Ch01 - Management of Information Security, 2nd ed. 1-1...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Management of Information Security, 2 nd ed. 1-1 Chapter 1 Introduction to the Management of Information Security At a Glance Instructor’s Manual Table of Contents Chapter Overview Chapter Outline Chapter Objectives Setup Notes Lecture Notes and Teaching Tips with Quick Quizzes Discussion Topics Key Terms Additional Project Ideas
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Management of Information Security, 2 nd ed. 1-2 Chapter Overview The opening chapter establishes the foundation for understanding the field of information security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organization’s information assets. In this chapter, the student will come to know and understand the definition and key characteristics of information security and learn to recognize the characteristics that differentiate information security management from general management. Chapter Outline Lecture Topics Page # Introduction 2 What is Security? 4 What is Management? 9 Principles of Information Security Management 17 Chapter Objectives When you complete this chapter, you will be able to: Recognize the importance of the manager’s role in securing an organization’s use of information technology, and understand who is responsible for protecting an organization’s information assets Know and understand the definition and key characteristics of information security Know and understand the definition and key characteristics of leadership and management Recognize the characteristics that differentiate information security management from general management
Background image of page 2
Management of Information Security, 2 nd ed. 1-3 Setup Notes This chapter could be completed in a single class session, if there is sufficient time to cover the material. Unless the students have not had the opportunity to read the material in advance (in some settings, the textbooks are not made available until the first class meeting), it may be prudent to have a general discussion of the topic, with detailed lecture to follow at the next class meeting. The subject matter can be covered in 1.25 to 2.5 hours. Lecture Notes and Teaching Tips with Quick Quizzes INTRODUCTION Information technology is the vehicle that stores and transports information—a company’s most valuable resource—from one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this new concept covers a broader range of issues, from the protection of data to the protection of human resources, information security is no longer the sole responsibility of a discrete group of people in the company; rather, it is the responsibility of every employee, and especially managers. Organizations must realize that information security funding and planning decisions
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 17

Ch01 - Management of Information Security, 2nd ed. 1-1...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online