• Home
  • /
  • Topic
  • /
  • Other
  • /
  • Home
  • /
  • Home Security Vulnerabilities Intruders Are Constantly Looking Essay
Verified Document

Home Security Vulnerabilities Intruders Are Constantly Looking Essay

Home Security Vulnerabilities Intruders are constantly looking for home security vulnerabilities that might make their invasion easy and swift. This effectively means that the more vulnerable a home is, the higher its chances of being targeted by robbers. In this text, I keenly observe my residence from the outside in an attempt to identify potential security vulnerabilities. In addition to identifying the specific areas burglars would likely focus on; I also take note of the various soft targets associated with my residence.

Identifying Potential Security Vulnerabilities

According to Philips (2006), it may be prudent to "conduct a safety and security survey (or vulnerability analysis)" prior to creating an office or home security plan. In carrying out such a survey, the author points out that one may be required to walk around the outside of his or her residence while taking note of the potential vulnerabilities or problems (Philips, 2006). Looking at my residence from the outside, I managed to identify a number of potential vulnerabilities which I discuss in the following section.

To begin with, my garden has lots of overgrown bushes and shrubs. Looking at my home from an intruder's standpoint, these bushes and shrubs would offer convenient hiding places. In fact, it would be easy for an intruder to completely shield himself from view by squatting behind these shrubs. Further, a number...

In my opinion, these could be used by an intruder to gain access to either the roof or the upper floors of the house. There is hence an urgent need for me to consider developing a landscaping plan that will eliminate the vulnerability in this case.
Secondly, with the study room curtains drawn, the PC which sits on a table near the window is clearly visible. I consider this a key vulnerability as the same would aid an intruder as he seeks to take inventory of what is inside the house. This also attracts the attention of a potential burglar. Further, in my front yard, there are two boxes of electronic items I purchased recently. One of the boxes belongs to a CD player I purchased for my cousin while the other came with a flat screen TV I purchased three weeks ago. These in my opinion are indicators of priced possessions inside the house. I am convinced that burglars would rather rob a home that promises them of a good payday. It would be a huge gamble for intruders to risk robbing a house when they can't tell what is inside. Indeed, as Capel (1997) points out, "if your premises are known or believed to contain articles of high value, they may attract the attention of the professional burglar."

Next, although I have a fully functional alarm system installed, there is no evidence of the same i.e. A sign or poster declaring that the property has a home…

Sources used in this document:
References

Capel, V. (1997). Home Security: Alarms, Sensors and Systems (2nd ed.). Woburn, MA: Newnes.

Philips. B. (2006). The Complete Book of Home, Site, and Office Security: Selecting, Installing, and Troubleshooting Systems and Devices. New York, NY: McGraw-Hill Professional.
Cite this Document:
Copy Bibliography Citation

Related Documents

Thematic Analysis of Security Issues
Words: 20201 Length: 78 Document Type: Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

ERP and Information Security
Words: 8373 Length: 26 Document Type: Term Paper

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Intelligence Agencies What Exactly Is
Words: 11218 Length: 28 Document Type: Term Paper

Sometimes, it is even necessary to carry out certain clandestine operations like deceptions, clandestine collection of information, covert actions, and also the carrying out of the exercise of distributing disinformation or misleading information, which would mislead the suspected threat. The United States Intelligence Community is, as stated earlier, made up a number of different agencies. The Central Intelligence Agency is one of these. Also known popularly as the CIA, this

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now