CHAPTER 18

Security for Networked AV Applications

In this chapter, you will learn about

•   Documenting security objectives

•   Evaluating a client’s security posture

•   Creating a risk register for an AV/IT network

•   Implementing a risk response for common security risks

Consider how and why you protect your home, whether you use an alarm system or simply lock your doors. You secure your home for the same reason your customers protect their IT networks—to protect the valuables inside. As AV systems are frequently part of a client’s enterprise data network, the client expects them to maintain a security posture in alignment with their overall information security goals. AV designers must understand their clients’ security requirements and ...

Get CTS-D Certified Technology Specialist-Design Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.