Free Essay

Seven Steps of Information Gathering

In:

Submitted By Fuck1234
Words 2645
Pages 11
Certified Ethical Hacker

Unit 2 Project

Presented

By

Sandra Grannum

To

Dr. Pace

On

December 13, 2011

Table of Contents

Abstact………………………………………………………………………………………………………..3

Seven steps of Information gathering…………………………………………………..………..4

Popular Reconnaissance tools……………………………………………………………………….5

Methods to crack passwords on windows linux and Mac…………………………….…..8

Password Cracker downloads…………………………………………………………….………….9

Security Plan……………………………………………………………………………………………….. 9-11

Steps to remove evidence……………………………………………………………………………. 11

References:…………………………………………………………………………………………………..12

Abstract

This paper list and describe the seven steps of information gathering and describe some of the most popular reconnaissance tools while explaining the benefits and limitations of each. Included as well is the method to crack passwords on Windows, Linux, and Mac. There is also a password cracker tool that was downloaded on my home computer that describes the steps and outcomes. Least but not last, a security plan is also included in this project and the steps to remove evidence of an attack on a network.

Define the seven-step information gathering process • Information gathering is divided into seven steps. These steps include gathering information, determining the network range, identifying active machines, finding open ports and access points, OS fingerprinting, fingerprinting services, and mapping the network.
Define footprinting • Footprinting is the process of acquiring an increasing number of data regarding a precise network environment, typically for the purpose of finding ways to encroach into the environment.
Locate the network range • Locating the network range is desired to be familiar with what addresses can be targeted and are obtainable for extra scanning and analysis.
Identify active machines • In order to identify active machines, ping sweeps and port scans and assist in the testing of knowing if the machine is vigorously connected to the network and in reach.
Understand how to map open ports and identify their underlying applications • Ports are tied to applications and, as such, can be registered, arbitrary, or dynamic.
Describe passive fingerprinting • Identifying systems exclusive of injecting traffic or packets into the network is Passive fingerpriniting
State the various ways that active fingerprinting tools work • Certain systems respond in distinctively. So active fingerprinting tools inject oddly crafted packets into the network to measure how systems respond.
Use tools such as Nmap to perform port scanning and know common Nmap switches • Understanding Nmap switches is a required test element. Common switches include -sT, full connect, and -sS, stealth scan.

Reconnaissance Tools:

Security intrusion detection has gotten more complicated, so has the software used by hackers. By looking at the network, that’s how Intrusion-detection software identifies you. Hackers are aware that scanning and probing a network is likely to create a feeling or thought that might create an alarm. Based on this, hackers have developed new software that make an effort to achieve or completely hide the true purpose of its action. Reconnaissance tools that is used today:

|NMAP |WHOIS |
|SATAN |Ping |
|Portscanner |Nslookup |
|Strobe |Trace |
|Ethereal |NESSUS |

http://www.ciscoarticles.com/CCSP-Cisco-Certified-Security-Professional/Reconnaissance-Tools.html

Three Useful Tools:

• Ethereal – see what is on your network • NMAP – determine which ports are open • NESSUS – search for vulnerabilities
Ethereal
• Open Source network protocol analyzer – ethereal.com • Key points: – Run as root, but use su (not su ­) – Use filters in busy networks – Analyze stored traffic or live traffic – Have permission to sniff traffic first
Ethereal
• Good points: Large list of decoded protocols, – Easy to use interface • Bad points: Filter language difficult to use (and important) May crash in heavy traffic (capture traffic using tethereal or tcpdump for later analysis) (ethereal.com)

NMAP • The continually updated Open Source tool for network exploration and security assessments. (nmap.insecure.org) • Written by a security consultant, Fyodor • Basically a port scanner but will do much more
Host Discovery: NMAP is useful for discovering in-use IP addresses. It quickly sends ICMP Echo with –sP to check to see which hosts are up and respond. ARP scans can be used in the local network, and are very fast and quite reliable (-PR), other types of scan are possible, such as ACK scan to port (-PA –p 80)
Port Scanning: Port scanning detects open ports and represents listening services, which are potentially vulnerable services. Use port scanning to check for compliance to policy, that is no web servers on desktops or unusual services, or service list differing from netstat, an indication that a rootkit has been installed. (nmap.insecure.org)
NMAP Port Scanning: Traditional port scan displays the port number and service name. NMAP can attempt to identify application version by adding reliability to service name identification and provides additional information to port scan based on banner grabbing.
NMAP OS Identification: NMAP will attempt to identify the OS version of scanned systems but requires discovering one closed port and examines responses to packets sent to open and closed ports. It collects other information, such as ISN, IP, id, window size, and order of TCP options 1707 fingerprints in version 3.95. (nmap.insecure.org)
Pros:
Faster, more flexible, and it’s a scanner, OS and application version information that accepts IP address ranges, lists, file format and has a frontend available for the commandline inhibited.
Cons:
Scanning maybe considered hostile, SYN scans have been known to crash some systems.
Nessus Vulnerability Scanner: It is available for free use @ nessus.org, Nessus works by locating hosts starting with a target file, port scanning the targets located and probe for vulnerabilities in application listening at open ports. (nessus.org) Nessus client server architecture client requests scan and format results, the server accepts scan requests, authenticates clients, and performs scans and scan based on large and constantly updated vulnerability list. Pros: free vulnerability scanning and check for effectiveness of patching. Cons: Some UI issues, less open than it once was as well as definitely appears hostile when used. (nessus.org)

NMAP Recommendation: I would recommend using NMAP, Why? According to Zebulebu 2006, NMap is intended to detect any open (and closed! and filtered! and firewalled!) ports on a computer and to determine which services may be running on those ports. NMap is sophisticated enough to fingerprint the Operating System as well as giving a detailed examination of which the machine behave in reaction to the scan. Nmap can also estimate without sufficient information to be sure as to what OS the target may be running. The NMap tool is considered gold to a hacker, it gives them the strength and vitality required to running exploits that is relevant to target. Rather than trying several times of exploits and may never succeed. Zebulebu also states that NMap has a countless of options for running scans, with hundreds of combinations of scan types possible. “It is a command line tool (though a GUI does exist for both the Windows and Linux versions) and should, in this author’s opinion, be run from its native environment.” (Zebulebu 2006) In order to appreciate and understand NMap, you will need to be running it from the command line and you will get an understanding of how an attacker utilizes this tool. (Zebulebu 2006)

Cracking Password on Windows, Linux, and Mac:
Windows would be most effective. Why? For Windows OS, Ophcrack is the tool of choice. It is a free Windows Password cracker based on Rainbow Tables. It has a GUI that makes it easier to run. The software can decipher passwords up to 14 characters in length in a quick 10 seconds.
To use Ophcrack one needs to download the Ophcrack ISO and burn it to a CD (or load it via a USB drive). Run the CD by loading it in the tray and restarting the computer with the power switch. Switch to the BIOS options and set the computer to boot from the CD Drive. The computer boots up and reads the Ophcrack CD, which then proceeds to break the password. Use this password to log into the machine. Ophcrack is multi-platform software and so can be used for Mac and Linux too.
Linux
Turn on the computer and press the ESC key when GRUB appears. Scroll down and highlight ‘Recovery Mode’ and press the ‘B’ key; this will cause you to enter ‘Single User Mode’.
You’re now at the prompt, and logged in as ‘root’ by default. Type ‘passwd’ and then choose a new password. This will change the root password to whatever you enter. If you’re interested in only gaining access to a single account on the system, however, then type ‘passwd username’ replacing ‘username’ with the login name for the account you would like to alter the password for.
Mac OS X Apart from Ophcrack, another simple method involves using the Mac OS X installation CD (for v10.4). Insert and reboot to display UTILITIES. Choose RESET PASSWORD to get a new one. Login using this password, to reset the password in Mac OS X 10.5, reboot the computer and press COMMAND + S
At the prompt type in: sck -fy mount -uw / launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist dscl . -passwd /Users/UserName newpassword
Login with the new reset password
Password Cracker:
The tool that I installed on my Red Hat server was john
The tool was downloaded from repo forge http://pkgs.repoforge.org/john/ The tool can be run in the following modes:
(1) Wordlist
(2) Single Crack
(3) Incremental
I ran it in the Wordlist and Incremental modes. In the first mode, the program checked the password against a dictionary word that I supplied. If the password was in the dictionary, it found it. If it was not in the dictionary, it was not found. In the Incremental mode, it was able to crack some passwords created on different character combinations.
This method actually took longer to crack than the previous method. On my systems at home, school and at work, I do take extra steps to secure my passwords by making it strong. Personally, I treat passwords as underwear. They should not be shared with anyone also and they should be changed often. To make my passwords secure, I try to stay away from using personal nouns that are related to me and I also stay away from common words or words in the dictionary. I also make sure that I use random sequence of characters with mixed cases, numbers and special characters on the keyboard such as spaces, hyphens, asterisks, commas and periods.

Security Plan to protect against password & keylogger attacks:
Use a Firewall: In order for a Keylogger to do harm it needs to be tranmitted through a third party. Of course this is sending information out of your computer via the Internet. A firewall is an excellnet defense against keyloggers for the reason that it will monitor your computer’s activity closer than anyone could. When you identify that a program is trying to send data out, the firewall will ask for authorization or display a warning. Some firewall software, such as ZoneAlarm, will supply you with the option of shutting down all inbound and outbound data completely. (Smith 2011)
Install a Password Manager: According to Smith most users infected with a keylogger will never know it unless an account or credit card is hijacked. One disadvantage of keyloggers, however, is the fact that you can’t keylog what isn’t typed. That’s where automatic form filling becomes useful. If a password is filled in automatically by your PC, without any keystrokes, the password will only be susceptible to keyloggers the very first time you type it. All the major web browsers have this feature baked in and will request to store your password information the first time you type it. Some computers ship with software that offers this functionality throughout the entire operating system. So saying all that when you choose a paasword make sure it is a mix of alphanumeric and characters. (Smith 2011)
Keep your Software Updated: Taking charge of your computer’s security is always a good idea, and the most significant part of a proactive defense is keeping software updated. Keyloggers, like most variants of modern malware, can harness software vulnerabilities to inject them into your system without you, and in some cases your antivirus, being any the wiser. An example of Adobe Flash, has had issues with remote code implementation exploits in the past. Also Microsoft Windows and Mac OS X are habitually patched to take care of grave exploits. You must update your system as often as updates are available because if you don’t you will be leaving it open to all sorts of attacks that could otherwise have been avoided. If you implement the updating process by making sure all software is current this will make your lives easier. This process is quite easy and will save and stop most attacks before it occurs. (Smith 2011)
Change Your Passwords Frequently: For most users, the actions stated above will provide enough protection to ward off any keylogger woes, however, there is always password stolen issues even when things are done right to safe guard your password. This is most likely the fault of exploits that have yet to be identified or patched and it can sometimes occur because of social engineering. Almost all smart geek is vigilant, but none is perfect. By altering your passwords more often, say every 30 days will help reduce the latent damage of a keylogging attack. If your password is stolen the likely hood of it being used immediately is slim, unless that keylogger was directly targeted at you (in that case your problems are bigger than keylogging!). Also, if your password is changed every two weeks, then your stolen information will no longer be useful. Appling these methods will help to safeguard you against keyloggers and password by lessening their chance to infect your PC and diminishing the information they can steal if one does happen to be installed. Even though, you can never protect yourself 100%, applying/implementing these steps will decrease your risk.

Steps used to remove evidence of an attack on a network:
According to tech-faq.com before you make an effort to resolve the problems of an attack, it is suggested do your best to record all the information possible such as “the name and IP address of the machine, the installed operating system, operating system version, installed service packs, and record all running processes and services.”
Gathering evidence of network attacks, involves the following behaviors: • Achieving the most valuable information this is the process that would need to be acquired: ▪ Retrieving all application event log information. ▪ Retrieving all system event log information. ▪ Retrieving all security event log information. ▪ And also retrieving all other machine specific event logs, such as DNS logs, DHCP logs, or File Replication logs. • In-addition malicious activities needs to be recorded and must include: ▪ Corrupted, deleted and modified files. ▪ Also all unauthorized processes running.

References:
Understanding Footprintig and Scanning, Gregg M., (2006) retrieved on 12/5/11 from http://www.informit.com/articles/article.aspx?p=472323

How to Crack the Account Password on Any Operating System, Tech J, (2009) retrieved 12/6/11 from http://www.joetech.com/how-to-crack-the-account-password-on-any-operating-system/

http://www.ciscoarticles.com/CCSP-Cisco-Certified-Security-Professional/Reconnaissance-Tools.html n.d. retrieved 12/10/11

http://pkgs.repoforge.org/john/ retrieved 12/13/11

NMap tutorial – part one, Zebulebu (2006) retrieved 12/10/11 from http://www.certforums.co.uk/forums/computer-security/18698-nmap-tutorial-part-one.html

4 Ways to protect against keyloggers and password, Smith M (2011) retrieved 12/12/11from http://www.makeuseof.com/tag/4-ways-protect-keyloggers/

Responding to IT Security Incidents, n.d. retrieved on 12/12/11 from http://technet.microsoft.com/en-us/library/cc875825.aspx

Responding to Network Attacks and Security Incidents, n.d. retrieved 12/13/11 from http://www.tech-faq.com/responding-to-network-attacks-and-security-incidents.html

Similar Documents

Premium Essay

Understanding the Doctoral Process

...online commitment to pursue a Doctorate is a very solitary commitment. The process will fail to provide any personal face-to-face interaction between student and mentor, between student and advisor, bantering with colleagues, or befriending the Dean of the School in any way but grades. Consequently, the student must make a commitment and prepare for this singular or introverted activity. The Research Process Nevertheless, in order to fully understanding the research process of the doctoral process, one needs to select a topic that creates a passion but that ask a question to resolve. According to Leedy & Ormrod (2010) research is not the process of gathering data, nor the compilation of data to use on another date, which relates similar to writing a term paper, or surfing websites or other means to acquire information, or the word research used as a way to get attention ( p. 1-2). Formal Research In the...

Words: 979 - Pages: 4

Premium Essay

Utilizing Research

...This paper will have information in regards to research methodologies, and what style can be effective for research. I will be explaining the steps in the research process. I will summarize the difference between a hypothesis and a research question. I will be explaining the types of research methodologies. Including the types of data collection tools used in health care research. This paper will have some sampling methodologies. Also the types of statistical analyses. Explain the steps in the research process There are many different styles in the research process. However, each style does have the same steps in the research process. According to Priest and Roberts (2015) there are eight steps that need to be taken in consideration for research. The first step is to identify the problem. This can also be developing a research question. To identify a problem or question, one must gather some knowledge or information that is needed by the source. The second step is reviewing the literature. By reviewing the literature, the researcher must review the literature related to what was identified as the problem. This step provides foundational knowledge about the problem area. The third step is clarifying the problem. After the literature has been reviewed, the researcher must narrow it down to what the cause of the problem is by the information that was gathered. The fourth step is to define clearly terms and concept. The information gathered must be specifically...

Words: 1107 - Pages: 5

Premium Essay

Umuc Bethesda Mining

...software team skill level in each phase of the software developmental process. I created an Excel spreadsheet of each developer’s strengths and weakness. The role of the project manager is to understand and assign members of team to what their strengths are in software development process. Additionally, I used the IDE and J Unit automated testing tool because there was no capital required to purchase the tool which cost zero dollars to use. The first phase of the SDLC in the Water Fall model is requirement of gathering all the information; I assigned the task of gathering the information to Anita, Andre, Calvin and Pedro. The clock had twenty ticks, the requirement specification document was about seven percent completed. The other employees Roger, Mimi and Emily were tasked with reviewing the SRS document. The SRS document was fourteen percent complete after 20 clock ticks. The reviewers were staring to encounter several errors in the documents. The process of gathering was becoming slow and too cumbersome. I decided to purchase requirements capture tool for $10,000 dollars. After twenty clock ticks, twenty-five of SRS using the requirements capture tool this increased the efficiency by fifty percent. I decided to start the design phase with allocated capital expenditure of $5,000 on the design environment. Emily was assigned to the design phase of the project because she is an experienced design analyst along with Mimi and Rodger who are less experienced. Simultaneously...

Words: 742 - Pages: 3

Premium Essay

Job Description

...Research for a R.V business By: Jason Baker Step One: Would starting up my own R.V repair and sales business potentially be successful. Step Two: The research objectives would be: Where is the small business development center located? Are there any R.V. manufacturers in the local area, how much is local commercial property cost both rent and selling price. Are there local suppliers of parts? Which suppliers will give the best prices? Who will the services serve? How many local R.V. parks are in the local area? Step Three: After locating the small business center begin formulating a business plan, while developing a business plan start scouting the area for properties that will be with in your price range. Basically gathering all the primary data needed to present to the bank according to the business plan that has been developed. Primary data must be acquired because secondary data is suspect to accuracy. If you were to ask local businesses or potential competition for data they may try to sabotage you with inaccurate figures so you fail. The secondary data that might be acceptable to gather from other local businesses similar business are their utility costs. Step Four: fill your car with fuel and set aside a few days to start gathering information. Make some calls to the local businesses like suppliers, manufactures, competitors and realtors. Step Five: now that your car is full of fuel go out to those businesses and speak with them about your business...

Words: 443 - Pages: 2

Premium Essay

Servuce Request Riordan

...million. The company is wholly owned by Riordan Industries, a Fortune 1000 enterprise with revenues in excess of $1 billion. The company was founded by Dr. Riordan, a professor of chemistry, who had obtained several patents relative to processing polymers into high tensile strength plastic substrate. Riordan Manufacturing Human Resources Information system (HRIS) system was installed in 1992. It is a part of the financial systems package and keeps track of the following employee information: * Personal information (such as name, address, marital status, birth date, etc.) * Pay rate * Personal exemptions for tax purposes * Hire date * Seniority date (which is sometimes different than the hire date) * Organizational information (department for budget purposes, manager’s name, etc.) * Vacation hours (for non-exempt employees) If any information needs to be changed, the changes are submitted in writing on special forms by the employee’s manager and then those changes are entered by the payroll clerk. The training and development specialist uses and Excel worksheet to keep training and development records. Applicant information for open positions is kept by each recruiter. The applicant’s resumes are filed in a central storage area and recruiters keep an Excel worksheet to track the applicant’s status. Resumes are filed in a...

Words: 1469 - Pages: 6

Premium Essay

Research, Statistics, & Psychology Paper

...Research, Statistics, & Psychology Psy/315 January 9, 2012 Research, Statistics & Psychology The scientific, objective, and the methodic gathering of information for a theory is research. Statistics is collection of data, interpretation, the analysis, and presentation of the data. Statistical data is the important part to any good research. Psychology, statistics is the method of pursuing the truth (Aron, Aron, & Coup, 2009). The statistics methods is to make sense out of the large amount of data collected during research by psychologists. This paper will explore the role of research and statistics in psychology field. The paper will give the definition of the research and the scientific method, and the characteristics of the primary and secondary data that researcher use to help form an hypothesis. The paper will also explore the role of statistics in research. Research and Scientific Method Merriam-Webster Dictionary defines research has the, “studious inquiry or examination, especially: investigation or experimentation aimed at the discovery and interpretation of facts, revision of accepted theories or laws in the light of new facts, or practical...

Words: 945 - Pages: 4

Premium Essay

Rirodan Project

...defined, providing the stakeholders with a specific goal to work towards. Riordan Manufacturing’s stakeholders for the HR systems project are: the President and CEO, the Chief Operating Officer, the Vice President of Research and Development, the Vice President of Sales and Marketing, the Director of Human Resources, the Vice President of Marketing, the Chief Financial Officer, the employees, and the floor managers. Every stakeholder has a very important role in the company’s strategic plan that will work to develop a successful HR system. Information Gathering Techniques Analyze Organization charts - This will provide an understanding of how the department functions and identify individuals that could provide insight into their daily task and system requirements. Conduct Interviews - The primary method of obtaining information during the preliminary investigation is the interview. The interviewing process would consist of these seven steps for each interview: 1. Determine individuals to interview. 2. Establish objectives for the interview. 3. Develop interview questions. 4. Prepare for the interview. 5. Conduct the interview. 6. Document the interview. 7. Evaluate the interview. Document Review – Obtain copies of current forms and operating documents currently in use. This...

Words: 1148 - Pages: 5

Premium Essay

There Will Come Soft Rains Analysis

...What new technology does is create new opportunities to do a job that customers want done”. Ray Bradbury started writing at age 12 or 13, he wanted to “live forever” through his fiction. In the story, “There Will Come Soft Rains”, Ray Bradbury is explaining how the house is operated to do actions step by step, it has a daily routine and something went wrong which led to another problem. Technology has been increasing throughout the years. In the 1950s the First British H-bomb exploded at Christmas Island. The yield was between 200 - 300 kilotons. It was less than expected.Technology has improved society because it has impacted many people positively and is helpful for many reasons . In the...

Words: 619 - Pages: 3

Premium Essay

Desicion

...making choices by setting goals, gathering information, and assessing alternative occupations. As you can see, there are seven steps in effective decision making. Step 1: Identify the decision to be made. You realize that a decision must be made. You then go through an internal process of trying to define clearly the nature of the decision you must make. This first step is a very important one. Step 2: Gather relevant information. Most decisions require collecting pertinent information. The real trick in this step is to know what information is needed, the best sources of this information, and how to go about getting it. Some information must be sought from within yourself through a process of self-assessment; other information must be sought from outside yourself-from books, people, and a variety of other sources. This step, therefore, involves both internal and external “work”. Step 3: Identify alternatives. Through the process of collecting information you will probably identify several possible paths of action, or alternatives. You may also use your imagination and information to construct new alternatives. In this step of the decision-making process, you will list all possible and desirable alternatives. Step 4: Weigh evidence. In this step, you draw on your information and emotions to imagine what it would be like if you carried out each of the alternatives to the end. You must evaluate whether the need identified in Step 1 would be helped or solved through...

Words: 473 - Pages: 2

Premium Essay

Intro Problem Solving L04

...Section 5 INTRODUCTION TO PROBLEM SOLVING Key Points 1 2 3 Army Decision Making The Seven Problem Solving Steps The Leader’s Role e A good leader must sometimes be stubborn. Armed with the courage of his convictions, he must often fight to defend them. When he has come to a decision after thorough analysis—and when he is sure he is right— he must stick to it even to the point of stubbornness. General of the Army Omar Bradley Tactics and Techniques Track Introduction to Problem Solving n 281 Introduction As an Army leader, you will be involved in problem solving daily. Some problems are simple and only require you to use your intuition, experience, and best judgment. At other times, however, you will face problems that are more complex. These require you to follow a systematic approach to define and analyze the problem, develop and analyze possible solutions, choose the best solution, and implement a plan of action. The amount of time and resources you apply to any given problem depends on its complexity, the amount of time available, and your experience as a leader. In this section, you will learn about the Army problem solving process— a systematic, logical approach to problem solving and decision making designed to help leaders make better decisions. As a junior officer, you may not face a decision on the scale of that facing BG John Buford on 30 June 1863. But using this systematic approach to problem solving can help you make decisions as solid as...

Words: 2602 - Pages: 11

Free Essay

The Research Process

...test message, down to paying of school fees and going from one office to another for the full registration. Just as life and becoming a student entail following certain processes, so is obtaining useful information in form of data for reliable decision making. Thus, we talk of “the Research Process”. Also, to obtain quality data, there is need for the use of effective tool of data collection (Techniques of Research). Before we look into the research process proper, it is necessary to understand what is meant by ‘Research’. Definition of Research Research is a way of solving problem, which the researcher has defined, in the subject area chosen. In general terms, according to Anyanwu (2000:1), research is concerned with finding or searching out something that can aid management in the solution of problems. That is to say that any research that cannot proffer solution to a problem is a waste of resources (time, money and energy). Research as a scientific inquiry calls for various activities. These series of activities are what give us the research process. Meaning of Research Process The research process, therefore, is defined as the series of activities that the researcher must perform in order to complete his/her work. To a large extent, these activities must follow step by step and in many cases, the successful completion of one is necessary in order to embark on the other. Thus, one cannot collect data for an undefined problem neither can he collect the data after...

Words: 4049 - Pages: 17

Premium Essay

Business

...Managerial Decision Making Midterm 110 points 1. Explain the steps on how to solve a problem. Also, what questions would you ask and why. (TCO A.) 27 points There are seven main steps to follow when trying to solve a problem.  These steps are as follows: i. 1.    Define and Identify the Problem ii. 2.    Analyze the Problem iii. 3.    Identifying Possible Solutions iv. 4.    Selecting the Best Solutions v. 5.    Evaluating Solutions vi. 6.    Develop an Action Plan vii. 7.    Implement the Solution Questions to Ask When Analyzing the Problem: viii. What is the history of the problem?  How long has it existed? ix. How serious is the problem? x. What are the causes of the problem? xi. What are the effects of the problem? xii. What are the symptoms of the problem? xiii. What methods does the group already have for dealing with the problem? xiv. What are the limitations of those methods? xv. How much freedom does the group have in gathering information and attempting to solve the problem? xvi. What obstacles keep the group from achieving the goal? Can the problem be divided into sub problems for definition and analysis? 2. Why is it important to define clear objectives for the decision situation? How can you ensure that you have...

Words: 300 - Pages: 2

Free Essay

Implementing Change

...can the form not just keep doing what it has been doing? c. What is management’s role in the transformational change? d. Are there easier alternatives to accomplish the goal of remaining competitive? III. Theories of Change Management 6 a. Discuss at least three theories of change management b. Include specific pros and cons of each. c. What is the best way to ensure the implementation of an organizational change? IV. Communication Plan 10 a. What stakeholders require communication? b. What will be communicated to them? c. Who will send the communication? d. What communication medium will be used? V. Implementation Plan 11 a. Major implementation steps. b. Key criteria for success. c. Summary of weeks 1-5 VI. References 16 Implementing Change Authoritative change is frequently a staggering test for organizations and their pioneers. The requirement for change — or changes — may be the consequence of business movements, nature's turf, innovation progressions or changing work energy ability set request. Change must turn into a center hierarchical quality utilizing client input, inside created hierarchical changes and other outside input. Change activities should...

Words: 3379 - Pages: 14

Free Essay

Itec630Midterm

...commercial entity, or unauthorized source. Suspected violations of the academic integrity policy of the University of Maryland University College will be processed in accordance to the Procedures for Handling Charges of Alleged Academic Dishonesty outlined in Policy 150.25 - Academic Dishonesty and Plagiarism (http://www.umuc.edu/policy/aa15025.shtml). In typing my name following the word 'Signature', I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature. ITEC 630- Information Systems Analysis, Modeling, and Design This is an open-book, individual examination. You are only allowed to use your textbook and information posted in our classroom. Please do not use any other sources that are not listed in our classroom. For example, you can refer to our class discussion notes and all links posted in the lecture notes but you should not search the Web for information to solve exam questions. You must do your own work and you may not collaborate with your classmates. Answer the questions succinctly and clearly, explain your answer, and show your work. Answers, even if right but without an explanation, will get no credit. The explanations need to be brief, but complete, logical, and to the point. Do not quote anybody else, use your own words. Answers will be evaluated on the following criteria: key content, logical flow, and clarity. Save the file with your answers as a MS Word file or PDF (please label...

Words: 2365 - Pages: 10

Premium Essay

Career Preference

...Tabasin Joanna Paula Velete December 5, 2013 Introduction Learning styles originated in the 1970’s. They involve educating methods, particular to an individual that are presumed to allow that individual to learn best. It is commonly believed that most people favor some particular method of interacting with, taking in, and processing stimuli or information. It has been proposed that teachers should assess the learning styles of their students and adapt their classroom methods to best fit each student's learning style. (Wikipedia.org) The researchers chose this topic because the researchers want to know what different learning styles the third year College of Accountancy and Business students got used to. Understanding a particular learning style and how to best meet the needs of that learning style is essential to performing better in the classroom. Once a person has unlocked his learning style and discovered the best methods for helping him to learn through that style, he may be surprised to discover just how well he can flourish in the classroom, even in subjects that he previously found difficult. There are seven perceptual learning styles and the following are visual, aural, verbal, physical, logical, social and solitary. Each individual may possess a single style or could possess a combination of different learning styles. In most cases, the characteristics of a learning style can even be observed at a relatively young age. Once a person has identified a particular...

Words: 2838 - Pages: 12