Chapter 2
This chapter explains the basic security concepts on which UTM-1 security is based.
This chapter includes the following topics:
Introduction to Information Security ..........................................................39
The UTM-1 Firewall ..................................................................................44
Introduction to Information Security
Network security is but a small part of information security, which in turn is only a fraction
of general security. In order to understand why the UTM-1 appliance is the best product
for securing the business network, we must first examine information security
requirements in general.
Information is Valuable!
The most valuable asset an organization has is its information. The type of information
maintained by an organization depends on the organization's type and purpose. For
example:
•
Almost every organization stores information about its operations, such as
employees' names and other personal details, salaries, and so on.
•
Depending on the role of different governmental offices, they may store personal
information about citizens, residential addresses, car licenses registration, and so
on.
•
The army stores information about its soldiers, weapons inventory, and
intelligence information about other armies. Much of this information is
confidential.
•
A bank stores information about its customers' accounts, their money
transactions, ATM machine access codes, and so on. Much of this information is
confidential.
Chapter 2: UTM-1 Security
Introduction to Information Security
UTM-1 Security
39
Need help?
Do you have a question about the UTM-1 Edge and is the answer not in the manual?