AUTOMATING HOME SECURITY RYAN C. KRAUSE. BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection.

Slides:



Advertisements
Similar presentations
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
Advertisements

Automation of the home, housework or household activity. Linked systems/appliances to centralized control. Remote monitoring of the home from a tabletop.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Remote Monitoring and Management Solutions ®
Jim Niehaus October 9, Topics No Cost Considerations Systems with 24/7 Monitoring Service Cameras Motion Sensors References & Product Links.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
SMART HOMES The way we nest now Suhasini K Vamsi Priya V Sushmitha K.
The Comfort System Product Presentation The Intelligent Home System.
security statistics 2 1 home in 5 will suffer a burglary or fire incident in the next 6 years 1 home in 3 will have a medical emergency this year A home.
© 2004 Control 4 August 4, 2015 Control4 Get the most out of your home.
Introducing The Revolutionary ENSA  EN ergy SA ving Automated Wireless Light Switch A World First For The Security Industry By Making Alarm Sensors Dual.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
C ONTENTS 1-Introduction What are smart homes 2-Why smart homes 3- Applications of smart homes 4- The main objective of the project 5- The main phases.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Gaylen Atkinson March 16, AGENDA Market Potential Customer Need Tridium Solution Benefits to Users Customer “Hot” Buttons Product Offerings How.
BUILDING SECURITY ALARM SYSTEM. BUILDING SECURITY ALARM SYSTEM Any electrical or mechanical device which is designed or used for the detection of an unauthorized.
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
XFINITY HOME Presentation. WHY? A home or apartment burglary occurs ever 15 seconds. Home burglaries are most common during daylight hours – usually when.
 The Circuit  Home Security Systems are a simple electric circuit. To open or close a light, you simply throw a switch. In a burglar alarm it?s the.
Automate Your Home and Vehicle Using Your Smartphone or Tablet.
Video Management Control-Bit Technologies video system manages various types of video inputs; analog or digital, originated in both analog & IP cameras,
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
What is Vision?What is Vision?  Vision is a security system that offers top notch services for a reasonable price. The customer has the option to customize.
Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
SURVEILLANCE SYSTEM HITRON DVR All rights reserved by Hitron Systems.
Chapter 2 What is an Alarm System? Alarms: The First Line of Defense
AZOR – easy solution GSM mini alarm Azor. AZOR - introduction Common alarm system = STRESSFUL Your home is changing to „PROTECTED PREMISES“ Complicated.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Toda una gama de proyectos domóticos listos para instalar Home Automation proyects ready to install.
Save-bees’ solution : Consists of standalone devices that are placed in the beehives and offer accurate measurement information for The weight of the.
What Is Smart Home It should use computers Integrate work, learning and living into home It should hide the technique and details of how it works.
How to Sell T-Link TL250/300. T-Link Internet & Network Alarm Communicators Internet alarm communications for multi-branch Financial Institutions, Governments,
Welcome Utree Phone Manual. Intro Thankyou for purchasing our Utree mobile This user-guide has been specially designed to help you get to know the functions.
The Secure, Automated Home Project Team: Alec Kulbacki Project Advisor: W. Thomas Miller.
INTRUSION ALARM TECHNOLOGY
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
C24 Interactive Simply Connected. Simply Secure. Rev 101.
COMFORT & SAFETY Objective 8.01 & Bell Ringer 11/17  Copy and Answer the following question in your notebooks:  Cutout patterns of furniture and.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Configuration Guide ---for Alarm device ---for Alarm device.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Mechanics Security Solutions “Creating Next Generation Security Solutions”
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Security Systems Presented By:
How to configure alarm system
Seminar on PRESENTED BY Jayesh patel Roll no:6431 L.D.Collage of ENGG. AH-15.
Mobile Device Security Management Leyna Belinsky.
Unit 1: Protecting the Facility (Virtual Machines)
Home security consultants provide hardware and customer support services to help homeowners prevent crime and fires in their homes and on their property.
S3b Sim Secual Product Training March Connected to your smartphone Communication by SIM card Interact with your system everywhere you are Control.
Home Security Options What can I do to deter Burglars?
XBee Based Industrial And Home Security System
Instructor Materials Chapter 6 Building a Home Network
Security and Smart Home Devices: How Safe Is Your Home?
Smart Home "Simple is smart". We believe it is smart to make complex things simple. But only when this means simple for our customers, not for ourselves.
Internet of Things
Module 3 Selling Security
The security and vulnerabilities of IoT devices
Chapter 6 Networks Communicating and Sharing Resources
The most exciting DDC control to be introduced in the last 30 years.
Reason To Install Smart Home System. Smart HomeSmart Home have become much smater about keeping an eye on your home while you're asleep or out for the.
Presentation transcript:

AUTOMATING HOME SECURITY RYAN C. KRAUSE

BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection 1, and many more A typical standard alarm comes with: Siren, 3 door/window sensors, and 1 motion detector Allows for many other upgrades as to the quantity of each sensor First security system was constructed in 1966 by Marie Van Brittan Brown and Albert Brown This system was created for owners who are afraid of rising crime rates and view surroundings from a safe distance. The system had 4 peep holes and a camera that would move a on a track and capture images from each hole when necessary.

BACKGROUND: HOME AUTOMATION Home Automation is becoming much more popular among consumers Control4; and many home security companies have started cashing in on Home Automation Typically contains a function of home security, which makes it beneficial for Home security companies to include it. There is no typical or standard package that comes with home automation, every package is created fully custom for what the owner or buyer wants. Most systems use Wi-Fi or Ethernet to transmit data to other aspects of the system. Older systems used the Power lines so no extra cable need ran.

BENEFITS OF HOME SECURITY SYSTEMS A monitored system can notify authorities when there is an emergency and you are not there. Insurance companies can offer discounts Security systems can be configured to not just monitor doors and windows but also smoke, heat, carbon monoxide, freezing temperatures and rising water Can notify others when system events happen, such as a child coming home from school. Can call in to the system to arm and disarm the system.

BENEFITS OF HOME AUTOMATION SYSTEMS Offer what Home Security Systems offer plus: Fully automated light control Climate control that adjusts to outside as well as what rooms are being occupied in the house Remote activation and surveillance of all systems in your house Appliance integration Control4 Video

SIMILARITIES/DIFFERENCES BETWEEN SYSTEMS Similarities Both systems use motion and contact sensors to detect occupancy You can monitor the activities and be notified of system events via text message or Both systems are able to monitor for CO2, Fire, Smoke, Water, and Burglary and notify accordingly Differences Home Security is more dedicated towards just security where Automation is more general with security and entertainment Home Security uses one board with the devices connected to it, Automation uses many controllers connected like a network With Automation it is much easier to add on with new products, Home Security, you would need a new board and have to rewire the system.

VULNERABILITIES IN THE SYSTEMS “Sniffer” to read unencrypted data in power lines on Home Automation Systems Have weak Wi-Fi passwords Call in on private number to change system settings Still only relies on 4-digit pin

“SNIFFER” TO READ UNENCRYPTED DATA IN POWER LINES ON HOME AUTOMATION SYSTEMS Problem In older systems home automation systems, devices communicated on Ethernet networks over existing power lines. In order to communicate over power lines, most signals had to be sent unencrypted so every device didn’t have to be authenticated. A display was shown at DefCon in 2011 which used two X10 products, they were able to Jam signals from security alarms, unlock doors, and even monitor the people inside. Solution Encrypt! Encrypt! Encrypt! Authentication may take longer, but worth it in the end Upgrade and use a closed network as state of the art systems are using Use a power line firewall that can block signals from outside the home

WEAK WI-FI PASSWORDS Problem Weak or no Wi-Fi passwords are among the biggest issues in network security Home automation systems use Wi-Fi to communicate with devices such as tablets and control panels for the system A lot of systems don’t require a Wi-Fi password or keep it the default and must be changed manually If a hacker is able to access your network, he/she can easily access your home automation system Solution Enable/Create a much more secure passcode, using the latest encryption (WPA2) Ditch Wi-Fi and only be able to connect to your system via Ethernet Set up MAC address filtering so you are able to set which devices can access your network

CALL IN ON PRIVATE NUMBER TO CHANGE SYSTEM SETTINGS Problem Both Home Automation and Home Security systems have a feature that you can: Receive messages about system events such as a child coming home from school Send messages to have the system perform functions (incase you forget to arm it) This is a problem as all an attacker needs is the 10- digit phone number and a 4-digit pin Chances are you save the phone number in your phone and don’t delete your sent items with your pin Solution Have the telephone company only allow messages from a predefined list of numbers Don’t use text messaging and use calling with better authentication techniques

STILL ONLY RELIES ON 4-DIGIT PIN Problem All systems still only relay on a simple 4-digit pin Pins are typically easy to guess Typically choose 1 pin and use it for many other areas Typically once set, the pin is never changed Solution Allow other ways of authentication, possibly a retinal scan or fingerprint scan Allow more than just a 4-digit pin, allow alpha numeric characters in it s well Have a policy set up that you need to change your pin after a year

WHAT CAN HAPPEN IF AN ATTACKER TAKES OVER MY HOUSE Home Security Attacker can disarm your system to allow a break-in If surveillance equipment is installed, may be able to view it Able to see which rooms are occupied Able to see when people leave and come home Home Automation All issues the same as home security plus… Able to unlock and lock doors in the house Able to turn on appliances such as your oven Able to change your HVAC settings Able to change and power up any entertainment equipment Able to turn lights on and off

CONCLUSION Great Benefit if used correctly Remember Encrypt! Encrypt! Encrypt! Fun to use Can aid in an infinite amount of ways Just be SMART!