100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

TESTBANK FOR Principles of Information Security (MindTap Course List) 7th Edition by Michael Whitman, Herbert Mattord ISBN:% COMPLETE GUIDE !!! ALL CHAPTERS COVERED!!! A+ GRADE ASSURED!!!

Rating
-
Sold
-
Pages
40
Grade
A+
Uploaded on
12-07-2025
Written in
2024/2025

TESTBANK FOR Principles of Information Security (MindTap Course List) 7th Edition by Michael Whitman, Herbert Mattord ISBN:978-0357506431 100% COMPLETE GUIDE !!! ALL CHAPTERS COVERED!!! A+ GRADE ASSURED!!!

Institution
Principles Of Information Security
Course
Principles of information security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Principles of information security
Course
Principles of information security

Document information

Uploaded on
July 12, 2025
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

InstructorManual Principlesof Information Securit
y,7th Edition by Michael E. Whitman

,InstructorManual
WhitmanandMattord,PrinciplesofInformationSecurity7e,ISBN978-0-357-50643-
xz xz xz xz xz xz xz



1; Module 1: Introduction to Information Security
xz xz xz xz xz xz xz




TableofContents
Purpose and Perspective of the Module .............................................................................................. 2
xz xz r xz r




CengageSupplements ...................................................................................................................... 2
ModuleObjectives ............................................................................................................................. 2
Complete List ofModule Activities and Assessments ......................................................................... 2
r r r xz xz




KeyTerms ......................................................................................................................................... 3
xz




What'sNew inThis Module................................................................................................................. 4
xz xz r




ModuleOutline .................................................................................................................................. 4
DiscussionQuestions ...................................................................................................................... 15
Suggested Usage forLab Activities .................................................................................................. 16
r r r




AdditionalActivities and Assignments .............................................................................................. 17
xz xz




AdditionalResources ...................................................................................................................... 17
CengageVideo Resources ................................................................................................................................. 17
xz




Internet Resources ............................................................................................................................................ 17
xz




Appendix ........................................................................................................................................ 18
Grading Rubrics ................................................................................................................................................. 18
xz

,PurposeandPerspectiveofthe Module zx zx




Thefirst module of the course in information security provides learners the foundationalknowledget
r r xz r xz r xz xz xz xz r xz



o becomewellversed in theprotection systems of any size need within an organization today. The m
xz r xz xz xz xz xz r xz xz xz xz xz r xz



odulebegins withfundamentalknowledgeofwhat information security is and the how computer sec
xz r xz xz xz xz xz xz xz xz



urity evolvedinto what we know now as information security today. Additionally, learners will gainkn
xz xz r r xz xz r xz xz xz xz xz r xz



owledge on thehow information security canbe viewed either as an art or ascience and whythat is th
r r xz xz xz r xz xz xz xz r xz r xz r xz xz



ecase.

CengageSupplements zx




Thefollowingproduct-
levelsupplements are available inthe Instructor ResourceCenter andprovideadditionalinformatio nthat mayhelp
xz r r xz r xz xz xz xz xz xz r


you in preparing your course:
xz xz xz xz




 PowerPointslides
 Test banks, available inWord, asLMS-ready files, and on the Cognero platform
xz xz xz xz xz xz xz xz r r xz



 MindTap EducatorGuide xz



 Solution and Answer Guide r xz xz



 This instructor‘s manual
xz xz




ModuleObjectives xz




Thefollowingobjectivesare addressed inthis module: xz xz xz




1.1 Define informationsecurity. r



1.2 Discuss thehistoryofcomputer securityand explainhow it evolvedintoinformationsec ur
xz xz xz xz r xz xz r xz xz xz xz



ity.
1.3 Define keyterms and critical concepts of information security.
r xz xz xz xz xz xz




1.4 Describe the informationsecurityrolesofprofessionalswithinan organization.
r r xz xz xz xz r




CompleteList ofModule ActivitiesandAssessments r x z




For additionalguidance refer to the MindTap EducatorGuide.
xz xz xz xz xz r




Module O bjec PPT slide
r xz r Activity/Assessment Duration
tive
2 Icebreaker:InterviewSimulation 10minutes xz



1.1–1.2 19–20 KnowledgeCheck Activity1 xz 2minutes
xz



1.3 34–35 KnowledgeCheck Activity2 xz 2minutes
xz



1.4 39–40 KnowledgeCheck Activity3 xz 2minutes
xz



1.1–1.4 MindTap Module01ReviewQuestions xz xz 30–40minutes
1.1– 1.4 r MindTap Module 01 Case Exercises xz xz xz 30minutes xz



1.1– 1.4 r MindTap Module01Exercises xz xz 10–
30minutes per questi
xz xz xz



on;1+hourper xz



module
1.1– 1.4 r MindTap Module 01 Securityfor Life xz xz xz 1+ hour xz



1.1– 1.4 r MindTap Module01Quiz xz xz 10–15minutes
[return totop] xz

, KeyTerms zx




Inorderofuse:
xz xz xz




computer security:In the early days ofcomputers, this term specified theprotection ofthe physical l
xz r xz xz xz xz xz xz r xz r xz



ocation and assetsassociatedwithcomputer technologyfrom outside threats, but it later came to re
r xz xz xz r xz r r xz r xz xz



present allactions taken to protect computer systems from losses.
xz xz xz xz r xz xz xz




security:A state ofbeingsecure andfree from danger or harm as well as theactionstaken to makes
r xz r r xz xz xz r xz r xz xz xz xz



omeoneorsomethingsecure. xz




information security:Protection oftheconfidentiality, integrity, and availabilityof information ass et
xz xz xz xz xz xz xz xz



s, whether in storage, processing, or transmission, via theapplication of policy, education, training and
xz xz xz xz xz xz xz r xz xz xz xz rx z xz



awareness, and technology. xz xz




networksecurity: A subset of communications security; theprotection of voice and datanetworkin gcomponents r r r xz r xz xz xz xz r xz xz



, connections, and content.
xz xz xz




C.I.A. triad: Theindustry standard for computer security since thedevelopment of the mainframe; t
xz r xz xz xz xz xz r r xz r xz xz



he standard is based onthree characteristics that describe the attributes ofinformation that are impo
xz xz xz r r r xz r r x z xz r r x



rtant to protect: confidentiality, integrity, and availability.
z xz xz xz xz xz r



confidentiality:An attribute of information that describes howdata is protected from disclosure or e r r xz r r x z xz xz xz xz r xz x



xposure to unauthorized individuals or systems.
z xz xz xz xz xz




personallyidentifiable information (PII):Information about a person‘s history, background, and xz xz xz r r xz xz xz rx


zattributes that can be used to commit identitytheft that typicallyincludes aperson‘s name, address,
xz r xz r xz xz r r r xz xz xz x



Social Security number, familyinformation, employment history, and financial information.
z xz xz xz xz xz xz xz r



integrity: An attribute of information that describes how data is whole, complete, and uncorrupted.
r xz r xz xz r xz r xz xz xz xz r




availability: Anattribute ofinformationthat describes howdataisaccessible andcorrectlyformatte dfo r xz r xz xz r xz xz xz xz r xz xz xz



r use without interference or obstruction.
xz r r r xz




accuracy: Anattribute ofinformationthat describes how datais freeoferrors andhas thevaluethat th e
r xz r xz xz r xz xz xz xz xz xz xz r xz r xz



userexpects. xz




authenticity: Anattribute of information that describes howdata is genuineororiginal rather thanre pr r xz r xz xz r xz xz xz xz xz xz



oduced orfabricated. r xz




utility: Anattribute ofinformationthat describes how datahas value orusefulnessforan endpurpos e.
r xz r xz xz r xz xz xz xz r xz r xz xz




possession:Anattribute ofinformationthat describes howthe data‘sownership or controlis legitim at xz r xz xz r xz r r xz xz xz xz



eorauthorized. xz




McCumber Cube:A graphical representation of thearchitectural approach used in computer and i
xz r xz xz xz xz xz xz xz xz r xz


nformation security that is commonlyshown as acube composed of 3×3×3cells, similar to a Rubik‘s
xz xz r xz r xz r xz xz xz xz xz xz xz



Cube.
information system: The entire set of software, hardware, data, people, procedures, and networksxz r r r xz xz xz xz xz xz xz xz rx


zthat enablethe useof information resources in the organization.
r r xz xz xz xz r




physical security: The protection ofmaterial items, objects,or areas from unauthorizedaccess and
xz r r xz r xz xz xz xz r xz



misuse.
$16.69
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TOPSCOREEXAMS
3.0
(1)

Get to know the seller

Seller avatar
TOPSCOREEXAMS Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
5 months
Number of followers
1
Documents
149
Last sold
2 months ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions