Instructor Manual Principles of Information Securi
dl dl dl dl dldl
ty, 7th Edition by Michael E.Whitman
dl dl dl dl dl
,InstructorManual dl
Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-
dl dl dl dl dl dl dl dl dl
1; Module 1: Introduction to Information Security
dl dl dl dl dl dl
Table of Contents dl dl
Purpose and Perspective of the Module ...........................................................................................2
dl dl dl dl dl
Cengage Supplements .....................................................................................................................2
dl
Module Objectives ............................................................................................................................2
dl
Complete List of Module Activities and Assessments .......................................................................2
dl dl dl dl dl dl
Key Terms ........................................................................................................................................3
dl
What's New in This Module ...............................................................................................................4
dl dl dl dl
Module Outline .................................................................................................................................4
dl
Discussion Questions .....................................................................................................................15
dl
Suggested Usage for Lab Activities ................................................................................................16
dl dl dl dl
Additional Activities and Assignments ............................................................................................17
dl dl dl
Additional Resources ...................................................................................................................... 17
dl
Cengage Video Resources ................................................................................................................................ 17
dl dl
Internet Resources ........................................................................................................................................... 17
dl
Appendix ........................................................................................................................................18
Grading Rubrics ................................................................................................................................................ 18
dl
,Purpose and Perspective of the Module dl dl dl dl dl
The first module of the course in information security provides learners the foundational knowled
dl dl dl dl dl dl dl dl dl dl dl dl dl
ge to become well versed in the protection systems of any size need within an organization today.
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
The module begins with fundamental knowledge of what information security is and the how com
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
puter security evolved into what we know now as information security today. Additionally, learner
dl dl dl dl dl dl dl dl dl dl dl dl dl
s will gain knowledge on the how information security can be viewed either as an art or a science a
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
nd why that is the case.
dl dl dl dl dl
Cengage Supplements dl
The following product-
dl dl
level supplements are available in the Instructor Resource Center and provide additional informat
dl dl dl dl dl dl dl dl dl dl dl dl
ion that may help you in preparing your course:
dl dl dl dl dl dl dl dl
• PowerPoint slides dl
• Test banks, available in Word, as LMS-ready files, and on the Cognero platform
dl dl dl dl dl dl dl dl dl dl dl dl
• MindTap Educator Guide dl dl
• Solution and Answer Guide dl dl dl
• This instructor‘s manual
dl dl
Module Objectives dl
The following objectives are addressed in this module:
dl dl dl dl dl dl dl
1.1 Define information security. dl dl
1.2 Discuss the history of computer security and explain how it evolved into information s
dl dl dl dl dl dl dl dl dl dl dl dl dl
ecurity.
1.3 Define key terms and critical concepts of information security.
dl dl dl dl dl dl dl dl
1.4 Describe the information security roles of professionals within an organization.
dl dl dl dl dl dl dl dl dl
Complete List of Module Activities and Assessments dl dl dl dl dl dl
For additional guidance refer to the MindTap Educator Guide.
dl dl dl dl dl dl dl dl
Module dl PPT slide dl Activity/Assessment Duration
Objective
2 Icebreaker: Interview Simulation dl dl 10 minutes dl
1.1–1.2 19–20 Knowledge Check Activity 1 dl dl dl 2 minutes dl
1.3 34–35 Knowledge Check Activity 2 dl dl dl 2 minutes dl
1.4 39–40 Knowledge Check Activity 3 dl dl dl 2 minutes dl
1.1–1.4 MindTap Module 01 Review Questions dl dl dl 30–40 minutes dl
1.1 – 1.4 dl dl MindTap Module 01 Case Exercises dl dl dl 30 minutes dl
1.1 – 1.4 dl dl MindTap Module 01 Exercises dl dl 10–30 minutes per dl dl
question; 1+ hour pe dl dl dl
r module
dl
1.1 – 1.4 dl dl MindTap Module 01 Security for Life dl dl dl dl 1+ hour dl
1.1 – 1.4 dl dl MindTap Module 01 Quiz dl dl 10–15 minutes dl
[return to top] dl dl
, Key Terms dl
In order of use:
dl dl dl
computer security: In the early days of computers, this term specified the protection of the phys
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ical location and assets associated with computer technology from outside threats, but it later cam
dl dl dl dl dl dl dl dl dl dl dl dl dl dl
e to represent all actions taken to protect computer systems from losses.
dl dl dl dl dl dl dl dl dl dl dl
security: A state of being secure and free from danger or harm as well as the actions taken to ma
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ke someone or something secure.
dl dl dl dl
information security: Protection of the confidentiality, integrity, and availability of information a
dl dl dl dl dl dl dl dl dl dl dl
ssets, whether in storage, processing, or transmission, via the application of policy, education, trai
dl dl dl dl dl dl dl dl dl dl dl dl dl
ning and awareness, and technology.dl dl dl dl
network security: A subset of communications security; the protection of voice and data network
dl dl dl dl dl dl dl dl dl dl dl dl dl
ing components, connections, and content.
dl dl dl dl
C.I.A. triad: The industry standard for computer security since the development of the mainfram
dl dl dl dl dl dl dl dl dl dl dl dl dl
e; the standard is based on three characteristics that describe the attributes of information that are
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
important to protect: confidentiality, integrity, and availability.
dl dl dl dl dl dl dl
confidentiality: An attribute of information that describes how data is protected from disclosure o dl dl dl dl dl dl dl dl dl dl dl dl dl
r exposure to unauthorized individuals or systems.
dl dl dl dl dl dl
personally identifiable information (PII): Information about a person‘s history, background, an
dl dl dl dl dl dl dl dl dl dl
d attributes that can be used to commit identity theft that typically includes a person‘s name, addre
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ss, Social Security number, family information, employment history, and financial information.
dl dl dl dl dl dl dl dl dl dl
integrity: An attribute of information that describes how data is whole, complete, and uncorrupted
dl dl dl dl dl dl dl dl dl dl dl dl dl
.
availability: An attribute of information that describes how data is accessible and correctly format
dl dl dl dl dl dl dl dl dl dl dl dl dl
ted for use without interference or obstruction.
dl dl dl dl dl dl
accuracy: An attribute of information that describes how data is free of errors and has the value th
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
at the user expects.
dl dl dl
authenticity: An attribute of information that describes how data is genuine or original rather than dl dl dl dl dl dl dl dl dl dl dl dl dl dl
reproduced or fabricated.
dl dl dl
utility: An attribute of information that describes how data has value or usefulness for an end purp
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ose.
possession: An attribute of information that describes how the data‘s ownership or control is legit dl dl dl dl dl dl dl dl dl dl dl dl dl dl
imate or authorized. dl dl
McCumber Cube: A graphical representation of the architectural approach used in computer an
dl dl dl dl dl dl dl dl dl dl dl dl
d information security that is commonly shown as a cube composed of 3×3×3 cells, similar to a Ru
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
bik‘s Cube. dl
information system: The entire set of software, hardware, data, people, procedures, and networdl dl dl dl dl dl dl dl dl dl dl dl
ks that enable the use of information resources in the organization.
dl dl dl dl dl dl dl dl dl dl
physical security: The protection of material items, objects, or areas from unauthorized access an
dl dl dl dl dl dl dl dl dl dl dl dl dl
d misuse. dl
dl dl dl dl dldl
ty, 7th Edition by Michael E.Whitman
dl dl dl dl dl
,InstructorManual dl
Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-
dl dl dl dl dl dl dl dl dl
1; Module 1: Introduction to Information Security
dl dl dl dl dl dl
Table of Contents dl dl
Purpose and Perspective of the Module ...........................................................................................2
dl dl dl dl dl
Cengage Supplements .....................................................................................................................2
dl
Module Objectives ............................................................................................................................2
dl
Complete List of Module Activities and Assessments .......................................................................2
dl dl dl dl dl dl
Key Terms ........................................................................................................................................3
dl
What's New in This Module ...............................................................................................................4
dl dl dl dl
Module Outline .................................................................................................................................4
dl
Discussion Questions .....................................................................................................................15
dl
Suggested Usage for Lab Activities ................................................................................................16
dl dl dl dl
Additional Activities and Assignments ............................................................................................17
dl dl dl
Additional Resources ...................................................................................................................... 17
dl
Cengage Video Resources ................................................................................................................................ 17
dl dl
Internet Resources ........................................................................................................................................... 17
dl
Appendix ........................................................................................................................................18
Grading Rubrics ................................................................................................................................................ 18
dl
,Purpose and Perspective of the Module dl dl dl dl dl
The first module of the course in information security provides learners the foundational knowled
dl dl dl dl dl dl dl dl dl dl dl dl dl
ge to become well versed in the protection systems of any size need within an organization today.
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
The module begins with fundamental knowledge of what information security is and the how com
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
puter security evolved into what we know now as information security today. Additionally, learner
dl dl dl dl dl dl dl dl dl dl dl dl dl
s will gain knowledge on the how information security can be viewed either as an art or a science a
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
nd why that is the case.
dl dl dl dl dl
Cengage Supplements dl
The following product-
dl dl
level supplements are available in the Instructor Resource Center and provide additional informat
dl dl dl dl dl dl dl dl dl dl dl dl
ion that may help you in preparing your course:
dl dl dl dl dl dl dl dl
• PowerPoint slides dl
• Test banks, available in Word, as LMS-ready files, and on the Cognero platform
dl dl dl dl dl dl dl dl dl dl dl dl
• MindTap Educator Guide dl dl
• Solution and Answer Guide dl dl dl
• This instructor‘s manual
dl dl
Module Objectives dl
The following objectives are addressed in this module:
dl dl dl dl dl dl dl
1.1 Define information security. dl dl
1.2 Discuss the history of computer security and explain how it evolved into information s
dl dl dl dl dl dl dl dl dl dl dl dl dl
ecurity.
1.3 Define key terms and critical concepts of information security.
dl dl dl dl dl dl dl dl
1.4 Describe the information security roles of professionals within an organization.
dl dl dl dl dl dl dl dl dl
Complete List of Module Activities and Assessments dl dl dl dl dl dl
For additional guidance refer to the MindTap Educator Guide.
dl dl dl dl dl dl dl dl
Module dl PPT slide dl Activity/Assessment Duration
Objective
2 Icebreaker: Interview Simulation dl dl 10 minutes dl
1.1–1.2 19–20 Knowledge Check Activity 1 dl dl dl 2 minutes dl
1.3 34–35 Knowledge Check Activity 2 dl dl dl 2 minutes dl
1.4 39–40 Knowledge Check Activity 3 dl dl dl 2 minutes dl
1.1–1.4 MindTap Module 01 Review Questions dl dl dl 30–40 minutes dl
1.1 – 1.4 dl dl MindTap Module 01 Case Exercises dl dl dl 30 minutes dl
1.1 – 1.4 dl dl MindTap Module 01 Exercises dl dl 10–30 minutes per dl dl
question; 1+ hour pe dl dl dl
r module
dl
1.1 – 1.4 dl dl MindTap Module 01 Security for Life dl dl dl dl 1+ hour dl
1.1 – 1.4 dl dl MindTap Module 01 Quiz dl dl 10–15 minutes dl
[return to top] dl dl
, Key Terms dl
In order of use:
dl dl dl
computer security: In the early days of computers, this term specified the protection of the phys
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ical location and assets associated with computer technology from outside threats, but it later cam
dl dl dl dl dl dl dl dl dl dl dl dl dl dl
e to represent all actions taken to protect computer systems from losses.
dl dl dl dl dl dl dl dl dl dl dl
security: A state of being secure and free from danger or harm as well as the actions taken to ma
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ke someone or something secure.
dl dl dl dl
information security: Protection of the confidentiality, integrity, and availability of information a
dl dl dl dl dl dl dl dl dl dl dl
ssets, whether in storage, processing, or transmission, via the application of policy, education, trai
dl dl dl dl dl dl dl dl dl dl dl dl dl
ning and awareness, and technology.dl dl dl dl
network security: A subset of communications security; the protection of voice and data network
dl dl dl dl dl dl dl dl dl dl dl dl dl
ing components, connections, and content.
dl dl dl dl
C.I.A. triad: The industry standard for computer security since the development of the mainfram
dl dl dl dl dl dl dl dl dl dl dl dl dl
e; the standard is based on three characteristics that describe the attributes of information that are
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
important to protect: confidentiality, integrity, and availability.
dl dl dl dl dl dl dl
confidentiality: An attribute of information that describes how data is protected from disclosure o dl dl dl dl dl dl dl dl dl dl dl dl dl
r exposure to unauthorized individuals or systems.
dl dl dl dl dl dl
personally identifiable information (PII): Information about a person‘s history, background, an
dl dl dl dl dl dl dl dl dl dl
d attributes that can be used to commit identity theft that typically includes a person‘s name, addre
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ss, Social Security number, family information, employment history, and financial information.
dl dl dl dl dl dl dl dl dl dl
integrity: An attribute of information that describes how data is whole, complete, and uncorrupted
dl dl dl dl dl dl dl dl dl dl dl dl dl
.
availability: An attribute of information that describes how data is accessible and correctly format
dl dl dl dl dl dl dl dl dl dl dl dl dl
ted for use without interference or obstruction.
dl dl dl dl dl dl
accuracy: An attribute of information that describes how data is free of errors and has the value th
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
at the user expects.
dl dl dl
authenticity: An attribute of information that describes how data is genuine or original rather than dl dl dl dl dl dl dl dl dl dl dl dl dl dl
reproduced or fabricated.
dl dl dl
utility: An attribute of information that describes how data has value or usefulness for an end purp
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
ose.
possession: An attribute of information that describes how the data‘s ownership or control is legit dl dl dl dl dl dl dl dl dl dl dl dl dl dl
imate or authorized. dl dl
McCumber Cube: A graphical representation of the architectural approach used in computer an
dl dl dl dl dl dl dl dl dl dl dl dl
d information security that is commonly shown as a cube composed of 3×3×3 cells, similar to a Ru
dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl dl
bik‘s Cube. dl
information system: The entire set of software, hardware, data, people, procedures, and networdl dl dl dl dl dl dl dl dl dl dl dl
ks that enable the use of information resources in the organization.
dl dl dl dl dl dl dl dl dl dl
physical security: The protection of material items, objects, or areas from unauthorized access an
dl dl dl dl dl dl dl dl dl dl dl dl dl
d misuse. dl