User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Introduction to Information Security
34 Check Point Safe@Office User Guide
In order for a security policy be effective, it must be accompanied by the following
measures:
• Awareness - A security policy must be accompanied by steps taken to increase
the employees' awareness of security issues. If employees are unaware of a
security policy rule and the reason for it, they are likely to break it.
• Enforcement - To enforce a security policy, an organization can take various
measures, both human and electronic. For example:
• Installing surveillance cameras in strategic locations throughout the
organization
• Positioning human guards who have the authority to prevent other people
from entering the premises or certain areas on the premises
• Installing alarms that are triggered upon certain conditions
• Using magnetic identification tags to enforce and log access permissions to
different areas on the premises
• Using “red phones” to encrypt highly confidential voice phone calls
• Updating - A security policy is a living thing that must be updated from time to
time according to changing situations.
Unfortunately, even when a security policy is accompanied by these measures, its
effectiveness is limited against a person with malicious intent.