{"id":121315,"date":"2023-10-19T05:10:27","date_gmt":"2023-10-19T05:10:27","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=121315"},"modified":"2023-10-19T05:10:29","modified_gmt":"2023-10-19T05:10:29","slug":"instructor-manual-principles-of-information-security-7th-edition-by-michael-e-whitman","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/10\/19\/instructor-manual-principles-of-information-security-7th-edition-by-michael-e-whitman\/","title":{"rendered":"Instructor Manual Principles of Information Security, 7th Edition by Michael E. Whitman"},"content":{"rendered":"\n<p>Instructor Manual<br>Principles of Information Security,<br>7th Edition by Michael E. Whitman<\/p>\n\n\n\n<p>Instructor Manual<br>Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-1; Module<br>1: Introduction to Information Security<br>Table of Contents<br>Purpose and Perspective of the Module\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026..2<br>Cengage Supplements\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.2<br>Module Objectives \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.2<br>Complete List of Module Activities and Assessments\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u20262<br>Key Terms \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.3<br>What&#8217;s New in This Module\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u20264<br>Module Outline\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.4<br>Discussion Questions\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.15<br>Suggested Usage for Lab Activities\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.16<br>Additional Activities and Assignments \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u202617<br>Additional Resources \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.17<br>Cengage Video Resources\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026..17<br>Internet Resources \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.17<br>Appendix\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026..18<br>Grading Rubrics\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.18<\/p>\n\n\n\n<p>Purpose and Perspective of the Module<br>The first module of the course in information security provides learners the foundational<br>knowledge to become well versed in the protection systems of any size need within an<br>organization today. The module begins with fundamental knowledge of what information<br>security is and the how computer security evolved into what we know now as information<br>security today. Additionally, learners will gain knowledge on the how information security can be<br>viewed either as an art or a science and why that is the case.<br>Cengage Supplements<br>The following product-level supplements are available in the Instructor Resource Center and<br>provide additional information that may help you in preparing your course:<br>\uf0b7 PowerPoint slides<br>\uf0b7 Test banks, available in Word, as LMS-ready files, and on the Cognero platform<br>\uf0b7 MindTap Educator Guide<br>\uf0b7 Solution and Answer Guide<br>\uf0b7 This instructor\u2018s manual<br>Module Objectives<br>The following objectives are addressed in this module:<br>1.1 Define information security.<br>1.2 Discuss the history of computer security and explain how it evolved into information<br>security.<br>1.3 Define key terms and critical concepts of information security.<br>1.4 Describe the information security roles of professionals within an organization.<br>Complete List of Module Activities and Assessments<br>For additional guidance refer to the MindTap Educator Guide.<br>Module<br>Objective<br>PPT slide Activity\/Assessment Duration<br>2 Icebreaker: Interview Simulation 10 minutes<br>1.1\u20131.2 19\u201320 Knowledge Check Activity 1 2 minutes<br>1.3 34\u201335 Knowledge Check Activity 2 2 minutes<br>1.4 39\u201340 Knowledge Check Activity 3 2 minutes<br>1.1\u20131.4 MindTap Module 01 Review Questions 30\u201340 minutes<br>1.1 \u2013 1.4 MindTap Module 01 Case Exercises 30 minutes<br>1.1 \u2013 1.4 MindTap Module 01 Exercises 10\u201330 minutes per<br>question; 1+ hour<br>per module<br>1.1 \u2013 1.4 MindTap Module 01 Security for Life 1+ hour<br>1.1 \u2013 1.4 MindTap Module 01 Quiz 10\u201315 minutes<br><\/p>\n\n\n<p>[return to top]<\/p>\n\n\n\n<p>Key Terms<br>In order of use:<br>computer security: In the early days of computers, this term specified the protection of the<br>physical location and assets associated with computer technology from outside threats, but it<br>later came to represent all actions taken to protect computer systems from losses.<br>security: A state of being secure and free from danger or harm as well as the actions taken to<br>make someone or something secure.<br>information security: Protection of the confidentiality, integrity, and availability of information<br>assets, whether in storage, processing, or transmission, via the application of policy, education,<br>training and awareness, and technology.<br>network security: A subset of communications security; the protection of voice and data<br>networking components, connections, and content.<br>C.I.A. triad: The industry standard for computer security since the development of the<br>mainframe; the standard is based on three characteristics that describe the attributes of<br>information that are important to protect: confidentiality, integrity, and availability.<br>confidentiality: An attribute of information that describes how data is protected from disclosure<br>or exposure to unauthorized individuals or systems.<br>personally identifiable information (PII): Information about a person\u2018s history, background,<br>and attributes that can be used to commit identity theft that typically includes a person\u2018s name,<br>address, Social Security number, family information, employment history, and financial<br>information.<br>integrity: An attribute of information that describes how data is whole, complete, and<br>uncorrupted.<br>availability: An attribute of information that describes how data is accessible and correctly<br>formatted for use without interference or obstruction.<br>accuracy: An attribute of information that describes how data is free of errors and has the value<br>that the user expects.<br>authenticity: An attribute of information that describes how data is genuine or original rather<br>than reproduced or fabricated.<br>utility: An attribute of information that describes how data has value or usefulness for an end<br>purpose.<br>possession: An attribute of information that describes how the data\u2018s ownership or control is<br>legitimate or authorized.<br>McCumber Cube: A graphical representation of the architectural approach used in computer<br>and information security that is commonly shown as a cube composed of 3\u00d73\u00d73 cells, similar to<br>a Rubik\u2018s Cube.<br>information system: The entire set of software, hardware, data, people, procedures, and<br>networks that enable the use of information resources in the organization.<br>physical security: The protection of material items, objects, or areas from unauthorized access<br>and misuse.<br>download pdf at <a href=\"https:\/\/learnexams.com\/search\/study?query=aqa\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=aqa<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructor ManualPrinciples of Information Security,7th Edition by Michael E. Whitman Instructor ManualWhitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-1; Module1: Introduction to Information SecurityTable of ContentsPurpose and Perspective of the Module\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026..2Cengage Supplements\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.2Module Objectives \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.2Complete List of Module Activities and Assessments\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u20262Key Terms \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.3What&#8217;s New in This Module\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u20264Module Outline\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.4Discussion Questions\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.15Suggested Usage for Lab Activities\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.16Additional Activities [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-121315","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/121315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=121315"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/121315\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=121315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=121315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=121315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}