Instructor Manual Principles of Information Securit
r r r r rr
y, 7th Edition by Michael E.Whitman
r r r r r
,InstructorManual r
WhitmanrandrMattord,rPrinciplesrofrInformationrSecurityr7e,rISBNr978-0-357-50643-
1;rModuler1:rIntroductionrtorInformationrSecurity
Table of Contents
r r
PurposerandrPerspectiverofrtherModule ........................................................................................ 2
CengagerSupplements ................................................................................................................ 2
ModulerObjectives ....................................................................................................................... 2
CompleterListrofrModulerActivitiesrandrAssessments ..................................................................... 2
KeyrTerms ................................................................................................................................... 3
What'srNewrinrThisrModule ........................................................................................................... 4
ModulerOutline ............................................................................................................................ 4
DiscussionrQuestions ................................................................................................................ 15
SuggestedrUsagerforrLabrActivities ............................................................................................. 16
AdditionalrActivitiesrandrAssignments ......................................................................................... 17
AdditionalrResources ................................................................................................................. 17
CengagerVideorResources ........................................................................................................................ 17
InternetrResources ................................................................................................................................... 17
Appendix ................................................................................................................................... 18
GradingrRubrics........................................................................................................................................ 18
,Purpose and Perspective of the Module
r r r r r
Therfirstrmodulerofrthercourserinrinformationrsecurityrprovidesrlearnersrtherfoundationalrknowledger
torbecomerwellrversedrinrtherprotectionrsystemsrofranyrsizerneedrwithinranrorganizationrtoday.rTher
modulerbeginsrwithrfundamentalrknowledgerofrwhatrinformationrsecurityrisrandrtherhowrcomputerrs
ecurityrevolvedrintorwhatrwerknowrnowrasrinformationrsecurityrtoday.rAdditionally,rlearnersrwillrgain
rknowledgeronrtherhowrinformationrsecurityrcanrberviewedreitherrasranrartrorrarsciencerandrwhyrthatr
isrthercase.
Cengage Supplements r
Therfollowingrproduct-
levelrsupplementsrareravailablerinrtherInstructorrResourcerCenterrandrprovideradditionalrinformatio
nrthatrmayrhelpryourinrpreparingryourrcourse:
• PowerPointrslides
• Testrbanks,ravailablerinrWord,rasrLMS-readyrfiles,randronrtherCognerorplatform
• MindTaprEducatorrGuide
• SolutionrandrAnswerrGuide
• Thisrinstructor‘srmanual
Module Objectives
r
Therfollowingrobjectivesrareraddressedrinrthisrmodule:
1.1 Definerinformationrsecurity.
1.2 Discussrtherhistoryrofrcomputerrsecurityrandrexplainrhowritrevolvedrintorinformationrse
curity.
1.3 Definerkeyrtermsrandrcriticalrconceptsrofrinformationrsecurity.
1.4 Describertherinformationrsecurityrrolesrofrprofessionalsrwithinranrorganization.
Complete List of Module Activities and Assessments
r r r r r r
ForradditionalrguidancerreferrtortherMindTaprEducatorrGuide.
ModulerO PPTrslide Activity/Assessment Duration
bjective
2 Icebreaker:rInterviewrSimulation 10rminutes
1.1–1.2 19–20 KnowledgerCheckrActivityr1 2rminutes
1.3 34–35 KnowledgerCheckrActivityr2 2rminutes
1.4 39–40 KnowledgerCheckrActivityr3 2rminutes
1.1–1.4 MindTap Moduler01rReviewrQuestions 30–40rminutes
1.1r–r1.4 MindTap Moduler01rCaserExercises 30rminutes
1.1r–r1.4 MindTap Moduler01rExercises 10–30rminutesrper
question;r1+rhourrpe
rrmodule
1.1r–r1.4 MindTap Moduler01rSecurityrforrLife 1+rhour
1.1r–r1.4 MindTap Moduler01rQuiz 10–15rminutes
[returnrtortop]
, Key Terms
r
Inrorderrofruse:
computerrsecurity:rInrtherearlyrdaysrofrcomputers,rthisrtermrspecifiedrtherprotectionrofrtherphysic
alrlocationrandrassetsrassociatedrwithrcomputerrtechnologyrfromroutsiderthreats,rbutritrlaterrcamert
orrepresentrallractionsrtakenrtorprotectrcomputerrsystemsrfromrlosses.
security:rArstaterofrbeingrsecurerandrfreerfromrdangerrorrharmrasrwellrasrtheractionsrtakenrtormaker
someonerorrsomethingrsecure.
informationrsecurity:rProtectionrofrtherconfidentiality,rintegrity,randravailabilityrofrinformationrass
ets,rwhetherrinrstorage,rprocessing,rorrtransmission,rviartherapplicationrofrpolicy,reducation,rtrainin
grandrawareness,randrtechnology.
networkrsecurity:rArsubsetrofrcommunicationsrsecurity;rtherprotectionrofrvoicerandrdatarnetworkin
grcomponents,rconnections,randrcontent.
C.I.A.rtriad:rTherindustryrstandardrforrcomputerrsecurityrsincertherdevelopmentrofrthermainframe;rt
herstandardrisrbasedronrthreercharacteristicsrthatrdescribertherattributesrofrinformationrthatrarerimp
ortantrtorprotect:rconfidentiality,rintegrity,randravailability.
confidentiality:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrprotectedrfromrdisclosurerorr
exposurertorunauthorizedrindividualsrorrsystems.
personallyridentifiablerinformationr(PII):rInformationraboutrarperson‘srhistory,rbackground,randr
attributesrthatrcanrberusedrtorcommitridentityrtheftrthatrtypicallyrincludesrarperson‘srname,raddress,r
SocialrSecurityrnumber,rfamilyrinformation,remploymentrhistory,randrfinancialrinformation.
integrity:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrwhole,rcomplete,randruncorrupted.
availability:rAnrattributerofrinformationrthatrdescribesrhowrdatarisraccessiblerandrcorrectlyrformatt
edrforruserwithoutrinterferencerorrobstruction.
accuracy:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrfreerofrerrorsrandrhasrthervaluerthatrt
heruserrexpects.
authenticity:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrgenuinerorroriginalrratherrthanrr
eproducedrorrfabricated.
utility:rAnrattributerofrinformationrthatrdescribesrhowrdatarhasrvaluerorrusefulnessrforranrendrpurpo
se.
possession:rAnrattributerofrinformationrthatrdescribesrhowrtherdata‘srownershiprorrcontrolrisrlegiti
materorrauthorized.
McCumberrCube:rArgraphicalrrepresentationrofrtherarchitecturalrapproachrusedrinrcomputerrandri
nformationrsecurityrthatrisrcommonlyrshownrasrarcubercomposedrofr3×3×3rcells,rsimilarrtorarRubik‘
srCube.
informationrsystem:rTherentirersetrofrsoftware,rhardware,rdata,rpeople,rprocedures,randrnetwork
srthatrenablertheruserofrinformationrresourcesrinrtherorganization.
physicalrsecurity:rTherprotectionrofrmaterialritems,robjects,rorrareasrfromrunauthorizedraccessrand
rmisuse.
r r r r rr
y, 7th Edition by Michael E.Whitman
r r r r r
,InstructorManual r
WhitmanrandrMattord,rPrinciplesrofrInformationrSecurityr7e,rISBNr978-0-357-50643-
1;rModuler1:rIntroductionrtorInformationrSecurity
Table of Contents
r r
PurposerandrPerspectiverofrtherModule ........................................................................................ 2
CengagerSupplements ................................................................................................................ 2
ModulerObjectives ....................................................................................................................... 2
CompleterListrofrModulerActivitiesrandrAssessments ..................................................................... 2
KeyrTerms ................................................................................................................................... 3
What'srNewrinrThisrModule ........................................................................................................... 4
ModulerOutline ............................................................................................................................ 4
DiscussionrQuestions ................................................................................................................ 15
SuggestedrUsagerforrLabrActivities ............................................................................................. 16
AdditionalrActivitiesrandrAssignments ......................................................................................... 17
AdditionalrResources ................................................................................................................. 17
CengagerVideorResources ........................................................................................................................ 17
InternetrResources ................................................................................................................................... 17
Appendix ................................................................................................................................... 18
GradingrRubrics........................................................................................................................................ 18
,Purpose and Perspective of the Module
r r r r r
Therfirstrmodulerofrthercourserinrinformationrsecurityrprovidesrlearnersrtherfoundationalrknowledger
torbecomerwellrversedrinrtherprotectionrsystemsrofranyrsizerneedrwithinranrorganizationrtoday.rTher
modulerbeginsrwithrfundamentalrknowledgerofrwhatrinformationrsecurityrisrandrtherhowrcomputerrs
ecurityrevolvedrintorwhatrwerknowrnowrasrinformationrsecurityrtoday.rAdditionally,rlearnersrwillrgain
rknowledgeronrtherhowrinformationrsecurityrcanrberviewedreitherrasranrartrorrarsciencerandrwhyrthatr
isrthercase.
Cengage Supplements r
Therfollowingrproduct-
levelrsupplementsrareravailablerinrtherInstructorrResourcerCenterrandrprovideradditionalrinformatio
nrthatrmayrhelpryourinrpreparingryourrcourse:
• PowerPointrslides
• Testrbanks,ravailablerinrWord,rasrLMS-readyrfiles,randronrtherCognerorplatform
• MindTaprEducatorrGuide
• SolutionrandrAnswerrGuide
• Thisrinstructor‘srmanual
Module Objectives
r
Therfollowingrobjectivesrareraddressedrinrthisrmodule:
1.1 Definerinformationrsecurity.
1.2 Discussrtherhistoryrofrcomputerrsecurityrandrexplainrhowritrevolvedrintorinformationrse
curity.
1.3 Definerkeyrtermsrandrcriticalrconceptsrofrinformationrsecurity.
1.4 Describertherinformationrsecurityrrolesrofrprofessionalsrwithinranrorganization.
Complete List of Module Activities and Assessments
r r r r r r
ForradditionalrguidancerreferrtortherMindTaprEducatorrGuide.
ModulerO PPTrslide Activity/Assessment Duration
bjective
2 Icebreaker:rInterviewrSimulation 10rminutes
1.1–1.2 19–20 KnowledgerCheckrActivityr1 2rminutes
1.3 34–35 KnowledgerCheckrActivityr2 2rminutes
1.4 39–40 KnowledgerCheckrActivityr3 2rminutes
1.1–1.4 MindTap Moduler01rReviewrQuestions 30–40rminutes
1.1r–r1.4 MindTap Moduler01rCaserExercises 30rminutes
1.1r–r1.4 MindTap Moduler01rExercises 10–30rminutesrper
question;r1+rhourrpe
rrmodule
1.1r–r1.4 MindTap Moduler01rSecurityrforrLife 1+rhour
1.1r–r1.4 MindTap Moduler01rQuiz 10–15rminutes
[returnrtortop]
, Key Terms
r
Inrorderrofruse:
computerrsecurity:rInrtherearlyrdaysrofrcomputers,rthisrtermrspecifiedrtherprotectionrofrtherphysic
alrlocationrandrassetsrassociatedrwithrcomputerrtechnologyrfromroutsiderthreats,rbutritrlaterrcamert
orrepresentrallractionsrtakenrtorprotectrcomputerrsystemsrfromrlosses.
security:rArstaterofrbeingrsecurerandrfreerfromrdangerrorrharmrasrwellrasrtheractionsrtakenrtormaker
someonerorrsomethingrsecure.
informationrsecurity:rProtectionrofrtherconfidentiality,rintegrity,randravailabilityrofrinformationrass
ets,rwhetherrinrstorage,rprocessing,rorrtransmission,rviartherapplicationrofrpolicy,reducation,rtrainin
grandrawareness,randrtechnology.
networkrsecurity:rArsubsetrofrcommunicationsrsecurity;rtherprotectionrofrvoicerandrdatarnetworkin
grcomponents,rconnections,randrcontent.
C.I.A.rtriad:rTherindustryrstandardrforrcomputerrsecurityrsincertherdevelopmentrofrthermainframe;rt
herstandardrisrbasedronrthreercharacteristicsrthatrdescribertherattributesrofrinformationrthatrarerimp
ortantrtorprotect:rconfidentiality,rintegrity,randravailability.
confidentiality:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrprotectedrfromrdisclosurerorr
exposurertorunauthorizedrindividualsrorrsystems.
personallyridentifiablerinformationr(PII):rInformationraboutrarperson‘srhistory,rbackground,randr
attributesrthatrcanrberusedrtorcommitridentityrtheftrthatrtypicallyrincludesrarperson‘srname,raddress,r
SocialrSecurityrnumber,rfamilyrinformation,remploymentrhistory,randrfinancialrinformation.
integrity:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrwhole,rcomplete,randruncorrupted.
availability:rAnrattributerofrinformationrthatrdescribesrhowrdatarisraccessiblerandrcorrectlyrformatt
edrforruserwithoutrinterferencerorrobstruction.
accuracy:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrfreerofrerrorsrandrhasrthervaluerthatrt
heruserrexpects.
authenticity:rAnrattributerofrinformationrthatrdescribesrhowrdatarisrgenuinerorroriginalrratherrthanrr
eproducedrorrfabricated.
utility:rAnrattributerofrinformationrthatrdescribesrhowrdatarhasrvaluerorrusefulnessrforranrendrpurpo
se.
possession:rAnrattributerofrinformationrthatrdescribesrhowrtherdata‘srownershiprorrcontrolrisrlegiti
materorrauthorized.
McCumberrCube:rArgraphicalrrepresentationrofrtherarchitecturalrapproachrusedrinrcomputerrandri
nformationrsecurityrthatrisrcommonlyrshownrasrarcubercomposedrofr3×3×3rcells,rsimilarrtorarRubik‘
srCube.
informationrsystem:rTherentirersetrofrsoftware,rhardware,rdata,rpeople,rprocedures,randrnetwork
srthatrenablertheruserofrinformationrresourcesrinrtherorganization.
physicalrsecurity:rTherprotectionrofrmaterialritems,robjects,rorrareasrfromrunauthorizedraccessrand
rmisuse.