100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

TESTBANK FOR Principles of Information Security (MindTap Course List) 7th Edition by Michael Whitman, Herbert Mattord ISBN:% COMPLETE GUIDE !!! ALL CHAPTERS COVERED!!! A+ GRADE ASSURED!!!

Puntuación
-
Vendido
-
Páginas
40
Grado
A+
Subido en
12-07-2025
Escrito en
2024/2025

TESTBANK FOR Principles of Information Security (MindTap Course List) 7th Edition by Michael Whitman, Herbert Mattord ISBN:978-0357506431 100% COMPLETE GUIDE !!! ALL CHAPTERS COVERED!!! A+ GRADE ASSURED!!!

Institución
Principles Of Information Security
Grado
Principles of information security











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Institución
Principles of information security
Grado
Principles of information security

Información del documento

Subido en
12 de julio de 2025
Número de páginas
40
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

InstructorManual Principlesof Information Securit
y,7th Edition by Michael E. Whitman

,InstructorManual
WhitmanandMattord,PrinciplesofInformationSecurity7e,ISBN978-0-357-50643-
xz xz xz xz xz xz xz



1; Module 1: Introduction to Information Security
xz xz xz xz xz xz xz




TableofContents
Purpose and Perspective of the Module .............................................................................................. 2
xz xz r xz r




CengageSupplements ...................................................................................................................... 2
ModuleObjectives ............................................................................................................................. 2
Complete List ofModule Activities and Assessments ......................................................................... 2
r r r xz xz




KeyTerms ......................................................................................................................................... 3
xz




What'sNew inThis Module................................................................................................................. 4
xz xz r




ModuleOutline .................................................................................................................................. 4
DiscussionQuestions ...................................................................................................................... 15
Suggested Usage forLab Activities .................................................................................................. 16
r r r




AdditionalActivities and Assignments .............................................................................................. 17
xz xz




AdditionalResources ...................................................................................................................... 17
CengageVideo Resources ................................................................................................................................. 17
xz




Internet Resources ............................................................................................................................................ 17
xz




Appendix ........................................................................................................................................ 18
Grading Rubrics ................................................................................................................................................. 18
xz

,PurposeandPerspectiveofthe Module zx zx




Thefirst module of the course in information security provides learners the foundationalknowledget
r r xz r xz r xz xz xz xz r xz



o becomewellversed in theprotection systems of any size need within an organization today. The m
xz r xz xz xz xz xz r xz xz xz xz xz r xz



odulebegins withfundamentalknowledgeofwhat information security is and the how computer sec
xz r xz xz xz xz xz xz xz xz



urity evolvedinto what we know now as information security today. Additionally, learners will gainkn
xz xz r r xz xz r xz xz xz xz xz r xz



owledge on thehow information security canbe viewed either as an art or ascience and whythat is th
r r xz xz xz r xz xz xz xz r xz r xz r xz xz



ecase.

CengageSupplements zx




Thefollowingproduct-
levelsupplements are available inthe Instructor ResourceCenter andprovideadditionalinformatio nthat mayhelp
xz r r xz r xz xz xz xz xz xz r


you in preparing your course:
xz xz xz xz




 PowerPointslides
 Test banks, available inWord, asLMS-ready files, and on the Cognero platform
xz xz xz xz xz xz xz xz r r xz



 MindTap EducatorGuide xz



 Solution and Answer Guide r xz xz



 This instructor‘s manual
xz xz




ModuleObjectives xz




Thefollowingobjectivesare addressed inthis module: xz xz xz




1.1 Define informationsecurity. r



1.2 Discuss thehistoryofcomputer securityand explainhow it evolvedintoinformationsec ur
xz xz xz xz r xz xz r xz xz xz xz



ity.
1.3 Define keyterms and critical concepts of information security.
r xz xz xz xz xz xz




1.4 Describe the informationsecurityrolesofprofessionalswithinan organization.
r r xz xz xz xz r




CompleteList ofModule ActivitiesandAssessments r x z




For additionalguidance refer to the MindTap EducatorGuide.
xz xz xz xz xz r




Module O bjec PPT slide
r xz r Activity/Assessment Duration
tive
2 Icebreaker:InterviewSimulation 10minutes xz



1.1–1.2 19–20 KnowledgeCheck Activity1 xz 2minutes
xz



1.3 34–35 KnowledgeCheck Activity2 xz 2minutes
xz



1.4 39–40 KnowledgeCheck Activity3 xz 2minutes
xz



1.1–1.4 MindTap Module01ReviewQuestions xz xz 30–40minutes
1.1– 1.4 r MindTap Module 01 Case Exercises xz xz xz 30minutes xz



1.1– 1.4 r MindTap Module01Exercises xz xz 10–
30minutes per questi
xz xz xz



on;1+hourper xz



module
1.1– 1.4 r MindTap Module 01 Securityfor Life xz xz xz 1+ hour xz



1.1– 1.4 r MindTap Module01Quiz xz xz 10–15minutes
[return totop] xz

, KeyTerms zx




Inorderofuse:
xz xz xz




computer security:In the early days ofcomputers, this term specified theprotection ofthe physical l
xz r xz xz xz xz xz xz r xz r xz



ocation and assetsassociatedwithcomputer technologyfrom outside threats, but it later came to re
r xz xz xz r xz r r xz r xz xz



present allactions taken to protect computer systems from losses.
xz xz xz xz r xz xz xz




security:A state ofbeingsecure andfree from danger or harm as well as theactionstaken to makes
r xz r r xz xz xz r xz r xz xz xz xz



omeoneorsomethingsecure. xz




information security:Protection oftheconfidentiality, integrity, and availabilityof information ass et
xz xz xz xz xz xz xz xz



s, whether in storage, processing, or transmission, via theapplication of policy, education, training and
xz xz xz xz xz xz xz r xz xz xz xz rx z xz



awareness, and technology. xz xz




networksecurity: A subset of communications security; theprotection of voice and datanetworkin gcomponents r r r xz r xz xz xz xz r xz xz



, connections, and content.
xz xz xz




C.I.A. triad: Theindustry standard for computer security since thedevelopment of the mainframe; t
xz r xz xz xz xz xz r r xz r xz xz



he standard is based onthree characteristics that describe the attributes ofinformation that are impo
xz xz xz r r r xz r r x z xz r r x



rtant to protect: confidentiality, integrity, and availability.
z xz xz xz xz xz r



confidentiality:An attribute of information that describes howdata is protected from disclosure or e r r xz r r x z xz xz xz xz r xz x



xposure to unauthorized individuals or systems.
z xz xz xz xz xz




personallyidentifiable information (PII):Information about a person‘s history, background, and xz xz xz r r xz xz xz rx


zattributes that can be used to commit identitytheft that typicallyincludes aperson‘s name, address,
xz r xz r xz xz r r r xz xz xz x



Social Security number, familyinformation, employment history, and financial information.
z xz xz xz xz xz xz xz r



integrity: An attribute of information that describes how data is whole, complete, and uncorrupted.
r xz r xz xz r xz r xz xz xz xz r




availability: Anattribute ofinformationthat describes howdataisaccessible andcorrectlyformatte dfo r xz r xz xz r xz xz xz xz r xz xz xz



r use without interference or obstruction.
xz r r r xz




accuracy: Anattribute ofinformationthat describes how datais freeoferrors andhas thevaluethat th e
r xz r xz xz r xz xz xz xz xz xz xz r xz r xz



userexpects. xz




authenticity: Anattribute of information that describes howdata is genuineororiginal rather thanre pr r xz r xz xz r xz xz xz xz xz xz



oduced orfabricated. r xz




utility: Anattribute ofinformationthat describes how datahas value orusefulnessforan endpurpos e.
r xz r xz xz r xz xz xz xz r xz r xz xz




possession:Anattribute ofinformationthat describes howthe data‘sownership or controlis legitim at xz r xz xz r xz r r xz xz xz xz



eorauthorized. xz




McCumber Cube:A graphical representation of thearchitectural approach used in computer and i
xz r xz xz xz xz xz xz xz xz r xz


nformation security that is commonlyshown as acube composed of 3×3×3cells, similar to a Rubik‘s
xz xz r xz r xz r xz xz xz xz xz xz xz



Cube.
information system: The entire set of software, hardware, data, people, procedures, and networksxz r r r xz xz xz xz xz xz xz xz rx


zthat enablethe useof information resources in the organization.
r r xz xz xz xz r




physical security: The protection ofmaterial items, objects,or areas from unauthorizedaccess and
xz r r xz r xz xz xz xz r xz



misuse.
$16.69
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
TOPSCOREEXAMS
4.0
(2)

Conoce al vendedor

Seller avatar
TOPSCOREEXAMS Harvard University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
6
Miembro desde
5 meses
Número de seguidores
1
Documentos
149
Última venta
4 días hace

4.0

2 reseñas

5
1
4
0
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes