Thursday, October 31, 2019

Case Study Essay Example | Topics and Well Written Essays - 500 words - 67

Case Study - Essay Example This led to implementation and installation of the new system, but poor training and inadequate time for training about the new systems affected its effectiveness. This led to challenges to the JCSS officials but after later training, the system became effective. (Timeline, 2006). For the purpose of faster and efficient data analysis, JCSS needed to develop the new system and to enhance that they selected vendors and software. A selection of computer committee of major users of the system was chosen to evaluate and recommend on available systems and recommend a vendor to the JCSS School Board. The vendors were to accept responsibility and enhance installation and maintenance of the new system by support and training services. JCSS gave information on the size and the system they needed and gave specifications on the desired requirements for the application software. The problem arose when the system that they needed did none of what they exactly needed the system to do and this led to uncertainties in the new system, which was to be replaced with the existing one. (Chris, 2006) There were major problems in using the student management system and installation. The method employed in the implementation of student system by transferring directly all information in the old system to the new system without testing the system to identify any problem let to problems. This led to errors when they started working on the students scheduling. The scheduling officers did not know how the system work due to inefficient training by the DSI, and this led to the failure of JCSS to make the schedules done at the time planned which resulted in several problems. The rush in training due to less time for training as schools were to open led to issues when schools started as those working in the system did not understand it. The attendance officers were unable to work the system for the first few weeks, and this made scheduling of

Monday, October 28, 2019

Internal Audit Function and Fraud Detection in Government Essay Example for Free

Internal Audit Function and Fraud Detection in Government Essay CHAPTER ONE 1. 0Introduction This chapter will cover the background of the study, the statement of the problem, the purpose of the study, the objectives, the research questions, and the scope, the significance of the study and the structure of the report. 1. 1Background of the Study According to Hector Perela, (2009), Internal auditing function with other intervention mechanisms like financial reporting and external audit to helps maintain cost-efficient contracting between owners and managers. It is designed by government agencies to add value and improve organizational performance. It helps organizations accomplish their objectives by bringing a systematic, disciplined approaches to evaluate and improve the effectiveness of risk management, control and governance processes. † Internal audit helps organizations to ensure that financial and other records are reliable and complete. As well as ensuring that management adheres to policies and procedures for orderly and efficient conduct of the business, proper recording and safeguarding of assets and resources. The purpose of internal audit as far as the organization is concerned is to get accounting errors corrected and control weaknesses eliminated. The most testing time for the internal auditor is the report he/she writes to achieve this end. No precise legal definition of fraud exists; many of the offences referred to as fraud are covered by the Theft Acts of 1968 and 1978. Generally, the term is used to describe such acts as deception, bribery, forgery, extortion, corruption, theft, conspiracy, embezzlement, misappropriation, false representation, concealment of material facts and collusion. For practical purposes fraud may be defined as the use of deception with the intention of obtaining an advantage, avoiding an obligation or causing loss to another part. Internal Audit, University of Birmingham, Edgbaston, Birmingham, B15 2TT, UK) On one hand, fraud detection in government agencies involves employees or managers of the victim organization (commercial angles news letters 2001), the most effective tools for fraud detection are internal audit review, specific investigation by management, employee notification, and accidental discovery. Fraud detection helps Management to address its responsibility through development of an appropriate design of the system of internal control and the effective operation of that system. Numerous fraud prevention and detection techniques are now utilized to reduce the direct and indirect costs associated with all forms of fraud. These various techniques include but are not limited to: fraud policies, telephone hot lines, employee reference checks, fraud vulnerability reviews, vendor contract reviews and sanctions, analytical reviews , password protection, firewalls, digital analysis and other forms of software technology, and discovery sampling (Thomas and Gibson, 2003). Government departments implements the ideas and decisions of executive government in a particular area of governance. Each department is led by a minister in charge or commissioner, and the main work of the department is determined by legislation. Despite the internal audit function, many government agencies fail to detect fraud for example loss of huge monies in NAADS. The National Agricultural Advisory Services (NAADS) is a Ugandan government agency created in 2001 to improve rural livelihoods by increasing agricultural productivity and profitability.

Saturday, October 26, 2019

Construct A Script By Using Scapy Computer Science Essay

Construct A Script By Using Scapy Computer Science Essay Wireless network generally can be defined as a network which is set up by using radio signal frequency to communicate among computers and other network devices. Wireless networks known as WiFi network or WLAN. As a network grows and expands wireless networks are extremely popular and easy to setup feature and no cabling involved. There are two main components to access the wireless network which are wireless router or access point and wireless clients. Wireless network normally used in 802.11a, 802.11b, 802.11g, and 802.11n standards protocol. Wireless network needs highly security to carry all kinds of confidential data which means at least enabling Wired Equivalent Privacy (WEP) on the access point. Without proper implementation of security measures, any wireless network adapter coming within the range can access the internet without permission. So, it will results in congestion and some of the authorized client cannot access the internet. So, this research will do wireless network auditing by sniffing some of the information within the access point and detect possible intrusions in Faculty of Computer and Mathematical Sciences. 1.1 Background Wireless network is a network which is setup by using radio signal frequency to communicate among multiple stations at one time. In addition, wireless network referred as WiFi network or WLAN. Although we have enable WEP encryption on the access point, there are still some weaknesses which can be easily crack by the users with the right equipment to crack. The attacker can sniff easily with several tools to crack the password to break in as unauthorized person. In order to verify the correct access point settings and detect intrusions in terms of security in wireless network, we construct the complete script to audit wireless networks. 1.2 Problem Statement Nowadays wireless network become a trend in communication. Each wireless system or access point was setup with certain policies. It is hard to verify whether each wireless access point setup correctly or not. Plus, nowadays we need to use many tools to verify the wireless access point status. Furthermore, most of network admin does not check back each wireless access point after its configuration. Moreover, we need some tools to identify the intrusions that come where they are try to access the Internet. Besides that, some of attackers send spoofing frame to try access the wireless network. So, we cannot identify the attackers MAC address. 1.3 Research Objectives The main objective of this project is: To construct a script by using Scapy To sniff and to find possible intrusion on wireless network related with wireless security. 1.4 Scope of the Research This project focuses in Faculty of Computer and Mathematical Sciences that has multiple access points which will enables to sniff all the information on wireless networks. We focuses on Data Link layer 2 to sniff the broadcast frame and identify possible intrusion. The main platform to run the tools:- Ubuntu10.10 We are use two main tools to construct the script which are:- Python2.6 Scapy 1.5 Significance of the Research This project is important to gain knowledge to construct the complete script by using Python2.6 and Scapy script. We can learn the easiest way by using this script with the shorter line compared to other script. This project also helps to learn 802.11 frame structure including beacon frame that has transmitted by the access point. 1.6 Organization of Thesis This project divided into 5 main chapters: Chapter 1: In this chapter, we discussed on the introduction generally of this topic. It includes problem statement, objectives, scope and significance of the research. Chapter 2: This chapter reviewed literature that relate to the topic with previous researches. We include the similar of related studies to our research. Chapter 3: In third chapter, we identify materials and methods that are described in methodology phases in order to get the desired information for the accomplishment of this research. Chapter 4: In fourth chapter, we discusses on the findings of the research. Chapter 5: Finally, the last chapter is focuses on the recommendations and suggestions where it will summarize the conclusion of the research. 1.7 Conclusion This introduction of this chapter had clearly explained the problem statement, objectives, scope, and significances of the research. This chapter gives a clear view of the overall content of the research. CHAPTER 2 LITERATURE REVIEW 2.0 Introduction This chapter examines the previous work done by prior researcher in the field of auditing wireless network, security of wireless network and any other related works. Section 2.1 discuss on main platform to install the tools. Section 2.2 discuss on the tools to be use to construct and run the script. Section 2.3 discuss on standard protocol fro wireless Lan(WLAN), IEE 802.11. Then, sections 2.4 discuss on frame for 802.11, 2.5 Wireless LAN components, 2.6 Wireless Network Sniffing, 2.7 reviews for the related works and lastly 2.8 Summarizations of Literature Reviews. 2.1 Platform 2.1.1 Ubuntu10.10 Ubuntu is a free operating system, developed by small team developers who are established Linux Debian projects. This free operating system was developed to facilitate the use of desktop linux, Ubuntu. It developed based on the Debian GNU/Linux distribution and distributed as free and open source software. Most Ubuntu packages are based on package from Debian. Both distributions are using Debians deb package format and package management tools, Apt and Synaptic. However, sometimes .deb packages need to be rebuild from source to be used in Ubuntu. Ubuntu have variant edition such as GNOME desktop, KDE edition, Kubuntu and server edition. In this project, we use Ubuntu 10.10 as our platform to run all the tools in it. 2.2 Tools 2.2.1 Python Python is the one of the programming language that can interpret in developing the applications such as web applications and integrate the system more effectively. Python can run on Windows, Linux/Unix, Mac OS X. All the Python programs can be packaged into stand-alone executable code for many using various tools. In this project, we use the latest version, Python2.6 tool to construct and run the complete script after install all the Python package in Ubuntu10.10. We use Python as a programming language because it is most powerful language and shorter to write the code than other languages. Compared to other programming languages, Python are readable syntax, intuitive object orientation, very high level dynamic data types, full modularity, supporting hierarchical packages and many more. 2.2.2 Scapy According to Philippe Biondi (2009), Scapy is a powerful interactive packet manipulation program from Python program that be able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery. For this project, we focused on 802.11 standard protocols. Scapy enable to sniff wireless network and generate the packet and can send it to the wireless network. 2.3 Wireless Protocol 2.3.1 IEEE 802.11 IEEE 802.11 is a standard protocol for wireless LAN (WLAN), which is uses RF technology to transmit and receive data over the air. Based on this standard protocol, it communicates between wireless client and a base stations or access point. There are several types of standard protocols which are 802.11a, 802.11b, 802.11g, and 802.11n. Here are briefly about types of standard protocols: 2.3.1.1 IEEE 802.11b IEEE 802.11b standard supports maximum bandwidth 11Mbps in 2.4 Ghz. The advantage of this protocol is lowest. Disadvantage using this protocol is lowest maximum speed because it may interfere if no determined the frequency band. 2.3.1.2 IEEE 802.11a 802.11a supports bandwidth up to 54 Mbps in 5 GHz. The advantage of this protocol is fast maximum speed. Disadvantage using this protocol is the cost is higher than IEE 802.11b 2.3.1.3 IEE 802.11g IEE 802.11g standard supports maximum bandwidth 54Mbps in the 2.4 GHz band in maximum range. The advantage is signal range is better with fastest maximum speed. Disadvantage using this protocol is higher cost than IEEE 802.11b. 2.3.1.4 IEEE 802.11n IEEE 802.11n is developed on previous IEEE 802.11 standards by adding MIMO. IEEE 802.11n offers high throughput wireless transmission at 100Mbps 200 Mbps. It is better performance compared with IEE 802.11g. 2.4 802.11 Frame 2.4.1 Frame header Each  frame  contains  a  standard  header  as  shown  in  Figure  2.1 Figure 2.1 Frame Header from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The  frame header  contains  all  the  information  needed  to  get  the  frame to  where  it  is  going  and  allow  the  receiver  to  understand  what message  the  frame  is  carrying. Frame Control FC contains control information used for defining the type of 802.11 MAC frame and providing information necessary. FC field as shown in Figure 2.2 Figure 2.2 Frame Control Field from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The details of frame control field as follows: Protocol Version Protocol Version provides the current version of the 802.11 protocol used. Type and Subtypes It is determines the function of the frame. There are three main different of type fields which are control, data and management and breaks into multiple subtypes. Three values of type field: 00 Management 01 Control 10 Data 11 Reserved/Unused Breaks into subtype field: 00/0000 Management/Association Request 00/1000 Management/Authentication 00/1100 Management/Deauthentication 01/1011 Control/Request To Send (RTS) 10/0000 Data/Data To DS and from DS Specify  the  addressing  type  of  the frame, either the frame is going to or exiting from the DS. More Fragments   Shows more fragments of the frame, either data or management type. Retry Retransmitted either data or management frame types. Power Management   shows whether the sending station is in active mode or power-save mode. More Data   shows to a station in power-save mode that the AP has more frames to send. It is also used for APs to show that additional broadcast/multicast frames are to follow. WEP   shows whether or not encryption and authentication are used in the frame. Order   Shows that all received data frames must be processed in order. Duration/ID Shows the remaining duration needed to receive the next frame transmission. Sequence Control (SEQ) SEQ used  for  fragmentation  and packet  reassembly. Frame body The frame body contains the data or information included in either management type or data type frames. Frame Check Sequence (FCS) The transmitting STA uses a cyclic redundancy check (CRC) over all the fields of the MAC header and the frame body field to generate the FCS value. 2.4.2 Beacon Frame Beacon frames are identified by the type field being set to 0 (Management Frame) and subtype of 8. Beacon frame are used by access point to advertise its presence and relay information, such as timestamp, SSID, and other parameters based on access point to radio NICs that are within range. Radio NICs continually scan all 802.11 radio channels and listen to beacons as the basis for choosing which access point is best to associate with. According to Robin Wood (2007), people  mostly believe that turning  off  beacons  will  hide  their  network  from  attacks  as  their SSID will no longer be broadcast. Unfortunately, SSID is transmitted in clear text in all management frames and when the network is hidden while there is no data being transmitted, attacker can collect a management frame they can find in network SSID. 2.5 Wireless LAN component 2.5.1 Access point Wireless access point (WAP) is a basically hardware equipment that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. In a wireless network, an access point sends and receives signals to any number of other, local wireless devices. These are usually adapters and routers. The WAP is commonly use in offices, homes and educational institutions. WAP devices use in IEEE 802.11 standards. 2.6 Wireless Network Sniffing Wireless Sniffer is captures the data on wireless network without being detected. Wireless network sniffing works in 802.11, Ethernet as the physical and data link layers which is able of reporting raw packets (RFMON support), which include any prism2 based card (Linksys, D-Link, Rangelan, etc), Cisco Aironet cards, and Orinoco based cards. Moreover, sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections. Sniffing wireless network usually used by the attackers to capture the data and get the appropriate information from the beacon frame. There are several techniques used to sniff the wireless network. Some of them are as follows:- Passive Scanning Passive scanning is the first steps used to sniff the wireless networks. It is turn to mode RF into monitor mode that allows every frame appearing on a channel to be copied as the radio of the station tunes to various channels. A station in monitor mode can capture packets without associating with an AP or ad-hoc network. When the transmission of the data in the form of radio waves starts the attackers can scan the whole data passively and carry on the sniffing process. The so-called promiscuous mode allows the capture of all wireless packets of an associated network. In this mode, packets cannot be read until authentication and association are completed. With the help of this data sniffer can easily decodes the secret information of the wireless networks. SSID Detection After scan the data transmitted, it can detect the list of service set identifier (SSID) in the particular wireless network. The SSID shown in the Beacon frames is set to null in the hope of making the WLAN invisible unless a client already knows the correct SSID.  When the Beacon displays a null SSID, there are two possibilities.   Eventually, an Associate Request may appear from a legitimate station that already has a correct SSID.   To such a request, there will be an Associate Response frame from the AP.   Both frames will contain the SSID in the clear, and the attacker sniffs these.   If the station wishes to join any available AP, it sends Probe Requests on all channels, and listens for Probe Responses that contain the SSIDs of the APs.   The station considers all Probe Responses, just as it would have with the non-empty SSID Beacon frames, to select an AP. Normal association then begins.   The attacker usually waits to sniff these Probe Responses and extract the SSIDs. Otherwise, if the beacon transmission is disabled, the attacker has two choices.   The attacker can keep sniffing waiting for a voluntary Associate Request to appear from a legal station that already has a correct SSID and sniff that SSID.   Collection of MAC addresses After detecting the SSID, sniffer now take steps to sniff the wireless network by collecting the required MAC addresses with the help of passive scanning and also with the help of different types of software. The collected of MAC address used for constructing spoofed frame by using specific tool. In wireless sniffing, there are some reasons why attacker collects all the MAC address. Some of the reasons are the attacker used sniffing to hide his or her identity and their access points. The other reason, access points used in collecting the MAC would not be registered. 2.7 Review of Previous Related Works 2.7.1 Author: David Maynor Title of Paper: Beginners Guide to Wireless Auditing (2006) This paper is a study of how to find the vulnerabilities in wireless devices drivers with specific techniques. The researcher discuss on how to build auditing environment, how to construct tools and finally how to interpret the results. On this paper, although this was done on Dell Latitude D610, the internal wireless card of the machine was not used. The researcher was used wireless card, Netgear WPN511 to set up auditing environment that is supported with madwifi drivers. The combination with LORCON (Loss Of Radio CONnectivity) ability to craft the packet from scratch. Moreover, after setting up the good environment with patch madwifi and LORCON, the researcher construct the script with Scapy to generate a simple frame and inject it. The researcher use Wireshark to see the packets injected. 2.7.2 Author: Shreeraj Shah Title of Paper: Secure Your Wireless Networks with Scapy Packet Manipulation (2007) According to Shreej Shah, Scapy is scriptable and easy to use compared with Kismet and Airodump-ng. This paper focused on intrusion detection by using proven techniques. There are two techniques can be employed which are passive sniffing and active packet injection. The researcher discussed only passive sniffing methodology. In this project, there are several steps are used in passive sniffing methodology as follows:- Set up a station for radio frequency (RF) monitor mode Sniff packets and discover network access points Discover hidden access points and SSID (service set identifier) Harvest MAC and IP addresses Perform ongoing intrusion detection with sniffing. 2.7.3 Author: Robin Wood, Robin and freedomsoftware.co.uk Title: Programming Wireless Security (2007) This paper discussed some programming techniques to build wireless security tools. The researchers construct the script by using Python and Ruby script. There are several techniques that are used by using both scripts including deauthentication attack, sniffing wireless traffic and automating a Four-Way- Handshake capture. All the techniques will be brought together to create an applications to automate capturing an EAPOL handshake which can used to crack the Pre-Shared Key. This paper required several tools including Lorcon, Pylorcon, ruby lorcon and Scruby. Moreover, it also discussed about several issues on Scruby which means Ruby scripts will not work properly as exactly required. 2.8 Summarizations of some Literature Reviews No Author Year Project Title Project Similarities and Differences 1. Peter Seebach 2005 Getting practical about wireless security, Part 1: Building a wireless sniffer with Perl In this paper, lightweight wireless sniffer was build that runs on open source software. This paper show to use open source software by getting information about on wireless network and identified the common security problem. 2. TJ OConnor 2010 Detecting and Responding to Data Link Layer Attacks In this paper, Scapy is used to examine network traffic for data link layer attacks with identifying signatures and anomalies on both wired and wireless networks. 3. Petter Clutterbuck, Terry Rowlands, Owen Seamons 2007 Auditing the Data Confidentiality of Wireless Local Area Networks This paper describes how the software auditing artefact uses on sampled data packets to product a very detailed evaluation of the level of data confidentiality in effect across the WLAN. 4. Mingzhe Li, Mark Claypool, and Robert Kinicki 2005 How to Build and Use an IEEE 802.11 Wireless Network Sniffer In this paper, wireless sniffer is built on computers with Linux operating systems and prism GT-based wireless interface cards. The operating systems tested are SUSE (Novell) Linux release 9.0/9.1/9.2/10.0 and Linux Fedora Core 3 where the kernel version can be either 2.4.x or 2.6.x. The wireless network interface cards, Netgear WG 511 version 1 PCMCIA card and Allnet ALL0271 54Mbit Wireless PCI adapter are used Table 2.1: Summarization of related Literature Review 2.9 Conclusion All the information gathered from this literature review is very useful in order to identify potential information that can make this research more relevant. By understanding the scenario of past implementation, it will give a better view on how to achieve these research objectives and also inspire new ideas to be implemented or added into this research. CHAPTER 3 METHODOLOGY 3.0 Introduction This chapter presents about the methodology being used as a guideline to ensure the project will operate successfully. Methodology consists of hardware, software and method that being used in this research. We need to choose proper hardware and software to meet the research requirement. Methodology is very important part to audit the wireless network with sequence of phases. We need to follow all this phases in order to accomplish the final project with achieving the objective. We divide the methodology of our project to several phases, where every phase will include the important activities and its significant to be done. 3.1 Methodology Phase In this project, there are four phases of method that followed properly. First phase is planning, second phase is development, third phase is testing, fourth phase is result and evaluation and the last phase is documentation. All the flow of the methodology phase will be implementing systematically and efficiently as its role is vital to ensure the process of finishing this project in time. These phases are illustrated in methodology overview in Figure 3.1(i) and Figure 3.1(ii). PLANNING DEVELOPMENT TESTING RESULT AND EVALUATION DOCUMENTATION Figure 3.1 Project Phase (i) Documentation Development Testing Result and Evaluation Planning Problem Assessment Preliminary study of Literature Install OS Install Python package Install Scapy package Construct script Run Scapy script Sniff a list of access point. Sniff Intrusion Detection Writing a report Project Scope Project Objective Project Planning Determine hardware and software used Scapy script completed Result finding Final report completed. Figure 3.1 Project Phase (ii) 3.2 Research Methodology 3.2.1 Planning For planning phase, the activity is to define the objective of project by identifying problem assessment and by preliminary study of literature review. The deliverable of this phase can identify research objective and scope and also project planning. It consists of: 3.2.1.1 Preliminary study of literature review The purpose is to understanding the similar or related project to be done. We need to review and get the idea on how it can be implemented and find the objective, scope and others benefit can get for the project requirement. This preliminary study can review by journals, online resource (internet), articles or book. USER ACCESS POINT USER SNIFF3.2.2 Development Diagram 3.1: Structure of research project 3.2.2 [a] Install operating system We install Ubuntu 10.10 with interactive Graphical User Interface (GUI) on the laptop. It is easier to update the latest package. All the latest package including Python will updated on Ubuntu10.10 [emailprotected]:~# sudo apt-get update 3.2.2 [b] Install tools We install Scapy in Python program where the Scapy is interactive manipulation program that can construct with the shorter script compared to the other script. We install Python program as a main programming language and resides the entire package in it. a. Install Python 2.6 package [emailprotected]:~# sudo apt-get install python [emailprotected]:~# cd /tmp [emailprotected]: /tmp# fetch http://www.secdev.org/projects/scapy/files/scapy-latest.tar.gz [emailprotected]: /tmp# tar xvzf scapy-latest.tar.gz [emailprotected]: /tmp# cd scapy-2.1.0 [emailprotected]: /tmp/scapy-2.1.0 # python setup.py install b. Install python-scapy package [emailprotected]:~# sudo apt-get install python-libpcap c. Install libpcap and libdnet and their Python wrappers. [emailprotected]:~# sudo apt-get install python-libdnet d. Install additional software for special features. [emailprotected]:~# sudo apt-get install tcpdump graphviz imagemagick python-gnuplot python-crypto python-pyx 3.2.2 [c] Construct the script We construct the script with Python program for sniffing and detect possible vulnerabilities. The script will run on Ubuntu 10.10 in root terminal. 3.2.3 Testing Testing phase, the action is to test by sniffing wireless network in an area by running the completed script. Before we run the script, we need to setting up the station for radio frequency (FR) in monitor mode. We illustrates the steps in Figure 3.2 Construct the script Setting up the station for Radio Frequency (RF) to monitor mode Script run Enter the command Get the data from acces point including:- Name of access point SSID channel Radio Type Security Type Signal Collect the data: Intrusion Detection including:- Discovering Rogue Access Point Discovering Dummy Access Point Figures 3.2 Steps for testing 3.2.4 Result and Evaluation In this phase, we come out with the result by running the script. We collect all the information about SSID, MAC address, channel, radio type, security type, signal from broadcast frame that send by multiple access point. Next, we can detect possible intrusion by running other script using a same scripting language. 3.2.5 Documentation In this final phase, all the results and findings will be included in one report. From the documentation, the researcher can determine whether the project achieve the objectives or not. 3.3 Hardware and Software Required To execute this project successfully, some requirement need to be accomplish. Some of the requirement will be involving hardware and software. Hardwares that will be required are: 3.3.1 Hardware This project will used laptop. Processor at least 1 Gigahertz of CPU speed. 3GB of RAM 250 Gigabyte of hard disk space Intel WiFi Link 5100 wireless network interface card Motherboard that support the processor Monitor Network cable 3.3.2 Software This project will be running on LINUX platform: Ubuntu 10.10 3.3.3 Tools Python2.6 Scapy 3.4 Conclusion As a conclusion, this chapter is very important to gather all related and relevant information required. All the information will be used in order to achieve the objectives of this research. CHAPTER 4 RESULTS AND DISCUSSIONS 4.0 Introduction This chapter discusses on the results gathered from this research, which is obtained by implementing the methods in Chapter 3. The result based on running completed script on Ubuntu10.10. It will display all the available information of access point actively in an area after sniffing it. Moreover we can detect all the possible intrusion with display the list of rogue access point and dummy access point. 4.1 Sniff the wireless network First of all we set up Radio Frequency (RF) into monitor mode which is in wlan0 interface. Next, we run the completed script that is already saved in root on Ubuntu 10.10 with the name of file, sniffap.py. Then, we open the root terminal by enter ./sniffap.py wlan0. The result has shown in Figure 4.1 Figure 4.1 Sniff Wireless Networks sniffap.py name of saved file wlan0 monitor mode interface CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 5.0 Introduction This final chapter discuss about the conclusion of this research. It also discusses the suggestions and recommendations that will help those who want to upgrade or refers to this project in the future. 5.1 Conclusion As you can see, having an effective wireless access policy is critical to the security of any organization that operates a wireless networks. Without appropriate policy, the attacker easily gain access the wireless networks. 5.2 Recommendation This project is hopefully can only use the fully script to get the data from the access point without purchase the tools. Moreover, the admin take the action to get access point more securely and get a better signal for client to access the Internet.

Thursday, October 24, 2019

Balances Of Values And Academiic Freedom Of Inquiry Essay -- essays re

Balances of Values and Academiic Freedom of Inquiry Dear Mr. R. Kirby Godsey,   Ã‚  Ã‚  Ã‚  Ã‚  In the process of life we face many challenges and many crossroads. We have many choices and many decisions to make. In making these decisions we must keep in mind the moral values our parents have taught us since we were born. Those Christian values should guide our lives and the choices we make. These same values should also guide at school as well. In our pursuit of knowledge, we should keep these values in mind.   Ã‚  Ã‚  Ã‚  Ã‚  In our never-ending road of learning, we are granted with many academic freedoms. We have the freedom to question and try to learn new ideas. We also have the freedom to disagree with the material presented to us. We can disagree and voice our opinions, but in an orderly fashion.   Ã‚  Ã‚  Ã‚  Ã‚  In exercising those freedoms, we should do so with maturity and responsibility. As students, we are responsible for learning all the content of any course we study. We are free to take exception to the views or information presented to us, and we are free to reserve judgment about matters of opinions.   Ã‚  Ã‚  Ã‚  Ã‚  Sometimes, in our quest for knowledge, there becomes a conflict between our beliefs we are accustomed to and the material presented to us. When there is a difference, we should not ignore the idea or block it out. We should feel free to learn and question new ideas. Just because we learn somet...

Wednesday, October 23, 2019

Creative Writing (Story beginnings) Essay

A golden haze encircled the angel’s head and its torso glowed dazzling white against the drab dreary wall behind. â€Å"What’s happe†¦Ã¢â‚¬  she willed her mouth to finish the sentence but it wouldn’t obey so she gave up. She fought too against the uplifting force taking her away from the slightly damp pavement but as every ounce of resistance drained out of her limbs, she went limp and was completely at its mercy. The final thought that crossed her mind before it succumbed to the black cloud that eventually engulfed her was that she recognised this angel. * Elizabeth Anne Johnson – Lizzie to her friends – was a beautiful girl. With endless jet-black locks flowing down her back and striking features, she looked straight off a catwalk. Tonight she was wearing her favourite pale pink mini-dress with manicured nails and dainty heels to match; and with her perfect figure, she was more than able to carry it off. A combination of her stunning looks and the confidence she exuded made every head turn when she walked past – a fact of which she was well aware. Lizzie had spent all night in Brighton’s new trendiest nightspot â€Å"Heaven†. The place was heaving with bodies bouncing to the thundering beats pounding out of the state of the art stereo system. They were puppets dancing to the tune of the headphone-wearing master in the glass booth above. Fluffy white clouds were suspended from the ceiling, in keeping with the paradisiacal theme, and the strobe lighting completed the effect. The drinks were flowing and the atmosphere was electric – just how Lizzie liked it – and as she cast her chocolate-brown eyes around the dance floor a wave of euphoria swept over her. She felt as though she was perched on top of the world. Already tonight, she had received fifteen requests to buy her a drink – a record even by her standards – and had accepted only one. This was one more than usual though. She may have seemed like the happy-go-lucky type but appearances can be deceptive and she was quite the opposite. Lizzie, a seasoned partygoer, was extremely cautious, especially after the letters†¦ Nevertheless, against her better judgement, she was drawn in by the hypnotic charms of this blonde-haired stranger and felt powerless to resist. His eyes were bottomless pools of baby blue and he had a passive, peaceful presence – she trusted him immediately and completely. She began chatting to him and it suddenly dawned on her that she was telling her life story to a total stranger but she pushed the thought out of her mind just as quickly as it had surfaced. Besides with his crisp white shirt, soft voice and wide grin, he seemed harmless enough. Chapter One (2) The sun was playing hide and seek behind the rows of trees as Detective Flynn drove up to the Heaton mansion. He was filled with the giddy excitement of a man about to change his life. He knew how lucky he was to be here and that this case could potentially make or break his career. Flynn was extremely tall and so scrawny one feared he might blow over in a sudden gust of wind. Through the flaming red curtains flopping over his forehead, intense blue eyes peered out inquisitively. As the mansion came into view for the first time he was awestruck. Beyond the wrought iron gates, it stood large and handsome. It was a huge stone structure with countless windows glinting in the afternoon sun and set in acres of sprawling grounds, of which every inch was flawless. The only thing blemishing this perfect watercolour was the black and yellow police tape running the length of the building. The old rusty Ford Escort coughed and spluttered to a halt in the immaculate courtyard and with an almighty heave Flynn managed to force the door open. As he stepped out gravel crunched beneath his feet. He was dressed in a pair of old faded ‘Marks and Sparks’ jeans and looking around, was suddenly painfully aware of how old and faded they really were. He was also regretting the rest of his wardrobe choice. His slightly off-white shirt had a ‘straight out of the laundry basket’ look and his black leather loafers hadn’t seen a dab of polish since†¦well ever. Despite this, John Heaton greeted Flynn with a warm friendly handshake. The two had been at school together and even though their lives had taken extremely different paths, they had remained the best of friends. As he was being introduced to Heaton’s wife Claudia, the detective couldn’t help but notice how much his friend had changed. A nervous and slightly awkward teenager, John Heaton had become a confident self-assured 35 year-old. He now spoke with the eloquence and poise that only a multi-billionaire could. He was dripping with expensive designer labels – a far cry from the washed out tee shirts and baggy jeans of his adolescence. Money oozed out of his every pore. One thing, however, had definitely not changed. Observing the dreamy look that descended upon his face as he gazed at his wife, Flynn could tell his old chum was still a sucker for a pretty girl. And this was one pretty girl! 15 years his junior, actress Claudia Gilbert-Heaton was a blonde-haired, blue-eyed beauty. Yet, as she tentatively extended her perfectly manicured hand to shake his, Detective Flynn took an instant disliking to her. Her broad smile was almost condescending and didn’t reach her eyes, which were icy and distant. â€Å"I’m so pleased to finally meet you,† she said, looking him up and down, staring pointedly at the ink stain on his shirt pocket. The disdainful look in her eyes betrayed her words and he could tell she was quite the opposite. The reason for this, he would soon discover†¦ Chapter One (3) It screamed at me. Its waving arms taunted me as they jerked up and down and the smiley face was more of a sneering face. At that moment all I wanted to do was shatter it into a thousand pieces but it was so far away and my legs were still sound asleep. I picked a rolled up sock up off the floor and with all the energy I could muster, sat up and launched it. It hit its intended destination with satisfying thud and mercifully, the screaming desisted. Putting the bright yellow, â€Å"Little Miss Sunshine† alarm clock so far out of reach had been a pre-emptive strike by mother against my Sunday morning lie-in. Ha, I thought, she’ll have to think of something better than that! I managed the beginnings of a triumphant grin before, exhausted from my exertions, I slumped onto the lumpy mattress and slid back into a peaceful slumber. Ten minutes later I heard the sprightly purposeful pounding that could only be her bounding up the stairs. She burst through the door, wearing her mechanical cheery smile. â€Å"Morning love, sleep well? Why aren’t you up yet, I heard the alarm go off ages ago?†Ã¢â‚¬  she asked, ruffling my unruly brown curls. She then marched over to the window, with unnatural liveliness considering the time and spread the curtains wide. â€Å"Oh Mum, it’s too bright,† I mumbled in complaint, raising an arm to shield my bleary eyes from the light. She ignored me. â€Å"I sometimes think you wouldn’t know an early morning if it came up and bit you on the behind. Now get up, I’m sure you’ve plenty of work to do today and we don’t want you falling behind now do we?† she chirped, practically, it seemed, in unison with the birds outside. â€Å"I need sleep,† I whined, yearning for some pity. It didn’t come. â€Å"You shouldn’t let sleep get in the way of things. Heaven knows I don’t; I can’t. What would happen if I did? Nothing would get done around here – that’s what!† she tutted and continued with renewed vigour, â€Å"Goodness, look at the state of this room! I’m sure you’ve forgotten what colour the carpet is! This is not a positive working environment. How on earth can you get anything done in here?† She asked and without pausing for an answer, delved into the abyss that was my bedroom floor. She began sorting tidying and organising like an unstoppable whirlwind of efficiency, her neat blonde bob bouncing up and down. I merely lounged on the bed and watched on in amazement. Within minutes she had transformed the cluttered chaotic mess into a tidy, orderly bedroom. When she finished, she stood up, brushed some imaginary specks of dirt from her skirt and staring at my sprawled out figure, flashed me the look. Oh no, I groaned inwardly. It was the I-am-so-disappointed-you-didn’t-turn-out-more-like-me look. This look was always followed by a stream of criticisms, of which most, to be fair, were usually quite accurate. I sighed and braced myself for the oncoming tirade. Literary Analysis of Story Beginning (1) When writing my own story opening, I tried to use techniques that would make the reader want to read on. For example, I described the main character’s appearance in detail so that the reader would be able to form a mental picture of her. Just from the first few paragraphs, the reader knows that she is â€Å"a beautiful girl† with â€Å"endless jet black locks† and â€Å"chocolate brown eyes†. The effect of this is to make the reader relate to her with empathy rather than objectivity because they feel they know her. I also tried to show her personality was sweet and kind. Her clothes and shoes are â€Å"powder-pink† and â€Å"dainty†. I also mentioned that she â€Å"seemed like the happy-go-lucky type†. I did this so the reader would like her and be affected by anything that may happen to her. I included her full name â€Å"Elizabeth Anne Johnson† so that the reader would feel like they were getting a complete picture of her. However, for the rest of the opening, I referred to her as Lizzie. This created a bond between the reader and the character because she is â€Å"Lizzie to her friends† so the reader feels like her friend. It is written in the 3rd person narrative so the reader can get a full overview of all the events in the story. The narrative structure deviates. This creates suspense, as there is no development of the action in the first paragraph in the rest of the opening. I purposely created a huge contrast between the eerie and spooky first paragraph and the rest of the opening, which seems like an ordinary night out, by using varying degrees of character and event description. In the first paragraph I did not use any description at all and just used non-specific terms like â€Å"she†. This was to create mystery and apprehension. In sharp contrast to this, I fully described character and events in the rest of the story. I began with telling the reader her full name so they felt they were being formally introduced. I then went on to describe her appearance, clothes what she is doing: â€Å"tonight she was wearing†¦Ã¢â‚¬  â€Å"She had spent all night†¦Ã¢â‚¬  because I did none of this in the first paragraph. I did however make some links. For example, in the first paragraph, the words â€Å"angel†, â€Å"uplifting† and â€Å"glowed† are used. In the rest of the opening, the words â€Å"Heaven†, â€Å"fluffy white clouds† and â€Å"euphoria† are used. This is to create a link between the two parts of the story and establish an ongoing theme of heaven and the supernatural. I also used a sense of vulnerability to link the two main characters. With the girl in the first paragraph it is obvious. I used carefully chosen vocabulary. â€Å"She willed her mouth†¦it wouldn’t obey† shows that she isn’t even in control of her own body. â€Å"She fought to against the uplifting force†¦was completely at its mercy†, â€Å"her mind†¦succumbed to the black cloud that eventually engulfed her†. Also the word succumbed is quite passive. However the vulnerability in Lizzie’s character is subtler. At the end, she is â€Å"drawn in† by the stranger and feels â€Å"powerless to resist†. This links Lizzie and the girl but also â€Å"the angel† and â€Å"the stranger† because they hold the power in the respective relationships. I think the links make the reader want to read on because it’s like giving them some pieces of a puzzle. They can see some of the picture so they read on so they can find the rest of it. To create further curiosity, the phrase â€Å"especially after the letters†¦Ã¢â‚¬  is not explained at any point in the opening, forcing the reader to form their own opinion. The fact that she was â€Å"extremely cautious especially after the letters† makes the letters seem sinister and let the reader know they were a cause for concern. I used ellipsis at the end so show it is an unfinished thought and an unanswered question. I carefully chose vocabulary to foreshadow dramatic events. For example, ‘on top of the world’ is a well-known phrase, which means in a position of great happiness or success. However I used the phrase â€Å"perched on top of the world† in my story opening. The word perched suggests instability and precariousness so implies that her happiness may be short lived. I also used the progression of time to create effect. The story begins with the girl trying to speak and then finally collapsing â€Å"†¦she willed her mouth to finish the sentence but it wouldn’t obey†¦succumbed to the black cloud that was threatening to engulf her† and then goes to a lively vibrant scene. I did this so the scene would seem like a flashback or a dream – as we know the main character is unconscious. The strobe lighting in the scene adds to the dream-like quality. I tried to create an image of the setting (the club) being beautiful and pure. I did this by calling it â€Å"heaven† and using description like â€Å"fluffy white clouds†. I then used words like â€Å"heaving with bodies† â€Å"thundering beats† and â€Å"pounding† when describing the people and what they are doing to create a contrast. I did this to imply that clubbing itself is innocent enough but the people make it dangerous. I used alliteration in several places for effect. â€Å"†¦drab dreary wall† emphasises how dull and grey the wall in contrast â€Å"dazzling white† of the angel, to to make it stand out more. In â€Å"bodies all bouncing to the thundering beat†, the ‘b’ sound is repeated to try and mirror the beat of the music. I used the phrases â€Å"bottomless pools of baby blue† and â€Å"passive, peaceful presence† because they are quite soft sounds and I wanted to make the stranger seem calm and therefore contrast with the setting, which is â€Å"electric†. I used a metaphor â€Å"They were puppets dancing to the tune of the headphone-wearing master in the glass booth above† because it emphasises the submissive nature of the clubbers and the idea of a person wielding power over someone else. The issue of power is explored in many different parts of the story. I also used repetition. The word seemed is used at the end the last paragraph. â€Å"She may have seemed like the happy-go-lucky type but appearances can be deceptive and she was quite the opposite† and â€Å"he seemed harmless enough†. This is to suggest that just because the stranger seems harmless he â€Å"may be quite the opposite† and to foreshadow him doing something harmful in the future. I put it in italics both times to add emphasis and draw the reader’s attention to it. In conclusion, I think the techniques I used were effective because there are unanswered questions right at the beginning, which are never answered and this appeals the curiosity of the reader, making them want to read on.

Tuesday, October 22, 2019

Assessing Leadership Skills Essay Essays

Assessing Leadership Skills Essay Essays Assessing Leadership Skills Essay Essay Assessing Leadership Skills Essay Essay This paper will supply information about the theoretical attacks that I will utilize to heighten my leading effectivity. it will discourse my leading manner and the ground I choose the manner. This paper will besides explicate the leading accomplishments and qualities I already possess. with the accomplishments and qualities that need betterment. along with how to implement the leadership/follower interaction to better the organisation where I would wish to work. and eventually depict one point of action that I’ve learned from my Self Insight documents. that will include a description of how each point will be implemented. Let’s Begin by specifying leading ; leading is the influence relationship among leaders and followings who intend existent alterations and results that reflect their shared intents. ( Draft. 2011. p. 5 ) Leadership is a people activity and is different from administrative paper work or planning activities. Leadership happens wi th people. it is non something done to people. ( Draft. 2011. p. 6 ) The theoretical attacks that I will utilize to heighten my leading effectivity will be to integrate the democratic leading manner ; along with the Fiedler’s Contingency Model. The democratic manner of leading delegate’s authorization to others encourages engagement. relies on subordinates’ cognition for completion of undertakings and depends on subsidiaries respect for others. ( Draft. 2011. p. 44 ) Democratic leading manner is similar to Theory Y Democratic leaders treat subsidiaries as to the full capable of making the work on their ain. Democratic leaders work with subsidiaries they encourage. they treat each one reasonably. They don’t set anyone down. they see themselves as ushers. They give suggestions. instead than seeking to alter them. Democratic leaders provide information. in their rating they give nonsubjective congratulations and unfavorable judgment. ( Northouse. 2009 ) Although a Democratic leader will do the concluding determination. he/she encourage other members of the squad to hold a say in the determination devising procedure. This non merely hike occupation satisfaction by linking employees or squad members in what’s traveling on. but it besides help to develop people’s accomplishments. Employees and squad members feel in control of their ain fate. such as the publicity they deserve and so are motivated to work hard by more than merely a fiscal wages. As engagement takes clip. this attack can take to things go oning more easy but frequently the terminal consequence is better. The attack can be most suited where squad work is indispensable and quality is more of import than velocity to market productiveness. ( Bhatti. N. et. Al. 2012 ) The results of democratic leaders are largely positive. first it consequences in greater group member satisfaction. committedness. and coherence. Second. there is more friendliness. common prattles. and group mindedness. The teams members interact with each other in a positive mode. and the end is has the group in head with doing we statements opposed to I stat ements. Last. democratic leaders result in stronger worker motive and greater creativeness. and under a democratic leader group members participate more and are more committed to group determinations Fiedler’s Contingency Model ; this theoretical account was designed to enable leaders to name both leading manner and organisational state of affairs. ( Draft. 2011. p. 68 ) This theoretical account was besides designed to name whether or non the leader is task oriented or relationship oriented and fit the leader manner to the state of affairs. The Tasks oriented people are end oriented. They want to accomplish. Their work in meaningful. they are actors. Then we have Relationship oriented people they find intending in being instead than making. Like the democratic manner. relationship oriented people they want to be connected to people. There is besides Task leading and Relationship leading. Task relationship behaviours facilitate ends achievements ; they are behaviours that aid group mem bers to accomplish their aims. while relationship leading behaviour aid subordinates experience comfy with themselves. with each other. and with the state of affairs which they find themselves. The ground why I choose these theoretical accounts is because they best fit my leading manner. and I think it’s a productive manner of leading. In using this accomplishment I‘m ale to listen to other position. and welcome an mixture of declarations. My best leading qualities are in the class of a transformational leader. Transformational leaders are a leader that influences. inspire. move and literally transform followings to accomplish organisational ends beyond their opportunisms therefore originating about positive alteration. They besides introduce new concern theoretical accounts. merchandises and services because of their ability to make new organisational visions. schemes. civilizations. and structures through committed followings. Transformational leaders positively change follower’s lives. raising liquors and even the committedness to moralss and morality ( Weiss. J. ( 2011 ) My penchant would be a transformational leader because they deal more with the individual instead than the undertaking. They build relationships with their squad members. they encourage and motivate. and I think that their followings will acquire more work done because of the resonance that is made with the squad. Another quality that I posses is â€Å"Stewardship† stewardship involves the support and belief that leaders are profoundly accountable to others every bit good as to the organisation. without seeking to command others. specify significance and intent for others. or take attention of others. I’m in favour of this type of leading because it allows the people to make the work without being micro managed. There are four constituents to this manner of leading. reorient towards partnership premises. place determinations and power to those closest to the work and the client. acknowledge and honor the value of labour. and anticipate nucleus work squads to construct t he organisation. ( Draft. 2011. p. 176 ) By utilizing these methods the leader is to take the organisation taking control of the follower. They are able to work together in harmoniousness with squad members. By utilizing the stewardship method you are able to handle team members as spouses. by sharing power. and keeping control over their ain work. This theoretical account besides allows relationships to organize between leaders and followings that will lend to the organisations success. Independent believing refers to believing. oppugning premises. and construing informations and events. harmonizing to one’s ain beliefs. thoughts. non harmonizing to prestablished regulations. modus operandis or classs defined by others. ( Draft. 2011. p. 138 ) I’ve ever been an independent mind. I’m non the type of individual that agrees with people for credence. or merely to travel along with the most popular reply. I’m really opinionated. and I’m able to acquire my positions across without being rude or mean. In my current place. I have to ever be watchful. and able to believe critically because systems are ever altering Although I fell that I’m a good overall leader my weakest accomplishments falls under disposal accomplishments. disposal accomplishments. Administrative accomplishments are those competences a leader needs to run an organisation in order to transport out the organisations purpose and ends. Administrative accomplishments are divided into three classs: managing people. pull offing resources. and demoing proficient competency. ( Northouse. 2009 ) I work good with people but covering with administrative undertaking has ever been an issue for me. I’m non the best typist. nor am I good organized. Since going a pupil at AU I’ve go more organized. Another quality in demand of betterment trades with system believing. System believing means the ability to see the synergism of the whole instead than merely the separate elements of a system and larn to reenforce or alter whole system forms. ( Draft. 2011. p. 142 ) The leadership/follower interaction that I would implement to better the organisation where I would wish to work is leader follower coaction. In the leader follower coaction leaders and followings have more in common than they think. In my ideal work topographic point I would utilize this theoretical account as the design for my company. Get downing phases of a undertaking or assignment. The leader and follower functions differ significantly in the initial phases of a undertaking. The leader should supply way in the signifier of range. nonsubjective. outlooks. restrictions and guidelines while the follower should inquire inquiries to guarantee understanding and should lend to the undertaking or assignment definition as appropriate. Middle phases of a undertaking or assignment. The leader and follower functions exhibit greater similarities during the in-between phases of a undertaking. This is where the majority of work occurs. Leadership should switch. based upon who possesses the appropriate cognition or expertness. With self-importances in cheque. leaders should allow. and even promote. followings to originate thoughts and sentiments. With cowardliness in cheque. followings should exercise leading by offering thoughts and sentiments. If leader and follower can carry through these new functions. a high grade of coaction will happen and project success will increase. Concluding phases of a undertaking or assignment In this phase. leader and follower functions once more differ. It is up to the leader to specify the terminal of one undertaking and the beginning of the following. For optimum acquisition. leader and follower might collaboratively prosecute in a â€Å"lessons learned† duologue. ( Don Grayson A ; Ryan Speckhart ) What I’ve learned from my Self Insight Papers is that I might be a spot timid in my leading ability. I thought that I was a good leader but it seems as though that I still have some work to make. Prior to taking this class I thought that I was a really good leader. but it seems as though I have a batch to work to make to better my leading accomplishments. In making an appraisal of my strengths and failings. I realized that in order to go a more effectual leader I will hold to go much more confident in certain countries. The countries that betterment is needed is in my motive techniques. I thought that I encouraged my squad in a positive mode. but what I realized is that I’m making the majority of the work while promoting. what sense does that do? I have to put lineations and let my squad members to do errors. and learn from them. Because we get paid by public presentation is likely why I do that. As a leader. you can develop anchor to accept personal duty for accomplishing the desired results. traveling against the position quo. and standing up for what you believe. You can larn to force beyond your comfort zone and interruption through the frights that bound you. ( Draft. 2011. p. 182 ) That statement amounts it up for me. If a leader can populate by that statement everyone will profit in the terminal. In decision this paper has defined leading. identified the accomplishments and qualities I possess. in add-on to the qualities that need betterment. every bit good as how to implement the leadership/follower interaction to better the organisation where I would wish to work. and eventually depict one point of action that I’ve learned from my Self Insight documents. that will include a description of how each point will be implemented. MentionsBhatti. N. . Maitlo. G. M. . Shaikh. N. . Hashmi. M. A. . A ; Shaikh. F. M. ( 2012 ) . The impact of bossy and democratic leading manner on occupation satisfaction. International Business Research. 5 ( 2 ) . 192-201. Retrieved from hypertext transfer protocol: //search. proquest. com/docview/963357720? accountid=32521 Daft. R. L. ( 2011. 2008 ) . The leading experience ( 5/e ) . Mason. Ohio: South-Western Cengage Learning. Northouse. P. G. ( 2009 ) . Introduction to Leadership: Concepts and Practice. Thousand Oaks. CA: Sage Publications Weiss. J. ( 2011 ) An Introduction to Leadership. Bridgepoint Education. Inc. World Wide Web. trustee. edu/acad/global/publications/†¦/grayson_speckhar