Free Essay

Mister

In:

Submitted By Khanski
Words 2443
Pages 10
Elias N. Khan
Prof. Session
CRJ 115
7 December 2015
Packet Sniffers: A Bittersweet Software Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to "sniff" out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave & Buster's, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. A packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when "an attacker monitors network packets, modifies them, and inserts them back to the network" (Whitman, et al., 2008). For example, a MITM attack could occur when two employees are communicating by email. An attacker could intercept and alter the email correspondence between each employee, without either knowing that the emails had been changed. MITM attacks have the potential to be a considerable threat to any individual or organization since such an attack compromises the integrity of data while in transmission. Packet sniffing programs work by capturing "binary" data that is passing through the network, and then the program decodes the data into a human-readable form. A following step called "protocol analysis" makes it even easier for the data to be read. The degree of these analyses varies by individual packet sniffing program. Simple programs may only break down the information in the packet, while more complicated ones can provide more detailed information and analysis, for example, by highlighting certain types of data such as passwords that pass through the network ("Packet Sniffing", Surasoft.com, 2011). As for today's networks, switch technology is commonly used in network design. This technology makes it increasingly easy to set up sniffing programs on servers and routers, through which much traffic flows. In addition, there are already built-in sniffing modules being used in today's networks. For example, most hubs support a standard called Remote Network Monitoring (RMON). This kind of standard allows hackers to sniff remotely with the SNMP (Simple Network Management Protocol), used in most network devices, and only requires weak authentication. Network associates "Distributed Sniffer Servers" are used by many corporations. These servers are set up with passwords that are quite easy to guess or crack. In addition, computers with Windows NT system usually come with "Network monitoring agent," which also allows remote sniffing ("Packet Sniffing", ISS.net, 2011). Essentially, these sniffing programs are set up for the use of network administrators. However, the threat exists that hackers can gain access to the network and view the program logs. Packet sniffers capture all of the packets that travel through the point where the sniffer is located. For example, if the program was installed next to the server of an organization, the user could have access to all the data being transferred across the company through that server. Typical types of packets intercepted by attackers include the following:
SMTP (email): The attacker can intercept unencrypted emails ("Packet Sniffing", ISS.net, 2011).
HTTP (web): Web traffic information and history can be easily captured ("Packet Sniffing", ISS.net, 2011).
Telnet Authentication: Login information to a Telnet account can be intercepted ("Packet Sniffing", ISS.net, 2011).
FTP traffic: Access to an FTP account can be sniffed in clear text ("Packet Sniffing", ISS.net, 2011).
SQL database: Information from web databases is also vulnerable ("Packet Sniffing", ISS.net, 2011). Like any tool, a packet sniffer is a "double-edged sword" because it can be used for good or bad purposes (Orebaugh, Ramirez, and Beale, 2007). It can be used by security professionals to investigate and diagnose network problems and monitor network activity (Orebaugh, et al., 2007). Conversely, it can be used to eavesdrop on network traffic by hackers, criminals, and the like, who can use the data gathered for harmful purposes (Orebaugh, et al., 2007). Professionals such as system administrators, network engineers, security engineers, system operators, and programmers use packet sniffers for a variety of uses, including troubleshooting network problems, figuring out system configuration issues, analyzing network performance (including usage and bottlenecks), debugging during the development stages of network programming, analyzing operations and diagnosing problems with applications, and ensuring compliance with company computer usage policies (Orebaugh, et al., 2007). When an error occurs on a network or within an application, it can be very difficult for administrators to determine what exactly went wrong and how to correct the error. Many consider the packet sniffer to be the best tool for figuring out what is wrong with programs on a network (Neville-Neil, 2010). Examining packets as a starting point for solving problems is useful because a packet is the most basic piece of data and holds information, including the protocol being used and source and destination address (Banerjee, Vashishtha, and Saxena, 2010). Basically, at the packet level of analysis, nothing is hidden when all layers are visible (Neville-Neil, 2010). In addition to solving network communication problems, packet sniffers can help administrators plan network capacity and perform network optimization (Shimonski, 2002). A packet sniffer allows users to view data that travels over a network packet by packet (Shimonski, 2002). However, rather than having to examine each packet, the appropriate sniffer program will perform the analysis for the administrator. The tools are especially useful because depending on the packet sniffing program used, the packet data will appear in an easy-to-understand format. Packet sniffers can often generate and display statistics and analyze patterns of network activity (Shimonski, 2002). Data can appear in graphs and charts that make analysis and comprehension easy. Additionally, the network administrator can filter by selected criteria to capture only the relevant traffic rather than having to sort through irrelevant data (Shimonski, 2002). Knowing what programs and which users use the most bandwidth can help administrators manage resources efficiently and avoid bandwidth problems. Intruders maliciously and illegally use sniffers on networks for an innumerable number of things. Some of the most common are to capture clear text usernames and passwords, discover usage patterns of users, compromise confidential or proprietary information, capture voice over IP (VoIP) telephone conversations, map out a network's layout, and fingerprint an operating system (Orebaugh, et al., 2007). The previously listed uses are illegal unless the user is a penetration tester hired to detect such types of weaknesses (Orebaugh, et al., 2007). An intruder must first gain entry to the communication cable in order to begin sniffing (Orebaugh, et al., 2006). This means that he must be on the same shared network segment or tap into a cable along the path of communication (Orebaugh, et al., 2007). This can be done in many ways. Firstly, the intruder can be physically on-site at the target system or communications access point (Orebaugh, et al., 2007). If this is not the case, the intruder can access the system in a variety of ways. These include breaking into a certain computer and installing sniffing software that will be controlled remotely, breaking into an access point such as an Internet Service Provider (ISP) and installing sniffing software there, using sniffing software that is already installed on a system at the ISP, using social engineering to gain physical access to install the software, working with an inside accomplice to gain access, and redirecting or copying communications to take a path that the intruder's computer is on (Orebaugh, et al., 2007).
Intruders can use sniffing programs designed to detect certain things such as passwords and then use other programs to have this data automatically sent to themselves (Orebaugh, et al., 2007). Protocols that are especially vulnerable to such intrusion include Telnet, File Transfer Protocol (FTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol (IMAP), Simple Mail Transfer Program (SMTP), Hypertext Transfer Protocol (HTTP), Remote Login (rlogin), and Simple Network Management Protocol (SNMP) (Orebaugh, et al., 2007). Once the intruder has access to the network, he can collect data and use it as he likes. Common examples of stolen data include credit card numbers and proprietary organizational secrets, but include anything the hacker desires. Although organizations may use a primarily switched network, they are not protected from sniffer attacks because many programs exist that allow packet sniffing in a switched network (Whitman, et al., 2008). Because intruders who use packet sniffers do not directly interface or connect to other systems on the network, they are considered to be a passive-type of attack (Orebaugh, et al., 2007). It is this passive nature that makes sniffers so difficult to detect (Orebaugh, et al., 2007). In addition to this, hackers use normally use rootkits to cover their tracks so that their intrusion will not be detected (Orebaugh, et al., 2007). A rootkit is a collection of Trojan programs hackers use to replace the legitimate programs on a system so that their intrusion will not be detected (Orebaugh, et al., 2007). Rootkits replace commands and utilities that the hacker inputs and clears log entries so that there will be no record of his entry (Orebaugh, et al., 2007). Though it is difficult, there are some ways to detect rootkits. Methods of detection include using an alternate, trusted operating system, analyzing normal behaviors, scanning signatures, and analyzing memory dumps ("Rootkit", Wikipedia, 2011). Removing rootkits can be very complicated and difficult and if the rootkit is in the central operating system, reinstalling the operating system may be the only option ("Rootkit", Wikipedia, 2011). The threat of eavesdropping by intruders is large and challenging. However, there are some defenses that can be taken to prevent hackers from using packet sniffers against an organization. Packet sniffing and man-in-the-middle attacks compromise the integrity and confidentiality of data while in transmission. Fortunately, there are several techniques that can be used by organizations and individuals to protect against these threats and reduce risk. Specifically, technology, policy, and education are typically used to cover all aspects of security. Encryption is the best form of protection against any kind of packet interception (Orebaugh, et al., 2007). The reason behind this is that even if the data is captured by the packet sniffer, the information is completely unreadable by the attacker (Orebaugh, et al., 2007). By using this technique, messages are encrypted once the data leaves the sender's computer. Both sender and receiver hold a key that decrypts the message being transferred. Most popular websites apply a level encryption by using the HTTP Secure (HTTPS) protocol. With this technology, the connection between the web server and the user's computer is encrypted; making the information intercepted by a third party useless. Currently, most popular websites such as Google, Facebook, Yahoo, and Twitter use the https technology. However, some sites (such as Amazon.com) use https only at the login page and fail to provide a secure connection afterwards. In order to assure complete security, it is important to apply the https protocol throughout the user's browsing experience. The main disadvantage of this feature is that it slightly slows down the user's connection.
Email can also be protected from packet sniffers by using encryption. Email extensions such as Pretty Good Protection (PGP) can be easily implemented using standard email platforms like Microsoft Outlook (Orebaugh, et al., 2007). Once sender and receiver start using the encryption techniques, intercepted email messages cannot be interpreted by an attacker (Orebaugh, et al., 2007).
Another way to protect against sniffers is by using One Time Passwords (OTP). With this method, a different password is sent every time the authentication is requested to the user (Orebaugh, et al., 2007). Similarly, to the case of encryption, if a third party intercepts someone's password, this information will be useless since these can only be used once (Orebaugh, et al., 2007). This technology can be extremely useful to ensure security; however, remembering new passwords for each login can be very challenging and frustrating for most users.
A new security technique called quantum encryption is also provides good protection against sniffing attacks. This technique consists of making each bit of data as small as a photon (McDougall, 2006). The data is then transferred across fiber-optic lines. If the information is picked up and intercepted by any kind of packet sniffer, the entire photon message is disrupted, ending up the entire transmission (McDougall, 2006). A technology like this would make it impossible to intercept information since the communication will be cut in the case of interception. However, it requires fiber-optic Internet connections, which many service providers do not own and its installation can be expensive.
Packet sniffing is a sophisticated subject that wears two hats. It can be used for either good or evil depending on the intentions of the person using the program. It can help with analyzing network problems and detect misuses in the network for good purposes. Meanwhile, it can also help hackers and other cyber-criminals steal data from insecure networks and commit crimes, as in the case of Dave & Buster's. The best way to protect data from being "sniffed" is to encrypt it. Necessary policies and training also help with the protection. As technology evolves, there will be more and more ways to commit cyber-crime. Extremely sensitive data like credit card information and health care data should be well protected, from the perspectives of both the business and personal. In order to protect this information, organizations and individuals must be aware of the threat of packet sniffers.

Similar Documents

Free Essay

My Fear Analysis

...My Fear by Lawrence Raab struck me as a simplistic poem when first read. Upon the first reading I understood that Raab was talking about the emotion of fear, but once I read it again you couldn’t help but pick up on the obvious personification that Raab uses. I believe that to be the overall literary device that he uses in this poem. He refers to fear, an emotion, as “he” and “mister” giving it a much more personal backbone. “Mr. Fear” shows how Raab has respect for him and what he does. He doesn’t want fear to not exist, but instead he acknowledges fear’s existence. Raab gives fear its own emotions by saying, “Maybe he smiles when he finds the right one. Maybe he’s sorry.” I also feel like in this poem, Raab is talking about a nightmare. Nightmares always induce fear into our peaceful rest. The poem talks about dreams and what fear has in store for them. He also asks fear to make his burden he takes from him to be small and easy to get rid of. I tried to find some underlying meaning to the part of the poem where it says, “Fear, let me have a small brown bat and a purse of crickets...,” but I still wasn’t sure. A brown bat might represent a boy because boys play baseball and the purse would represent a girl. But I was still unaware how it tied into the fear notion. The overall theme that Raab is trying to get across with this poem is that fear is alive. It’s an emotion everyone feels, but it is also something that lives inside each person. It feeds off our deepest thoughts...

Words: 300 - Pages: 2

Premium Essay

Mister

...November 20, 2012 Good morning. I am here to inform you the next report about nutrition on people in nowadays. We are going to mention recently surveys made by Herbalife International of America where state how people from the XXI century are taking care of their bodies. Then, how nutrition can affect your life and how you can improve it with Herbalife natural products. Starting consuming nutritional products is necessary to have a good life away from diseases and the products from Herbalife are the solution. Let’s start with the next statement “The most Americans don’t get enough vitamins and nutrients” according to recently surveys made by scientist from Herbalife International of America. The surveys stressed the lack of vitamins and nutrients people have stopped eating and instead of it, they started eating junky food like for example McDonald, or BurgerKing. In my personal experience when I was thirteen I had problems with my overweight and high blood pressure. It was mainly because my family just did not know about the risk of fast food, neither did I. It was a dream to being eating all that tasty but at the same time fatty food. Until, the doctor told me to stop eating it and to start a balance diet full on vitamins and nutrients. I was fighting against it for the next three years after the doctor told me to do that, so my mother find this company Herbalife International of America and we decided to give it a try. We’ve discussed about the how junk food can easily...

Words: 537 - Pages: 3

Premium Essay

Mister

...TANSCULTURAL NURSING SUBMITTED BY: HARUNA ABDULLAHI IBRAHIM, MSC. NURSING (1ST YEAR), GARDEN CITY COLLEGE OF NURSING. SUBMITTED ON: 13TH AUGUST, 2012 I. INTRODUCTION: In the health care delivery system, as in the society, nurses interact with people of similar as well as diverse backgrounds having different frames of references and varied preferences regarding their health and health needs. In the provision of care, nurses must acknowledge, respect and adapt the cultural needs of those patients and their significant others through identifying the differences between cultural groups that require health care providers to identify culture specific health and illness practices and caring behaviours that transcend cultural groups and appear to be universal care practices to enable the provision of care that is holistic, effective and culturally competent. The field of transcultural nursing which was pioneered by Madelein Leininger in 1975 represent a shift from the biophysiological and psychological models that dominated nursing in the 1950s as it advocates the recognition of each individual as a social being and must be handled as unique entity having cultural beliefs, norms, values and customs that influence his or her life in all ramifications including health, illness and treatment. Leininger, who was considered the leader and initiator in the field of transcultural nursing, postulated the theory of “diversity and universality of...

Words: 3258 - Pages: 14

Premium Essay

Mister

...Contents Title Page Dedication Prologue CHAPTER ONE: Republicans and Democrats CHAPTER TWO: Values CHAPTER THREE: Our Constitution CHAPTER FOUR: Politics CHAPTER FIVE: Opportunity CHAPTER SIX: Faith CHAPTER SEVEN: Race CHAPTER EIGHT: The World Beyond Our Borders CHAPTER NINE: Family Epilogue Acknowledgments About the Author Also by Barack Obama Copyright Prologue IT’S BEEN ALMOST ten years since I first ran for political office. I was thirty-five at the time, four years out of law school, recently married, and generally impatient with life. A seat in the Illinois legislature had opened up, and several friends suggested that I run, thinking that my work as a civil rights lawyer, and contacts from my days as a community organizer, would make me a viable candidate. After discussing it with my wife, I entered the race and proceeded to do what every first-time candidate does: I talked to anyone who would listen. I went to block club meetings and church socials, beauty shops and barbershops. If two guys were standing on a corner, I would cross the street to hand them campaign literature. And everywhere I went, I’d get some version of the same two questions. “Where’d you get that funny name?” And then: “You seem like a nice enough guy. Why do you want to go into something dirty and nasty like politics?” I was familiar with the question, a variant on the questions asked of me years earlier, when I’d first arrived in Chicago to work in low-income neighborhoods. It signaled a cynicism...

Words: 120305 - Pages: 482

Free Essay

Mister

...Hardware Components |Components |Devices |Requirements Met | |Input Device |Wireless Keyboard |Create text documents with flexibility | | |All-in-One Scanner |Create digital copy of files | | |HD Web Cam w/ Mic |Create video and still image files | | |5-in-1 Card Reader |Creates copy video, still image files | | |Wireless Mouse |Allows flexibility of selection device | | | | | | | | | |Output Devices |23”HD 3D LED Monitor |High quality visual presentation | | |Wireless Laser Printer |High quality hardcopy presentation ...

Words: 659 - Pages: 3

Free Essay

Mister

...Insurance for All: A Dream Come True Medical coverage in Africa is very low. Worst still, the underprivileged are excluded even from this very low coverage. For our dream to transform Africa into an island of prosperity to become reality, a number of initiatives such as providing medical coverage for the poor are necessary. This can be possible through the MC²s, which are actually rural development micro-banks whose mission is to drive the economic growth of the underprivileged, and because the underlying principle of the MC² approach is the pooling together of a community’s material and intellectual resources to promote its welfare. For the purpose of better understanding it is necessary to define micro-insurance and mutual association. A Mutual Association can be defined as “a not-for-profit-making and non compulsory association of people driven by solidarity and who through their contributions and by their democratic decisions undertake provident funding and mutual help to cover themselves against social risk.” Micro-insurance is a form of insurance requiring very low premiums from subscribers and whose objective is the optimum satisfaction of personal needs. Principles of A Mutual Association To achieve our objective to provide medical coverage to low and very low income people, we rely on the principle of collecting small amounts from every community member to ensure optimum satisfaction for the individual and the community as a whole...

Words: 1284 - Pages: 6

Premium Essay

Mister

...HIST-T124 T1 Study Guide I. MULTIPLE CHOICE KEY CONCEPTS Early Humans and their Culture * Define “culture” * Identify the features of the Paleolithic and Neolithic Cultures Middle East * Define “civilization” * Explain the role of climate and geography in the development of Mesopotamian and Egyptian civilizations Near East * Explain the role of climate and geography in the development of Near Eastern civilizations * Identify the Hittites and Assyrians Indian Sub-Continent * Explain the role of climate and geography in the development of early Indian civilization * Recognize and identify key characteristics and features of Harappan and Vedic Aryan civilizations East Asia (China) * Explain the role of climate and geography on the emergence of civilization in East Asia * Identify and describe the key features of Shang and Zhou civilization The Americas * Explain the role of climate and geography in the development of civilization in the Americas * Focus on the Olmecs in Mesoamerica and Chavin de Huantar in the Andes Comparing the Four Great Revolutions * Identify and understand the main points of comparison and contrast between Chinese, Indian, Near Eastern, and Mediterranean philosophy and religion Philosophy in China * Identify and understand the key features and messages of Confucianism, Daoism...

Words: 1109 - Pages: 5

Free Essay

Mister

...Conservatism Favours Pragmatism Over Principle.’ Discuss (45 Marks) Conservatism, like many other political ideologies has many factions within it. Traditional conservatism, especially paternalistic conservatism very much favours a pragmatic approach. This is the belief that behaviour should be shaped in accordance with practical circumstances and goals rather than principles, beliefs or ideological objectives. However with the introduction of the liberal new right conservatism due to the conservative view of economic and social breakdown, things have started to look a lot more ideological and challenged the pragmatic nature of conservatism. This is where the debate arises. Traditional conservatives undoubtedly favour a pragmatic approach rather than stick to the core ideologies of conservatism. Burke famously said ‘a state which doesn’t change cannot conserve’ which perfectly explains the traditional conservative favouritism towards pragmatism. If a government does not change in order to help all aspects of society and bring in some kind of social reforms there will be revolt by the poor of the country. Conservatives hold this belief due to the belief that humans are naturally imperfect and therefore limited intellectually. Society is too complicated for human’s to fully understand and can therefore never fully understand the political system. Traditional conservatives are therefore suspicious of abstract ideas and systems of thought that claim to understand how society...

Words: 311 - Pages: 2

Premium Essay

Mister

...Enrico (“Rico”) Bandello who epitomized the rise and fall of the gangster. Edward G. Robinson was the first Gangster star in this genre. These career criminals live double lives as respectable business men, who defy the law, and are tough who also operate under a cloak of fear portrayed as respect. The popularity and appeal of these films during the 30’s was divided among the public. Some would see these films as a sort of participation in the rebellion against a failed government and others would see them as revenge against the bad guys. Hollywood would put the gangster in a mostly retributive frame with the negativity of the gangster myth ratifying the belief in the public enemy system. This would be seen as the result of the collapse of law enforcement in a society or loss of morality, and ultimately social disorder. William Wellman’s The Public Enemy (1931) starred James Cagney as the fast talking and cocky Tom Powers and his most famous line, “I’m on top of the world Ma!” This is an example of a well dressed man with street smarts who is a criminal bootlegger and womanizer. One of the films most controversial and pivotal scenes is when Tom Powers assaults his floozy girlfriend with a grapefruit by slamming it into her face at the breakfast table. Howard Hawkins “Scarface: The Shame of a Nation” (1932) starred Paul Muni as a Immature, power hungry, monstrous and beastly hood in prohibition era Chicago, whose character was loosely based on Al Capone. This is the first movie...

Words: 1982 - Pages: 8

Premium Essay

Mister

...Developing Conceptual Framework Is An Impossible Possibility Accounting Essay Accounting is playing an important role in nowadays society. It provides financial information to the user to make business decision. However, accountants have to follow accounting standards when they are providing the information. We may question what the principle of those standards is. Financial accounting theory was created as the principle in making standards, and conceptual framework for accounting built up. This essay is going to talk about whether developing a conceptual framework is an impossible possibility. In order to talk about this, I am going through some history of accounting, the definition and compare the conceptual framework under different standards. Accounting was created for thousands years ago. It dates back more than 7,000 years which is the time of ancient Babylon, Assyris and Sumeria. (Friedlob, G. Thomas & Plewa, Franklin James, 1996) At that time, people did accounting for their personal need. With the change of the times, accounting no longer work for personal need. People need common standards for stakeholders to use when making decisions. Countries built up Generally Accepted Accounting Principles (GAAP) to set up rules for accountants to do accounting. When the business is becoming bigger, people find out that it is hard to understand other countries' accounting report. People need international standards, so some international standards come out, Such as International...

Words: 980 - Pages: 4

Premium Essay

Mister

...5.0 STRATEGIC INITIATIVES UNDERTAKEN BY CSC STEEL HOLDINGS BERHAD IN E-RECRUITMENT 5.1 ERP system CSC Steel Holding Berhad uses ERP systems to provide human resources management module within the enterprise and good human resources management, the main function covers the whole process of human resource needs, such as Attendance Management and General Affair Management. 5.1.1 Attendance Management * Mainly use to manage the employees attendance including shift work maintenance, attendance in-out time record, change shift, lateness and also leave application. CSC Steel Group can determine whether or not a business will be successful in the future. They must keep a track of employees. Monitoring attendance helps in the long term for a business, as an employer will be able to tell which employees arrive early, which arrive late and who has the most absences without any valid reason. This could help an employer in deciding which employees are most suitable to work in the business, having employees who arrive to work on time means that the day-to-day tasks of the organization will be fulfilled. Employees within an organization should know about their employer’s attendance and absence policy, so that they are aware of what is required of them. 5.1.2 General Affair Management * Function including employees’ data control & recruitment management system. Employers perform administrative tasks to ensure that their staffs can work efficiently. Equipment and machinery used in their...

Words: 1209 - Pages: 5

Premium Essay

Mister

...Team 5 Charter TEAM MEMBERS 1. Awura Adwoa Ofosu-Anim 2. Tonia Ikharo 3. Asad Zuberi 4. Joshua Sanni     MISSION STATEMENT “Making effort to be involved in the learning process by working as a team for a common goal” VISION STATEMENT “To stand out in our endeavors” COMMON GOALS We will work together to effectively achieve tasks and team assignments.   I. Rules of engagement: 1. Meetings 2. Communication 3. Team members’ responses 4. Conflict Resolution 5. Leadership 6. Decision Making process MEETINGS Team members have to arrive 10 minutes before any scheduled meeting so that prior issues are discussed. Team meetings will be held at least once weekly and details will be sent out to members at least 24 hours before the scheduled time to allow ample time for preparations. COMMUNICATION We will be communicating via emails, our team whats app group, Skype, text messaging and phone calls. Each member is responsible to execute assigned roles and provide prompt feedback. TEAM MEMBERS’ RESPONSES Team members have a duty to always carry out assigned tasks and provide prompt feedback and should inform the team should in case they encounter any issues while carrying out such individual tasks, so that we can work our way around such hitches before deadlines. LEADERSHIP Informal leadership is practiced within the team. A facilitator role will be assigned prior to each meeting and rotated every time to give a chance to all team members to participate...

Words: 324 - Pages: 2

Premium Essay

Mister

...I. Nature of Business Echo Global Logistics, Inc. is a provider of technology-enabled transportation and supply chain management services, delivered on a proprietary technology platform, serving the transportation and logistics needs of its clients. Echo’s web-based technology platform compiles and analyzes data from its network of over 24,000 transportation providers to serve its clients’ shipping and freight management needs. The Company has become a leading contender among 3PLs and has been listed in Inbound Logistics' Top 100 3PL Providers.  In 2011, Echo has procured transportation and provided logistics services for more than 22,700 clients across a wide range of industries, such as manufacturing, construction, consumer products and retail. SERVICES Echo provides transportation services for shipping including: * Truckload (TL) * Small Parcel * Inter-Modal * Domestic Air * International * Expedited Main logistics services include: * Rate Negotiation * Carrier Management * Routing Compliance * Shipment Execution and Tracking * Freight Bill Audit * Payment and Performance Management Clients * Guthy Renker * Elkay * Daktronics * Archway * Culligan * Samuel Strapping Echo Global Logistics Daily Transportation Management Operations II. Value Chain Analysis Logistics Echo Global Logistics took a nontraditional approach to supporting its rapid growth early on by enlisting the services...

Words: 1720 - Pages: 7

Free Essay

Mister

...BROTHER® MOBILE PRINTERS TELECOM CASE STUDY P-touch® Commercial Labeling Solution Helps Major Telecom Company’s Customers Stay Connected Proper Labeling Communicates Professionalism, Helps Eliminate Mistakes and Service Calls One of the country’s leading providers of voice and data communications had long recognized the benefits of proper labeling and has practiced some form of labeling for many years. According to a senior field service engineer with the company, “we used a typical handheld labeler and typed in information we felt relevant to the application, but often forgot to include something (like the service number to call) or there was inconsistency in the format, making some labels difficult to read.” They tried preprinting their labels, but this presented problems with custom data, and there were so many different applications that it became impractical to preprint so many kinds of labels – not to mention the impossible task to manage the inventory for hundreds of installers all over the country. Handwritten labels solve some of these problems, but they are time consuming as each field service technician struggles to print legibly. Labeling is a thumbprint of professionalism and the company was determined to find a labeling solution that meets their requirements. The company made organization changes, including a new corporate logo which provided an opportune time to identify and standardize on a better labeling solution for the company. Since this group had...

Words: 1055 - Pages: 5

Premium Essay

Mister

...Martin Luther King's “Letter from Birmingham Jail” strives to justify the desperate need for nonviolent direct action, the absolute immorality of unjust laws together with what a just law is, as well as, the increasing probability of the “Negro” resorting to extreme disorder and bloodshed, in addition to his utter disappointment with the Church who, in his opinion, had not lived up to their responsibilities as people of God. King's justification to the eight clergymen for protesting segregation begins with a profound explanation of their actions, “Nonviolent direct action seeks to create such a crisis and foster such a tension that a community which has constantly refused to negotiate is forced to confront the issue”. The actions of the African American people are overdue and very well planned as King had explained in the letter. Their quest was to force the white politicians to negotiate and actually heed the requests for desegregation. As King explains, “past promises have been broken by the politicians and merchants of Birmingham and now is the time to fulfill the natural right of all people to be treated equal”. Violence is not what King wants, he simply wants unjust laws to change and the Supreme Courts 1954 ruling to be upheld. Secondly, King’s answer to the clergymen's assertion that breaking the law is not the way to achieve the results the African American is looking for. “Conversely, one has a moral responsibility to disobey unjust laws. I would agree with St. Augustine...

Words: 594 - Pages: 3