Home Security Essay

1358 words - 6 pages

Home Security Vulnerabilities
DeVry Online, SEC310
Professor Kathryn Fenner

The neighborhood I have lived in for the past three years is southwest of Chicago. The main benefit of living forty-five minutes from the city is the peace and quiet. It is an old farm town with newly built homes. The population of Lockport houses approximately twenty-five thousand residents. The town is very quiet, with two lane access roads throughout much of the city. The traffic is minimal, the stars are visible at night and the sound of horses and roosters in the morning are what make residents feel a sense of security. When walking through the neighborhood, it is not out of the ordinary to see garage ...view middle of the document...

The subdivisions are not gated; however police do patrol the area regularly. The homes in this area do not have a front yard fence, yet most of them have a backyard fence. Criminal activity is relatively low. In 2012, the City of Lockport reported four robberies, forty-four burglaries and two hundred sixty-four thefts.
The subdivision I live in has a Facebook page that is managed by two residents. To ensure it is only residents, they audit the people on the page to verify they still reside in our community area for safety reasons. Not only has social media helped us all to get to know neighbors that do not live within throwing distance, it has helped us come together as a community of residents that care. In recent weeks, a neighbor had thousands of dollars in tools stolen from his garage. This happened overnight while he and his family slept upstairs. Since then, folks have banded together as a make-shift Neighborhood Watch and have posted strange activity; whether it was a suspicious vehicle or individual walking around. There is a bit of calmness knowing that the individuals in your neighborhood are friendly and look out for one another.
The biggest deterrent is a home security system. While I personally do not have one, I do have battery operated sensors for all doors. The alarm will sound when turned on and the door opens. I also have stickers in the windows showing that I do have a home security system. There are so many options for personal home security that make it easy for homeowners to monitor their home while they are away. Xfinity by Comcast now offers home security. Some of the available options include motion sensor lights and in-home cameras. The options to log in online and update the security settings have made this a cost effective, marketable item to make homeowners feel safe and secure. Home security statistics tell us that burglars will usually bypass a house if it requires too much effort or more skills or tools than they possess.
Doors can also be a big vulnerability. There are four doors; including the door through the garage that allow entrance into my home. There is the front door, the back door, the garage door, and the door inside the garage that allows access into the house. The garage door has a keypad with a 4-digit code that allows access into the garage. It is locked and cannot be opened manually unless the correct code is entered. The front doors metal with a lock on the doorknob as well as a deadbolt. The glass screen door also has a lock that is always in the locked position. There is a main window on the first floor which always remains locked. During warm weather, the window is closed and locked if we leave the house for any amount of time. There is also a sliding door leading to the backyard. This has a standard lock as...

Other Papers Like Home Security

Cmgt400 Week 4 Individual Essay

1359 words - 6 pages mobile devices or those who work from home. According to "8 Levels Of It Security In The Data Center" (n.d.), “Another important level of protection requires that processing resources like mainframes and minicomputers be housed in secure areas that offer reasonable protection from unauthorized physical access, and natural calamities such as fires and floods, among other risks” (pg. 1). Another level of protection deals with platform security

Linux Security Essay

448 words - 2 pages can be run on one server with virtualized software saving on the cost of individual hardware with a redundant backup the same way at still a considerable savings. Citations "Home." ISO/IEC 17799:2005. N.p., n.d. Web. 23 Sept. 2015. "ISO/IEC 27001 Information Security Management." ISO/IEC 27001 Information Security. N.p., n.d. Web. 23 Sept. 2015.

Com 172 Persuasive Essay

1008 words - 5 pages Social Security and Retirement Erin Darby COM172 June 7, 2011 Louise Gerdes Social Security and Retirement In the United States, Americans need to plan for retirement. Social Security will not cover people’s needs when retiring. Americans who retire should use savings based on their personal investments, private savings accounts, employer’s pensions such as 401K, and Social Security so that they can live the rest of their lives

Security Breach

1832 words - 8 pages Running Head: SECURITY BREACH Security Breach faced by Sony Corporation Introduction In the global marketplace, to attract the customers and provide relevant information to the customers, internet is used by most of firms as a promotional tool. In this, web-sites, social networking sites, etc. are used by the firms to communicate with the customers. Although, many security tools and techniques are used by the firms

Tjx Technology

580 words - 3 pages Introduction: The TJX Companies, Incorporated is based in Framingham, Massachusetts. It is originally evolved from the Zayre discount department store chain. In 1988, Zayre sold the depatrtment store and renamed the company as The TJX Companies, Incorporated. The first branch of T.J Maxx was opened in 1976. And it moved up to 141st in the Fortune 500 rankings in 2004. In 2009, it became the largest international apparel and home fashions off

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages Global Security Policy CMGT-400 Monday, May 11, 2015 Vijay Bhaskar Jonnalagadda Global Security Policy Organizations with offices in multiple countries have to strategically implement personnel, logistics, network configurations, and inventory; but they also have to create a security plan to secure these assets to keep their customer, brand integrity, and profits. Some of the issues faced while maintaining security for a company in

It Audit Guide

4838 words - 20 pages IT [pic] Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Table of Contents 1. Introduction to Accreditation 4 2. The Information System Audit – Checklist 7 2.1. What is an Information System Audit? 7 2.2. Why is an Information System Certification needed? 7 2.3. Assessing an Information System’s Security Risks 7

Computer Forensics and Cyber Crime

701 words - 3 pages , business or home to determine its current security status, its current practices deficiencies or excesses, determine level of protection needed, and ways of improving overall security levels are recommended. A security survey can either be done by in-house personnel or by external security consultants. However, outside security experts are preferred their approach to the job would be more objective and would not take some parts of the job for granted

Unit 4 Assignment 1

271 words - 2 pages scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers

Bfsi Security Market: Global Industry Analysis and Forecast 2016 - 2024

1259 words - 6 pages BFSI Security Market: Global Industry Analysis and Forecast 2016 - 2024 Persistence Market Research BFSI Security Market: Global Industry Analysis and Forecast 2016 - 2024 Persistence Market Research 1 BFSI Security Market: Global Industry Analysis and Forecast 2016 - 2024 Persistence Market Research Released New Market Report on “BFSI Security Market: Global Industry Analysis and Forecast 2016 - 2024”. In past one decade, electronic

It302 Research #1

1311 words - 6 pages is particularly useful for the security of shared hosting accounts. Without a chroot jail, a user with limited file permissions would still be able to navigate to top-level directories. As an example, suppose the user’s directory is /home/user. Without chroot, nothing would prevent the user from navigating up to /home to see other users’ directories or even navigating up to / where they can see /etc, /usr, /var, /lib, and other system-critical

Related Essays

Home Security Components Essay

3070 words - 13 pages Home Security System Components: In planning on installing a home alarm in either yourself or professionally, it is important that having enough knowledge in the components that make up a complete home security system. A home security system is made up of four separate groups. 1. Alarm System Control – "the Brain" 2. Alarm System Keypad – "the Heart" 3. Alarm System Detection Device – "the Eyes and Ears" 4. Alarm System Siren – "the

Home Computer Security Essay

3757 words - 16 pages Home Computer Security -- Glossary Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.Home Computer Security       Glossary | This section contains definitions of terms used throughout this booklet. Unless otherwise stated, the definitions come from the Webopedia Online Dictionary for Computer and Internet

Home Work Security Essay

578 words - 3 pages Charlie Hill GE253_V6.0:Physics>Week 1>Assignment>Assignment The scientific method is a process to systematically investigate observations, solve problems and test hypotheses. 1. The first step to scientific method is to state the problem. It is important to clearly state what your problem is to avoid any confusion later in the scientific method. 2. The second step to scientific method is making observations about the problem. The

11.2.2.6 Lab Cnaa Essay

608 words - 3 pages Lab – Researching Network Security Threats Objectives Part 1: Explore the SANS Website Navigate to the SANS website and identify resources. Part 2: Identify Recent Network Security Threats Identify several recent network security threats using the SANS site. Identify sites beyond SANS that provide network security threat information. Part 3: Detail a Specific Network Security Threat Select and detail a specific recent network threat