The difference root cause analysis and simply identifying

Assignment Help Computer Network Security
Reference no: EM13777944

Determining Targets Through Root Cause Analysis

It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also to gather an understanding of where you are currently and where you need to be. Correct identification will allow you to make quick improvements, which would not be possible if you only treated the symptoms.

For this Discussion topic, first:

Explain, in your own words, the difference between root cause analysis and simply identifying issues in a process.
Then, research and describe an article or a case study where a company has performed a successful root cause analysis. This means they went deeper than identifying just the symptoms.

Explain what the symptoms were and what root causes they identified as the culprits.
How did this analysis help the company create quantifiable, specific targets/objectives in their improvement efforts?
Make sure to describe how they accomplished this; there are various specific methodologies beyond sitting and talking in a room that can be used for this purpose. For example, root cause analysis is part of Six Sigma, which has specific tools for carrying this out.

If you cannot clearly show the distinction between the root causes and symptoms in the case, then you do not have the right case. You are not looking for cases where someone just identified problems by talking to people - root cause analysis is a very specific term that describes using formal methodologies to go beyond the most obvious issues. Your example should demonstrate this in-depth analysis.

Reference no: EM13777944

Questions Cloud

Images of aging : How to Begin: For this assignment, you will analyze images of aging that surround us in popular culture. This can include images about aging seen in ads, programs, magazines, birthday cards, etc.
Make comparison between united kingdom systems : Make Comparison between United Kingdom systems (In the United Kingdom the common law approach to the admissibility of expert opinion evidence)And American system (In the American the common law approach to the admissibility of expert opinion evide..
Problem releated to mental status plan : Details of your assessment plan: What areas of need your treatment plan should address, specific instruments selected, along with reasons for selecting them.
Sociological perspectives to the individuals : Apply one of the sociological perspectives to the individuals' lives. Why did you choose this particular perspective? How does it explain each person's life and life choices?
The difference root cause analysis and simply identifying : It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also t..
What is ending inventory under a periodic inventory system : What is the present value of a $10,000 bond, 7%, 5-year that pays interest annually? Market interest rate is 10%. What is the ending inventory under a periodic inventory system assuming average cost (rounding unit cost to three decimal places)?
Discussing the case and explaining the courts decision : Write a 1-2 page summary discussing the case, explaining the court's decision, and relating the information to the materials covered in this week's readings
Difference between data and information : Diversification is a means to reduce risk. What are two funds that will provide the investor good diversification at a low cost
Leadership situation and analysis of the factors : Description of the leadership situation and analysis of the factors that influenced the leaders decisions and actions. Discussion on why these factors emerged.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  White-hat hackers to breach systems

Go online and search for information about Operation Eligible Receiver. What details can you find? For example, which government systems were infiltrated? How difficult was it for white-hat hackers to breach those systems?

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  The hr department has sensitive information

The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

  Define the cybercrime paper

The papers should be comprised of a INTRODUCTION, REVIEW OF LITERATURE, DISCUSSION, CONCLUSIONS, and REFERENCES.

  Discussion on computer crime

The state crime lab training coordinator is concerned with level of expertise at its Blacksburg, VA location and would like to contract DC Investigative to conduct four training sessions.

  Analyze the impact of security breaches

Each team has to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once a team selects a particular security breach to work on, other teams cannot ..

  The proposed cyber security act

Review the May 2011 Cyber Security Legislative Proposal, the proposed Cyber Security Act of 2012, Executive Order (EO) 13636 Improving Critical Infrastructure Cyber security, and Presidential Policy Directive (PPD) 21 Critical Infrastructure Secur..

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  What would be a successful cybersecurity policy

Write an essay on the topic, "Building and implementing a successful cybersecurity policy". The following questions should be covered in the essay: What would be a successful cybersecurity policy

  Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739.

  The relation between passwords and key size

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password

  Design such a password protocol and evaluate its usability

An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd