• Home
  • /
  • Topic
  • /
  • Other
  • /
  • Home
  • /
  • Home Security Vulnerabilities Having Observed My Residence Essay
Verified Document

Home Security Vulnerabilities Having Observed My Residence Essay

Home Security Vulnerabilities Having observed my residence from the outside so as to identify key security vulnerabilities or weaknesses, I now come up with an in-depth security vulnerability assessment of the said residence. Included in this assessment are recommendations on how the identified vulnerabilities or security weaknesses will be eliminated and/or minimized.

Vulnerability Assessment and Recommended Security Enhancements

Intruders more often than not 'case' homes before they attempt a robbery. What this means is that intruders scout for key vulnerabilities that would make a certain home their likely target. Having looked at my residence from an intruder's point-of-view, I was able to identify a number of key security vulnerabilities. In the section below, I revisit some of the vulnerabilities I spotted and make recommendations that would in addition to eliminating the said vulnerabilities also make my home more secure.

To begin with, the open bedroom window presents a perfect opportunity for an intruder to access the house and make away with something of value. Indeed, in the opinion of Capel (1997), being the most neglected venerable points, "the majority of all entries are made through windows." In the past, there are times I have left the front door unlocked while in the neighborhood. While my neighborhood is relatively safe, the likelihood of an opportunistic robbery cannot be ruled out. To eliminate this vulnerability, the first and most logical step will be to ensure that all doors and windows remain locked whenever am not in the house. Additional measures like double glazing can also be taken to further secure the windows. Double glazing according to Capel (1997) "is undoubtedly a deterrent as there are two panes of glass to penetrate instead of one." Hence for any intruder, this would provide an appropriate barrier against forced entry....

This is more so the case for basement windows. However, the iron grills will be designed in a way that allows them to be opened from the inside. This is an important consideration as grills that cannot be opened from the inside can effectively trap occupants inside the house incase of a fire.
Poor landscaping is yet another major security vulnerability that needs to be fixed urgently. Currently, quite a number of tree branches around the compound are in dire need of pruning. Further, most plants around the compound and most particularly those ones near basement windows also need to be trimmed. Un-pruned tree branches and other un-trimmed plants can provide convenient concealment to intruders. In seeking to break into a house, intruders prefer to be either partially or fully concealed from public view. Possible entry points to my residence i.e. basement windows are well shielded by un-trimmed plants. From an intruder's point-of-view, this is a critical vulnerability. The most logical approach towards the elimination of this vulnerability has got to do with proper landscaping. In this case, plants near doors and windows will be pulled up as they can be used by intruders to conceal themselves as they attempt a break-in. Trees near the house will have their lower level branches pruned. Further, all shrubs and bushes in the compound will not be allowed to exceed a height of more than 3 feet going forward.

The other key vulnerability which I also need to fix has got to do with lighting. Defective bulbs would make a break-in after dark an easy undertaking even for the most inexperienced robber. Without adequate lighting, an intruder would be perfectly concealed from pedestrians, neighbors as well as those inside the house. In seeking to eliminate this vulnerability, I will make…

Sources used in this document:
References

Capel, V. (1997). Home Security: Alarms, Sensors and Systems (2nd ed.). Jordan Hill, Oxford: Newnes.
Cite this Document:
Copy Bibliography Citation

Related Documents

Home Security Vulnerabilities Intruders Are Constantly Looking
Words: 957 Length: 3 Document Type: Essay

Home Security Vulnerabilities Intruders are constantly looking for home security vulnerabilities that might make their invasion easy and swift. This effectively means that the more vulnerable a home is, the higher its chances of being targeted by robbers. In this text, I keenly observe my residence from the outside in an attempt to identify potential security vulnerabilities. In addition to identifying the specific areas burglars would likely focus on; I also

Transportation - Security Contemporary Transportation
Words: 6826 Length: 25 Document Type: Research Proposal

By federal law, all passenger airliners now feature cockpit doors that are locked by the pilots from inside the cockpit. Likewise, pilot training now includes the specific instructions not to open the door in response to any occurrence or emergency in the passenger cabin; instead, pilots are under instructions to land the aircraft immediately in response to any perceived emergency that would have previously been cause to investigate beyond

How to Perform Valuations for Municipalities in South Africa
Words: 64599 Length: 254 Document Type: Dissertation

……South African Municipalities Municipal Revenue Loss Reduction through Improved Municipal Valuation Methodologies:Balance Sheet Enhancement of South African Municipalities to Improve Rates and Taxes Revenue GenerationAbstractThis study examines the property valuation process of Municipalities in South Africa and develops a strategy for strengthening that process in order to more efficiently value properties and ultimately to enhance municipal balance sheets and increase revenue streams. This study proposes an innovative valuation method based

SF Targeting
Words: 967 Length: 4 Document Type: Essay

Target Folder Target Identification and Description Target identification data. Located at 1407 W. Wilson. Chicago IL. 60647 Description and significance. This residence is suspected as being a safe house for individuals recruited as foreign fighters. These individuals pass through the safe house in transit to unknown locations in the Horn of Africa. The intent of the upcoming direct action is to deploy a Special Forces team to raid the residence in the hope of capturing

Terrorists, Politicians, Social Reformers, Paramilitary,
Words: 9563 Length: 33 Document Type: Dissertation

Hezbollah has committed itself to the betterment of societal Lebanon not just in the context of Muslim families and organizations but all those who stand for an independent Lebanon. They have also provided a great deal of assistance when conflict has rendered regions without electricity or water (International Crisis Group, 2005). It was Hezbollah who provided not only medical supplies and food to Beirut during the 2006 conflict, but

Insurance Fraud
Words: 11287 Length: 35 Document Type: Term Paper

Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now