InstructorManual Principlesof Information Securit
y,7th Edition by Michael E. Whitman
,InstructorManual
WhitmanandMattord,PrinciplesofInformationSecurity7e,ISBN978-0-357-50643-
xz xz xz xz xz xz xz
1; Module 1: Introduction to Information Security
xz xz xz xz xz xz xz
TableofContents
Purpose and Perspective of the Module .............................................................................................. 2
xz xz r xz r
CengageSupplements ...................................................................................................................... 2
ModuleObjectives ............................................................................................................................. 2
Complete List ofModule Activities and Assessments ......................................................................... 2
r r r xz xz
KeyTerms ......................................................................................................................................... 3
xz
What'sNew inThis Module................................................................................................................. 4
xz xz r
ModuleOutline .................................................................................................................................. 4
DiscussionQuestions ...................................................................................................................... 15
Suggested Usage forLab Activities .................................................................................................. 16
r r r
AdditionalActivities and Assignments .............................................................................................. 17
xz xz
AdditionalResources ...................................................................................................................... 17
CengageVideo Resources ................................................................................................................................. 17
xz
Internet Resources ............................................................................................................................................ 17
xz
Appendix ........................................................................................................................................ 18
Grading Rubrics ................................................................................................................................................. 18
xz
,PurposeandPerspectiveofthe Module zx zx
Thefirst module of the course in information security provides learners the foundationalknowledget
r r xz r xz r xz xz xz xz r xz
o becomewellversed in theprotection systems of any size need within an organization today. The m
xz r xz xz xz xz xz r xz xz xz xz xz r xz
odulebegins withfundamentalknowledgeofwhat information security is and the how computer sec
xz r xz xz xz xz xz xz xz xz
urity evolvedinto what we know now as information security today. Additionally, learners will gainkn
xz xz r r xz xz r xz xz xz xz xz r xz
owledge on thehow information security canbe viewed either as an art or ascience and whythat is th
r r xz xz xz r xz xz xz xz r xz r xz r xz xz
ecase.
CengageSupplements zx
Thefollowingproduct-
levelsupplements are available inthe Instructor ResourceCenter andprovideadditionalinformatio nthat mayhelp
xz r r xz r xz xz xz xz xz xz r
you in preparing your course:
xz xz xz xz
PowerPointslides
Test banks, available inWord, asLMS-ready files, and on the Cognero platform
xz xz xz xz xz xz xz xz r r xz
MindTap EducatorGuide xz
Solution and Answer Guide r xz xz
This instructor‘s manual
xz xz
ModuleObjectives xz
Thefollowingobjectivesare addressed inthis module: xz xz xz
1.1 Define informationsecurity. r
1.2 Discuss thehistoryofcomputer securityand explainhow it evolvedintoinformationsec ur
xz xz xz xz r xz xz r xz xz xz xz
ity.
1.3 Define keyterms and critical concepts of information security.
r xz xz xz xz xz xz
1.4 Describe the informationsecurityrolesofprofessionalswithinan organization.
r r xz xz xz xz r
CompleteList ofModule ActivitiesandAssessments r x z
For additionalguidance refer to the MindTap EducatorGuide.
xz xz xz xz xz r
Module O bjec PPT slide
r xz r Activity/Assessment Duration
tive
2 Icebreaker:InterviewSimulation 10minutes xz
1.1–1.2 19–20 KnowledgeCheck Activity1 xz 2minutes
xz
1.3 34–35 KnowledgeCheck Activity2 xz 2minutes
xz
1.4 39–40 KnowledgeCheck Activity3 xz 2minutes
xz
1.1–1.4 MindTap Module01ReviewQuestions xz xz 30–40minutes
1.1– 1.4 r MindTap Module 01 Case Exercises xz xz xz 30minutes xz
1.1– 1.4 r MindTap Module01Exercises xz xz 10–
30minutes per questi
xz xz xz
on;1+hourper xz
module
1.1– 1.4 r MindTap Module 01 Securityfor Life xz xz xz 1+ hour xz
1.1– 1.4 r MindTap Module01Quiz xz xz 10–15minutes
[return totop] xz
, KeyTerms zx
Inorderofuse:
xz xz xz
computer security:In the early days ofcomputers, this term specified theprotection ofthe physical l
xz r xz xz xz xz xz xz r xz r xz
ocation and assetsassociatedwithcomputer technologyfrom outside threats, but it later came to re
r xz xz xz r xz r r xz r xz xz
present allactions taken to protect computer systems from losses.
xz xz xz xz r xz xz xz
security:A state ofbeingsecure andfree from danger or harm as well as theactionstaken to makes
r xz r r xz xz xz r xz r xz xz xz xz
omeoneorsomethingsecure. xz
information security:Protection oftheconfidentiality, integrity, and availabilityof information ass et
xz xz xz xz xz xz xz xz
s, whether in storage, processing, or transmission, via theapplication of policy, education, training and
xz xz xz xz xz xz xz r xz xz xz xz rx z xz
awareness, and technology. xz xz
networksecurity: A subset of communications security; theprotection of voice and datanetworkin gcomponents r r r xz r xz xz xz xz r xz xz
, connections, and content.
xz xz xz
C.I.A. triad: Theindustry standard for computer security since thedevelopment of the mainframe; t
xz r xz xz xz xz xz r r xz r xz xz
he standard is based onthree characteristics that describe the attributes ofinformation that are impo
xz xz xz r r r xz r r x z xz r r x
rtant to protect: confidentiality, integrity, and availability.
z xz xz xz xz xz r
confidentiality:An attribute of information that describes howdata is protected from disclosure or e r r xz r r x z xz xz xz xz r xz x
xposure to unauthorized individuals or systems.
z xz xz xz xz xz
personallyidentifiable information (PII):Information about a person‘s history, background, and xz xz xz r r xz xz xz rx
zattributes that can be used to commit identitytheft that typicallyincludes aperson‘s name, address,
xz r xz r xz xz r r r xz xz xz x
Social Security number, familyinformation, employment history, and financial information.
z xz xz xz xz xz xz xz r
integrity: An attribute of information that describes how data is whole, complete, and uncorrupted.
r xz r xz xz r xz r xz xz xz xz r
availability: Anattribute ofinformationthat describes howdataisaccessible andcorrectlyformatte dfo r xz r xz xz r xz xz xz xz r xz xz xz
r use without interference or obstruction.
xz r r r xz
accuracy: Anattribute ofinformationthat describes how datais freeoferrors andhas thevaluethat th e
r xz r xz xz r xz xz xz xz xz xz xz r xz r xz
userexpects. xz
authenticity: Anattribute of information that describes howdata is genuineororiginal rather thanre pr r xz r xz xz r xz xz xz xz xz xz
oduced orfabricated. r xz
utility: Anattribute ofinformationthat describes how datahas value orusefulnessforan endpurpos e.
r xz r xz xz r xz xz xz xz r xz r xz xz
possession:Anattribute ofinformationthat describes howthe data‘sownership or controlis legitim at xz r xz xz r xz r r xz xz xz xz
eorauthorized. xz
McCumber Cube:A graphical representation of thearchitectural approach used in computer and i
xz r xz xz xz xz xz xz xz xz r xz
nformation security that is commonlyshown as acube composed of 3×3×3cells, similar to a Rubik‘s
xz xz r xz r xz r xz xz xz xz xz xz xz
Cube.
information system: The entire set of software, hardware, data, people, procedures, and networksxz r r r xz xz xz xz xz xz xz xz rx
zthat enablethe useof information resources in the organization.
r r xz xz xz xz r
physical security: The protection ofmaterial items, objects,or areas from unauthorizedaccess and
xz r r xz r xz xz xz xz r xz
misuse.
y,7th Edition by Michael E. Whitman
,InstructorManual
WhitmanandMattord,PrinciplesofInformationSecurity7e,ISBN978-0-357-50643-
xz xz xz xz xz xz xz
1; Module 1: Introduction to Information Security
xz xz xz xz xz xz xz
TableofContents
Purpose and Perspective of the Module .............................................................................................. 2
xz xz r xz r
CengageSupplements ...................................................................................................................... 2
ModuleObjectives ............................................................................................................................. 2
Complete List ofModule Activities and Assessments ......................................................................... 2
r r r xz xz
KeyTerms ......................................................................................................................................... 3
xz
What'sNew inThis Module................................................................................................................. 4
xz xz r
ModuleOutline .................................................................................................................................. 4
DiscussionQuestions ...................................................................................................................... 15
Suggested Usage forLab Activities .................................................................................................. 16
r r r
AdditionalActivities and Assignments .............................................................................................. 17
xz xz
AdditionalResources ...................................................................................................................... 17
CengageVideo Resources ................................................................................................................................. 17
xz
Internet Resources ............................................................................................................................................ 17
xz
Appendix ........................................................................................................................................ 18
Grading Rubrics ................................................................................................................................................. 18
xz
,PurposeandPerspectiveofthe Module zx zx
Thefirst module of the course in information security provides learners the foundationalknowledget
r r xz r xz r xz xz xz xz r xz
o becomewellversed in theprotection systems of any size need within an organization today. The m
xz r xz xz xz xz xz r xz xz xz xz xz r xz
odulebegins withfundamentalknowledgeofwhat information security is and the how computer sec
xz r xz xz xz xz xz xz xz xz
urity evolvedinto what we know now as information security today. Additionally, learners will gainkn
xz xz r r xz xz r xz xz xz xz xz r xz
owledge on thehow information security canbe viewed either as an art or ascience and whythat is th
r r xz xz xz r xz xz xz xz r xz r xz r xz xz
ecase.
CengageSupplements zx
Thefollowingproduct-
levelsupplements are available inthe Instructor ResourceCenter andprovideadditionalinformatio nthat mayhelp
xz r r xz r xz xz xz xz xz xz r
you in preparing your course:
xz xz xz xz
PowerPointslides
Test banks, available inWord, asLMS-ready files, and on the Cognero platform
xz xz xz xz xz xz xz xz r r xz
MindTap EducatorGuide xz
Solution and Answer Guide r xz xz
This instructor‘s manual
xz xz
ModuleObjectives xz
Thefollowingobjectivesare addressed inthis module: xz xz xz
1.1 Define informationsecurity. r
1.2 Discuss thehistoryofcomputer securityand explainhow it evolvedintoinformationsec ur
xz xz xz xz r xz xz r xz xz xz xz
ity.
1.3 Define keyterms and critical concepts of information security.
r xz xz xz xz xz xz
1.4 Describe the informationsecurityrolesofprofessionalswithinan organization.
r r xz xz xz xz r
CompleteList ofModule ActivitiesandAssessments r x z
For additionalguidance refer to the MindTap EducatorGuide.
xz xz xz xz xz r
Module O bjec PPT slide
r xz r Activity/Assessment Duration
tive
2 Icebreaker:InterviewSimulation 10minutes xz
1.1–1.2 19–20 KnowledgeCheck Activity1 xz 2minutes
xz
1.3 34–35 KnowledgeCheck Activity2 xz 2minutes
xz
1.4 39–40 KnowledgeCheck Activity3 xz 2minutes
xz
1.1–1.4 MindTap Module01ReviewQuestions xz xz 30–40minutes
1.1– 1.4 r MindTap Module 01 Case Exercises xz xz xz 30minutes xz
1.1– 1.4 r MindTap Module01Exercises xz xz 10–
30minutes per questi
xz xz xz
on;1+hourper xz
module
1.1– 1.4 r MindTap Module 01 Securityfor Life xz xz xz 1+ hour xz
1.1– 1.4 r MindTap Module01Quiz xz xz 10–15minutes
[return totop] xz
, KeyTerms zx
Inorderofuse:
xz xz xz
computer security:In the early days ofcomputers, this term specified theprotection ofthe physical l
xz r xz xz xz xz xz xz r xz r xz
ocation and assetsassociatedwithcomputer technologyfrom outside threats, but it later came to re
r xz xz xz r xz r r xz r xz xz
present allactions taken to protect computer systems from losses.
xz xz xz xz r xz xz xz
security:A state ofbeingsecure andfree from danger or harm as well as theactionstaken to makes
r xz r r xz xz xz r xz r xz xz xz xz
omeoneorsomethingsecure. xz
information security:Protection oftheconfidentiality, integrity, and availabilityof information ass et
xz xz xz xz xz xz xz xz
s, whether in storage, processing, or transmission, via theapplication of policy, education, training and
xz xz xz xz xz xz xz r xz xz xz xz rx z xz
awareness, and technology. xz xz
networksecurity: A subset of communications security; theprotection of voice and datanetworkin gcomponents r r r xz r xz xz xz xz r xz xz
, connections, and content.
xz xz xz
C.I.A. triad: Theindustry standard for computer security since thedevelopment of the mainframe; t
xz r xz xz xz xz xz r r xz r xz xz
he standard is based onthree characteristics that describe the attributes ofinformation that are impo
xz xz xz r r r xz r r x z xz r r x
rtant to protect: confidentiality, integrity, and availability.
z xz xz xz xz xz r
confidentiality:An attribute of information that describes howdata is protected from disclosure or e r r xz r r x z xz xz xz xz r xz x
xposure to unauthorized individuals or systems.
z xz xz xz xz xz
personallyidentifiable information (PII):Information about a person‘s history, background, and xz xz xz r r xz xz xz rx
zattributes that can be used to commit identitytheft that typicallyincludes aperson‘s name, address,
xz r xz r xz xz r r r xz xz xz x
Social Security number, familyinformation, employment history, and financial information.
z xz xz xz xz xz xz xz r
integrity: An attribute of information that describes how data is whole, complete, and uncorrupted.
r xz r xz xz r xz r xz xz xz xz r
availability: Anattribute ofinformationthat describes howdataisaccessible andcorrectlyformatte dfo r xz r xz xz r xz xz xz xz r xz xz xz
r use without interference or obstruction.
xz r r r xz
accuracy: Anattribute ofinformationthat describes how datais freeoferrors andhas thevaluethat th e
r xz r xz xz r xz xz xz xz xz xz xz r xz r xz
userexpects. xz
authenticity: Anattribute of information that describes howdata is genuineororiginal rather thanre pr r xz r xz xz r xz xz xz xz xz xz
oduced orfabricated. r xz
utility: Anattribute ofinformationthat describes how datahas value orusefulnessforan endpurpos e.
r xz r xz xz r xz xz xz xz r xz r xz xz
possession:Anattribute ofinformationthat describes howthe data‘sownership or controlis legitim at xz r xz xz r xz r r xz xz xz xz
eorauthorized. xz
McCumber Cube:A graphical representation of thearchitectural approach used in computer and i
xz r xz xz xz xz xz xz xz xz r xz
nformation security that is commonlyshown as acube composed of 3×3×3cells, similar to a Rubik‘s
xz xz r xz r xz r xz xz xz xz xz xz xz
Cube.
information system: The entire set of software, hardware, data, people, procedures, and networksxz r r r xz xz xz xz xz xz xz xz rx
zthat enablethe useof information resources in the organization.
r r xz xz xz xz r
physical security: The protection ofmaterial items, objects,or areas from unauthorizedaccess and
xz r r xz r xz xz xz xz r xz
misuse.