The difference root cause analysis and simply identifying

Assignment Help Computer Network Security
Reference no: EM13777944

Determining Targets Through Root Cause Analysis

It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also to gather an understanding of where you are currently and where you need to be. Correct identification will allow you to make quick improvements, which would not be possible if you only treated the symptoms.

For this Discussion topic, first:

Explain, in your own words, the difference between root cause analysis and simply identifying issues in a process.
Then, research and describe an article or a case study where a company has performed a successful root cause analysis. This means they went deeper than identifying just the symptoms.

Explain what the symptoms were and what root causes they identified as the culprits.
How did this analysis help the company create quantifiable, specific targets/objectives in their improvement efforts?
Make sure to describe how they accomplished this; there are various specific methodologies beyond sitting and talking in a room that can be used for this purpose. For example, root cause analysis is part of Six Sigma, which has specific tools for carrying this out.

If you cannot clearly show the distinction between the root causes and symptoms in the case, then you do not have the right case. You are not looking for cases where someone just identified problems by talking to people - root cause analysis is a very specific term that describes using formal methodologies to go beyond the most obvious issues. Your example should demonstrate this in-depth analysis.

Reference no: EM13777944

Questions Cloud

Images of aging : How to Begin: For this assignment, you will analyze images of aging that surround us in popular culture. This can include images about aging seen in ads, programs, magazines, birthday cards, etc.
Make comparison between united kingdom systems : Make Comparison between United Kingdom systems (In the United Kingdom the common law approach to the admissibility of expert opinion evidence)And American system (In the American the common law approach to the admissibility of expert opinion evide..
Problem releated to mental status plan : Details of your assessment plan: What areas of need your treatment plan should address, specific instruments selected, along with reasons for selecting them.
Sociological perspectives to the individuals : Apply one of the sociological perspectives to the individuals' lives. Why did you choose this particular perspective? How does it explain each person's life and life choices?
The difference root cause analysis and simply identifying : It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also t..
What is ending inventory under a periodic inventory system : What is the present value of a $10,000 bond, 7%, 5-year that pays interest annually? Market interest rate is 10%. What is the ending inventory under a periodic inventory system assuming average cost (rounding unit cost to three decimal places)?
Discussing the case and explaining the courts decision : Write a 1-2 page summary discussing the case, explaining the court's decision, and relating the information to the materials covered in this week's readings
Difference between data and information : Diversification is a means to reduce risk. What are two funds that will provide the investor good diversification at a low cost
Leadership situation and analysis of the factors : Description of the leadership situation and analysis of the factors that influenced the leaders decisions and actions. Discussion on why these factors emerged.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

  What tools chris used to take pictures of kayak prototypes

This project will have you validating forensic images, processing the data forensically by conducting key word searches and locating graphic files, as well as, finding EXIF data in the photos to determine what tools Chris used to take pictures of ..

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  Define physical secuirty and three types of threats

Define Physical secuirty and three types of threats related with physical security. Write down the steps in designing and choosing a secure site in detail.

  Description of des encryption feistel structure algorithm

Prove that y’ = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented). [This is Question 3.3 of the textbook. Hint: this can be proved using the “high-level” description of DES encryption Feistel structure ..

  Describe situations where end-to-end encryption combined

Give some examples where traffic analysis could jeopardize security. Describe situations where end-to-end encryption combined with link encryption would still allow enough traffic analysis to be dangerous. about 150 words with references

  How do you plan to validate the data after acquiring it

What diplomatic strategies should you use with the network administrator and what privacy issues might be a concern with bank records (bank account numbers, customer names, etc.)?

  Determine how rootkits can be used

Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given ..

  Determine with justification the equation of the curve

Determine with justification the equation of the curve and determine with justification all values oft for which there is no point (x, y) on the curve.

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd