Free Essay

Home Security Vulnerabilities

In: Business and Management

Submitted By abmarie
Words 1106
Pages 5
Home Security Vulnerabilities
Principles & Theory of Security Management
Professor James Leiman
DeVry University On-Line
Antoinette Bowen
19 January 2014

Home Security Vulnerability With criminals being smart enough wait and watch even pay real close attention to their victims daily habits; “at every 15 seconds, a home in the United States is broken into, said Angela Mickalide, director of education and outreach for the National Home Safety Council.” (Herbet, 2014) It would seem that it’s hopeless for people to stay safe. That in order for people to feel safe they need to purchase state of the art equipment to secure their property. For those who maybe considering the option to purchase a security system but really don’t have the funds for the monthly services should realize that there are several other methods of prevention. When observing our own environment it will appear to be safe, but how safe are we? Since people consider a very familiar area their comfort zone is when we tend to overlook the possibilities of being watched-to become a delinquent’s next victim. Let us look into our own backyards to assess the safety of our own homes. Being in a home that had been constructed in the 1920’s would seem fairly unsafe and susceptible to break-ins even becoming an easy target for offenders. Easy to kick doors in, break through windows, and bust locks due to a decaying foundation. Even as the dynamic of the changing neighborhood goes from home owners to being occupied with renters and dilapidated homes; it seems more likely to become a target for break-ins as well as for other illicit activities. Most of the renters have not shown any interest in keeping up with lawn care which makes it easy access for a person to lay and wait for their opportunity. Public utilities have deemed it a necessity to conserve energy so the street lights will go off for about five to ten minutes and back on and so forth. The home is fenced in with the ability to climb or leap over and the area between the houses from the backyard has an unclimbable wood fence. Now, with all the lack of lighting, neighbors who don’t care, the possibilities of a weak foundation and the depreciation of the community it appears that crime has become a very big problem within the area. Leaving the residence of the community to feel unsafe and more of a possible victim. After looking around the home and area I think that the lighting, windows, doors, locks, the fence, and landscape could be a fault to securing the home. Compared to newly built homes made from less quality products with less time to build them, I would believe the home built in the 1920’s to have a stable foundation if not more stable base than the homes of today. In order to make certain that any home that lacks the proper security measures one should go through a check list to focus on what areas that need to be fortified. To begin, let’s start by thinking like a criminal and look for the accessible entry points and weaknesses from within the perimeter. This will help when designing your strategy plan for securing your home. Although installing a security system would be a good idea it may not be economically fit for you, you should try to make your home uninviting to burglars. Some communities have adopted a Street Closures program (Project Quiet Street) which has been designed by Ronald V. Clarke. In the guide it states that; “It assumes that you have already conducted a detailed problem analysis and are now exploring alternative responses, including closing streets or alleys. It explains why you might expect street closures to reduce crime or disorder, it summarizes the literature on their effectiveness, and it discusses the arguments for and against their use. It also lists the questions you should ask, and steps you should follow, in implementing closures. Finally, it suggests measures you might use to assess the effectiveness of your actions.” (Clarke, 2014) Not all can have this happen but what we can take away from the guide will help with securing the home. Always keep hedging trimmed since it could make for good hiding placing that can lead a crook to be able to enter the home without being seen. Keeping your shrubbery manicured will allow avoidance from a home invasion since some older homes has flimsy single-pane glass. Next you should make sure access is repudiated by locking all doors and windows-even if you have a garage that’s attached to the house make sure to bolt all windows and doors. Remember, having a garage does not mean the house is safe due to closing the garage door. It’s a good notion to have lighting around your walkways with some motion-detectors stationed around the property. Make sure to changes in your routine, one should never get comfortable doing and following the habitual activities. This can give an offender opportunity so be sure to the settings on the lights and change up your activities. Another idea would to know thy neighbors. Building a rapport will allow each resident to keep a watchful eye out while you’re away. If they are unable to keep an eye on the whole house be sure have a boards or rods to secure the sliding glass doors, window are locked on the second floors, and never give a culprit helpful means of gaining entrance in your home. Finally, consider your safety along with precautions because as Polk has said; "Don't establish any patterns," "If a burglar can't be sure of when you're coming or going, they're less likely to strike your house." (Herbet, 2014) Ask people you can rely upon to make rounds (drive by the house) to pick up mail and the newspapers. When purchasing deadbolts make sure you’re able to make a hasty escape. It has always been a good idea to inaugurate a neighborhood watch and try to implement measures that will be most operative to your strategy plan. In that plan one should have clear approach towards prevention goals by analyzing the problem.

References http://www.adt.com/resources/home-security-101/ Clarke, R. V. (2014, January 13). Closing Streets and Alleys To Reduce Crime: Should You Go Down This Road? Retrieved from Center for Problem-Oriented Policing: http://www.popcenter.org/Responses/closing_streets/print/
Herbet, M. (2014, January 15). 10 Tips to make your home more secure. Retrieved from The Seattle Times: http://seattletimes.com/html/homegarden/2008336426_securitytips01.html
http://www.popcenter.org/Responses/closing_streets/print/

Similar Documents

Premium Essay

Home Security

...Home Security Vulnerabilities DeVry Online, SEC310 Professor Kathryn Fenner The neighborhood I have lived in for the past three years is southwest of Chicago. The main benefit of living forty-five minutes from the city is the peace and quiet. It is an old farm town with newly built homes. The population of Lockport houses approximately twenty-five thousand residents. The town is very quiet, with two lane access roads throughout much of the city. The traffic is minimal, the stars are visible at night and the sound of horses and roosters in the morning are what make residents feel a sense of security. When walking through the neighborhood, it is not out of the ordinary to see garage doors left open or front doors open with the screen door closed to let some air in the house. As a result of a small town feel, people tend to feel their town is totally safe. They forget to assess home security vulnerabilities because there seems to be no imminent threat. Burglars make the most of on this by studying their subjects, the neighborhood they live in, and the routine of their victims. In order to properly assess vulnerabilities, we must think like a criminal and analyze what areas around our home can be used as an advantage for entry; including a neighborhood assessment, alarms, lighting, doors, windows, locks, windows, and cameras. My neighborhood would be considered an upper-middle class area with a good blend of older homes and new subdivisions....

Words: 1342 - Pages: 6

Premium Essay

Is3110

...Lab 2 Align Risk, Treats, & Vulnerabilities to COBIT P09 Risk Management Controls 1. Risk Factors a. Remote communications from home office (MEDIUM Risk) b. LAN server OS has known software vulnerability (HIGH Risk) c. User downloads an unknown e-mail attachment (HIGH Risk) 2. COBIT Risk Management * No. * Yes, the identified software vulnerabilities relate to risk context for both internal and external access. * Yes, the identified software vulnerabilities themselves are events that represent risk identification. Once identified, the event can be assessed for risk. * Yes, once risk events are identified (such as software vulnerabilities), they can properly assessed (quantitatively or qualitatively). * Yes, once the risk has been assessed (high, medium, low) the response that risk can be aligned appropriately. * No. 3. Vulnerability impacts a. Remote communications from home office (Confidentiality) b. LAN server OS has known software vulnerability (Integrity) c. User downloads an unknown e-mail attachment (Availability) 4. Effectiveness, Efficiency, Compliance, and Reliability 5. Mitigated and managed a....

Words: 794 - Pages: 4

Premium Essay

Essay On Home Computer Security

...Even though news stories are full of computer security concerns, home computer users do not have a clear image about computer security. Home computers are target for hackers because of their vulnerabilities. Hackers change home computers into what is know a Zombie army which facilities them to attack other computers on the network by using smart software. Moreover, Home computers are subject to other threats like identity theft. Therefore, this report focuses on the importance of Home Computer Security by shedding light on threats to them with tangible solution to these threats. introduction Home computer is the preferable target of hackers according to Symantec (computer Security Company) that 86 precent \cite{Hacker} of all attacks aim home computers. Home computers are targeted due to the user’s lack of basic information about how to secure their computers. Another...

Words: 1093 - Pages: 5

Premium Essay

Risk Management and Problem Management of a Compromised Unix Operating System

...Running head: RISK MANAGEMENT AND PROBLEM MANAGEMENT RELATION The effectiveness of the relationship between risk management and problem management of a compromised UNIX operating system CSMN 655 Computer Security, Software Assurance, Hardware Assurance, and Security Management Abstract Risk management is an ongoing, continuous process whose purpose is to identify and assess program risks and opportunities with sufficient lead-time to implement timely strategies to ensure program success. The entire risk management process balances the operational and economic costs of protective measures and contributes to mission capability by protecting the systems and the data that support the organizational mission from both deliberate and unintentional compromise. Computer security problem, or incident, management is an administrative function of managing and protecting computer assets, networks and information systems. These systems continue to become more critical to the personal and economic welfare of our society. Organizations must understand their responsibilities to the public good and to the welfare of their members. This responsibility extends to having a management program for reacting to system breaches, if and when they occur....

Words: 4103 - Pages: 17

Premium Essay

Security Threats

...To secure a home network beginning risk analysis should identify the risks to the network, network resources, and data. The intent of a risk analysis is...

Words: 786 - Pages: 4

Premium Essay

Is4550 Lab 9

...Risk-Threat-Vulnerability IT Security Policy Definition Unauthorized access from Public Internet Acceptable Us Policy User Destroys Data in application and deletes all files Asset Identification and Classification Policy Hacker penetrates you IT infrastructure and gains access to your internal network Vulnerability Assessment and Management Policy Intra-office employee romance gone bad Security Awareness Training Policy Fire destroys primary data center Threat Assessment and Management policy communication circuit outages Asset Protection Policy Workstation OS has a known software vulnerability Vulnerability Assessment and Management Policy Unauthorized access to organization owned Workstations Asset Management Policy Loss of production data Security Awareness Training Policy Denial of service attack on organization e-mail server Vulnerability Assessment and Management Policy Remote communications from home office Asset Protection Policy LAN server OS has a known software vulnerability Vulnerability Assessment and Management Policy User downloads an unknown e-mail attachment Security Awareness Training Policy Workstation browser has software vulnerability Vulnerability Assessment and Management Policy Service provider has a major network outage Asset Protection Policy Weak ingress/egress traffic filtering degrades performance Vulnerability Assessment and Management Policy User inserts CDs and USB hard drives with personal......

Words: 616 - Pages: 3

Free Essay

Security in the Smart Grid

...Security in the Smart Grid introduction Present and future battlefronts of electronic terrorism includes the state of readiness and resilience of the computer equipment protecting America's energy distribution networks and industrial control systems. According to a Pike research report [1] published March 1st of this year, it is projected that investments in smart grid cyber security will total $14 billion through 2018. First, what is a power grid? A power grid consists of several networks that carry electricity from the power plants where it is generated to consumers, and includes wires, substations, transformers, switches, software, and other hardware. The grid in the past used a centralized one-way communication distribution concept that consisted of limited automation, limited situational awareness, and did not provide the capability for consumers to manage their energy use. “Smart Grid” generally refers to a class of technology designed to upgrade the current utility grid infrastructure to improve the efficiency on the power network and in energy users’ homes and businesses. Much of the legacy power plant infrastructure is now over 30 years old with electrical transmission and distribution system components (i.e. power transformers) averaging over 40 years old and 70% of transmission lines being 25 years or older [2]....

Words: 3081 - Pages: 13

Free Essay

Linux Securities

...Despite the work done to the IP tables package in order to improve it there are still vulnerabilities to be exploited. Vulnerabilities to denial of service and even an arbitrary filter rule issue have been exploited in the package. Even...

Words: 1131 - Pages: 5

Premium Essay

Unit 5 Assignment 2

...* Check for Windows administrative vulnerabilities * Check for weak passwords * Check for IIS administrative vulnerabilities * Check for SQL administrative vulnerabilities Using the Graphical Interface Tool 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. * Check for...

Words: 487 - Pages: 2

Premium Essay

Unit 6 Assignment 1

...* Check for Windows administrative vulnerabilities * Check for weak passwords * Check for IIS administrative vulnerabilities * Check for SQL administrative vulnerabilities Using the Graphical Interface Tool 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan....

Words: 487 - Pages: 2

Premium Essay

How to Identify Threats & Vulnerabilities in an It Infrastructure

...Week 1 Laboratory How to Identify Threats & Vulnerabilities in an IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to: • Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure. • Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure • Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization • Prioritize the identified critical, major, and minor software vulnerabilities   Week 1 Lab: Assessment Worksheet Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure Overview One of the most important first steps to risk management and implementing a risk mitigation strategy is to identify known risks, threats, and vulnerabilities and organize them. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. This lab requires students to identify risks, threats, and vulnerabilities and map them to the domain that these impact from a risk management perspective. Lab Assessment Questions & Answers The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations....

Words: 590 - Pages: 3

Premium Essay

Lab2

...Lab 2 Part 1: 10 points Learning Objectives and Outcomes * Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows: * Windows laptops: Traveling salespeople, remote suppliers, branch offices * Windows desktops: Accounting group, developer group, customer service group * Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each. 1....

Words: 684 - Pages: 3

Premium Essay

Metasploit Vulnerability Scanner Executive Proposal

...It is imperative that ARC considers information security (IS) and begins to invest in products that will allow the IT department to better protect the network and the information stored and passed through it. Metasploit Pro is a software product that will allow the IT department to assess and analyze vulnerabilities on virtually all parts of the network, to include users. It can assist the IT department in performing audits of all hosts or devices operating on the network, to...

Words: 2593 - Pages: 11

Premium Essay

Never

...The Mitre Corporation under contract with the Department of Homeland Security (sponsor) and the U.S. National Cyber Security Division (sponsor) is responsible for hosting the CVE database listing website.   CVE publishes known software vulnerabilities and exposures and how to mitigate them with software...

Words: 296 - Pages: 2

Premium Essay

Home Depot

...Home Depot used phase six of the security process rather well (Smith, 2013). Home Depot identified the damage that had been done and then identified the root cause to the breach. Home...

Words: 695 - Pages: 3