CE Pro January 2022 - 40

STATE OF THE INDUSTRY
Top 5 Technologies
device. Unlike computer viruses or worms, a Trojan does not
self-replicate, so it needs to be installed by a valid user.
Virus: A type of malicious code or program written to alter
the way a computer operates and is designed to spread
from one computer to another.
Worm: A type of malicious software that spreads copies
of itself from computer to computer. It can replicate itself
without human interaction and does not need to attach
itself to a software program to cause damage. The main
difference between a virus and a worm is that viruses must
be triggered by the activation of their host while worms are
stand-alone programs that can self-replicate.
Bot/Botnet: A type of software application that performs
tasks on command, allowing an attacker to take complete
remote control of an affected device.
Encryption: The process of converting human-readable
plaintext to incomprehensible text to prevent theft. It is
a way of scrambling data so only authorized parties can
understand the information.
Penetration testing (pen testing): A practice that uses
hacker tools and techniques to discover and evaluate security
flaws - essentially a simulated cyberattack to check for
exploitable vulnerabilities.
Social engineering: A technique that uses psychological
manipulation to trick users into making security mistakes
or giving away sensitive information. When individuals are
targeted, hackers are usually trying to trick people into giving
them passwords or bank information. Examples include deceptive
emails or text messages with the promise of a reward.
Threat actor: The person behind the event. This could be
an external threat who launches a phishing campaign or an
employee who accidentally leaves sensitive documents on
his or her desk.
External threat: An attack by a hacker not associated with
the affected institution, where no trust or privilege previously
existed.
Internal threat: An internal threat is a threat actor within
the targeted organization.
Incident: A security event that compromises the integrity,
confidentiality or availability of an information asset.
Data breach: An incident that results in the confirmed
disclosure of data to an unauthorized party.
40 | CE Pro January 2022
Systems Security Certified Practitioner (SSCP): According
to (ISC)2, this certification will validate an IT pro's technical
abilities and experience using security policies and procedures
to:
Implement IT infrastructure
Monitor networks
Administer IT
Ensure the confidentiality, integrity and availability of
data
Certified Information Privacy Professional (CIPP): This certification
from the International Association of Privacy Professionals
(IAPP) will provide an understanding of global concepts
of privacy and data protection law and practice, including:
Jurisdictional laws, regulations, rules, standards and
enforcement
Essential privacy concepts
Legal requirements for handling data
Cisco Certified Network Associate (CCNA): This certification
from IT giant Cisco is often hailed as one of the first steps
in preparing for a career in IT. The exam covers a broad range
of the basics of IT, including:
Networking
Software development
Security
Automation
Programming
Job roles
CompTIA Security+: IT trade organization CompTIA offers
this certification to validate an IT pro's baseline skills to perform
core security functions, including:
Assessing the security posture of an organization
Monitoring and securing hybrid environments
Knowledge of laws, policies, governance,
risk and compliance
Incident response
Targeted Solutions for Custom Integrators
Besides the built-in cyber protection from hardware manufacturers
like Snap One, Luxul, WhyReboot, Ubiquiti and
others, there are a few solutions that can help integrators
take it to the next level, including Invisus and guardDog, the
latter recently feted with the TechStarter award at CEDIA
Expo 2021.
The company's Protective Cloud Services (PCS) solution
works with its Fido device to protect consumers, small
business owners, and large enterprises against the ever-constant
cyber threats, ransomware hacks, privacy matters and
more. The company's cybersecurity product is an overlay
device in the network chain designed to address privacy for
the residential market.
cepro.com
http://www.cepro.com

CE Pro January 2022

Table of Contents for the Digital Edition of CE Pro January 2022

CE Pro January 2022 - Intro
CE Pro January 2022 - Cover1
CE Pro January 2022 - Cover2
CE Pro January 2022 - 1
CE Pro January 2022 - 2
CE Pro January 2022 - 3
CE Pro January 2022 - 4
CE Pro January 2022 - 5
CE Pro January 2022 - 6
CE Pro January 2022 - 7
CE Pro January 2022 - 8
CE Pro January 2022 - 9
CE Pro January 2022 - 10
CE Pro January 2022 - 11
CE Pro January 2022 - 12
CE Pro January 2022 - 13
CE Pro January 2022 - 14
CE Pro January 2022 - 15
CE Pro January 2022 - 16
CE Pro January 2022 - 17
CE Pro January 2022 - 18
CE Pro January 2022 - 19
CE Pro January 2022 - 20
CE Pro January 2022 - 21
CE Pro January 2022 - 22
CE Pro January 2022 - 23
CE Pro January 2022 - 24
CE Pro January 2022 - 25
CE Pro January 2022 - 26
CE Pro January 2022 - 27
CE Pro January 2022 - 28
CE Pro January 2022 - 29
CE Pro January 2022 - 30
CE Pro January 2022 - 31
CE Pro January 2022 - 32
CE Pro January 2022 - 33
CE Pro January 2022 - 34
CE Pro January 2022 - 35
CE Pro January 2022 - 36
CE Pro January 2022 - 37
CE Pro January 2022 - 38
CE Pro January 2022 - 39
CE Pro January 2022 - 40
CE Pro January 2022 - 41
CE Pro January 2022 - 42
CE Pro January 2022 - 43
CE Pro January 2022 - 44
CE Pro January 2022 - 45
CE Pro January 2022 - 46
CE Pro January 2022 - 47
CE Pro January 2022 - 48
CE Pro January 2022 - 49
CE Pro January 2022 - 50
CE Pro January 2022 - 51
CE Pro January 2022 - 52
CE Pro January 2022 - 53
CE Pro January 2022 - 54
CE Pro January 2022 - 55
CE Pro January 2022 - 56
CE Pro January 2022 - 57
CE Pro January 2022 - 58
CE Pro January 2022 - 59
CE Pro January 2022 - 60
CE Pro January 2022 - 61
CE Pro January 2022 - 62
CE Pro January 2022 - 63
CE Pro January 2022 - 64
CE Pro January 2022 - Cover3
CE Pro January 2022 - Cover4
https://www.nxtbook.com/emerald/cepro/november_2022
https://www.nxtbook.com/emerald/cepro/october_2022
https://www.nxtbook.com/emerald/cepro/september_2022
https://www.nxtbook.com/emerald/cepro/august_2022
https://www.nxtbook.com/emerald/cepro/july_2022
https://www.nxtbook.com/emerald/cepro/june_2022
https://www.nxtbook.com/emerald/cepro/may_2022
https://www.nxtbook.com/emerald/cepro/april_2022
https://www.nxtbook.com/emerald/cepro/march_2022
https://www.nxtbook.com/emerald/cepro/february_2022
https://www.nxtbook.com/emerald/cepro/january_2022
https://www.nxtbook.com/emerald/cepro/december_2021
https://www.nxtbook.com/emerald/cepro/november_2021
https://www.nxtbook.com/emerald/cepro/october_2021
https://www.nxtbook.com/emerald/cepro/september_2021
https://www.nxtbook.com/emerald/cepro/august_2021
https://www.nxtbook.com/emerald/cepro/july_2021
https://www.nxtbook.com/emerald/cepro/june_2021
https://www.nxtbook.com/emerald/cepro/may_2021
https://www.nxtbook.com/emerald/cepro/cepro_april_2021
https://www.nxtbookmedia.com