The difference root cause analysis and simply identifying

Assignment Help Computer Network Security
Reference no: EM13777944

Determining Targets Through Root Cause Analysis

It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also to gather an understanding of where you are currently and where you need to be. Correct identification will allow you to make quick improvements, which would not be possible if you only treated the symptoms.

For this Discussion topic, first:

Explain, in your own words, the difference between root cause analysis and simply identifying issues in a process.
Then, research and describe an article or a case study where a company has performed a successful root cause analysis. This means they went deeper than identifying just the symptoms.

Explain what the symptoms were and what root causes they identified as the culprits.
How did this analysis help the company create quantifiable, specific targets/objectives in their improvement efforts?
Make sure to describe how they accomplished this; there are various specific methodologies beyond sitting and talking in a room that can be used for this purpose. For example, root cause analysis is part of Six Sigma, which has specific tools for carrying this out.

If you cannot clearly show the distinction between the root causes and symptoms in the case, then you do not have the right case. You are not looking for cases where someone just identified problems by talking to people - root cause analysis is a very specific term that describes using formal methodologies to go beyond the most obvious issues. Your example should demonstrate this in-depth analysis.

Reference no: EM13777944

Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization

Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. Wh

Write a paper about malware that could cripple organization

Write a paper about malware that could cripple your organization. You have been tasked to describe the ways in which different malware function. You also must provide at least

Describe the implementation of secure sockets layer

Describe the implementation of Secure Sockets Layer (SSL) in support of Hypertext Transfer Protocol Secure (HTTPS). Assess how you are assured that your browser is secure. D

Difference between cyber-related crimes and cyber crimes

Summarize the difference between cyber-related crimes and cyber crimes. On cyber crimes, define cyber trespass, cyber vandalism and cyber privacy. On cyber-related crimes de

Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, W

Analyse potential attacks and give a method of prevention

Write a key exchange protocol for A and B to share a symmetric key. Analyse potential attacks and give a method of prevention and write a key exchange protocol for A and B to

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd