100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Instructor Manual Principles of Information Security, 7th Edition by Michael E. Whitman

Rating
-
Sold
-
Pages
569
Grade
A+
Uploaded on
31-07-2025
Written in
2024/2025

Instructor Manual Principles of Information Security, 7th Edition by Michael E. Whitman

Institution
Instructor Manual Principles Of Information Secur
Course
Instructor Manual Principles of Information Secur











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Instructor Manual Principles of Information Secur
Course
Instructor Manual Principles of Information Secur

Document information

Uploaded on
July 31, 2025
Number of pages
569
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Instructor Manual
Principles of Information Security,
7th Edition by Michael E. Whitman

,Instructor Manual 58


Whitman58and58Mattord,58Principles58of58Information58Security587e,58ISBN58978-0-357-50643-
1;58Module581:58Introduction58to58Information58Security

Table58of58Contents
Purpose58and58Perspective58of58the58Module ............................................................................. 2
Cengage58Supplements .............................................................................................................. 2
Module58Objectives ..................................................................................................................... 2
Complete58List58of58Module58Activities58and58Assessments ....................................................... 2
Key58Terms ................................................................................................................................. 3
What's58New58in58This58Module .................................................................................................. 4
Module58Outline .......................................................................................................................... 4
Discussion58Questions .............................................................................................................. 15
Suggested58Usage58for58Lab58Activities .................................................................................... 16
Additional58Activities58and58Assignments .................................................................................. 17
Additional58Resources ............................................................................................................... 17
Cengage58Video58Resources .................................................................................................................... 17
Internet58Resources ................................................................................................................................. 17
Appendix ................................................................................................................................... 18
Grading58Rubrics ..................................................................................................................................... 18

,Purpose58and58Perspective58of58the58Module
The58first58module58of58the58course58in58information58security58provides58learners58the58found
ational58knowledge58to58become58well58versed58in58the58protection58systems58of58any58size58
need58within58an58organization58today.58The58module58begins58with58fundamental58knowledge
58of58what58information58security58is58and58the58how58computer58security58evolved58into58wha
t58we58know58now58as58information58security58today.58Additionally,58learners58will58gain58know
ledge58on58the58how58information58security58can58be58viewed58either58as58an58art58or58a58scie
nce58and58why58that58is58the58case.

Cengage58Supplements
The58following58product-
level58supplements58are58available58in58the58Instructor58Resource58Center58and58provide58add
itional58information58that58may58help58you58in58preparing58your58course:
 PowerPoint58slides
 Test58banks,58available58in58Word,58as58LMS-
ready58files,58and58on58the58Cognero58platform
 MindTap58Educator58Guide
 Solution58and58Answer58Guide
 This58instructor‘s58manual

Module58Objectives
The58following58objectives58are58addressed58in58this58module:
1.1 Define58information58security.
1.2 Discuss58the58history58of58computer58security58and58explain58how58it58evolved58int
o58information58security.
1.3 Define58key58terms58and58critical58concepts58of58information58security.
1.4 Describe58the58information58security58roles58of58professionals58within58an58organization.

Complete58List58of58Module58Activities58and58Assessments
For58additional58guidance58refer58to58the58MindTap58Educator58Guide.

Module58 PPT58slide Activity/Assessment Duration
Objective
2 Icebreaker:58Interview58Simulation 1058minutes
1.1–1.2 19–20 Knowledge58Check58Activity581 258minutes
1.3 34–35 Knowledge58Check58Activity582 258minutes
1.4 39–40 Knowledge58Check58Activity583 258minutes
1.1–1.4 MindTap Module580158Review58Questions 30–4058minutes
1.158–581.4 MindTap Module580158Case58Exercises 3058minutes
1.158–581.4 MindTap Module580158Exercises 10–3058minutes58per
question;581+58hour5
8per58module
1.158–581.4 MindTap Module580158Security58for58Life 1+58hour
1.158–581.4 MindTap Module580158Quiz 10–1558minutes
[return58to58top]

, Key58Terms
In58order58of58use:
computer58security:58In58the58early58days58of58computers,58this58term58specified58the58prote
ction58of58the58physical58location58and58assets58associated58with58computer58technology58fro
m58outside58threats,58but58it58later58came58to58represent58all58actions58taken58to58protect58co
mputer58systems58from58losses.
security:58A58state58of58being58secure58and58free58from58danger58or58harm58as58well58as58the
58actions58taken58to58make58someone58or58something58secure.

information58security:58Protection58of58the58confidentiality,58integrity,58and58availability58of58infor
mation58assets,58whether58in58storage,58processing,58or58transmission,58via58the58application58of58
policy,58education,58training58and58awareness,58and58technology.
network58security:58A58subset58of58communications58security;58the58protection58of58voic
e58and58data58networking58components,58connections,58and58content.
C.I.A.58triad:58The58industry58standard58for58computer58security58since58the58developm
ent58of58the58mainframe;58the58standard58is58based58on58three58characteristics58that58de
scribe58the58attributes58of58information58that58are58important58to58protect:58confidentiality
,58integrity,58and58availability.
confidentiality:58An58attribute58of58information58that58describes58how58data58is58protected58fro
m58disclosure58or58exposure58to58unauthorized58individuals58or58systems.
personally58identifiable58information58(PII):58Information58about58a58person‘s58history,58bac
kground,58and58attributes58that58can58be58used58to58commit58identity58theft58that58typically58inc
ludes58a58person‘s58name,58address,58Social58Security58number,58family58information,58emplo
yment58history,58and58financial58information.
integrity:58An58attribute58of58information58that58describes58how58data58is58whole,58compl
ete,58and58uncorrupted.
availability:58An58attribute58of58information58that58describes58how58data58is58accessible58and58
correctly58formatted58for58use58without58interference58or58obstruction.
accuracy:58An58attribute58of58information58that58describes58how58data58is58free58of58errors58an
d58has58the58value58that58the58user58expects.
authenticity:58An58attribute58of58information58that58describes58how58data58is58genuine58or58ori
ginal58rather58than58reproduced58or58fabricated.
utility:58An58attribute58of58information58that58describes58how58data58has58value58or58usefulness58fo
r58an58end58purpose.
possession:58An58attribute58of58information58that58describes58how58the58data‘s58ownership58or58co
ntrol58is58legitimate58or58authorized.
McCumber58Cube:58A58graphical58representation58of58the58architectural58approach58used58in
58computer58and58information58security58that58is58commonly58shown58as58a58cube58composed
58of583×3×358cells,58similar58to58a58Rubik‘s58Cube.

information58system:58The58entire58set58of58software,58hardware,58data,58people,58proc
edures,58and58networks58that58enable58the58use58of58information58resources58in58the58or
ganization.
physical58security:58The58protection58of58material58items,58objects,58or58areas58from58unautho
rized58access58and58misuse.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
favouredone Havard university
Follow You need to be logged in order to follow users or courses
Sold
322
Member since
1 year
Number of followers
31
Documents
8656
Last sold
1 day ago
favoredone

Welcome to favoredone ! The place to find the best study materials for various subjects. You can be assured that you will receive only the best which will help you to ace your exams. All the materials posted are A+ Graded. Please rate and write a review after using my materials. Your reviews will motivate me to add more materials. Thank you very much!

4,4

339 reviews

5
221
4
74
3
24
2
3
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions