Essay Undergraduate 957 words Human Written

Home Security Vulnerabilities Intruders Are Constantly Looking

Last reviewed: ~5 min read Arts › Home
80% visible
Read full paper →
Paper Overview

Home Security Vulnerabilities Intruders are constantly looking for home security vulnerabilities that might make their invasion easy and swift. This effectively means that the more vulnerable a home is, the higher its chances of being targeted by robbers. In this text, I keenly observe my residence from the outside in an attempt to identify potential security...

Writing Guide
How to Easily Write a Compare and Contrast Essay (without breaking a sweat)

Have you been asked to write a compare and contrast essay? You are not alone. Every year, thousands of students are asked to write compare and contrast essays for their classes in junior high school, high school, and college. Compare and contrast essays are commonly assigned to students...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 957 words · 80% shown · Sign up to read all

Home Security Vulnerabilities Intruders are constantly looking for home security vulnerabilities that might make their invasion easy and swift. This effectively means that the more vulnerable a home is, the higher its chances of being targeted by robbers. In this text, I keenly observe my residence from the outside in an attempt to identify potential security vulnerabilities. In addition to identifying the specific areas burglars would likely focus on; I also take note of the various soft targets associated with my residence.

Identifying Potential Security Vulnerabilities According to Philips (2006), it may be prudent to "conduct a safety and security survey (or vulnerability analysis)" prior to creating an office or home security plan. In carrying out such a survey, the author points out that one may be required to walk around the outside of his or her residence while taking note of the potential vulnerabilities or problems (Philips, 2006). Looking at my residence from the outside, I managed to identify a number of potential vulnerabilities which I discuss in the following section.

To begin with, my garden has lots of overgrown bushes and shrubs. Looking at my home from an intruder's standpoint, these bushes and shrubs would offer convenient hiding places. In fact, it would be easy for an intruder to completely shield himself from view by squatting behind these shrubs. Further, a number of trees within the compound are too close to the house. In my opinion, these could be used by an intruder to gain access to either the roof or the upper floors of the house.

There is hence an urgent need for me to consider developing a landscaping plan that will eliminate the vulnerability in this case. Secondly, with the study room curtains drawn, the PC which sits on a table near the window is clearly visible. I consider this a key vulnerability as the same would aid an intruder as he seeks to take inventory of what is inside the house. This also attracts the attention of a potential burglar.

Further, in my front yard, there are two boxes of electronic items I purchased recently. One of the boxes belongs to a CD player I purchased for my cousin while the other came with a flat screen TV I purchased three weeks ago. These in my opinion are indicators of priced possessions inside the house. I am convinced that burglars would rather rob a home that promises them of a good payday.

It would be a huge gamble for intruders to risk robbing a house when they can't tell what is inside. Indeed, as Capel (1997) points out, "if your premises are known or believed to contain articles of high value, they may attract the attention of the professional burglar." Next, although I have a fully functional alarm system installed, there is no evidence of the same i.e. A sign or poster declaring that the property has a home security alarm system.

The absence of such a sign could easily be taken to mean that the property does not have an alarm system. In the course of committing a burglary, an intruder would ideally avoid detection as much as possible. The presence of a sign or poster declaring that the property is protected by a home security alarm system is hence a significant deterrent against any potential burglar. Fourth, I do not currently have a dog or any other pet for that matter.

Looking at my home from an intruder's standpoint, the absence of a dog in the lawn or even a pet in the house would make an intrusion less troublesome. For instance, a fierce looking dog around the garden would make a potential intruder think twice before attempting a break-in. In this case, the intruder would be kept at bay by both the fear of being mauled and that of rousing attention. Next, two defective security lamps in my backyard are yet to be repaired.

Although most of the other areas around the house are well lit, my backyard is rather dark. This is yet another significant vulnerability as a burglar would be well concealed at night. Typically, no burglar would want to be seen trying to make a break-in. Further, it is also important to note that I do not currently have any motion activated lighting installed within my residence.

In my opinion, if lights suddenly and unexpectedly go on with an intruder in the vicinity, this would be enough reason for such an individual to turn around. There is also a ladder lying in the backyard. This could be used by a burglar for a number.

192 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
3 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Home Security Vulnerabilities Intruders Are Constantly Looking" (2012, May 12) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/home-security-vulnerabilities-intruders-79985

Always verify citation format against your institution's current style guide.

80% of this paper shown 192 words remaining