User Manual Part 1

Table Of Contents
Introduction to Information Security
34 Check Point Safe@Office User Guide
In order for a security policy be effective, it must be accompanied by the following
measures:
Awareness - A security policy must be accompanied by steps taken to increase
the employees' awareness of security issues. If employees are unaware of a
security policy rule and the reason for it, they are likely to break it.
Enforcement - To enforce a security policy, an organization can take various
measures, both human and electronic. For example:
Installing surveillance cameras in strategic locations throughout the
organization
Positioning human guards who have the authority to prevent other people
from entering the premises or certain areas on the premises
Installing alarms that are triggered upon certain conditions
Using magnetic identification tags to enforce and log access permissions to
different areas on the premises
Using “red phones” to encrypt highly confidential voice phone calls
Updating - A security policy is a living thing that must be updated from time to
time according to changing situations.
Unfortunately, even when a security policy is accompanied by these measures, its
effectiveness is limited against a person with malicious intent.