{"id":56,"date":"2008-01-14T20:05:16","date_gmt":"2008-01-15T04:05:16","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/01\/14\/home-security-systems\/"},"modified":"2008-01-14T20:05:16","modified_gmt":"2008-01-15T04:05:16","slug":"home-security-systems","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/14\/home-security-systems\/","title":{"rendered":"Home Security Systems"},"content":{"rendered":"<p>Summary:<\/p>\n<p>The physical system I am reviewing is the prototypical home security system.  These systems are used to provide an increased sense of security (compared to only door and window locks), and provide a guarantee against more professional break-in attempts.  By professional, I am mean to define the skill with which an adversary would enter and exit without leaving evidence behind. A professional would be able to enter and exit undetected. Such a system would have window and door sensors, as well as disaster monitoring and reporting to a central office.  Each sensor is attached to a door or window, and is able to detect if it has been opened.  If the system is armed and the sensors or disaster systems are activated, a siren will sound and the central monitoring office would be notified.<\/p>\n<p><!--more--><\/p>\n<p>Assets and Goals:<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->The goal of this system is to protect the assets by deterring unauthorized entry into the house.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->The assets of this system are the safety of the family, their belongings, and the house itself.<\/p>\n<p>Adversaries and Threats:<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->An adversary of this system would be a criminal interested in stealing or attacking the family. The threat presented by this adversary is personal safety and loss of material possessions.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Another adversary is someone inside trying to get out; potentially a teenager with a curfew. The threat here is that the safety of the teenager cannot be ensured if his or her parents are unaware. It would also leave an opening for the first type of adversary to enter.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Nature may also be considered an adversary because of fire, flood, and wind.<\/p>\n<p>Potential Weaknesses:<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Security could be compromised from the inside by an escaping teenager or careless parent that doesn\u2019t arm the system.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->These systems tend to only include a few sensors, so it may not be possible to protect every door and window.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Home security systems may entice criminals as it signals a belief that what you have to protect is valuable.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->These systems lack a means of identifying who or what entered, as well as what was taken.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->The signal cable (phone line?) between the system and central office could be removed or intercepted to render the system useless.<\/p>\n<p>Potential Defenses:<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Better child-parent communication and a scheduled activation time would fix weakness 1.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Buying more sensors or placing them on the most vulnerable doors to maximize their effectiveness would help solve weakness 2.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Make an effort to keep easily portable, expensive items out of sight to weaken the determination of a potential criminal. If they can\u2019t see it, they won\u2019t know they can get it.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->Adding sound and motion activated cameras to the system would provide both a means of identification and of tracking what was taken.<\/p>\n<p><!--[if !supportLists]-->&#8211;          <!--[endif]-->An encrypted \u201cactive\u201d signal with a rotating key could be sent to the office during all modes of operation.<\/p>\n<p>Evaluation:<\/p>\n<p>Regarding asset protection, this product will only deter casual criminals. These are criminals that will commit crime as opportunities present themselves. They would be interested in an open window or laptop lying in the open, but would not take the risk without guaranteed reward. As long as the family is conscious of their actions, as well as using the controls at their disposal correctly, they should be fine.<\/p>\n<p>The inside adversary &#8211; someone trying to get out &#8211; could compromise the system by deactivating it, and would be risking his or her safety by exiting the home.<\/p>\n<p>The professional criminal &#8211; someone who knows specifically what they want from breaking into the home, as well as how to do so without tripping the alarm system &#8211; presents the greatest threat to the home, though it\u2019s not too probable that they would target a home without cause.<\/p>\n<p>This system may evolve with home electronic technology so that it is integrated with all doors, windows, sensors and appliances. This would at least improve the deterrence effect of the system.<\/p>\n<p>Conclusion:<\/p>\n<p>While this system should be improved to be more effective at crime prevention, its base purposes are deterrence and notification. These purposes are achieved adequately by standard home security systems while they are active. There is still a risk that someone could social engineer their way into the home. With that said, I believe the greatest risk comes from casual criminals with a known target (like that laptop), or insiders trying to get out of the house. This risk can be reduced simply by hiding that laptop and talking with the kids.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: The physical system I am reviewing is the prototypical home security system. These systems are used to provide an increased sense of security (compared to only door and window locks), and provide a guarantee against more professional break-in attempts. &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/14\/home-security-systems\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,5],"tags":[],"class_list":["post-56","post","type-post","status-publish","format-standard","hentry","category-physicalsecurity","category-security-reviews"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}