Tuesday, December 31, 2019

Reference Letter from Employer - 5583 Words

To Whom it May Concern: I highly recommend Jane Doe as a candidate for employment. Jane was employed by Company Name as an Administrative Assistant from 2002 - 2005. Jane was responsible for office support including word processing, scheduling appointments and creating brochures, newsletters, and other office literature. Jane has excellent communication skills. In addition, she is extremely organized, reliable and computer literate. Jane can work independently and is able to follow through to ensure that the job gets done. She is flexible and willing to work on any project that is assigned to her. Jane was quick to volunteer to assist in other areas of company operations, as well. Jane would be a tremendous asset for your company and has†¦show more content†¦In addition, as a member of the management team at SRR, I am charged with constantly working to find more efficient, cost-effective means of gathering respondent level data and producing our research products. Since joining SRR as a Senior Research Analyst, and more recently as Manager of Research and Development, Hongbin has been a major weapon in my arsenal of tools for accomplishing these tasks. Hongbin is a creative and original thinker. He has native intelligence, great curiosity about people and ideas, and plenty of common sense that he has applied to solving many problems at SRR. In addition, he has demonstrated excellent powers of observation, and an ability to communicate and suggest change in effective but non-threatening ways. To illustrate†¦ Early on, Hongbin was assigned to an important research project as a fill-in Project Manager. In this role he was responsible for the technical aspects of creating a computer-based survey questionnaire (from one given to him by our client services department), monitoring the telephone data collection process, and completing the data processing and analysis of the survey results. From the beginning of this assignment, Hongbin began to re-define our expectations of a good project manager. He started by participating in discussions with the client and suggesting and implementing several changes toShow MoreRelatedHow I Write A Letter Of Interest980 Words   |  4 PagesHow to Write a Letter of Interest KENYANPRO Introduction How to apply for a job that you are interested but there is no appropriate job posting? So how you can apply? In this situation you need to express your desire to meet the hiring manager by email or a letter. And this letter is known as letter of interest. What is a Letter of Interest? Letter of interest is used when you want show your interest to the hiring manager for a job position that is available to you. You can use LinkedIn’sRead MoreThe Legal Management of Employees in the Hospitality Industry1418 Words   |  6 Pagesorganization. Employee relationships are generally developed through clarification of the conditions of the employment agreement with the employee. Actually, every employer and employee is required to have employment agreement with each other. Employment agreement is basically defined as the terms of employment relationship between an employer and his/her employee(s) that stipulates the rights and obligations of the parties in the working agreement. The employment agreements usually vary and even existRead MoreThe Statement Of Blue Gum932 Words   |  4 PagesStatement of intent Blue Gum aims to attract, select, appoint and retain good quality employees by providing a recruitment process that is fair, respectful, consistent and confidential. We aim to encourage applicants from a wide range of candidates that meet the positions criteria. Blue Gum is committed to providing equal opportunity by considering possible candidates based on skills, qualifications, knowledge and abilities. Factors such as gender, ethnicity, marital status, physical impairmentRead MoreOsha Inspection Of Osha Inspections Essay969 Words   |  4 Pagesvisit by an OSHA inspector, taking into consideration both legal issues and the current climate of OSHA. The legal aspects of an OSHA visit are myriad: what authority and rights does the inspector have, what is the purpose of the visit, what rights employers and employees have during the visit, and what are the proper responses after the visit if violations were noted? The author addresses all of these with the exception of the last one, as the focus is on the visit itself and minimizing findings/citationsRead MoreAnalyse your contribution to the selection process for the position of Classroom Assistant1418 Words   |  6 Pagescontributed to the process. Before being selected through for the position, there are three stages that each applicant must face: the pre-interview, the interview itself and the post-interview. Each of these stages plays their part in allowing the employer to carefully select the potential candidate. Pre-interview When applying for a position or job role, it is essential that an application form is presented and that the candidate must meet the criteria as identified in the person specification inRead MoreEmployment Is Essential, Effective, Concise And Free Of Errors820 Words   |  4 Pagesrà ©sumà © is an accurate description, providing an employer with information regarding one’s educational accomplishments, work experience, achievements, skills and special knowledge and training. Since a rà ©sumà © is a business document, it should be professional, concise and free of errors. The main purpose of a rà ©sumà © is to make employers interested in learning about you, and to get you beyond the initial screening in order to obtain an interview from someone with the power to employ you. (Clague, 2004)Read MoreCommon Types of Application Letters1700 Words   |  7 PagesCommon Types of Application Letters To begin planning your letter, decide which type of application letter you need. This decision is in part based on requirements that employers may have, and in part based on what your background and employment needs are. In many ways, types of application letters are like the types of resumes. The types of application letters can be defined according to amount and kind of information: • Objective letters Ââ€" One type of letter says very little: it identifies theRead MoreEssay On Resume1187 Words   |  5 Pageshighlights an individuals experience, qualifications, skills education and certifications in hopes of finding a job and is usually limited to one, maybe two pages. (WiseGEEK, n.d.) Some employers ask for a resume, other employers ask for what is called a Curriculum Vitae, often shorted to CV. Some employers use the term interchangeably. The CV includes all life accomplishments, in chronological order regardless of the relevance to the job duties. In the academic community, a CVs is the mostRead MoreCareer Goals For A Professional Career Goal976 Words   |  4 Pagescompleted. Professional Career Statement Creating a professional career goal statement can significantly impact a resume. According to (Starzee, 2012) a professional career goal statement allows the candidate an opportunity to provide the employer a synopsis of the value they intend to bring to the organization. Below is a professional goal statement for a Client Relationship Professional: Engaging Client Relations Manager adept at evolving complex client proposals. Expertly skilled in variousRead MoreWayne Beatty v. Canadian Mill Case Study1514 Words   |  7 PagesWeek 11 Case Summary : Wayne Beatty v. Canadian Mill, 2003 BCSC 1053 (CanLII) FACTS Mr. Wayne Beatty, the plaintiff brought a claim against his former employer Canadian Mill Services Association (CMSA), the defendant is suing for wrongful dismissal and contending he is eligible for increased damages due to the way the dismissal was handled. The damages include an additional 13 months’ notice and for the loss of a number of fringe benefits. CMSA is a non-profit forest industry association

Monday, December 23, 2019

Entrepreneurship Is The Process Of Discovering New Ways Of...

Entrepreneurship is the process of discovering new ways of combining resources. To start a business offering a product, process or service, various entrepreneurial skills and business models are required for smooth functioning, but the most important aspect it to have an entrepreneurial mindset. This is drawn from opportunities, innovation and new value creation. Entrepreneurship is a practice of learning and exploring the world by being visionary, opportunistic and creative. Entrepreneurial Mindset Profile (EMP) results indicated two sections related to personality scales and skills scale. After analyzing my scores in comparison with corporate managers and entrepreneurs, I have identified my key strengths and they are described as follows: †¢ Risk Acceptance: When you start a new business, there are certain and unavoidable risks associated with the project. My score was 4 with is higher compared to corporate mangers (3.55) and slightly lower than entrepreneurs (4.18). It’s not about ability of taking risk but being able to measure and calculate the risks. I am willing to take a certain amount of risk to achieve real success in the venture. I am prepared to take some risks if only the payoff is big enough. I like to manage the risk with certain strategic plans to overcome any loss. †¢ Passion: My score was 4.20 and relatively higher than corporate managers (4.01) and marginally lower than entrepreneurs (4.32). I believe everyone should be passionate about something.Show MoreRelated General Motors Inc. Essay examples1410 Words   |  6 PagesGeneral Motors incorporates entrepreneurship and innovation into its business objectives. This is evident in General Motors Vision statement which states that its goal is to â€Å"lead in advanced technologies and quality by creating the world’s best vehicles†. (1) For instance General Motors has an extensive R D, Design, and Engineering department that oversees the creativity, innovation, and invention of its strategic technologies and innovation programs which are aligned with its corporate visionRead MoreOverview Of Methodologies. Effectuation . Effectual Reasoning1615 Words   |  7 Pagesthe circumstances (Sarasvathy, n.d.). Effectuation is a logic of thinking that requires entrepreneurs to constantly be making decisions and taking action (â€Å"What is effectuation?† 2011). No one can predict the future; however, effectual thinking is a way for entrepreneurs to control an unpredictable environment (â€Å"What is effectuation?† 2011). This framework of thinking advances ideas into sellable products and services with proven customers (â€Å"What is effectuation?† 2011). Principles of EffectuationRead MoreA Literature Review Of Schumpeter And Kirzner2338 Words   |  10 Pages A Literature Review of Schumpeter and Kirzner: Entrepreneurship Ben Sparrow Edinburgh Napier University 2014 Contents: 1.0 Introduction 1.1 Terms of Reference †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 1.2 Defining Entrepreneurship †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 2.0 Entrepreneurial Theories 2.1 Schumpeter †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 2.1.1 Example †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 2.1.2 Critique of Schumpeter †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 2.2 Kirzner †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4Read MoreHow Do Entrepreneurs Run And Grow Their Businesses?3371 Words   |  14 Pagesdifferent aspects of entrepreneurships. Although there are many different things you can talk about involving entrepreneurship, we chose to focus on three topics. The three topics discussed in this paper are: 1. Who becomes an entrepreneur? What are their skills sets or Psychological make-up? 2. What is an entrepreneur? 3. How do entrepreneurs run and grow their businesses? After research on all these topics we determined that anyone can become an entrepreneur, entrepreneurship has many differentRead MoreEntrepreneurial Leadership Traits And Characteristics1810 Words   |  8 PagesCharacteristics Entrepreneurial leaders are charismatic individuals and initiators. Being an entrepreneur enables an individual to forges path. Bagheri Pihie (2011) mentioned in his work that it is up to the leader to turn the forge path into highway. Combining these two characteristics can make a person exceptional and such individuals can become the driving force of changing the world. Fernald, et al (2005) also mentioned in his work that entrepreneurial are visionaries that are they think of innovativeRead MoreWomen Entrepreneurs in Bangladesh: a Case Study on Boutique Business10735 Words   |  43 PagesChapter: 1 Introduction 1.1 Introduction: Entrepreneurs are arguably the most important actors in our economy: the creators of new wealth and new jobs, the inventors of new products and services, and the revolutionizes of society and the economy. Yet despite their centrality, little is known about entrepreneurs: what motivates them, how they emerge, why they succeed. We know even less about who becomes an entrepreneur, and why. Women are one particularly understudied group of entrepreneurs. We knowRead MoreHow Teams Can Help Leaders Increase Levels Of Innovation2682 Words   |  11 Pagescompany?s strategy of globalizing had a positive impact on the results. According to its annual report, because of its globalizing strategy, LEGO reached new consumers in new places of the world. New products take around 60% of total sales each year. The biggest reason of this continues success is the innovative and consumer-oriented development process. Right now, LEGO is one of the most powerful brands in the world (LEGO, 2016). Do you know that this Danish toy maker almost went bankrupt in 2004?Read MoreI Love Reading Essay69689 Words   |  279 PagesCommission Entrepreneurship in India National Knowledge Commission 2008  ©National Knowledge Commission, 2008 This report has been prepared by Amlanjyoti Goswami, Namita Dalmia and Megha Pradhan with support and guidance from Dr. Ashok Kolaskar and Mr. Sunil Bahri. Table of Contents Acknowledgements Executive Summary Chapter I Chapter II Chapter III Chapter IV Chapter V Chapter VI Chapter VII Annexure I : : : : : : : : Introduction: Why Entrepreneurship What Motivates Entrepreneurship Socio-culturalRead MoreCase Studies: Sas Airline Ryanair80169 Words   |  321 Pagesderegulation of air transportation in Europe foster entrepreneurial behavior and innovation in the European airline industry over the last twenty years? Case studies: SAS Airline Ryanair Master Thesis in Entrepreneurship and Dynamic Business Contexts Spring 2007 Supervisor: Hà ¥kan Bohman Entrepreneurship Master Program Authors:  Gilles Helterlin and Nuno Ramalho  Acknowledgements We would like to express our gratitude to all who have contributed to the realization of this Master Thesis. A warmRead MoreHuman factors and cyber policy4873 Words   |  20 Pagescurrent debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs. There are six ways that intellectual property theft harms U.S. and global consumers and economies. Online piracy harms content as well as the trademark owners through lost sales and brand recognition through increased costs to protect intellectual property instead of

Sunday, December 15, 2019

Hacking and Countermeasures Controls Free Essays

Aim Higher College needs to ensure the safety of all its information. Recently we have seen suspicious and careless activity in the research data center. Data center technicians have reported lights left on, doors left open, successful logins to the research database, as well as login attempts in the backup business database after normal hours of operation. We will write a custom essay sample on Hacking and Countermeasures: Controls or any similar topic only for you Order Now Because this is also the backup for our business information we need to keep this area as secure as possible. In order maintain control over who has access to what in the center we need first ensure that only those that need access to the center are granted the appropriate permissions to the areas that they need. The revolving door should only allow one person through at a time, this will help to prevent someone without access from slipping by with some one that does have access or allow a person with access giving access to some that is not authorized in the build. This will be done with a using simple radio frequency identification (RFID) cards for the initial access to the building’s lobby. Both entry and exit will require that the card be read so that a log of who enters and leaves the building can be kept. Entry to the staff offices will simply be with a RFID card reader. With these cards, we can select what areas they have access to according to their needs. The front double doors and access to the receiving area can only be opened from the inside of the building. By allowing one-way access we ensure that hacking of the reader is not possible. Biometric scanners should be used for all sensitive areas as a second method to prevent card cloning. Those that have access to sensitive areas or doors that can allow more than one person through such as the shipping area and front double doors will be issued a Personal Identity Verification (PIV) cards. These card work with the biometric scans. When the card is scanned it relays to  the biometric scanner the information that the scanner will need to make the identification. This means that even if the card’s RFID is cloned as soon as it is read it would be denied because the biometric information is not there. The biometric that we should use is an iris scanner. Rather than hand dimensions that can change or fingerprints. Fingerprints are easy to fool, if the finger is dry the scan may not read correctly, the maintenance if high as the sensor must be cleaned, impurities on the hand or air can give false readings, and lastly to prevent the spread of disease. Iris scanners do not require physical contact, eyeglasses, and contracts normally do not disrupt the reading. To make things easier the iris scanning is much faster. The iris can be scanned as the person is walking up and then compared to the card when the PIV is read . In addition, it is my recommendation that the datacenter be physically separated between the backup site and the research site. This will allow students and staff to gain access to the research center but not the backup center. Only those that need to have access to the business side backup will be required to use biometrics and a PIV card. All servers will be locked in cabinets for the protection of the severs and SANs that are on site. This will deter theft of any equipment that might contain information. Security cameras will be used to monitor all access and movement within the building. Thirteen stationary static cameras will need to be in use to watch all hallways, doors, and the datacenters. Two motion detecting pan / tilt / zoom (PTZ) cameras will be paced in the center of the data centers (one in each) to follow and watch the activity of persons entering. This should be accompanied with a security system that monitors movement, doors and windows. The diagrams below show the position of the cameras and access control equipment and measures that are recommended. In the event of a power outage, it is highly recommended there is enough UPS in place for at least 15 minutes to allow for proper shut down. Preferable would be to have a backup generator so that information can be saved and moved to another site or to maintain functionality until the power comes back on. Protection of the systems will consist of the floor being raised by at least eight inches from the ground and an automatic pump system in place to mitigate flooding. Because there are people working in these areas  we need to ensure that we have an adequate fire suppression and we need to keep in mind the equipment that is in the room. The recommendation here is to use an waterless fire suppression. While it may not be as cheap as using water, the damage of having a water system in the area will be much more expensive. Waterless systems work by lowering the oxygen in the area to a point that the fire cannot continue combustion without the harmful effects to persons like Halon or CO2. The have been proven to put out fires faster without any damage people. This will give all persons enough time to evacuate calmly in case of fire . Water systems only help in containing the fire until fire fighters can arrive, in the meantime, we are causing damage to our own equipment They cost of the damage would be in the millions to replace servers and other equipment. The estimated time after a fire with a water system is approximately one month if data can be recovered. Not that we have the physical aspect of the data centered covered we need to look at the technical or logical side of protecting the information. Safeguarding the confidentiality, integrity, accessibility, and the non-repudiation (CIA) is vital. As stated before an IDS and IPS will be put in to place to watch the system at all times to report and mitigate if not stop unauthorized activity to the business backup and research databases. This will help with monitoring the network and see what and where unauthorized traffic and attempts are coming from. Anti-virus and anti-malware programs will be installed on all systems in both databases to protect the information and programs. Firewall implementation between the networks is necessary to keep unauthorized attempts from getting in to the business side of the database. All information will be encrypted so that if the data is or any hardware is stolen then the information be more difficult to read and will hopefully discourage the thief. To prevent a brute force attack through a console connection after 3 attempts at a password the system will lock down that port and a flag will be sent to the data center technician on duty. To ensure that the person that is attempting to gain access to the server through a console connection a token that generates a random alphanumeric code will be used. As we all know people are where we see the biggest problems in security breaches and problems on any computer or network system. People need to understand what they are allowed and not allowed to do, this is where policies, procedures, and training come in to play. By  implementing policies that use best practices, such as an acceptable use policy for all staff and students, we make it known what they are allowed to do, and what the consequences are should they choose to ignore the rules. Training all staff and students on security awareness is something that is necessary so that people to go or do things that can jeopardize the network. Making sure that procedures are documented help if there is a problem that can arise again, this reduces down time should the problem return. Making sure that a disaster recovery plan (DRP) is in place, practiced and trained on regularly. This is critical to make sure that down time is as minimal as possible. The separation of duties helps to break up the processes involved to complete a task prevents one individual from having total control over the whole system. Each person or team is responsible for his or her area only and if required forces collusion so that someone else is needed to meet the end goal. It acts like a checks and balance. With these policies in place we need to ensure that they stay current with or business continuity plan and the goal of our mission statement. This will be accomplished by security reviews and audits. This helps to ensure we do not get complacent as well. Performance evaluations help with ensuring that all staff is at their peak performance. Here is where performance correction for both junior and senior members comes in to play. We always need to keep even our staff up to date and fine-tuned to keep one-step ahead. Background checks from time to time are a good way of making she that all employees are acting honestly. There by safeguarding from any circumstance outside of work, that would lead one to perform maliciously with in work for a personal gain. Required vacations will help with employees with being overwrought with situations at work. As people, we need to step back, rest, and regain focus. Forcing staff to take vacations helps this happen. Finally, rotation of duties helps to make the team come to a better understanding of the network as a whole. This allows all members to be cross platform trained, which helps when someone is sick, on required vacation, or a team is short from termination. Aim higher college has come a long way in the two months now that security is serious concern. If we work together then we can make this college one that students and faculty feel safe coming to, to learn and teach. With colleges competing with online schools and courses, our information system needs to be at its most secure and best  performance to keep pulling students in. These controls are just an insight as to the recommendations that looked at seriously and deeply considered to make sure that Aim Higher College stays at the top. How to cite Hacking and Countermeasures: Controls, Papers

Saturday, December 7, 2019

Smartphone Forensics Analysis-Free-Samples for Students-Myassignment

Questions: 1.There is a series of process involved when a switched-on GSM mobile system is getting a channel from its carrier service provider. Please explain the processes. 2.Please explain the investigative values of the identifiers of handset and SIM card. 3.Please explain how the Exponential Back off Algorithm operates. Answers: 1.The channel or the control channel provided by the service provider for a switched on GSM mobile system is of a special frequency that is used to build a link between the mobile system and the base station. There are number of processes associated with this phenomenon. In case the GSM finds it problematic to establish a link with the control channel, it shows an error message. Each carrier frequency associated with the GSM mobile system is segregated in time by making use of the TDMA scheme, the primary unit of which is called burst period. Eight burst periods are generally grouped together, which form the primary units of logical channels. However, one physical channel is a single burst period in one TDMA frame. The position and associated number of the corresponding burst period define the channels obtained from the carrier, and each pattern of burst period is repeated in every two three hours. The control channels are responsible for housekeeping tasks and decide which frequency to use during a call. In order to ensure the handover works, the broadcast control channel upto 16 neighboring cells is monitored by the switched-on GSM. The phone continuously adjusts the radio waves, to receive a clear signal coming from the base station; as the phone is taken far from the base station, the signal strength weakens. In this case, the network consults and enforces a handover to the corresponding neighboring cell or channel, which has considerably good signal (Bechet and Miclaus 2012) 2.Identifiers of handsets: International Mobile Equipment Identity or IMEI number is an unique number associated with every handsets, which is used by an associated GSM network in identifying the identity of valid mobile devices. This number or ID is unique and hence can be used to track a stolen or lost phone. IMEI number tracks the mobile phone by the transmission of the mobile subscriber identity number, which is a unique ID of a SIM card. IMEI number has considerably helped in reducing the number of mobile thefts across the globe (Kumar, Kaur and Gndu 2015). This number is associated with every GSM, WCDMA mobile phones and few satellite phones as well. The other identifiers of handsets are Android ID, UDUD, IDFA, and IDFV. However, IMEI is mostly used as a unique identifier for handsets across the globe. Identifiers of SIM card: An integrated circuit card identifier or ICCID number internationally identifies every SIM. The ICCID number is generally defined by the ITU-T recommendation. The ICCID has different parts, such as IIN or Issuer Identification Number, which is of maximum seven digits, Individual account Identification of variable length and check digit. The format followed in generation of an ICCID number is MMCC IINN NNNN NNNN NN C x. Where, MM is a constant, CC denotes the country code of the SIM, II is the Issuer Identifier N{12} corresponds to account ID or the SIM card number. C is the calculated checksum from other digits by application of Luhn algorithm and finally the x is an extra 20th digit that is obtained as a return of AT!ICCID command. Apart from the ICCID, the SIM also contains an International Mobile Subscriber Identity (IMSI) number (Al-Hadadi and AlShidhani 2013). 3.Exponential Backoff algorithm makes use of feedback to decrease the process rate multiplicatively, with an aim of finding an acceptable rate. This algorithm is used to space out the repeated transmission of same data in order to avoid collision. It has an increasing usage in CSMA/CD as a collision resolution mechanism in random access networks. In case a collision is detected in transmission of a data, the node immediately stops the transmission of data. Exponential Back off algorithm works by sensing the medium when a frame is to be send through the medium. The medium or the channel is continuously monitored for collision and if there is a possibility of a collision, the transmission is aborted with a short jam signal. After a collision, the time frame is segregated into defined slots, with a length same as the worst-case roundtrip propagation time. In order to accommodate the longest path of the Ethernet, the slot time set is 512-bit times. Therefore, after occurrence of first co llision, the channel waits either 0 or 1 time slots at a random before trying again. This set is termed as contention window. In case, the sources collide even after that, the size of the contention window is doubled, which then becomes {0,1,2,3}. The sources of second or subsequent collision then pick an integer randomly from this sets and waits for that time before retransmission to avoid collision. Figure 1: Representing collision avoidance using Exponential Backoff Algorithm (Source: Al?Hubaishi et al. 2014 References Al-Hadadi, M. and AlShidhani, A., 2013. Smartphone forensics analysis: A case study.International Journal of Computer and Electrical Engineering,5(6), p.576. Al?Hubaishi, M., Alahdal, T., Alsaqour, R., Berqia, A., Abdelhaq, M. and Alsaqour, O., 2014. Enhanced binary exponential backoff algorithm for fair channel access in the IEEE 802.11 medium access control protocol.International journal of communication systems,27(12), pp.4166-4184. Bechet, P. and Miclaus, S., 2012. An improved procedure to accurately assess the variability of the exposure to electromagnetic radiation emitted by GSM base station antennas.Measurement Science and Technology,24(1), p.015003. Kumar, K., Kaur, P. and GNDU, A., 2015. Vulnerability detection of international mobile equipment identity number of smartphone and automated reporting of changed IMEI number.International Journal of Computer Science and Mobile Computing,4(5), pp.527-5