User guide
Introduction to Information Security
Chapter 2: Safe@Office Security 71
Chapter 2
This chapter explains the basic security concepts on which Safe@Office security is based.
This chapter includes the following topics:
Introduction to Information Security .......................................................... 71
The Safe@Office Firewall .......................................................................... 76
Introduction to Information Security
Network security is but a small part of information security, which in turn is only a fraction
of general security. In order to understand why the Safe@Office appliance is the best
product for securing the business network, we must first examine information security
requirements in general.
Information is Valuable!
The most valuable asset an organization has is its information. The type of information
maintained by an organization depends on the organization's type and purpose. For
example:
• Almost every organization stores information about its operations, such as
employees' names and other personal details, salaries, and so on.
• Depending on the role of different governmental offices, they may store personal
information about citizens, residential addresses, car licenses registration, and so
on.
• The army stores information about its soldiers, weapons inventory, and
intelligence information about other armies. Much of this information is
confidential.
• A bank stores information about its customers' accounts, their money
transactions, ATM machine access codes, and so on. Much of this information is
confidential.
Safe@Office Security