CE Pro January 2022 - 39

Association's Connected Home Security Checklist Tool, which
is based on the association's Device Security Best Practices
white paper.
The tool is mobile-friendly and ideal for job sites, offering
installers a quick reference of industry practices for
topics including passwords, networks, modems and routers,
VPNs and Z-Wave/ZigBee. To ensure consumers are
well informed about the work completed in their homes by
professionals, the tool also emails customers a comprehensive
assessment of the security steps performed, as well as
recommendations.
The Checklist Tool, according to CTA, delivers numerous
benefits by:
Outlining existing best solutions to current and forthcoming
smart home security challenges;
Providing customers with peace of mind through enhanced
protection against smart home/connected home
related threats;
Comprehensively cataloging the installed connected
systems in a home;
Reducing liability to professional installers by providing
an industry approved guide; and
Adding value to the services of CTA member professional
installers, setting them apart in the marketplace by using
documented recommended practices or processes for
selecting products, systems, installation and maintenance.
If
integrators want to take their cybersecurity offering to
the next level, there are several certifications that can be
earned, per the U.S. Cybersecurity and Infrastructure Security
Agency's Cybersecurity Workforce Training Guide. Some of
these certifications require prerequisites, so explore each
offering for more information. Among the choices are:
Associate of (ISC)2: The certification from the International
Information System Security Certification Consortium (ISC)2 is
compatible for O&M NICE categories and covers:
Security and risk management
Asset security
Security engineering
Communications and network security
Identity and access management
Security Assessment and Testing
Security Operations
Software Development Security
Certificate Authorized Professional (CAP): This certificate,
also from (ISC)2, measures skills and proficiency in:
Authorizing and maintaining information systems
Assessing risk
Establishing security requirements
Documentation
Virtual Private Network (VPN): A tool that allows users to
remain anonymous while using the Internet by masking the
location and encrypting traffic. It allows private networks to
send data across shared or public networks as if their devices
were directly connected to a private network.
Firewall: A network security device that monitors incoming/outgoing
network traffic and allows or blocks data packets
based on a set of security rules. Its purpose is to block
malicious traffic.
Cloud: Technology that allows for the access of files and/or
services through the Internet from anywhere in the world.
It is a collection of computers with large storage capabilities
that remotely serve requests.
Spyware: Software that is installed on a device without
the end user's knowledge and spies on their activity. It can
invade the device, steal sensitive information and internet
usage data, and relay it to external users.
Trojan: A Trojan horse, or Trojan, is malicious software that
downloads onto a computer disguised as a legitimate program.
It typically gets hidden as an attachment in an email
or a downloadable file and then transfers onto the user's
cepro.com
January 2022 CE Pro | 39
GET TO KNOW GENERAL
CYBERSECURITY TERMS
IP address: Each computer has a unique Internet Protocol
(IP) address, which consists of a set of numbers. The set of
numbers is a language that computers use to communicate
with each other over a network. IP addresses allow any
number of Internet-connected computers to be distinguished
from other computers. Website hosting provider
Bluehost compares it to calling someone on the phone -
everyone has a unique phone number, and you have to dial
that number to reach someone.
Domain: A group of computers, printers and devices that
are interconnected and governed as a whole. In layman's
terms, a domain name is the text that a user types into a
browser window to reach a certain website.
Domain Name System (DNS): Converts human-readable
domain names, such as google.com, to machine-readable IP
addresses. When you go to your web browser and type in a
domain name, it will connect with the DNS. The DNS then
searches through all of the registered IP addresses and
connects that domain name with the IP address. Continuing
with the phone analogy, Bluehost compares domain
names to contacts in your phone.
http://www.google.com http://www.cepro.com

CE Pro January 2022

Table of Contents for the Digital Edition of CE Pro January 2022

CE Pro January 2022 - Intro
CE Pro January 2022 - Cover1
CE Pro January 2022 - Cover2
CE Pro January 2022 - 1
CE Pro January 2022 - 2
CE Pro January 2022 - 3
CE Pro January 2022 - 4
CE Pro January 2022 - 5
CE Pro January 2022 - 6
CE Pro January 2022 - 7
CE Pro January 2022 - 8
CE Pro January 2022 - 9
CE Pro January 2022 - 10
CE Pro January 2022 - 11
CE Pro January 2022 - 12
CE Pro January 2022 - 13
CE Pro January 2022 - 14
CE Pro January 2022 - 15
CE Pro January 2022 - 16
CE Pro January 2022 - 17
CE Pro January 2022 - 18
CE Pro January 2022 - 19
CE Pro January 2022 - 20
CE Pro January 2022 - 21
CE Pro January 2022 - 22
CE Pro January 2022 - 23
CE Pro January 2022 - 24
CE Pro January 2022 - 25
CE Pro January 2022 - 26
CE Pro January 2022 - 27
CE Pro January 2022 - 28
CE Pro January 2022 - 29
CE Pro January 2022 - 30
CE Pro January 2022 - 31
CE Pro January 2022 - 32
CE Pro January 2022 - 33
CE Pro January 2022 - 34
CE Pro January 2022 - 35
CE Pro January 2022 - 36
CE Pro January 2022 - 37
CE Pro January 2022 - 38
CE Pro January 2022 - 39
CE Pro January 2022 - 40
CE Pro January 2022 - 41
CE Pro January 2022 - 42
CE Pro January 2022 - 43
CE Pro January 2022 - 44
CE Pro January 2022 - 45
CE Pro January 2022 - 46
CE Pro January 2022 - 47
CE Pro January 2022 - 48
CE Pro January 2022 - 49
CE Pro January 2022 - 50
CE Pro January 2022 - 51
CE Pro January 2022 - 52
CE Pro January 2022 - 53
CE Pro January 2022 - 54
CE Pro January 2022 - 55
CE Pro January 2022 - 56
CE Pro January 2022 - 57
CE Pro January 2022 - 58
CE Pro January 2022 - 59
CE Pro January 2022 - 60
CE Pro January 2022 - 61
CE Pro January 2022 - 62
CE Pro January 2022 - 63
CE Pro January 2022 - 64
CE Pro January 2022 - Cover3
CE Pro January 2022 - Cover4
https://www.nxtbook.com/emerald/cepro/november_2022
https://www.nxtbook.com/emerald/cepro/october_2022
https://www.nxtbook.com/emerald/cepro/september_2022
https://www.nxtbook.com/emerald/cepro/august_2022
https://www.nxtbook.com/emerald/cepro/july_2022
https://www.nxtbook.com/emerald/cepro/june_2022
https://www.nxtbook.com/emerald/cepro/may_2022
https://www.nxtbook.com/emerald/cepro/april_2022
https://www.nxtbook.com/emerald/cepro/march_2022
https://www.nxtbook.com/emerald/cepro/february_2022
https://www.nxtbook.com/emerald/cepro/january_2022
https://www.nxtbook.com/emerald/cepro/december_2021
https://www.nxtbook.com/emerald/cepro/november_2021
https://www.nxtbook.com/emerald/cepro/october_2021
https://www.nxtbook.com/emerald/cepro/september_2021
https://www.nxtbook.com/emerald/cepro/august_2021
https://www.nxtbook.com/emerald/cepro/july_2021
https://www.nxtbook.com/emerald/cepro/june_2021
https://www.nxtbook.com/emerald/cepro/may_2021
https://www.nxtbook.com/emerald/cepro/cepro_april_2021
https://www.nxtbookmedia.com