CWC Security Logo

A wide range of security & home automation services for your home & business.

 Keeping you safe & protected

We can provide a range of high quality security & home automation products and services for both the Home and Business. 

 

CWC Security strives to maintain the highest standards of design, installation, and project management for security, and communication installations by providing training for our employees to perform their work safely and efficiently. We offer a wide range of commercial and home security services .

 

We will achieve continued business expansion by growing our client base and diversifying the services we offer. As our clients’ operations are positively impacted by our services, our business will prosper. Every aspect of CWC Security, LLC. is designed to add value and deliver an urgent response to your changing needs with the right technology, custom-configured solutions, innovative extranet tools, technical expertise, specialized services and ongoing support.

 

 

Ensuring the safety and security of your premises is crucial in today's world. At CWC Security, we understand the importance of peace of mind when it comes to protecting what matters most to you.

 

As a leader in the alarm and security industry, we are committed to providing cutting-edge solutions tailored to your specific needs. With 25  years of expertise, our team specializes in designing, installing, and monitoring state-of-the-art security systems that offer comprehensive protection for residential and commercial spaces.

 

 

 

 

  • Home
  • > Glossary of Terms

 

CWC Security is here to help you understand termnology in security. Just some commonly used terms you may come across while researching your security options.

 

2G, 3G 4G Network
2G refers to the second generation (and 3G, the third generation) wireless telephone technology used by cellular providers. Because it is older technology, 2G is being replaced by 3G technology and will be shut down completely by December 31, 2016.

 

Abort Delay (Siren going off doesn't mean signal is at CS)
It can take up to 30 seconds after an alarm sounds for the signal to be sent to the Central Station. During this time, if an alarm panel is reset, it is possible that the Central Station will not receive the alarm.

 

Access Control
A type of security system that restricts access to authorized users at certain times. Different access levels can be granted to different users.

 

Alarm Event
An event triggered by an alarm system that alerts the control panel that some type of emergency has occurred. The control panel then sends signals to the Monitoring Center, where operators can dispatch the appropriate help.

 

Alarm Monitoring
A service provided by a Monitoring Center, in which a security system is connected 24/7 to a Monitoring Center operator.

 

Alarm Security System
A device for signaling an emergency. Signals are usually audible and/or visual.

 

Alarm Verification
The means of verifying that an actual intrusion has taken place.

 

Arm
The act of turning your security system on, so that it is ready to detect an alarm event.

 

Arm (Away)
Arming the system when you are leaving the home. This mode will activate all zones and all sensors, including both perimeter sensors and interior zones such as your interior motion sensors.

 

Arm (Stay)
Arming the system when you are staying in the home. Armed Stay will only activate your perimeter sensors such as door and window sensors and glass break detectors. Motion detectors will not be active in this mode so that you can walk around the home without tripping an alarm.

 

Battery Back-up Protection
A battery back up is protection placed in or around your security control panel. The battery back up keeps your security safety alarm system online in case of an electrical failure.

 

Cellular Alarm Monitoring
A type of alarm communication path that uses the digital cellular network to send an alarm signal from the control panel to the Monitoring Center. The benefits of cellular monitoring are that no phone line is needed and there is no chance of a criminal cutting your alarm communication line as it is a wireless cellular signal. Cellular monitoring is one of the most reliable ways to monitor a security system.

Central Station (or Monitoring Center)
An agency that receives alarms from customers' security systems and requests the dispatch of fire, police or medical authorities, based on the type of emergency.

 

Cloud
A cloud is essentially a third-party operated data center that offers online storage of data that can be accessed at any time using an Internet connection.

 

Cloud-hosted video
A video surveillance system whereby recorded footage is stored in the “cloud” rather than on a DVR. Cloud storage allows for access to the recorded footage anywhere, anytime from a Web-enabled device. See also “Cloud.”

 

Cloud computing
Storing and accessing data and programs over the Internet instead of your computer's hard drive. See also “Cloud.”

Cloud hosted access control
An access control solution whereby the software needed is hosted in the cloud. Because the solution is Web-based, software updates and IT maintenance occur automatically. See also “Cloud.”

 

Control Panel 
A panel that receives transmissions from alarm sensors and communicates data to the Monitoring Center.

 

Detector
Any alarm device that can be connected to a security system to provide notification of an alarm event to the control panel. Door/window contacts, motion detectors, glass break detectors, and smoke detectors are some of the most common detectors found on a security system.

 

Disarm 
The act of turning your security system off, so that it will no longer detect an alarm event.

 

Dispatch
The act of calling in an alarm event to the proper authorities. Monitoring Center operators are the ones typically doing the dispatch.

 

DVR (Digital Video Recorder)
A device that receives and records images from video cameras, allowing the footage to be viewed from a monitor, computer or smart device.

 

Electronic Verification
If the alarm panel is reset with the proper panel disarm code after an alarm is tripped, an operator will make a courtesy call to the premise phone number listed on the account. If there is an answer at the number, the operator will ensure everything is okay and will ask for the verbal password for the account. If there is no answer, the proper disarm will be used as electronic verification that everything is okay and no dispatch will be made. This helps reduce unnecessary false dispatches.

 

Energy Management
Solutions that allow users to control their lights and thermostats (or other appliances) from a Web-enabled device. By being able to turn these items on and off remotely, users can better manage their energy consumption.

 

Event
See “Alarm Event.”

 

False Alarm
An emergency alarm, such as a fire or burglar alarm, that is set off unnecessarily and triggers a response from local fire department of law enforcement. False alarms waste public resources as emergency responders spend time and money responding to an incident that is not a real emergency.

 

Fire Alarm
A signal transmitted by heat, fire or smoke detectors to the Monitoring Center to alert the fire department.

 

Geo-Services (Geo Fencing)
An automated security solution that allows you to set perimeters around your home and alerts you to any event you specify that occurs when those perimeters are crossed. Location from set home/work location

 

Glassbreak Detectors
An electronic device that detects frequencies that accompany the breaking of glass.

 

Heat Detectors
Heat detectors can determine changes in temperature in your house or building. Heat Detectors can be a standalone fire alarm safety system or can work in conjunction with other safety security systems.

 

Home Automation
A cloud-based service that allows the customer to control lights, locks and thermostats inside their home from their computer or smart device.

 

Image Sensor
A device that allows for visual verification of alarms. Usually consists of a motion sensor that triggers a video recording and an alarm to the Monitoring Center if motion is detected.

 

Line Seizure
Alarm systems that communicate through telephone lines are designed to take over the line when an alarm is activated. This will disconnect anyone on the phone and will also prevent any incoming or outgoing calls to be made on the line the alarm system communicates on until the alarm is fully transmitted to the central station.

 

Monitoring Center
See “Central Station.”

 

Motion Sensors
Devices that register changes of state in interior or exterior spaces. Motion sensors are highly effective in intrusion detection.

Notifications (to phone)

 

Electronic alerts (email and/or text messages) that are sent to your smartphone when an event you specify is triggered.

 

Panic Button
A device that when pressed, causes an alarm event regardless of whether or not the security system is armed or unarmed.

 

Passcode
A personal code that you enter into your alarm system via the control panel to arm and disarm your system. You should always keep your passcode confidential.

 

PERS (Personal Emergency Response System)
A device worn around your neck or wrist containing a button that when pushed connects you to a Monitoring Center operator that can summon medical help for you.

 

Radio Backup
Technology that allows for the installation of a radio alarm backup system without telephone lines. These cellular backup support systems may also be added to your present alarm protection system as a back-up which sends alarm signals by radio to the central surveillance monitoring station.

 

Security System
See “Alarm Security System.”

 

Sensor
A sensor is a device that detects a change, such as the opening of a window or door, which triggers an event to the control panel and an ultimate alarm to the Monitoring Center.

 

Smart Device
An electronic device, such as a phone or tablet, that is generally connected to other devices or networks via different protocols such as Bluetooth, WiFi, cellular networks, etc., that can operate to some extent interactively and autonomously.

 

Smoke Detector
An electronic device that senses the presence of smoke and sends a smoke alarm signal to the control panel.

 

Two-Way Voice
A control panel feature that allows the Monitoring Center to listen in and talk to the homeowner when an alarm signal is received.

 

Video Surveillance
A type of security that uses a digital video recorder (DVR) as well as security cameras to monitor a location. Video footage is stored on the DVR and can be retrieved. Most video surveillance systems give the user the ability to look in live to their property over an active Internet connection allowing them to monitor the site from anywhere.

 

Wireless Communication cellular backup support systems See “Cellular Alarm Monitoring..”

 

Wireless Security System
A security system that uses no wires. Each alarm device reports back to the control panel using a radio frequency wireless signal. See also “Cellular Alarm Monitoring.”

 

Z-Wave
Z-Wave is wireless technology that makes regular household products like lights, door locks and thermostats "smart.” Z-Wave products "talk" to each other wirelessly and securely and can be accessed and controlled on your computer, smartphone or tablet.

 

 

Computer Terms


Active matrix LCD panel High-resolution color display for laptop computers.


Application software Computer programs designed to directly deal with solving the user’s problems. Examples would include programs for accounting, word processing, financial analysis, computer games,

etc.


Backup The act of making a second (backup) copy of the data stored on a disk or other storage device, to safeguard against loss of data if there is damage to the primary copy.


BASIC Acronym for Beginner’s All-purpose Symbolic Instruction Code. A general-purpose programming language, often used in computers.


Baud rate A measurement of the speed at which data are transmitted between two computers, the number of signal per second being transmitted.


Bit Abbreviation for “binary digit,” the most common unit computers use for representing data internally.


Byte A group of eight bits, the most common unit computers use for internally representing individual characters, digits, or other data.


Cathode ray tube (CRT) Another term for display screen.


CD-ROM Abbreviation for Compact Disk-Read Only Memory. A small disk device capable of storing extremely large amounts of data, but which cannot be erased and reused for storing other data (the reason it is referred to as “read only”).


Central processing unit (CPU) The part of a computer that controls the entire system and does mathematical processing of data.

Character A single digit, letter of the alphabet, or other symbol. Usually represented inside a computer by one byte.


Chip Common term for very small silicon wafers upon which electronic circuits have been created for use in computers. Used for microprocessors, electronic memory, and other internal computer electronic components.


Communications program Computer program containing the instructions that allow a computer to send data to and receive data from another computer.


CPU Central Processing Unit.


Cursor A block, underline character, arrow, or other symbol used on a display screen to indicate a particular location on the screen.


Data The symbols, writing, words, or other items used to represent facts, objects, events, or ideas. Accounting records and yield measurements are two examples of data.


Data base management system (DBMS) General-purpose computer program that allows data to be stored, manipulated, organized, and retrieved in some logical manner. Sometimes referred to as an “electronic filing program.”


Demonstration program Limited, incomplete version of a program offered for sale by a software company, used for demonstrating the complete program’s features and capabilities. Often given free to potential buyers of the complete program, or sold at low cost.


Disk drive Device for recording onto and reading from one type of computer storage disk—either a diskette, or hard disk. Varying sizes and types of disks are not interchangeable among disk drives.


Diskette A 3 1/2-inch or 5 1/4-inch floppy disk.


Display screen Usually a television-like screen used for displaying computer output, however, may also be an LCD or other device.


Documentation The printed operating instructions that accompany a computer or software.


Dot matrix printer Printer that forms characters by selectively coloring or inking dots in a grid or matrix of dots. Characters thus printed often appear to consist of rows of dots.


Electronic worksheet or spreadsheet A general purpose computer program that operates like a large columnar pad of paper in the computer’s memory, which can do calculations on data typed onto the

sheet. Allows data and formulas to be typed in, edited, calculated, and printed out. Often used for budgeting and forecasting, as a “what if” planning tool.


Entry The act or result of putting data into a computer.


Ethernet A type of network interface card that connects an individual computer to a network. Computers on the Internet that use the TCP/IP protocols are frequently connected to the Internet over an

Ethernet link.


Expert system A computer program for making a recommendation, which tailors its recommendation to the user’s situation by following a variable path of reasoning dependent upon data given it by the user. One example would be a program to recommend grain marketing strategies based on the user’s risk and profit goals, availability of storage, proximity to markets, etc.


FAX modem A device to connect computer to telephone line to send data FAX messages.


File A collection of related data existing upon a computer storage device.


Floppy disk Flexible plastic disk coated with a magnetic material, upon which computer programs and data may be stored. Usually from 3 to 8 inches in diameter.

Hard disk A type of computer storage disk, usually consisting of a metal platter coated with a magnetic material. Capable of storing larger amounts of data than floppy disks.

Hardware The physical parts of a computer.

Information The result of processing, manipulating, and organizing data in a way that adds to the knowledge of the person receiving it.


Ink-jet printer A low-cost, near laser quality printer that uses liquid ink.


Input The data put into a computer.


Keyboard Typewriter-like computer input device.


Kilobyte (K) A unit for measuring computer memory and storage capacity, roughly equal to 1,000 characters or bytes of data. Technically, one K is 1,024 bytes.


Laser printer A fast, high-quality printer.


LCD Liquid Crystal Display. A technology popular in watches and calculators for displaying information, which also may be used for computer display screens—especially in portable computers.


LAN Local area network


Megabyte One million bytes, or 1,000 kilobytes.


Memory Term usually referring to the electronic memory circuits of a computer; however, sometimes also extended to imply all memory and storage devices used by a computer.


Menu A list of choices displayed on a computer display screen, from which the user may choose a program action.


Microcomputer Any computer using a microprocessor as its central processing unit.


Minicomputer Term for computers intermediate in processing power between microcomputers and mainframe computers.


Modem A device that allows a PC to communicate and exchange information with other modem-equipped computers via telephone lines. The current standard for modems is 56k, which allows you to transfer data at up to 56,000 bits per second.


Monitor A display screen.


Mouse Computer input device consisting of a small box having one or more buttons on top, for giving instructions to a computer.


MSDOS Operating system program popular among users of the IBM-PC and compatible computers.


Operating system A program or collection of programs that coordinates and controls the various devices making up a computer system.


Output The act or result of printing or displaying information generated by a computer.


PCMCIA An international association that defines specifications for devices.


Peripherals The add-on hardware devices used in conjunction with a computer, printer, display screen, disk drives, etc.


Printer Device that transfers computer output onto paper.


Program A set of pre-defined commands or instructions that tells a computer how to go about solving a problem or doing some job.


Random-access memory (RAM) Electronic memory circuits in a computer that may be both read from and written to, and which lose the data they contain whenever electricity is turned off to the computer.

Sometimes referred to as volatile memory.


Read-only memory (ROM) A memory device (usually electronic memory circuits) that may only be read by a computer. The data stored in ROM memory is permanent (non-volatile) and is not lost when electricity is turned off to the computer.


Small computer systems interface (SCSI) Used to connect hard drives and tape drives to computer.

Storage device Any device upon which a computer may store data in permanent form. Data is not lost from a storage device when the electricity to a computer is turned off, as is the case with electronic memory. Sometimes called non-volatile memory.


Surge protector Electronic device for protecting a computer or other electronic device from the harmful effects of sharp surges of voltage in electric power lines.


Template A pre-programmed set of instructions that may be used with an electronic worksheet or spreadsheet program for doing a particular job. Akin to a computer program.


Utility software Computer programs for handling the organizational and “housekeeping” chores in running a computer, such as deleting files of old data, copying disks, printing a directory of the information stored on a disk, etc.


WAN Wide area network


Word processing Using a computer to accept, edit, organize, and print out text.


Internet Terms

Address An individualized name (or number) identifying a computer user or computer. Used in network communications for the transmission of
messages for a particular person or machine.


Bookmark Most Web browsers give you an option of adding a URL to a list. By doing this, you can store the linking information (the URL) to any Web pages you plan to revisit.


Browser (Web browser) A software application (either text-based or graphical) that lets you browse (surf) the World Wide Web.


Cache (Pronounced “cash”) A region on the computer memory where frequently accessed data can be stored for fast access.


Chat room (or chatline) A location on an online service that allows users to communicate with each other about an agreed-upon topic in “real time” (or
“live”) as opposed to delayed time with e-mail.


Cookie Small bits of data that a Web page asks a browser to store on a user’s computer, either in RAM or on the hard drive.


Dial-up As opposed to a dedicated or leased line; a type of computer linkage using regular telephone lines, generally referring to the kind of connection one makes when using a terminal emulator and a regular modem.


Domain Name System (DNS) The unique name of a collection of computers connected to networks such as the Internet.


Download To receive a file sent from another computer via modem.


DSL (Digital Subscriber Line) A DSL circuit is much faster than a regular phone line. Currently DSL is not available in all cities or parts of cities.


E-mail (electronic mail) Online communications between computer users.

Encryption The process of scrambling a message so that a key, held only by authorized recipients, is needed to unscramble and read the message.


FAQ Frequently Asked Questions.

File compression This process stores computer data more efficiently so the information takes up less disk or file space and may be transmitted in less
time.

Finger A program used to find out whether someone is online. It may also reveal his or her full name and project files.


Firewalls Special computers that are set up on a network to prevent intruders from stealing or destroying confidential files.


Flame To heap written abuse on other computer users or to excessively criticize them for their ideas, spelling, grammar, etc. Flaming is considered
impolite, juvenile behavior, but it is not uncommon in some newsgroups.


Freeware Noncopyrighted software made available free for public use by the author.


FTP (File Transfer Protocol) The process of transferring files or pro-grams from one computer to another. An FTP site is a computer on the Internet that stores files and provides access to them.


GIF Graphic Interchange Format, the most common format used for graphics on the Internet.

Helper applications Additional software occasionally needed to help a Web browser program deal with a specialized file on the Internet.


Home page An introductory WWW page or Web server at a Web site that provides hyperlinks to other Web pages.


HTML (HyperText Markup Language) The computer language used to create hypertext documents. A system of marking up, or tagging, a document so it can be published on the World Wide Web.


HTTP (HyperText Transfer Protocol) The client-server protocol upon which the World Wide Web is based.

Hyperlink, hypertext A link within one document connected to other documents, other places within the same document, pictures, or HTML pages. Think of a hyperlink as an invitation to visit another place. A simple click on the link will take you there.


Internet The worldwide network of networks based on the TCP/IP protocol. A noncommercial, self-governing network devoted mostly to communication and research with roughly 66 million users worldwide.


Internet Service Providers (ISP) An organization that lets users dial into its computers to connect to its Internet link for a fee. ISPs generally provide an Internet connection and an electronic mail address.

Some providers also include World Wide Web browsing software.


Intranet Internal networks, based on Internet technology, designed to connect the members of a specific group or single company (a closed-user group).


IP (Internet Protocol) Main protocol upon which the Internet is based.


ISDN (Integrated Services Digital Network) Telecommunications network that allows for digital voice, video, and data transmissions.


JPEG (Joint Photographic Experts Group) A format that is used to display graphics on Web pages.


Listserv A program that allows users to mass-distribute messages that form conferences, as well as archiving files and messages that can be searched for and retrieved.


Login, logon The process of identifying yourself to your computer or an online service. The initial identification procedure to gain access to a system as a legitimate user. The usual requirements are a valid

user name (or user ID) and password.


Logout, logoff The concluding steps for formally ending a session with a system. Physically disconnecting or powering down a terminal does not necessarily result in a logout.


Mailing list Electronic discussion groups that link a relatively small group of people together by common interests and that are distributed throughout the Internet via its global e-mail system.


Multimedia Documents or platforms that combine different kinds of data (text, video, graphics, audio).


Netiquette Guidelines to good manners on the Internet; for example, don’t flame other users, don’t leave your caps lock key on (that’s like yelling), etc.


Newsgroup Collection of information and users who get together to communicate about one particular subject.


Online Refers to the successful connection with another computer via telephone lines or through a network.


Online service A dial-up service that provides news, information, and discussion forums for users with modem-equipped PCs and the access software provided by the service.


PDF (Portable Document Format) A PDF file preserves the look of a document. It is commonly used to make available publications on the Web. A free Acrobat Reader is needed on a computer before PDF files are readable. The Reader can be downloaded from the Adobe Corporation web site at www.adobe.com.


Privacy Policy Web sites should have a statement that describes what information about you is collected by the Web site and how it is used. A good policy statement should have an opt-in or opt-out option. An opt-in option means that the Web site will not use your information unless you tell them
they can. An opt-out option means that the Web site can use your information.


Protocol The “must follow” regulations that govern the transmission and receipt of information across a data communications link.


Script Also known as calling script. A record of keystrokes and commands that can be played back in order to automate routine tasks, such as logging on to an online service.


Search engine A WWW site that serves as an index to other sites on the Web.


Server A computer (or service) that provides information or a service to other computers on a network.


Shareware Software that is sold by individuals or companies for a nominal fee. Typically the software is downloaded and tried out before buying and
registering it.


Signature A three- or four-line message, used to identify the sender of an e-mail message or Usenet article.


Spam Generally referred to as the Internet equivalent of junk mail, spam ranges from annoyances like mass e-mailings and advertisements, junk mail,
and chain letters, to fraudulent product or service promotions, and harassing or threatening e-mails.


T-1, T-3 line High-speed digital lines that provide data communication speeds of 1.544 megabits (T-1) and 45 megabits (T-3) per second.


TCP/IP (Transmission Control Protocol/Internet Protocol) A set of instructions that dictates how packets of information are sent across multiple
networks. This includes SLIP and PPP. Also included is a built-in error-checking capability.


Telnet A program that lets the user log onto a remote computer. Also, the name of the program implementing the protocol.


Upload To send or transmit a file from one computer to another via modem.


URL (Universal Resource Locator) A Web site’s address. An example is: www.cwcsny.com



Usenet Refers mostly to the newsgroups, but also to e-mail. Usenet travels on the Internet, but also over modems and satellites.


Username, user-id An address that designates a personal account on a large computer. For example, in jsmith@xyz.com, “jsmith” is the user-id.


Virus A piece of programming code inserted into other programming to cause some unexpected and usually undesirable event, such as deleting or damaging files.


Web server A computer that is connected to the Internet that stores and manages Web documents. A Web server handles requests from other computers and delivers requested Web documents.


Web site A group of related pages, images, and files on a Web server.


WWW (World Wide Web) One of several features of the Internet. It contains graphics, video, audio, text, and much, much more.