You are on page 1of 7

7

Running Head: Home Governance

Home Governance
University of Advancing Technology
Joshua Moatz
August 17, 2014

HOME GOVERNANCE

JOSHUA MOATZ

Abstract
Information governance is the specification of decision rights and an
accountability framework to encourage desirable behavior in the valuation, creation,
storage, use, archival and deletion of information. It includes the processes, roles,
standards and metrics that ensure the effective and efficient use of information in
enabling an organization to achieve its goals. The word that matters most is
accountability. The root of all of our problems with information, and we do have lots of
problems with it, is the fact that there is no accountability for information as such. When
this affects our home life, especially home security, one must realize the foundations
both technology and ones home sit on. If one chooses to ignore the problem of
accountability, then one opens themselves up for home security failure. So, the question
then raised is how does one improve home governance? How does one secure their
home safely? (Logan, 2010)1

HOME GOVERNANCE

JOSHUA MOATZ

Home Governance
As one would say, lets talk shop. Most home networks are password protected
from the gate now. Some people take it a step further and add an alarm system within
the home. However, many fail to realize that just relying on these systems with a basic
password and security in place, does not fully protect them. In fact, the majority of most
people stick with standardized passwords and never change them. This effectively
makes them easy prey to experience online invaders. So, simply, step one improve
your passwords. You can start by making common sense your password. Its less likely
to be discovered! However, one a serious note, changing your internet connection
password is not enough to keep your system safe. Try changing the password every
other month. By rotating passwords, your connection is less likely to be penetrated.
As a young adult with no kids, only bills as my responsibilities, I have no younger
mischief to worry about. However, lets be honest, for those young parents out there, we
all know children are growing with technology. Therefore, they are the more likely target
to stumble upon or be the very person that allows for the right connections for a threat
to penetrate. Now, one solution is to keep small children off all of your tech in your home
but thats no fun right? You horrible parent! No, instead there are many options one
should definitely explore. Parental settings within technology is definitely one of the
better routes to choose. For example, Xbox One and PlayStation 4 are technology
meant for families to play games. At the same time, each account requests a full name,
address, birthdate, sex, and sometimes even credit card information to set up the
account. Not so much a family safe system without a security plan. Parental settings on
devices do more than just shield a child from certain content.
HOME GOVERNANCE

JOSHUA MOATZ

They also give the parent control of content surfing and monitoring where there
children go while exploring games or the consoles features. Now that I finished my
sales pitch for game systems to parents, take that same concept over to computers.
Most laptops and devices allow people to create individual users on the same device,
with one administrative user. By doing so, you can prevent certain groups from surfing
into hazardous areas, preventing your children from attracting the wrong kind of
attention. You can also increase your firewall protection and add virus protection
software, just as a safety precaution. Again, taking accountability to secure your own
protection is one of the best ways to improve home governance.
Who are these supposed home invaders of the internet? How do they devise
their devious plots? More importantly, how do you know when one crosses your path?
Social Engineers are your worst enemies. Social engineering is a term that describes a
non-technical kind of intrusion that relies heavily on human interaction and often
involves tricking other people to break normal security procedures. In this sense, a
social engineer may try to get you to give up information on your home because more
than likely that specific person or persons are interested in what you have stashed in
your place. (Rouse, 2010).2
So you put up a home security system and call it a day right? Wrong! As stated
before, technology brings a lot of positive things to the table but it only takes one person
to make that same technology detrimental. The same way hackers may exploit your
game consoles for your credit card information they can and will use your own tech
against you. Your home can quickly go from surveying your home to unwanted
monitoring. This poses a dangerous threat but how do you prevent it from happening?
HOME GOVERNANCE

JOSHUA MOATZ

You need to ask yourself the question, Do I need this? Allow me to explain. If
you live in a three room apartment, do you need a home security system? The most
likely answer will be no. One because most people in a three room place are just
starting out and have less to worry on the scale of home invasion. Two, because they
will less likely be targeted. However, in a family suburban home the question Do I
need this will apply in the equation of prevention. Sometimes adding security systems
are a bad idea, especially when they become equipped with cameras and less form of
security control. If you do choose home monitoring, then it becomes more of specific
question of camera placement. More than likely, placing the camera outside with be less
of a threat to your own personal privacy because you can monitor who came and went
from your home at such and such hours.
What would you do if you were asked to separate your personal email from
official email? What system do you know of that would allow this separation to happen
automatically? Easy, you say, save it all and sort it out later. And that, as it happens is
what most of us do, with e-mail, files, data and everything. We save everything and
lawyers often give this advice because its the easiest thing that we can do that we
assume will not get us into any kind of trouble. I suppose its all in how you define
trouble and whose trouble it is. Most of us dont have to deal with the trouble this
causes: the wasteful expense, the potential legal repercussions, or the time and energy
someone else might have to spend figuring it out one day. Again, were back to
accountability. The truth, a lot of the time, laziness is another factor we have to get over
in order to protect ourselves and our homes from invasion. First line of defense in
security is always expect the unexpected. (Logan, 2010). 3
HOME GOVERNANCE

JOSHUA MOATZ

Home Governance comes down to simply being ahead of the curve. There really
is no trick to it. In this digital age, nothing is full proof. There is no absolute solution.
There is only a sense of precaution. How you conduct that precaution and where you go
with it is up to the individual. Taking accountability in Home Governance is a start.
Owning your home and your tech with the knowledge of keeping it secure is helpful.
Now, I could ramble on forever but my intention is no longer to bore you. Just make sure
you study this short essay well. If not, hit reset.

HOME GOVERNANCE

JOSHUA MOATZ

References
What is Information Governance? Logan, Debrea 2010
http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governanceand-why-is-it-so-hard/
What is Social Engineering? Rouse, Margret 2010
http://searchsecurity.techtarget.com/definition/social-engineering

HOME GOVERNANCE

JOSHUA MOATZ

You might also like