Professional Documents
Culture Documents
Success
1.Importance of Communication in Success
3.Communicating Aggressively
or negative impact on their personal lives. When two people in a relationship are both effective
communicators there is a much higher likelihood of problems being resolved. Knowing the correct
words and their usage also allows one to more fully explain their feelings and opinions. The human
emotion system is vastly complex. The more words a person has command of, the more likely they
are to be able to convey the emotions they are feeling and the cause of those emotions. Strong
communication skills are also important when raising children. Children have an especially hard
time expressing their emotions in positive ways. When they grow up learning ways to express
themselves verbally by observing their parents, it often makes the parent-child relationship much
less stressed.
The fact that a strong vocabulary is important to success is actually no secret at all. In fact, several
popular magazines have features in every issue that list "power words" and their definitions, along
with suggested usages. People even pay large amounts of money to receive audio tapes and computer
programs to help them enhance their vocabulary. An effective vocabulary is much easier and less
expensive to acquire than the marketers of those audio tapes would like people to think. The means
lies in a book common to almost every household. That book is, of course, the Dictionary. Its
companion, the Thesaurus, is equally important. They both hold the key to developing word power.
Knowledge of words is only the first part of becoming a successful communicator. The next step
requires observation. Observe the uses of different words and their connotations in different
situations. Observe the positive and negative reactions to certain words. The last part is probably the
most complex. It is the ability to listen effectively. When someone is speaking consider not only the
specific words that they use, but also the meanings and intentions behind each of the words. This can
help you to not only better understand what is being said, but also to perceive underlying motives.
Many times you may notice that someone is expressing displeasure, but doing so in a way that less
observant people with an inferior understanding of word usage may never pick up on. This can lead
to people seeing you as intuitive, and can have innumerable positive effects on your personal and
professional life.
Another part of effective communication is knowing the correct words to use in certain settings.
Certain words may not match certain social settings, and may result in the user being considered
"rude" or "snooty." By observing the conversational norms you can better adapt your language to
those around you. This can be a great skill in a workplace that requires you to have contact with
a diverse customer base. Cultural differences also require observation. Some cultures appreciate
displeasure being voiced in an indirect, polite manner, while others view this type of behavior as a
sign that someone is dishonest and insincere. On the other end of the spectrum, stately words would
be quite appropriate in some occasions. When in the company of scholars, diplomats, or other welleducated people, one may be viewed as a simpleton for using casual language.
The ability to communicate is a great skill that is often undeveloped. Having command of a large
vocabulary is usually the most noticeable aspect of communication skills, but it is only one of the
required skills. The words you use, along with their usage, connotations, and implications, often
form others' opinions of you and your character. In the workplace these communication skills are
especially important. In order to achieve a managerial position, you must be able to not only
effectively communicate to your superiors why you deserve the position, but also be able to
communicate effectively with your subordinates in a manner that encourages teamwork and inspires
respect.
organizations and teams. But if the job details are not effectively passed on, the work will
not be completed satisfactorily and would cause failure of the job. Thus communication
plays an important role again in this regard. Communicating the job details accurately is
important and necessary so as to get the job done as per requirements.
Thus based on the above factors and discussions, we can conclude that communication is
not just a necessary ingredient for success but is also needed for maintaining harmony and
a peaceful professional relationship within the organization
At the end of every business communication, ensure that you document all key points that
have been discussed. Also, make it a point to document the actions that were discussed to
be taken after the meeting and follow them up on a regular basis. These kind of
documented points can act as evidence and reference when required in future.
Communicating Aggressively
It is common that we find people who act in a superior way around us, but there are some
people who over do this. They involve in our decisions and make our choices. Any situation
that they participate in will have to be a winning situation for them. Such people are all
around us and they are known as the aggressive types. But did you know how to figure out
the good and bad of this kind of communication? Read on to understand more about
communication types and in detail about aggressive communication.
What is communication and how is it classified?
Communication is the ability of an individual to convey across a message to a listener or an
audience through verbal or non-verbal forms. Communication is basically classified into
various types depending on the method used for communication like oral, written, nonverbal, etc. It can also be classified based on the characteristics exhibited by an individuals
style of communication. On that note, it is differentiated into four types, passive,
aggressive, assertive and passive-aggressive.
What is Aggressive type of Communication?
Aggressive communication is a communication style where the individual expresses his or
her opinion and views in a bold manner dominating others ideas. They often express their
views in such a manner that it violates others rights and opinions. These individuals can
also be at times verbally or physically abusive.
Sometimes a bit of aggression is also mixed in the behaviour leading to passive-aggressive
types of behaviour. It is often experienced by people who have had a history of past
emotional abuse and wounds. Such kind of wounds and feels tend to lower a persons selfesteem thereby making them aggressive in nature.
How is this behavioural nature developed?
Like passive communication, aggressive form of communication can also result due to low
self esteem. This form of urge to satisfy ones need may arise due to the suppressed
emotions for a long time or emotional wounds that have been tolerated for long.
Feelings of powerlessness that have been felt for long normally tend to bring out a
Focus on a Goal
The best way for your information to be totally understood is to provide a goal while
creating a road map on achieving that goal. This is usually the challenge faced by those
goes into presentation the first time. There are too many information to be considered and
too many factors that could affect the goal. But thinking about those things could easily
jeopardize your presentation.
To ensure you focus on a goal, the factors that you need to add should be the ones that will
have a great effect on the goal. By sticking to these factors, you can provide the challenges
in achieving that goal and what you can do about it. Expect your boss to ask questions
regarding other factors and be prepared for a rebuttal on why those factors will not have a
significant role in affecting the goal.
Many fresh graduates often end up frustrated with their careers because they are unable to
go through these scenarios. But think of pressure packed presentation only as a test. These
presentations are not death chambers wherein you will die if you do not have a good
presentation. If your first presentation does not go well, pick yourself up and try harder the
next time. As long as they do not terminate you from work, you will still have a chance to
improve
better to talk to them about short term and long term goals rather than encourage rising
expectations. It is wise to sit and discuss on goals to avoid future disappointments. Thus
expressing expectations also form a part of employee communication.
To effectively complete all these, it is must that you decide best strategies and
methodologies for communication. Communicating with your employees effectively is an
important part of organizational success. Such an effective communication not only
improves employee productivity but will also create a confidence and comfort level for
longer trustworthy relationships.
accompany it with all kinds of documentary evidence required. It is required that you are
prepared to answer all questions and answers regarding the message conveyed.
In case you are not sure of the answer for any of the question, inform them that you would
get back and do not forget to keep up your word.
Plan your communication session in advance and book your time beforehand to avoid last
minute hassles. If you are communicating with your boss, choose a time when he is in a
pleasant mood and in a relaxed state.
If you are communicating with your team, find a time when the entire team is available for
a session. Normally productivity is low in the afternoons and thus communicating at those
time will ensure that work is not affected to a serious extend. Make sure that you plan your
meeting in advance so as to avoid last minute absentees.
Learn to display a firm body language and clear facial expressions. A hunchbacked posture
or a serious look can provide a lack of confidence look. Also the posture of your hands tells
the listener a lot about your intention with regards to the communicated message. Hands
folded near the front may look like you lack openness and the listener might find it difficult
to create confidence on you.
Also hands that are busy fiddling with pen or watch might distract the listener and will
reduce efficiency of the communicated message. Your body language is a strong resource
and make sure that you use it to enhance your communication skills . Try to keep your
hands along the sides of your body or you can involve them in noting down points during
the meeting. Try to maintain a firm eye contact but do not stare at the listener which might
make them uncomfortable.
It is mandatory that you listen to the reaction of your audience and modulate your
communication skills based on it. Based on the body language exhibited, you can figure out
if the session is boring or not. You also need to make sure that the listener is involved in the
discussion.
Thus a two way communication is often very helpful in sending across the message
effectively. Use your skills to frame your communication in open ended questions. Open
ended questions like, how do you think we can help or What is your opinion on this, will
help the listener to open up and involve in the conversation.
Taking feedback is also an important method of part of effective communication. Make sure
that you are open to comments and opinions from your audience. Such a kind of open
communication will ensure that your listener grasps the main crux of your whole
communication.
Express your expectations in the right manner beforehand instead of waiting till the year
end to convey it. Whether you are a team leader or a team member, talk to your team and
your boss on your short term and long term goals and expectations. This will help resolve
disappointments in future.
mood. Thinking clearly about the assignment will also help you formulate an action plan.
Remember that it's another challenge that will prove your ability to deal with pressure.
Being Calm - All the Time
There will always be situation at work that can get anyone in a panic mood. But don't let
pure emotion affect you. Stay focused and calm in order to do the task asked of you.
Panicking will never do you any good as this can only lead to more trouble. You don't want
to be another person that will drag the company further down. Being calm will also help you
establish your leadership skills. You virtually become the "go to guy" when the going gets
tough because you are calm in this situation.
Keeping in Touch with the Right Persons
The trouble with work related stress is that they are often unexpected. Avoid this trouble by
actively looking for work. If you have finished your work before the expected date and time,
ask your boss or other contacts if there's anything else that needs to be done. This is
another feather to your cap when you are able to provide assistance to others who can't
deal with their responsibilities.
Procrastination at work is not just a habit that destroys companies. It's also a habit that can
destroy personal development. By procrastinating, things that can be done with high quality
are ignored. Avoiding to practice high quality output can never help the person improve.
There is also a long term effect for those who opted to procrastinate. Their reputation in
their previous company will never go unnoticed. Through background checking, employees
who practice procrastination will never be able to gain positive reviews from their previous
clients.
If you feel you're constantly procrastinating at work, be warned since there are serious long
term consequences of this behavior. To avoid getting your life ruined with procrastination,
here are some tips:
Write down objectives of the day - one of the many reasons why a person can't do a
single task in a day is because of the avalanche of assignments. Deal with this problem by
writing down the tasks that needs to be done that day.
Take it slow - you don't need to become instantly highly productive at work. Take it slow
so that you'll grow accustomed to the idea of quality which should be constantly practiced.
Reward yourself - every time you complete a task, give yourself a small reward. You
don't have to tell everyone that you've done something productive. A small reward that can
give you the encouragement to do more should be more than enough.
Commitment to small steps - being overwhelmed with a large task can be very
discouraging. Deal with this problem by breaking down the big goal into small and reachable
goals. You should be able to realize the actions needed to reach a small goal that can help
you achieve the bigger objective.
customer lists. E-commerce sites often store users' email addresses and credit card
numbers. Bypassing or evading authentication in order to steal this data is clearly high on a
hacker's priority list, and today's hackers have a large library of authentication evasion
techniques
at
their
disposal.
Session hijacking attacks such as Cross-site Scripting can steal a user's authentication token
and transmit it to a malicious third party, who can then use it to impersonate the legitimate
user. SQL injection attacks can also be very effective at bypassing authentication. By
sending a specially-formatted username and password combination containing SQL code to
the login form, an attacker can often trick the server into granting him unauthorized access.
These types of attacks get a lot of attention since they are creative, elegant, and effective.
However, there is another type of attack that can be just as effective, if not as elegant or
creative. A brute force attack (or dictionary attack) can still be a dangerous threat to your
Web
site
unless
proper
precautions
are
taken.
The brute force attack is about as uncomplicated and low-tech as Web application hacking
gets. The attacker simply guesses username and password combinations until he finds one
that works. It may seem like a brute force or dictionary attack is unlikely to ever succeed.
After all, what are the odds of someone randomly guessing a valid username and password
combination? Surprisingly, the odds for a brute force attack can be quite good if the site is
not properly configured. There are several factors that work to the hacker's advantage, the
most
Don't
important
Be
Lazy
of
-
which
Choose
is
a
human
laziness.
Password
Carefully!
Generally, people do not remember complicated passwords very well. If users are allowed to
create their own passwords, they will often create very simple ones like "password", "1234",
their spouse's name, or their favorite sports team. Passwords like these are easy for the
user to remember, but unfortunately they are also easy for someone else to guess.
Furthermore, any serious hacker who attempts a brute force attack will not be sitting at a
Web browser, guessing at authentication credentials and typing them in. He will be using an
automated tool for the brute force attack that can make thousands of requests per minute
with credentials generated from a large list of possible values. Often this list is an actual
dictionary, hence the term "dictionary attack." If a user chooses a common password, such
as a dictionary word, the automated tool will eventually guess it, and the user's account will
be
compromised.
Sidestepping
Dictionary
Attack
with
Username
Selection
Of course, a password is only half of the required login credential. A username is also
required. While it is less likely that a dictionary word would be used as a username, there
are still some common usernames that hackers are certain to try with a brute force attack.
First among these are "admin" and "administrator". These names are especially dangerous
since they are not only easily guessed, but the accounts they represent are usually highly
privileged administrative accounts. If the hacker's dictionary attack could gain access to an
administrative account, he could probably do much more damage to the system than he
could
if
he
gained
access
to
regular
user's
account.
Administrative accounts are not the only problem: many Web applications and Web
application frameworks create default users during installation. If the site administrator does
not remove these default users or at least change their passwords, these accounts will be
easy targets for a dictionary attack. Finally, when users are allowed to choose their own
usernames, they often choose their email address, since it is easy to remember. Once again,
the user's laziness is a benefit to a hacker using a brute force attack. Armed with a list of
email addresses (perhaps obtained from a spammer) and a dictionary of passwords (easily
obtained anywhere), an attacker has an excellent chance of breaking into at least one user's
account.
Countering
Brute
Force
Attack
with
Strong
Password
Policy
The primary defense against a brute force attack must be enforcement of a strong password
policy. As mentioned earlier, dictionary words make poor passwords. Password size is also
important: the longer the password, the more difficult it will be to force. While there is no
strict definition of a strong password that will be harder to determine via a dictionary attack,
some
good
--Minimum
--Must
guidelines
length
include
--Must
of
both
at
upper
--Must
be:
seven
characters
least
and
include
would
lower
case
numeric
characters
characters
include
punctuation
These guidelines may seem overly strict, but there is little chance that a password created
with these restrictions will be found with a brute force attack. There are almost 70 trillion
combinations of characters that can be seven digits long and can include upper case
characters, lower case characters, numbers, and punctuation. Even a dictionary attack tool
that could make one hundred requests per second would still take over 11,000 years before
it
would
be
statistically
likely
to
guess
the
password.
Obviously, most Web sites will want to block a dictionary attack much sooner than 11,000
years into the attack. Many organizations use an intrusion detection system (IDS) to detect
an abnormally high number of requests coming from a single user. This is a good idea, but it
is not sufficient to prevent the brute force attack. A clever hacker will simply reduce the
bandwidth used by his automated tool until it falls under the alert threshold of the IDS.
Other
Defensive
Strategies
And
Why
They
Don't
Work
attack
could
be
if
it
were
used
against
an
administrative
account.
In the second place, locking out accounts is ineffective against a brute force attack because
this technique assumes that the attacker is keeping the username constant and varying the
password. What if the attacker instead kept the password constant and varied the
username? We already know that a large percentage of users use common passwords like
"password". A hacker using a dictionary attack could try "password" for each of the users in
his username list, which would not only have a high chance of success, but would also
evade the account lockout logic. An attacker could make thousands of login attempts, and
even if every one of them failed, the system will only register one incorrect login per
account.
A
Better
Defense:
Incremental
Delay
A better strategy for blocking any brute force attack is to incrementally delay the page
response after failed login attempts. After the first failed login attempt, for example, the
response would be delayed by one second. After the second failed attempt, the response
would be delayed by two seconds, and so on. A one-, two-, or even six-second delay is
probably not going to bother a human user too seriously. Certainly he will find it less
irritating than having to wait 30 minutes for his account to reactivate because he
accidentally left his caps lock key on. On the other hand, an incrementing delay can
completely defeat an automated tool being used for a brute force attack. Assuming the tool
could normally make ten requests per second, the time it would take to make one thousand
requests would jump from two minutes to five days. This pretty much renders the brute
force attack tool useless. An incrementing delay also solves the problem of the attacker
holding the password constant and varying the username. Since the system tracks failed
login attempts on a user session basis and not an authentication credential basis, the delay
logic
cannot
be
bypassed
this
way.
There is one serious shortcoming to the incrementing delay approach: state must be kept in
order to record the number of failed login attempts by the current user. The dictionary
attack tool can be set up to begin a new session on every request by never sending a
session identification token to the server. In this situation, the server will not be able to
track the number of failed logins, and the delay will not be properly applied. It is possible to
track a user from his IP address instead of his session token, but this technique has
problems as well. Sometimes multiple users share a single IP address, and sometimes a
single user can change IP addresses between requests. While the incrementing delay
technique is not perfect, in many cases it is a better solution to fighting a dictionary attack
than the widely used practice of locking out accounts after failed login attempts.
Carefully
Word
Your
Error
Messages
Conclusion
In conclusion, sometimes old, boring attacks can work just as well as the new, exciting
ones. Low-tech as it might be, a brute force attack can be very effective at compromising
your Web application unless proper defenses are used. The first and foremost method of
defeating a brute force attack is to require all users to choose a strong password. Passwords
should be required to contain at least seven characters, with mixed upper- and lower-case
letters, numbers, and punctuation. Also, consider implementing an incrementing response
delay routine in your application in place of an automatic account lockout. Finally, be sure to
display nondescript, ambiguous login failure messages such as "Invalid username or
password." Messages like this provide no extra information about the system that a hacker
using a dictionary attack can take advantage of to lighten his workload. Following these
guidelines will help you protect your application and your users from the brutes of the world.