Free Essay

Disseminating Organizational It Security & Trouble Shooting

In:

Submitted By lemet1fish
Words 3223
Pages 13
Disseminating Organizational IT Security & Trouble Shooting

When we talk about the increase security with proper authentication policies; infrastructure security is more than just firewalls and security patches. Most IT environments have some type of remote access. VPN, e-mail, and many other services expose your user accounts to the world. This article will focus on how to deal with user accounts of your current and former employees.
Proper password aging policies will naturally take care of old or unused accounts. The idea behind password aging is that after a certain amount of time, a password expires. A password is less prone to compromise if it is changed frequently. Likewise, if an account is compromised, its usefulness will be limited to the amount of time left before the expiry timer concludes. Aging account passwords can reduce exposure if brute-force, social engineering, or sniffing attempts are successful. The strength of the password itself is also extremely important. It is imperative that the systems requiring users to change their passwords also enforce some level of strictness with regards to what passwords are accepted. An un-guessable password makes brute-force attacks the premiere method by which accounts are compromised mostly ineffective. An exhaustive brute-force attack will eventually discover all passwords, given enough time, but the idea is to use a password of sufficient length, so that it can’t be guessed in a reasonable amount of attempts. The successful guessing attempts normally find extremely inconsequential passwords, such as ones that are the same as the username. In next week’s article we’ll explore the password strength issue in more detail, when we dispel many myths about password security. For now, just know that password strength is quite important.
Account aging, that is the disabling of unused accounts, is just as important as having a decent password policy. Unused accounts are probably the second most commonly compromised. If you don’t have a password aging policy, at least be certain to disable old or unused accounts. Ideally, though, password aging should be your priority. There’s a few different ways to implement password aging. The aging of a password will naturally disable unused accounts. A since a user must login to be given notice that their password has expired, and if they fail to do so within a certain amount of time, the account itself can be disabled. The question is then, “how do we implement this enterprise-wide?” In practical terms, Windows Active Directory and various Unix-based LDAP servers support the setting of password policies. Unfortunately, simply enabling password expiry will be problematic. Services that use LDAP may not implement the necessary “goo” to talk about expired accounts. They simply get an authentication failure, and the user won’t know why. This also happens with Active Directory, for example a VPN user will not be able to authenticate with an expired password until they first login to an actual Windows machine and set a new password.
There are two viable solutions. Well, one that “works,” and one that is truly practicable. It would work to require that all systems that authenticate users implement password aging. Each system would have to keep track of these policies, possibly previously used passwords, and of course they would have to implement the mechanism by which a user can be notified and subsequently change their password. Not likely. The only viable solution, then, is to use a central authentication system. CAS, a central authentication system for Web-based applications, is the ideal solution. CAS is extremely popular, and it provides an extremely effective and secure method by which users can be centrally authenticated, complete with a method to support changing passwords on expired accounts. Kerberos-based services like AD in Windows or a Kerberos-enabled LDAP server in Unix provide authentication for workstations and other site-local applications, but with the drawbacks previously mentioned.

Fascinatingly enough, it should be noted that improving security through account aging requires central authentication, which provides the added benefit of single sign-on. Now, don’t forget that single sign-on can mean two things: having the same password everywhere, or using a ticket (or cookie, when talking about Web applications) to only need to sign on to one service, but gain access to many. Synchronizing passwords between services isn’t usually done for security reasons; instead it’s for user convenience. In the rare instances where a password change on one system, not a central system, propagates to all others, it is possible to implement a password aging policy. Commonly, these types of setups are geographically grown because a diverse set of applications don’t support a coherent set of protocols, and password aging is impossible.
As contrary as it may sound, central authentication is the only way to ensure proper security. Administrators can instantly disable access to all services at the same time with central authentication, and they can also ensure that password policies are enforced. The fact that a user is supplying the same password for all services isn’t as much of a concern as one might think. Indeed, there will always be multiple levels of security requirements. The most critical and secure financial systems, for example, can still be kept separate to alleviate concerns about a password compromise, but only if it also implements appropriate password strictness and aging policies. One should be sure to pay close attention to how your chosen systems will handle passwords set before your change in policy. Some systems may continue to allow old users with weak password to continue using them after you’ve turned on password involvedness necessities. Likewise, be sure to verify that new aging policies apply to all existing user accounts, not just new ones. Properly managed accounts, that is, accounts that are automatically disabled after too much idle time, will shut down the main vehicle of attack used today. Of course, disabling ex-employee accounts is just as important. Leaving an account open so that people can have access to an ex-employee’s e-mail is hazardous, and should be carefully considered. It’s generally best to make a copy of all existing e-mail, and then configure an e-mail forward to their supervisor. Merge constant user education about social engineering tactics, sysadmin education about security best practices, and observation in account policies; now your venture can be much more secure and easier to manage.
Security is concerned with the ability of a system to prevent unauthorized access to information or services. Traditionally, security issues have been associated with large databases. Over the past few years, security issues have also become important in embedded real-time systems, e.g. a cryptographic theft-avoidance system that locks the ignition of a car if the user cannot present the specific access code. Especially, the expansion of internet has also led to Web-Based control (Rodney98) of devices and embedded systems. This poses severe security concern for these devices. Figure 1 shows the growth of the Internet and the corresponding growth of reported security incidents (CERT97).

Three basic security concepts important to computer systems are confidentiality, integrity, and availability: Confidentiality: When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loan companies; debt collectors; businesses that extend credit to their customers or issue credit cards; hospitals, doctors' offices, and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes. Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering. Authentication and access control techniques are used to achieve Confidentiality and are mentioned in the section security practices. Integrity: Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers, air traffic control, and financial accounting. Information can be erased or become inaccessible, resulting in loss of availability. This means that people who are authorized to get information cannot get what they need. Availability: Availability is often the most important attribute in service-oriented businesses that depend on information (e.g., airline schedules and online inventory systems). Availability of the network itself is important to anyone whose business or education relies on a network connection. When a user cannot get access to the network or specific services provided on the network, they experience a denial of service.
In the face of the vulnerabilities and incident trends discussed above, a robust defense requires a flexible strategy that allows variation to the changing environment, well-defined policies and procedures, the use of robust tools, and constant vigilance. It is helpful to begin a security improvement program by determining the current state of security at the site. Methods for making this determination in a consistent way are becoming available. Integral to a security program are documented policies and procedures, and technology that support their accomplishment. This section gives some techniques and procedures to build security into systems.
One may ask, what is the purpose of cryptography? The purpose of cryptography is to secure the confidentiality, integrity, and authenticity of data resources. One of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. When you consider the millions of electronic messages that traverse the Internet each day, it is easy to see how a well-placed network sniffer might capture a wealth of information that users would not like to have disclosed to unintended readers. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of cryptography, to prevent intruders from being able to use the information that they capture.
Encryption is the process of translating information from its original form (called plaintext) into an encoded, incomprehensible form (called cipher text). Decryption refers to the process of taking cipher text and translating it back into plaintext. Any type of data may be encrypted, including digitized images and sounds. Cryptography secures information by protecting its confidentiality. Cryptography can also be used to protect information about the integrity and authenticity of data. For example, checksums are often used to verify the integrity of a block of information. A checksum, which is a number calculated from the contents of a file, can be used to determine if the contents are correct. An intruder, however, may be able to forget the checksum after modifying the block of information. Unless the checksum is protected, such modification might not be detected. Cryptographic checksums (also called message digests) help prevent undetected modification of information by encrypting the checksum in a way that makes the checksum unique.
The genuineness of data can be protected in a similar way. For example, to transmit information to a coworker by E-mail, the sender first encrypts the information to protect its confidentiality and then attaches an encrypted digital signature to the message. When the coworker receives the message, he or she checks the origin of the message by using a key to verify the sender's digital signature and decrypts the information using the corresponding decryption key. To protect against the chance of intruders modifying or forging the information in transit, digital signatures are formed by encrypting a amalgamation of a checksum of the information and the author's unique private key. A side effect of such authentication is the concept of no repudiation. A person who places their cryptographic digital signature on an electronic document cannot later claim that they did not sign it, since in theory they are the only one who could have created the correct signature.
The Data Encryption Standard (DES) has been in use worldwide as a standard for more than a decade. DES uses an algorithm to encrypt and decrypt blocks Of data consisting of 64 bits using a 64-bit key. The same key used for both The encryption and decryption processes. One benefit of this algorithm is that The same process can be used for both encryption and decryption (with the exception of the key, which must be used in reverse order for decryption). The algorithm also has the advantage that it only uses logical operations Resulting in a fast process whether implemented in hardware or software. An ongoing debate has been exactly how secure is DES? There has been much Suspicion that when NSA got involved, a "trap door" was inserted so they Could decrypt any DES encrypted messages. An unclassified report cleared the suspicion of any improper manipulation of the algorithm. Debate also surrounds the issue of the DES key length. Also one known weakness in DES surrounds the selection of the initial key. Now let’s talk a little about Security Policy, Procedures, and Practices. A security policy is concerned with the following Issues: High-level description of the technical environment of the site, the legal environment (governing laws), the authority of the policy, and the basic philosophy to be used when interpreting the policy Risk analysis that identifies the site's assets, the threats that exist against those assets, and the costs of asset loss Guidelines for system administrators on how to manage systems Definition of acceptable use for users Guidelines for reacting to a site compromise (e.g., how to deal with the media and law enforcement, and whether to trace the intruder or shutdown and rebuild the system)
Security-Related Procedures: Procedures are specific steps to follow that are based on the computer security policy. Procedures address such topics as retrieving programs from the network, connecting to the site's system from home or while traveling, using encryption, authentication for issuing accounts, configuration, and monitoring.
Security Practices: Checklists and general advice on good security practices are readily available. Below are examples of commonly recommended practices: Ensure all accounts have a password and that the passwords are difficult to guess. A one-time password system is preferable. Use tools such as MD5 checksums (8), a strong cryptographic technique, to ensure the integrity of system software on a regular basis. Use secure programming techniques when writing software. These can be found at security-related sites on the World Wide Web. Be observant in network use and configuration, making changes as vulnerabilities become known. Regularly check with vendors for the latest available fixes and keep systems current with upgrades and patches. Regularly check on-line security archives, such as those maintained by incident response teams, for security alerts and technical advice. Audit systems and networks, and regularly check logs. Many sites that suffer computer security incidents report that unsatisfactory audit data is collected, so detecting and tracing an intrusion is difficult.
Intrusion Detection Research is underway to improve the ability of networked systems and their managers to determine that they are, or have been, under attack. Intrusion detection is recognized as a problematic area of research that is still in its infancy. There are two major areas of research in intrusion detection: anomaly detection and pattern recognition. Research in anomaly detection is based on determining patterns of "normal" behavior for networks, hosts, and users and then detecting behavior that is appreciably different (anomalous). Patterns of normal behavior are frequently determined through data collection over a period of time sufficient to obtain a good sample of the typical behavior of authorized users and processes. The basic difficulty facing researchers is that normal behavior is highly variable based on a wide variety of harmless factors. Many of the activities of intruders are impossible to differentiate from the benign actions of an authorized user.
The second major area of intrusion detection research is pattern recognition. The goal here is to detect patterns of network, host, and user activity that match known intruder attack scenarios. One problem with this approach is the variability that is possible within a single overall attack strategy. A second problem is that new attacks, with new attack patterns, cannot be detected by this approach. Finally, to support the needs of the future Internet, intrusion detection tools and techniques that can identify coordinated distributed attacks are critically needed.
Continuous monitoring of network activity is required if a site is to maintain confidence in the security of its network and data resources. Network monitors may be installed at strategic locations to collect and examine information continuously that may indicate suspicious activity. It is possible to have automatic notifications alert system administrators when the monitor detects anomalous readings, such as a burst of activity that may indicate a denial-of-service attempt. Such notifications may use a variety of channels, including electronic mail and mobile paging. Sophisticated systems capable of reacting to questionable network activity may be implemented to disconnect and block suspect connections, limit or disable affected services, isolate affected systems, and collect evidence for subsequent analysis.
Tools to scan, monitor, and eradicate viruses can identify and destroy malicious programs that may have inadvertently been transmitted onto host systems. The damage potential of viruses ranges from mere annoyance (e.g., an unexpected "Happy Holidays" jingle without further effect) to the obliteration of critical data resources. To ensure continued protection, the virus identification data on which such tools depend must be kept up to date. Most virus tool vendors provide subscription services or other distribution facilities to help customers keep up to date with the latest viral strains.
Because of the increasing sophistication of intruder methods and the vulnerabilities present in commonly used applications, it is essential to assess periodically network susceptibility to compromise. A variety of vulnerability identification tools are available, which have garnered both praise and criticism. System administrators find these tools useful in identifying weaknesses in their systems. Critics argue that such tools, especially those freely available to the Internet community, pose a threat if acquired and misused by intruders.
With the rapid expansion of the Internet and the proliferation of distributed computing, new interest is now focused on the security aspects of both personal and enterprise computing systems, and with good reason. Millions of computer users are downloading files and applications of unknown origin every day-directly onto their PCs and workstations. This poses serious concern for security of the computer systems. The security concerns expand to embedded systems as we have more and more embedded devices on the Internet. I believe all the above mentioned techniques can be applied for embedded system security.

References
Fritzinger, Steven, Marianne Mueller, Java Security, Whitepaper, Sun Microsystems, Inc., 1996.
OmniTraining Real Information for Real IT http://omnitraining.net/security/198-increase-security-with-proper-authentication-policies Snell, Rodney. Web-Based Device Monitoring and Control, Embedded Systems Conference, Spring98
Thomas A. Longstaff, James T. Ellis Shawn V. Hernan, Howard F. Lipson, Robert D. Mcmillan, Linda Hutz Pesante and Derek Simmelj. Security of the Internet, Published in The Froehlich/Kent Encyclopedia of Telecommunications vol. 15, Marcel Dekker, New York, 1997, pp. 231-255.

Similar Documents

Free Essay

Deeepwater

...WMU Dissertations Graduate College 8-1-2012 Deepwater, Deep Ties, Deep Trouble: A StateCorporate Environmental Crime Analysis of the 2010 Gulf of Mexico Oil Spill Elizabeth A. Bradshaw Western Michigan University, brads2ea@cmich.edu Follow this and additional works at: http://scholarworks.wmich.edu/dissertations Recommended Citation Bradshaw, Elizabeth A., "Deepwater, Deep Ties, Deep Trouble: A State-Corporate Environmental Crime Analysis of the 2010 Gulf of Mexico Oil Spill" (2012). Dissertations. Paper 53. This Dissertation-Open Access is brought to you for free and open access by the Graduate College at ScholarWorks at WMU. It has been accepted for inclusion in Dissertations by an authorized administrator of ScholarWorks at WMU. For more information, please contact maira.bundza@wmich.edu. DEEPWATER, DEEP TIES, DEEP TROUBLE: A STATE-CORPORATE ENVIRONMENTAL CRIME ANALYSIS OF THE 2010 GULF OF MEXICO OIL SPILL by Elizabeth A. Bradshaw A Dissertation Submitted to the Faculty of The Graduate College in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Department of Sociology Advisor: Ronald C. Kramer, Ph.D. Western Michigan University Kalamazoo, Michigan August 2012 THE GRADUATE COLLEGE WESTERN MICHIGAN UNIVERSITY KALAMAZOO, MICHIGAN June 29, 2012 Date WE HEREBY APPROVE THE DISSERTATION SUBMITTED BY Elizabeth A. Bradshaw ENTITLED Deepwater, Deep Ties, Deep Trouble: A State-Corporate Environmental Crime Analysis of the 2010 Gulf of Mexico...

Words: 81631 - Pages: 327

Premium Essay

Leadership

...Fourth Edition Reframing Organizations Artistry, Choice, and Leadership LEE G. BOLMAN TERRENCE E. DEAL B est- se l l i n g a u t h o rs of LEADING WITH SOUL FOURTH EDITION Reframing Organizations Artistry, Choice, and Leadership Lee G. Bolman • Terrence E. Deal Copyright © 2008 by John Wiley & Sons, Inc. All rights reserved. Published by Jossey-Bass A Wiley Imprint 989 Market Street, San Francisco, CA 94103-1741—www.josseybass.com No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-6468600, or on the Web at www.copyright.com. Requests to the publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-7486011, fax 201-748-6008, or online at www.wiley.com/go/permissions. Credits are on page 528. Readers should be aware that Internet Web sites offered as citations and/or sources for further information may have changed or disappeared between the time this was written and when it is read. Limit of Liability/Disclaimer...

Words: 193447 - Pages: 774

Premium Essay

Iba Report on Banking Sector Report

...Swot banking The rise of retail lending in emerging economies like India has been of recent origin. Asia Pacific’s vast population, combined with high savings rates, explosive economic growth, and underdeveloped retail banking services, provide the most significant growth opportunities for banks. Banks will have to serve the retail banking segment effectively in order to utilize the growth opportunity. Banking strategies are presently undergoing various transformations, as the overall scenario has changed over the last couple of years. Till the recent past, most of the banks had adopted fierce costcutting measures to sustain their competitiveness. This strategy however has become obsolete in the new light of immense growth opportunities for banking industry. Most bankers are now confident about their high performance in terms of organic growth and in realising high returns. Nowadays, the growth strategies of banks revolve around customer satisfaction. Improved customer relationship management can only lead to fulfilment of long-term, as well as, short-term objectives of the bankers. This requires, efficient and accurate customer database management and development of well-trained sales force to develop and sustain long-term profitable customer relationship. The banking system in India is significantly different from that of the other Asian nations, because of the country’s unique geographic, social, and economic characteristics. Though the sector opened up quite...

Words: 30252 - Pages: 122

Premium Essay

Scanning Applications

...24/7 command post that monitors FBI operations and law enforcement activities around the globe. An FBI agent examines a potentially contaminated letter during a white powder training exercise. 2012 The FBI Story I A Message from FBI Director Robert S. Mueller, III For the FBI and its partners, 2012 was a year that reminded us once again of the seriousness of the security threats facing our nation. During the year, extremists plotted to attack—unsuccessfully, thanks to the work of our Joint Terrorism Task Forces—the U.S. Capitol, the New York Federal Reserve Bank, and other landmarks on U.S. soil. Tragically, on the 11th anniversary of 9/11, a hateful attack in Benghazi took the lives of the U.S. Ambassador to Libya and three other Americans. In the cyber realm, a rising tide of hackers took electronic aim at global cyber infrastructure, causing untold damages. High-dollar white-collar crimes of all kinds also continued to siphon significant sums from the pocketbooks of consumers. And in Newtown, Connecticut, 20 young children and six adults lost their lives in one of the worst mass shootings in American history, ending a year of violence that saw similar tragedies around the country. Working with its colleagues around the globe, the FBI is committed to taking a leadership role in protecting the nation. As you can see from this book—an annual compilation of stories from the FBI’s public website that provides a snapshot of Bureau milestones, activities, and accomplishments—we...

Words: 67387 - Pages: 270

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Free Essay

Rules for Redicals

...Books by Saul Alinsky John L. Lewis, An Unauthorized Biography Reveille for Radicals The Professional Radical (with Marian Sanders) Rules for Radicals RULES FOR RADICALS A Practical Primer for Realistic Radicals SAUL D. ALINSKY RANDOM HOUSE New York Acknowledgments This chapter "Of Means and Ends" was presented in the Auburn Lecture Series at Union Theological Seminary. Some of the other sections of this book were delivered in part in lectures before the Leaders of America series at the California Institute of Technology in Pasadena, California; Yale Political Union, New Haven, Connecticut, April, 1970; The Willis D. Wood Fellowship Lecture, Amherst College, Amherst, Massachusetts, May, 1969; American Society of Newspaper Editors, Washington, D.C., 1968; U.S. Chamber of Commerce, Washington, D.C.; March, 1968; A.F. of L.-C.I.O. Labor Press Association, Miami, Florida, December, 1967; American Whig-Cliosophic Society, Princeton University, Princeton, New Jersey, 1967; Centennial Address, Episcopal Theological Seminary, Cambridge, Massachusetts, 1968; Harvard Medical Conference, Cambridge, Massachusetts, 1969. 10 9 8 7 6 5 4 Copyright © 1971 by Saul D. Alinsky All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. ISBN: 0-394-44341-1 Library of Congress Catalog Card Number: 70-117651 ...

Words: 62916 - Pages: 252

Premium Essay

Lactor

...The Essays of Warren Buffett: Lessons for Corporate America Essays by Warren E. Buffett Selected, Arranged, and Introduced by Lawrence A. Cunningham Includes Previously Copyrighted Material Reprinted with Permission THE ESSAYS OF WARREN BUFFETT: LESSONS FOR CORPORATE AMERICA Essays by Warren E. Buffett Chairman and CEO Berkshire Hathaway Inc. Selected, Arranged, and Introduced by Lawrence A. Cunningham Professor of Law Director, The Samuel and Ronnie Heyman Center on Corporate Governance Benjamin N. Cardozo School of Law Yeshiva University © 1997; 1998 Lawrence A. Cunningham All Rights Reserved Includes Previously Copyrighted Material Reprinted with Permission TABLE OF CONTENTS INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PROLOGUE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 27 I. CORPORATE GOVERNANCE. . . . . . . . . . . . . . . . . . . . . . . . . . . . A. B. C. D. E. Owner-Related Business Principles................ Boards and Managers............................. The Anxieties of Plant Closings An Owner-Based Approach to Corporate Charity. A Principled Approach to Executive Pay.......... 29 29 38 43 47 54 II. CORPORATE FINANCE AND INVESTING. . . . . . . . . . . . . . . . A. B. C. D. E. F. G. H. I. 63 Mr. Market........................................ 63 Arbitrage......................

Words: 86030 - Pages: 345

Premium Essay

Management

...The Essays of Warren Buffett: Lessons for Corporate America Essays by Warren E. Buffett Selected, Arranged, and Introduced by Lawrence A. Cunningham Includes Previously Copyrighted Material Reprinted with Permission THE ESSAYS OF WARREN BUFFETT: LESSONS FOR CORPORATE AMERICA Essays by Warren E. Buffett Chairman and CEO Berkshire Hathaway Inc. Selected, Arranged, and Introduced by Lawrence A. Cunningham Professor of Law Director, The Samuel and Ronnie Heyman Center on Corporate Governance Benjamin N. Cardozo School of Law Yeshiva University © 1997; 1998 Lawrence A. Cunningham All Rights Reserved Includes Previously Copyrighted Material Reprinted with Permission TABLE OF CONTENTS INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PROLOGUE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 27 I. CORPORATE GOVERNANCE. . . . . . . . . . . . . . . . . . . . . . . . . . . . A. B. C. D. E. Owner-Related Business Principles................ Boards and Managers............................. The Anxieties of Plant Closings An Owner-Based Approach to Corporate Charity. A Principled Approach to Executive Pay.......... 29 29 38 43 47 54 II. CORPORATE FINANCE AND INVESTING. . . . . . . . . . . . . . . . A. B. C. D. E. F. G. H. I. 63 Mr. Market........................................ 63 Arbitrage......................

Words: 86813 - Pages: 348

Free Essay

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Free Essay

Bush

...FAMILY OF SECRETS The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years RUSS BAKER Contents Foreword by James Moore 1. How Did Bush Happen? 2. Poppy’s Secret 3. Viva Zapata 4. Where Was Poppy? 5. Oswald’s Friend 6. The Hit 7. After Camelot 8. Wings for W. 9. The Nixonian Bushes 10. Downing Nixon, Part I: The Setup 11. Downing Nixon, Part II: The Execution 12. In from the Cold 13. Poppy’s Proxy and the Saudis 14. Poppy’s Web 15. The Handoff 16. The Quacking Duck 17. Playing Hardball 18. Meet the Help 19. The Conversion 20. The Skeleton in W.’s Closet 21. Shock and . . . Oil? 22. Deflection for Reelection 23. Domestic Disturbance 24. Conclusion Afterword Author’s Note Acknowledgments Notes Foreword When a governor or any state official seeks elective national office, his (or her) reputation and what the country knows about the candidate’s background is initially determined by the work of local and regional media. Generally, those journalists do a competent job of reporting on the prospect’s record. In the case of Governor George W. Bush, Texas reporters had written numerous stories about his failed businesses in the oil patch, the dubious land grab and questionable funding behind a new stadium for Bush’s baseball team, the Texas Rangers, and his various political contradictions and hypocrisies while serving in Austin. I was one of those Texas journalists. I spent about a decade...

Words: 249168 - Pages: 997

Premium Essay

Mcgraw-Hill - Marketing Demystified

...trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at bulksales@mcgraw-hill.com. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that neither the author nor the publisher is not engaged in rendering legal, accounting, securities trading, or other professional services. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. —From a Declaration of Principles Jointly Adopted by a Committee of the American Bar Association and a Committee of Publishers and Associations Trademarks: McGraw-Hill, the McGraw-Hill Publishing logo,...

Words: 128470 - Pages: 514

Premium Essay

Asdf

...Copyright © 2013 by William A. Cohen. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-177863-3 MHID: 0-07-177863-2 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07177862-6, MHID: 0-07-177862-4. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at bulksales@mcgraw-hill.com. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute,...

Words: 87486 - Pages: 350

Free Essay

Thought on Business

...file:///C|/Documents%20and%20Settings/Administrator/Deskto...0BILL%20-%20BUSINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT BUSINESS AT THE SPEED OF THOUGHT by bill Gates ALSO By BILL GATES The Road Ahead BUSINESS AT THE SPEED OF THOUGHT: USING A DIGITAL NERVOUS SYSTEM BILL GATES WITH COLLINs HEMINGWAY 0 VMNER BOOKS A Time Warner Company To my wife, Melinda, and my daughter, Jennifer Many of the product names referred to herein are trademarks or registered trademarks of their respective owners. Copyright (D 1999 by William H. Gates, III All rights reserved. Warner Books, Inc, 1271 Avenue of the Americas, New York, NY 10020 Visit our Web site at www.warnerbooks.com 0 A Time Warner Company Printed in the United States of America First Printing: March 1999 10 9 8 7 6 5 4 3 2 1 ISBN: 0-446-52568-5 LC: 99-60040 Text design by Stanley S. Drate lFolio Graphics Co Inc Except as file:///C|/Documents%20and%20Settings/Admini...SINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT (1 of 392)12/28/2005 5:28:51 PM file:///C|/Documents%20and%20Settings/Administrator/Deskto...0BILL%20-%20BUSINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT indicated, artwork is by Gary Carter, Mary Feil-jacobs, Kevin Feldhausen, Michael Moore, and Steve Winard. ACKNOWLEDGMENTS I first want to thank my collaborator, Collins Hemingway, for his help in synthesizing and developing the material in this book and for his overall management of this project. I want to thank four CEOs who read a late draft of the manuscript and...

Words: 146627 - Pages: 587

Free Essay

Importance of Socialization

...W O M E N ’ S C O M M I S S I O N for refugee women & children w U N TA P P E D P OT E N T I A L : Adolescents affected by armed conflict A review of programs and policies U N TA P P E D P OT E N T I A L : Adolescents affected by armed conflict A review of programs and policies Wo m e n ’s C o m m i s s i o n f o r R e f u g e e Wo m e n & C h i l d r e n N e w Yo r k W O M E N ’ S C O M M I S S I O N for refugee women & children Copyright © January 2000 by Women’s Commission for Refugee Women and Children All rights reserved. Printed in the United States of America ISBN: 1-58030-000-6 Women’s Commission for Refugee Women and Children 122 East 42nd Street New York, NY 10168-1289 tel. 212.551.3111 or 3088 fax. 212.551.3180 e-mail: wcrwc@intrescom.org www.intrescom.org/wcrwc.html w cover photographs © Rachel K. Jones, Marc Sommers, Sarah Samson, Holly Myers, Anne-Sophie Rosette, International Rescue Committee M I S S I O N S TAT E M E N T The Women’s Commission for Refugee Women and Children seeks to improve the lives of refugee women and children through a vigorous program of public education and advocacy, and by acting as a technical resource. The Commission, founded in 1989 under the auspices of the International Rescue Committee, is the only organization in the United States dedicated solely to speaking out on behalf of women and children uprooted by armed conflict or persecution. Acknowledgments The Women’s Commission expresses its sincere...

Words: 101041 - Pages: 405