Free Essay

Ankara

In:

Submitted By almnfyfat
Words 3757
Pages 16
An ISS Technical White Paper

Wireless LAN Security
802.11b and Corporate Networks

6303 Barfield Road · Atlanta, GA 30328

Tel: 404.236.2600 · Fax: 404.236.2626

WWireWireless Lan Security

802.11b Wireless LAN Security

Introduction
Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth – comparable to a standard Ethernet wired LAN in performance. An upcoming version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b.
This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work – even if IT staff and security management administrators do not yet recognize wireless LANs as an approved technology. This paper addresses the security concerns raised by both current and upcoming
802.11 network technologies.
Wireless LAN Business Drivers
Without doubt, wireless LANs have a high gee-whiz factor. They provide always-on network connectivity, but don’t require a network cable. Office workers can roam from meeting to meeting throughout a building, constantly connected to the same network resources enjoyed by wired, desk-bound coworkers. Home or remote workers can set up networks without worrying about how to run wires through houses that never were designed to support network infrastructure.
Wireless LANS may actually prove less expensive to support than traditional networks for employees that need to connect to corporate resources in multiple office locations. Large hotel chains, airlines, convention centers, Internet cafes, etc., see wireless LANs as an additional revenue opportunity for providing Internet connectivity to their customers. Wireless is a more affordable and logistically acceptable alternative to wired LANs for these organizations. For example, an airline can provide for-fee wireless network access for travelers in frequent flyer lounges – or anywhere else in the airport.
Market maturity and technology advances will lower the cost and accelerate widespread adoption of wireless LANs. End-user spending, the primary cost metric, will drop from about $250 in 2001 to around $180 in 2004 (Gartner Group). By 2005, 50 percent of Fortune 1000 companies will have extensively deployed wireless LAN technology based on evolved 802.11 standards (0.7 probability). By 2010, the majority of Fortune 2000 companies will have deployed wireless LANs to support standard, wired network technology LANs (0.6 probability).
Reality Check
For the foreseeable future wireless technology will complement wired connectivity in enterprise environments. Even new buildings will continue to incorporate wired LANs. The primary reason is that wired networking remains less expensive than wireless. In addition, wired networks offer greater bandwidth, allowing for future applications beyond the capabilities of today’s wireless systems. Although it may cost 10 times more to retrofit a building for wired networking (initial construction being by far the preferred time to set up network infrastructure), wiring is only a very small fraction of the cost of the overall capital outlay for an enterprise network. For that reason, many corporations are only just testing wireless technology. This limited acceptance at the corporate level means few access points with a limited number of users in real world production environments, or evaluation test beds sequestered in a lab. In response, business units and individuals will deploy wireless access points on their own. These unauthorized networks almost certainly lack adequate attention to information security, and present a serious concern for protecting online business assets.
Finally, the 802.11b standard shares unlicensed frequencies with other devices, including
Bluetooth wireless personal area networks (PANs), cordless phones, and baby monitors. These technologies can, and do, interfere with each other. 802.11b also fails to delineate roaming

An ISS Technical White Paper

Page 1

WWireWireless Lan Security

802.11b Wireless LAN Security

(moving from one cell to another), leaving each vendor to implement a different solution. Future proposals in 802.11 promise to address these shortcomings, but no shipping products are on the immediate horizon.
Wireless Security In The Enterprise
802.11b’s low cost of entry is what makes it so attractive. However, inexpensive equipment also makes it easier for attackers to mount an attack. “Rogue” access points and unauthorized, poorly secured networks compound the odds of a security breach.
The following diagram depicts an intranet or internal network that is properly configured to handle wireless traffic, with two firewalls in place, plus intrusion detection and response sensors to monitor traffic on the wireless segment. One firewall controls access to and from the Internet. The other controls access to and from the wireless access point. The access point itself is the bridge that connects mobile clients to the internal network.

The access point has a dedicated IP address for remote management via SNMP (Simple
Network Management Protocol). The wireless clients themselves – usually laptops or desktops and handhelds – may also use SNMP agents to allow remote management. As a result, each of these devices contains a sensor to ensure that each unit is properly configured, and that these configurations have not been improperly altered. The network itself is regularly monitored to identify access points in operation, and verify that they are authorized and properly configured.
While this paper focuses on the risk issues from a corporate network perspective, these same issues apply to home networks, telecommuters using wireless, and “public use” networks such as those being set up by Microsoft to allow wireless Internet access at select Starbucks locations.
Remote users are now able to access internal corporate resources from multiple types of foreign networks. Even organizations without internal wireless networks must take wireless into account as part of their overall security practices.

Known Risks
Although attacks against 802.11b and other wireless technologies will undoubtedly increase in number and sophistication over time, most current 802.11b risks fall into seven basic categories:
§ Insertion attacks
§ Interception and unauthorized monitoring of wireless traffic
§ Jamming

An ISS Technical White Paper

Page 2

WWireWireless Lan Security
§
§
§
§

802.11b Wireless LAN Security

Client-to-Client attacks
Brute force attacks against access point passwords
Encryption attacks
Misconfigurations

Note that these classifications can apply to any wireless technology, not just 802.11b.
Understanding how they work and using this information to prevent their success is a good stepping stone for any wireless solution.
Insertion Attacks
Insertion attacks are based on deploying unauthorized devices or creating new wireless networks without going through security process and review.
§ Unauthorized Clients – An attacker tries to connect a wireless client, typically a laptop or PDA, to an access point without authorization. Access points can be configured to require a password for client access. If there is no password, an intruder can connect to the internal network simply by enabling a wireless client to communicate with the access point. Note, however, that some access points use the same password for all client access, requiring all users to adopt a new password every time the password needs to be changed.
§ Unauthorized or Renegade Access Points – An organization may not be aware that internal employees have deployed wireless capabilities on their network. This lack of awareness could lead to the previously described attack, with unauthorized clients gaining access to corporate resources through a rogue access point. Organizations need to implement policy to ensure secure configuration of access points, plus an ongoing process in which the network is scanned for the presence of unauthorized devices.
Interception and Monitoring of Wireless Traffic
As in wired networks, it is possible to intercept and monitor network traffic across a wireless LAN.
The attacker needs to be within range of an access point (approximately 300 feet for 802.11b) for this attack to work, whereas a wired attacker can be anywhere where there is a functioning network connection. The advantage for a wireless interception is that a wired attack requires the placement of a monitoring agent on a compromised system. All a wireless intruder needs is access to the network data stream.
There are two important considerations to keep in mind with the range of 802.11b access points.
First, directional antennae can dramatically extend either the transmission or reception ranges of
802.11b devices. Therefore, the 300 foot maximum range attributed to 802.11b only applies to normal, as-designed installations. Enhanced equipment also enhances the risk. Second, access points transmit their signals in a circular pattern, which means that the 802.11b signal almost always extends beyond the physical boundaries of the work area it is intended to cover. This signal can be intercepted outside buildings, or even through floors in multistory buildings. Careful antenna placement can significantly affect the ability of the 802.11b signal to reach beyond physical corporate boundaries.
§ Wireless Packet Analysis – A skilled attacker captures wireless traffic using techniques similar to those employed on wired networks. Many of these tools capture the first part of the connection session, where the data would typically include the username and password. An intruder can then masquerade as a legitimate user by using this captured information to hijack the user session and issue unauthorized commands.
§ Broadcast Monitoring – If an access point is connected to a hub rather than a switch, any network traffic across that hub can be potentially broadcasted out over the wireless network.
Because the Ethernet hub broadcasts all data packets to all connected devices including the wireless access point, an attacker can monitor sensitive data going over wireless not even intended for any wireless clients.

An ISS Technical White Paper

Page 3

WWireWireless Lan Security

802.11b Wireless LAN Security

§ Access Point Clone (Evil Twin) Traffic Interception – An attacker fools legitimate wireless clients into connecting to the attacker’s own network by placing an unauthorized access point with a stronger signal in close proximity to wireless clients. Users attempt to log into the substitute servers and unknowingly give away passwords and similar sensitive data.
Jamming
Denial of service attacks are also easily applied to wireless networks, where legitimate traffic can not reach clients or the access point because illegitimate traffic overwhelms the frequencies. An attacker with the proper equipment and tools can easily flood the 2.4 GHz frequency, corrupting the signal until the wireless network ceases to function. In addition, cordless phones, baby monitors and other devices that operate on the 2.4 GHz band can disrupt a wireless network using this frequency. These denials of service can originate from outside the work area serviced by the access point, or can inadvertently arrive from other 802.11b devices installed in other work areas that degrade the overall signal.
Client-to-Client Attacks
Two wireless clients can talk directly to each other, bypassing the access point. Users therefore need to defend clients not just against an external threat but also against each other.
§ File Sharing and Other TCP/IP Service Attacks – Wireless clients running TCP/IP services such as a Web server or file sharing are open to the same exploits and misconfigurations as any user on a wired network.
§ DOS (Denial of Service) – A wireless device floods other wireless client with bogus packets, creating a denial of service attack. In addition, duplicate IP or MAC addresses, both intentional and accidental, can cause disruption on the network.
Brute Force Attacks Against Access Point Passwords
Most access points use a single key or password that is shared with all connecting wireless clients. Brute force dictionary attacks attempt to compromise this key by methodically testing every possible password. The intruder gains access to the access point once the password is guessed. In addition, passwords can be compromised through less aggressive means. A compromised client can expose the access point. Not changing the keys on a frequent basis or when employees leave the organization also opens the access point to attack. Managing a large number of access points and clients only complicates this issue, encouraging lax security practices. Attacks against Encryption
802.11b standard uses an encryption system called WEP (Wired Equivalent Privacy). WEP has known weaknesses (see http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html for more information), and these issues are not slated to be addressed before 2002. Not many tools are readily available for exploiting this issue, but sophisticated attackers can certainly build their own.
Misconfiguration
Many access points ship in an unsecured configuration in order to emphasize ease of use and rapid deployment. Unless administrators understand wireless security risks and properly configure each unit prior to deployment, these access points will remain at a high risk for attack or misuse. The following section examines three leading access points, one each from Cisco,
Lucent and 3Com. Although each vendor has its own implementation of 802.11b, the underlying issues should be broadly applicable to products from other vendors.

An ISS Technical White Paper

Page 4

WWireWireless Lan Security

802.11b Wireless LAN Security

§ Server Set ID (SSID) – SSID is a configurable identification that allows clients to communicate with an appropriate access point. With proper configuration, only clients with the correct SSID can communicate with access points. In effect, SSID acts as a single shared password between access points and clients. Access points come with default SSIDs. If not changed, these units are easily compromised. Here are common default passwords:
“tsunami” – Cisco
”101” – 3Com
“RoamAbout Default Network Name” – Lucent/Cabletron
“Compaq” – Compaq
“WLAN” – Addtron
“intel” – Intel
“linksys” – Linksys
“Default SSID”, “Wireless” – Other manufacturers
SSIDs go over the air as clear text if WEP is disabled, allowing the SSID to be captured by monitoring the network’s traffic. In addition, the Lucent access points can operate in Secure
Access mode. This option requires the SSID of both client and access point to match. By default this security option is turned off. In non-secure access mode, clients can connect to the access point using the configured SSID, a blank SSID, or an SSID configured as “any.”
§ Wired Equivalent Privacy (WEP) – WEP can be typically configured as follows:
No encryption
40 bit encryption
128 bit encryption
Most access points ship with WEP turned off. Although 128 bit encryption is more effective than
40 bit encryption, both key strengths are subject to WEP’s known flaws.
§ SNMP Community Passwords – Many wireless access points run SNMP agents. If the community word is not properly configured, an intruder can read and potentially write sensitive data on the access point. If SNMP agents are enabled on the wireless clients, the same risk applies to them as well.
By default, many access points are read accessible by using the community word, “public”.
3Com access points allow write access by using the community word, ”comcomcom”. Cisco and Lucent/Cabletron require the write community word to be configured by the user or administrator before the agent is enabled.
§ Configuration Interfaces – Each access point model has its own interface for viewing and modifying its configuration. Here are the current interface options for these three access points:
Cisco – SNMP, serial, Web, telnet
3Com – SNMP, serial, Web, telnet
Lucent / Cabletron – SNMP, serial (no web/telnet)
3Com access points lack access control to the Web interface for controlling configuration. An attacker who locates a 3Com access point Web interface can easily get the SSID from the
“system properties” menu display. 3Com access points do require a password on the Web interface for write privileges. This password is the same as the community word for write privileges, therefore 3Com access points are at risk if deployed using the default “comcomcom” as the password.

An ISS Technical White Paper

Page 5

WWireWireless Lan Security

802.11b Wireless LAN Security

§ Client Side Security Risk – Clients connected to an access point store sensitive information for authenticating and communicating to the access point. This information can be compromised if the client is not properly configured. Cisco client software stores the SSID in the
Windows registry, and the WEP key in the firmware, where it is more difficult to access.
Lucent/Cabletron client software stores the SSID in the Windows registry. The WEP key is stored in the Windows registry, but it is encrypted using an undocumented algorithm. 3Com client software stores the SSID in the Windows registry. The WEP key is stored in the Windows registry with no encryption.
§ Installation – By default, all three access points are optimized to help build a useful network as quickly and as easily as possible. As a result, the default configurations minimize security.

Wireless Information Security Management
Process and technology are always easily confused, and never more so than with wireless information security management. In fact, the same business processes that establish strong risk management practices for physical assets and wired networks also work to protect wireless resources. The following cost-effective guidelines help enable organizations to establish proper security protections as part of an overall wireless strategy – and will continue to work in spite of wireless networking’s rapid evolution. The following items are an introduction to this approach.
Wireless Security Policy and Architecture Design – Security policy, procedures and best practices should include wireless networking as part of an overall security management architecture to determine what is and is not allowed with wireless technology.
Treat Access Points As Untrusted – Access points need to be identified and evaluated on a regular basis to determine if they need to be quarantined as untrusted devices before wireless clients can gain access to internal networks. This determination means appropriate placement of firewalls, virtual private networks (VPN), intrusion detection systems (IDS), and authentication between access point and intranets or the Internet.
Access Point Configuration Policy – Administrators need to define standard security settings for any 802.11b access point before it can be deployed. These guidelines should cover SSID,
WEP keys and encryption, and SNMP community words.
Access Point Discovery – Administrators should regularly search outwards from a wired network to identify unknown access points. Several methods of identifying 802.11b devices exist, including detection via banner strings on access points with either Web or telnet interfaces.
Wireless network searches can identify unauthorized access points by setting up a 2.4 GHz monitoring agent that searches for 802.11b packets in the air. These packets may contain IP addresses that identify which network they are on, indicating that rogue access points are operating in the area. One important note: this process may pick up access points from other organizations in densely populated areas.
Access Point Security Assessments – Regular security audits and penetration assessments quickly identify poorly configured access points, default or easily guessed passwords and community words, and the presence or absence of encryption. Router ACLs and firewall rules also help minimize access to the SNMP agents and other interfaces on the access point.
Wireless Client Protection – Wireless clients need to be regularly examined for good security practices. These procedures should include the presence of some or all of the following:
§ Distributed personal firewalls to lock down access to the client
§ VPNs to supplement encryption and authentication beyond what 802.11b can provide

An ISS Technical White Paper

Page 6

WWireWireless Lan Security

802.11b Wireless LAN Security

§ Intrusion detection and response to identify and minimize attacks from intruders, viruses,
Trojans and backdoors
§ Desktop assessments to identify and repair security issues on the client device
Managed Security Services for Wireless – Managed Security Services (MSS) helps organizations establish effective security practices without the overhead of an extensive, in-house solution. MSS providers handle assessment, design, deployment, management and support across a broad range of information security disciplines. This 24/7/365 solution works with the customer to set policy and architecture, plus provides emergency response, if needed. These services help an organization operating wireless networks to:
§ Deploy firewalls that separate wireless networks from internal networks or the Internet
§ Establish and monitor VPN gateways and VPN wireless clients
§ Maintain an intrusion detection system on the wireless network to identify and respond to attacks and misuse before critical digital resource are placed at risk.

Internet Security Systems Wireless LAN Solutions
Internet Security Systems products and services provide a robust security management solution for wireless LANs. These rapidly expanding offerings encompass:
Security Software Products – Internet Security Systems’ security products already protect wireless LAN environments against known security risks. ISS’ Internet Scanner™ network vulnerability assessment product probes networks to detect unauthorized or poorly configured wireless access points, as represented in the diagram below.

The RealSecure™ Protection System, deployed between a wireless access point and the corporate network, recognizes and reacts to attacks and misuse directed over the wireless LAN
(below). In addition, ISS’ renowned X-Force™ research and development team continually update these products.

An ISS Technical White Paper

Page 7

WWireWireless Lan Security

802.11b Wireless LAN Security

Managed Security Services – Internet Security Systems’ Managed Security Services protect wireless LANS on a 24x7 basis through remote network assessments and tactical deployment of remotely managed intrusion protection services. As new wireless protections are added to ISS security products, Managed Security Services will deliver these additional capabilities to our customers. Security Architecture Consulting – Internet Security Systems’ Consulting Solutions Group has in-depth security knowledge, expertise, and proven methodology required that helps organizations assess, integrate, design, and configure their wireless LANs and surrounding security infrastructure.
Wireless LAN Security Education – Internet Security Systems’ SecureU™ education services organization has developed wireless LAN security content to help customers understand the nuances of wireless LAN security and establish valid defensive techniques to minimize security risks. Product Updates – Internet Security Systems’ X-Force research and development team continually adds product enhancements that deliver new protections against wireless LAN risks.
These X-Press Update™ enhancements quickly and easily integrate into existing product installations. An ISS Technical White Paper

Page 8

WWireWireless Lan Security

802.11b Wireless LAN Security

About Internet Security Systems (ISS)
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a world leader in software and services that protect critical online resources from attack and misuse. ISS is headquartered in Atlanta, GA, with additional operations throughout the United States and in Asia, Australia,
Europe, Latin America and the Middle East.
Copyright © 2001 Internet Security Systems, Inc. All rights reserved worldwide.
Internet Security Systems, the Internet Security Systems logo, Internet Scanner, RealSecure, SecureU, XForce and X-Press Update are trademarks of Internet Security Systems, Inc. Other trademarks and trade names mentioned are marks and names of their owners as indicated. All trademarks are the property of their respective owners and are used here in an editorial context without intent of infringement. Specifications are subject to change without notice.

An ISS Technical White Paper

Page 9

Similar Documents

Free Essay

Serap Kilic Mba

...SERAP ULU KILIÇ PJETER BOGDANI, 20 TIRANA / ALBANIA +90 (546) 632 16 41 +355 (67) 479 63 15 serapulu@windowslive.com PERSONAL INFORMATION Birth of Date and Place Marital Status Nationality 22/12/1986, Istanbul – TURKEY Married Republic of Turkey EDUCATION 2004 – 2008 2000 – 2004 Gazi University,Chemistry Department / Ankara GPA: 2.83 / 4 Bahçeşehir Atatürk Foreign Language Based High School / Istanbul WORK EXPERIENCE November 2008- October 2014 ● Development & Merchandiser & Marketing, Konaktul , Avcılar/Istanbul I started to work as R&D asistant and then moved to Sales Department at Konaktul. The company is a lace and fancy fabrics producer working with man reputable worldwide brands like ZARA, MARKS AND SPENCER,TOP SHOP,H&M,ANN TAYLOR,GAP,CALVIN KLEIN,UNITED COLORS OF BENETTON,BETTY BARCLAY,GERRY WEBER,VERA MONT etc. In R&D dept, my main goal was following up all the trends in fashion and was continuously in touch with the design team of our customers. Considering and analyzing the requests from customers depends on to search fashion magazines, searching the web- sites regularly, watching catwalks. Gathering data from these mentioned sources, i started to make so many developments (like different color trials, prints, foiling, lamination, sequin printing, flocking…etc.) of our productions. Our presentation of the new developments was causing the base of the new collection which was prepared twice a year and was supported by ...

Words: 711 - Pages: 3

Free Essay

Ankara Under the Trash

...unplanned urbanization trigger this problem. Ankara which is a large city can be given an example for this problem. When the population of this city increases, the trash problem in that environment will cause many people, animals and the nature to be damagedin the way of health. Trash problem in Ankara become a highly controversial topic between the officials of government and many proffessionals in Turkey. While the officials of government argue that there is not a trash problem in Ankara, the proffesionals and experts support that this problem has been remaining in nowadays in Ankara. Trash which is a global problem has been increasing minacously in Ankara day by day because of lack of awareness and unplanned urbanization. The main reason of trash problem in Ankara is lack of awareness. In today's world, education is not a measurement to specify people who learn what is the good or bad thing. Especially university students who are known as a well-educated people have negative effects in this problem. For example, the picture above is belonged to Ted University's students. This picture is a scene which describes how much well-educated students give importance their area and how these people show an approach to this problem. Therefore, it is not related to university or school, this is related to lack of awareness between people and their environment. Not only students at Ted University but also the others universities in Ankara have a scene which look to be this picture. In...

Words: 575 - Pages: 3

Free Essay

Mrdkjfslkjdf

...KOLEKSİYONU Asuman Baytop* Prof. Dr. Hikmet Birand (1904-1972), Ankara Üniversitesi Fen Fakültesi’nde botanik öğretim üyesi idi. Aynı üniversitede kürsü başkanlığı, dekanlık ve rektörlük görevlerinde bulundu. Araştırma konusu olarak sistematik botanikten ziyade, bitki coğrafyası ve sosyolojisi, vejetasyon bilimi, tabiatı koruma konuları ile ilgileniyor, Türkiye’nin step bölgeleri ve step bitkileri üzerinde çalışıyordu. Bu gaye ile yaptığı araştırma gezilerinde bitki örnekleri topluyor ve örneklerini mensup olduğu kurumun herbaryumuna, önceleri Herbarium Turcicum’a, daha sonraları ANK’a yerleştiriyordu. ANK ile ilgili bir katalog da yayımladı. Onun çekici bir özelliği, halka yönelik olması, halkın takip edebileceği sade ve akıcı bir dilde bilimsel makaleler ve kitaplar yazması idi. H.Birand, Türkiye’de bitki sosyolojisi bilim dalının kurucusu oldu (Baytop 2001). Hikmet Birand’ın yaşam öyküsü hakkında bilgilerimiz nispeten azdır. Prof. C. Y. Çiftçi’nin son bir kitabından (Çiftçi 2008) aldığımız bilgilere dayanarak ve ilaveler getirerek onu aşağıda tanıtıyoruz. H. Birand 1904 yılında Karaman’da doğdu. İlk ve orta öğrenimini Karaman’da yaptı. Yüksek öğrenimini İstanbul’da Halkalı Yüksek Ziraat Mektebi’nde tamamladı. 1928-1932 yıllarında Almanya’da Bonn Üniversitesi’nde doktorasını yaptı. 1932’de yurda döndü ve Ankara’da Yüksek Ziraat Mektebi Botanik Enstitüsü başasistanlığına atandı. 1933’te, o yıl açılan Ankara Yüksek Ziraat Enstitüsü’nün kadrosuna geçti. Hocası Prof...

Words: 2877 - Pages: 12

Free Essay

Better Than Elses

... Fbrht139@gmail.com 06500, Çankaya / ANKARA - Turkey Education 2010 -- 2013 Bilkent University Faculty of Economics, Ankara, Turkey B.Sc. in Economics in progress ( Major program ) Current CGPA = 3.33 / 4.00 2006 -- 2009 Turkish Military Academy, Ankara, Turkey B.Sc. in Management Engineering (I quit Military Academy in the 3rd class to follow a career as an economist.) CGPA=3.84 / 4.00 2002 -- 2006 Kuleli Military High School İstanbul, Turkey Honors & Extra-Curricular Activities * Ranked 479th in the Nationwide University Entrance Exam among over 1.6 million applicants (2010) * Full Scholarship and monthly grant awarded by the Faculty of Economics, Bilkent University (2010 - Present) * High Honor awarded by Faculty of Economics, Bilkent University (2011 fall-Spring Semester) * High Honors every semester in high school (2002-2006) * 39 honor-certificates due to superior intellect in given tasks, high success in academic and managerial issues etc. between 2002-2009. * President of Football Club between 2007-2009. * Active member of Management and Economics Community-MEC (2010 - 2011) * Active member of Logistics Club (2011-Present) * Co-founder of the Gastronomy Club and member of management board(2011-Present) Certificates and Seminars * P&G Live Classes Finance Class ,Ankara (Dec 2010) * P&G Live Classes...

Words: 315 - Pages: 2

Premium Essay

Consultant

...Professionalising SOE Board of Directors MALAYSIA World Bank I’nal Conference on Corporate Governance Practices in SOEs Ankara Turkey 10 June 2014 Presenter: Aziz Bakar CEO, Malaysian Directors Academy (MINDA) 1 AGENDA 1. Background & Intro 2. Enhancing Directors Effectiveness 3. Enhancing Board Effectiveness 4. Malaysian Directors Academy (MINDA) 2 INVEST MALAYSIA FORUM • The Government is committed to ensure Government Linked Companies Transformation (GLCT) Programme continues to be implemented, if anything with greater urgency and focus • Government Linked Investment / Companies (GLIC/GLCs) must aspire to greater heights, whether best in class or emerging as future regional, if not global champions Source: Prime Minister’s Keynote Address at Invest Malaysia Forum 2012 3 HISTORY AND EVOLUTION OF GLCs 1969 Maybank becomes government owned 1972 LTAT established 1979 Sime Darby is Malaysianised 1957 1987 Jabatan Telekom Corporatised 1992 Malaysian Airport and Postal Department provatised 1997 Industrialisation and moving up the value chain 1951 EPF established 1983 Rapid economic growth and privatisation 1962 LTH established 1978 PNB established 1970 Launch of New Economic Policy (NEP) Malaysianised GLCs Value adding to Malaysia’s Natural resources 1985 Proton launch first model 1981 Launch of Heavy Industrialisation Programme ...

Words: 2101 - Pages: 9

Free Essay

Asasasa

...ayrılana kadar geçirdiği işlemleri gösteren bir süreç diyagramı hazırladım. Bu araştırmalarla birlikte işletme işleyişinin kavranması ve analizinde endüstri mühendisliği bakış açısını görmeyi amaçladım. 1.KURULUŞA AİT GENEL BİLGİLER 1.1 Adı Arçelik A.Ş. Ankara Bulaşık Makinesi İşletmesi 1.2 Kuruluş Tarihi Ocak 1992 yılında proje çalışmalarına başlanan Ankara Bulaşık Marinası İşletmesinin temeli, 22.09.1992 tarihinde atılmıştır. İşletme 1 yıldan daha az sürede imalata başlayarak 15.09.1993 tarihinde montaj bandında ilk deneme üretiminden sonra Çayırova işletmesinde bulunan Bulaşık Makinesi ile ilgili teçhizatın da Ankara işletmesine transfer edilmesi ile birlikte 20.10.1993 tarihinde seri üretime başlamıştır. Böylece bulaşık marinalarının tamamı Ankara işletmesinde üretilir hale getirilmiştir. 1.3 Kuruluşun Tarihçesi Arçelik, 1955 yılında Vehbi Koç ve Lütfi Doruk tarafından Sütlüce’de kurulmuştur. Türk Beyaz Eşya Sektöründe ilklerin öncüsü olan Arçelik 1959'da ilk çamaşır makinesini, 1960 ise ilk buzdolabını üretmiştir. 1968 yılında Çayırova tesislerine taşınmış, 1970'li ve 1980'li yıllarda ürün çeşidini hızla genişleterek 1975'de Eskişehir Buzdolabı, 1979'da İzmir Elektrikli Süpürge, 1993 yılında Ankara Bulaşık Makinesi işletmeleri faaliyete geçirilmiştir. 1999 büyüme ve yeniden yapılanma yılı olmuştur. Haziran ayında Ardem...

Words: 853 - Pages: 4

Premium Essay

Daily Life

...cheap and close-range to their work place. She would ashamed of this home in coming years. Although there were not children that were same status and conscious with her, she were a friendly child, thus she made lots of good friendships in there. The aunt also loved her so much, but neither aunt loved her as much as aunt loved her brother, nor she loved aunt as much as she loved to her grandmother. She comprehended that her grandmother must be the angel that sent to her to carry herself. There were some nannies to look after her and her brother if the grandmother was tired or busy. Although she loved these nannies so much, they could not give her same love as her grandmother did. She was continued to raised by her happily until they moved to Ankara in 1997. They moved because of her father’s job. He promoted a better position in the same work; therefore, they had to move. However, grandmother never thought in this way. She had only two child and two grandkids. When they moved to another city, she had to live with her only daughter who was not married...

Words: 1378 - Pages: 6

Free Essay

Ffff

...2016/1 DÖNEMİ SERBEST MUHASEBECİ MALİ MÜŞAVİRLİK SINAVLARINA İLİŞKİN DUYURU 5786 sayılı Yasa ile değişik 3568 sayılı Yasa ve 19 Ağustos 2014 tarih ve 29093 sayılı Resmi Gazetede yayımlanarak yürürlüğe giren "Yeminli Mali Müşavirlik ve Serbest Muhasebeci Mali Müşavirlik Sınav Yönetmeliğinde Değişiklik Yapılmasına Dair Yönetmelik" ile değişen 16 Ocak 2005 tarih ve 25702 sayılı Resmi Gazetede yayımlanmış "Yeminli Mali Müşavirlik ve Serbest Muhasebeci Mali Müşavirlik Sınav Yönetmeliği" hükümlerine göre, düzenlenen Serbest Muhasebeci Mali Müşavirlik Sınavları, aşağıda belirtilen tarihlerde Ankara, İstanbul, İzmir illerinde yapılacaktır. Bu sınava; stajını tamamlayan serbest muhasebeci mali müşavir aday meslek mensupları, Serbest Muhasebeci meslek mensupları ve anılan Yasa’nın 6’ncı maddesine göre, hizmet sürelerini stajdan saydıran aday meslek mensupları katılacaktır. 2016/1 Dönemi, SMMM Sınav Tarihleri * İlk kez sınava katılacaklar için odalara son başvuru tarihi * Tekrar katılacaklar için son başvuru tarihi : 19-20 Mart 2016 : 10 Şubat 2016 : 29 Şubat 2016 İlk kez sınav başvurusunda bulunacak adayların; 10 Şubat 2016 tarihi itibariyle stajlarını fiilen tamamlamış olmaları (Stajdan sayılan hizmetler, stajdan sayılan kurslar v.b) ve staj bitirme belgelerinin dosyalarında bulunması gereklidir. Sınavlara girmek isteyenlerin, Türkiye Serbest Muhasebeci Mali Müşavirler ve Yeminli Mali Müşavirler Odaları Birliği - Temel Eğitim ve Staj Merkezi Başkanlığı’na yukarıda belirtilen son başvuru...

Words: 1003 - Pages: 5

Premium Essay

Treysan Prefabricated Steel Cons. Ind. and Trade Corp.

...PREFABRICATED STEEL CONS. IND. AND TRADE CORP. MERVE BUYUKBAS IE 299 October 6, 2013 Industrial Engineering Bilkent University 06800 Ankara Abstract This report is an examination of Treysan Prefabricated Company observed by myself as an intern. In the three stage of the report, firstly, identity of company is defined. Then in the second part, general information is given including the part that the company’s took place in the industry. Conducted system of the company is observed; how they manage the orders from all over the world and how they produced their products are expressed in detail. In the third part, one specific area of the company, Magpan is analyzed and possible outcomes are written in order to develop the existing system.   1   IE299 – Company Identity Card Company Name: TREYSAN Location: Date of Establishment: Ownership: Area (m2) Outdoors: Indoors: Number of Workers White Collar: Blue Collar: Number of IEs: Annual Production Capacity for major products/services KAZAN, ANKARA 1975 IC IBRAHIM CECEN INVESTMENT 32 000 M2 18 000 M2 71 138 7 600 000 M2   2   Treysan Prefabricated Company produces prefabricated panel system buildings, preengineered steel buildings, permanent structures and living containers in its factory in Kazan, Ankara. Treysan Prefabricated is established in Ankara in 1975 by Ibrahim Çeçen and now it continues it’s business as an affiliation of IC ÇEÇEN holding. Treysan Prefabricated is established on...

Words: 3078 - Pages: 13

Premium Essay

Lindo Enterprise

...EDUCATION Ph.D. Information Science & Technology, Syracuse University (Sept 2004- Sept 2010) Dissertation Topic: Leadership perceptions and behaviors in self-managing virtual teams (Open Source Software Development Teams). Chair: Dr. Robert Heckman Committee Members: Dr. Kevin Crowston, Dr. Nora Misiolek, Dr. Derrick Cogburn M.B.A. Specializations in Supply Chain Management, and Global Entrepreneurship, Syracuse University (Syracuse, NY. 2001-2003) GPA: 3.8 / 4.0 M.S. Information Management, Syracuse University (Syracuse, NY, 2000-2002) GPA: 3.9 / 4.0 B.S. Business Administration, Middle East Technical University (Ankara, 1996-2000) GPA: 3.7 / 4.0 JOURNAL ARTICLES Eseryel, U. Y., Eseryel, D. (Submitted). Leading by Doing Work: Leadership in Self-Managing Virtual Teams. Crowston, K., Howison, J., Chengetai, M., & Eseryel, U. Y. (2007). A Balancing Act: The role of face-to-face meetings in technology-supported self-organizing distributed teams. IEEE Transactions on Professional Communications, 50(3), 185-203. Crowston, K., Li, Q., Wei, K., Eseryel, U. Y., & Howison, J. (2007). Self-organization of teams in free/libre open source software development. Information and Software Technology Journal, Special Issue on Qualitative Software Engineering Research, 49(6), 564-575. Nicholson, S., Sierra, T., Eseryel, U. Y., Park, J., Barkow, P., Pozo, E., & Ward, J. (2006).  How much of it is real? Analysis of paid placement in Web search engine results. Journal...

Words: 4481 - Pages: 18

Premium Essay

Patnubay at Gabay

...International Journal on New Trends in Education and Their Implications April, May, June 2012 Volume: 3 Issue: 2 Article: 04 ISSN 1309-6249 READING ATTITUDES OF HIGH SCHOOL STUDENTS: AN ANALYSIS FROM DIFFERENT VARIABLES Gökhan BAŞ Selçuk University Educational Sciences Institute, Curriculum and Instruction Department Meram, Konya, TURKEY ABSTRACT The purpose of this research is to determine the reading attitudes of high school ninth and twelfth grade students based on some variables. The researcher used ‘general survey method’ in the study. Totally 426 students from six public high schools, chosen according to random sampling method participated in the research. In order to answer the research questions in the study, “the Attitude Scale Towards Reading” was used. In accordance with the purpose of the study, percentage, mean, standard deviation, independent samples t-test, ANOVA and Tukey-HSD tests were employed in the study. For the statistical analyses SPSS 17.0 was used. According to findings of the study, it was seen that high school students had moderate level of reading attitudes. It was also understood in the study that high school students’ reading attitudes differed significantly according to gender, grade level, school type, father’s and mother’s educational level and the financial income of the family variables. Key Words: Reading, attitude, high school, gender, grade, education level, income. INTRODUCTION Reading plays a very important role in our lives. It is so...

Words: 6168 - Pages: 25

Premium Essay

Hardships in Achieving a Dream Career and Its Effects on Loved Ones

...Department of Business Administration, Ankara, Turkey Email: zkalyoncu@gmail.com Semra Guney Hacettepe University, Faculty of Economics and Administrative Sciences, Department of Business Administration, Ankara, Turkey Email: semguney@hacettepe.edu.tr Mahmut Arslan Hacettepe University, Faculty of Economics and Administrative Sciences, Department of Business Administration, Ankara, Turkey Email: marslan@hacettepe.edu.tr Salih Guney Istanbul Aydin University, Faculty of Economics and Administrative Sciences, Department of Economics and Finance, Istanbul, Turkey Email: saguney2004@gmail.com Evren Ayranci (Corresponding Author) Istanbul Aydin University, Faculty of Economics and Administrative Sciences, Department of Business Administration (in English), Istanbul, Turkey Email: xonox@mynet.com Abstract Emotional intelligence is one of the biggest factors that contributes to the success of individuals who assume various tasks and roles in modern life. It is also important in determining how individuals cope with the stress that can potentially limit their emotional relationships, decrease their efficiency, and reduce the pleasure of life. The main purposes of this study were to consider the concepts of emotional intelligence and stress, and to conduct an applied study of the relationship between these two variables. The nurses who worked at some of the private and governmental hospitals in the province of Ankara were studied, and this present study...

Words: 3611 - Pages: 15

Free Essay

Turkey in Ww2

...Central Asia The expansion of political, economic and cultural relations with Turkic-speaking countries is one of the priorities of Turkey’s modern foreign policy was initiated by Ahmet Davutoglu, former foreign minister, current prime minister. After the ruling Justice and Development Party came to power, Turkey did a lot to have close relations with the Turkic-speaking countries. One of the most important allies of Turkey among Turkic-speaking countries in the South Caucasus is Azerbaijan but in Central Asia – Kazakhstan. The Turkish authorities value these relations. Turkey is one of the first countries which recognized the independence of Kazakhstan. This testifies to the special status of Kazakhstan in Central Asian policy of Ankara. Today, Turkish President Recep Tayyip Erdogan will pay a state visit to Kazakhstan. The two presidents will take part in the second meeting of the High Level Strategic Cooperation Council. The Turkish-Kazakh Business Forum will be also held. Erdogan’s visit to Kazakhstan will last from April 15-17. At present, Turkey is the fourth country after the US, South Korea and Great Britain investing in Kazakhstan ($ 2 billion). In addition, more than 1,800 Turkish companies operate in Kazakhstan, and this figure exceeds the number of other foreign companies operating in the country. The total cost of projects implemented by Turkish contractors in Kazakhstan is about $17.5 billion. Over the last three years, the trade turnover between...

Words: 371 - Pages: 2

Free Essay

Sadasda

...1 APA 6.0 YAZIM KURALLARI ve KAYNAK GÖSTERME BİÇİMİ Ankyra, Ankara Üniversitesi Sosyal Bilimler Enstitüsü dergisine gönderilen yazılar, referans sistemi, dipnot gösterme biçimi ve kaynakça düzenlenmesinde American Psychological Association (APA) stilinde hazırlanmalıdır. APA‟nın 6. baskısı, yazarların dikkate alacağı versiyonu olmalıdır. Bununla birlikte kaynakça düzenlenirken Türkçeye uyarlanmış ve APA‟nın istisnası olan hususlar da bulunmaktadır. Bu istisnalar şunlardır: Kitapta yer alan bölümler/makaleler için İngilizce kullanılan “In” sözcüğü ve Türkçedeki karşılığı olan “içinde” sözcüğü kaynakçadan kaldırılmıştır. - Türkçede gün ve ay içeren tarihler önce gün, sonra ay şeklinde (örneğin 12 Kasım) yazılmalıdır. APA 6. basıma göre kaynak ve referans sistemi Metin içinde APA: - Metnin tümü, ara başlıklar dahil, son notlar (endnote) hariç, iki satır aralıkla yazılır. Metinde paragraflar soldan girintili olarak başlatılır. İlk sayfa kapak sayfasıdır. Kapakta sırasıyla, makalenin tam başlığı, yazarın adı, yazarın kurumu sayfada ortalanmış olarak alt alta ikişer satır aralıkla sıralanır. Sayfanın altına doğru yazar hakkında kısa bilgi notu sola yaslanmış olarak yer alır. Bu notta yazarın şu anki durumu, ilgi alanları, ödülleri vb. bilgiler, yazının bir proje kapsamında desteklenmesi vb. bilgiler ile iletişim için elektronik adresi yer alabilir. Metin içinde kitap, dergi ve film, TV programı adları italik yazılır. Örneğin, Siyaset Meydanı programında (…). Ayrıca yeni veya...

Words: 2405 - Pages: 10

Premium Essay

Annotated Bibliography

...Annotated Bibliography Name Institution Hert, J. (2009). Sports medicine In the United States. Westport: Greenwood Press. Hert (2009) provides imperative evidence on the inadequacy of nutritional facilities through a study that was done on some students from the sports units of Hacettepe, Ankara and Gazi Universities in Ankara. From this study, it was noted that many students in the sports department including their coaches were not aware of their nutrition value even as they pursued their sport courses. This piece of study is important as it gives facts concerning availability of nutritionists in the universities and knowledge of students concerning their diet. In the paper, this source gives a general picture of the situation and can hence be used as a starting point. Baechle, T.R. (2008). Essentials of strength training and conditioning. Champaign: Human Kinetics. This source also provides important information concerning the major topic. The author of the book highlights the importance of healthy feeding in football and how lack of nutritional facilities in a sports college negatively affects the success of the footballers and athletes. Baechle (2008) also insists that most of the universities in America lack nutritional facilities thus affecting success of many American footballers. Biols, N. (2010). Sports, body and health. California: California University Press. This book also forms important source information for the paper. The writer tries...

Words: 736 - Pages: 3