The difference root cause analysis and simply identifying

Assignment Help Computer Network Security
Reference no: EM13777944

Determining Targets Through Root Cause Analysis

It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also to gather an understanding of where you are currently and where you need to be. Correct identification will allow you to make quick improvements, which would not be possible if you only treated the symptoms.

For this Discussion topic, first:

Explain, in your own words, the difference between root cause analysis and simply identifying issues in a process.
Then, research and describe an article or a case study where a company has performed a successful root cause analysis. This means they went deeper than identifying just the symptoms.

Explain what the symptoms were and what root causes they identified as the culprits.
How did this analysis help the company create quantifiable, specific targets/objectives in their improvement efforts?
Make sure to describe how they accomplished this; there are various specific methodologies beyond sitting and talking in a room that can be used for this purpose. For example, root cause analysis is part of Six Sigma, which has specific tools for carrying this out.

If you cannot clearly show the distinction between the root causes and symptoms in the case, then you do not have the right case. You are not looking for cases where someone just identified problems by talking to people - root cause analysis is a very specific term that describes using formal methodologies to go beyond the most obvious issues. Your example should demonstrate this in-depth analysis.

Reference no: EM13777944

Questions Cloud

Images of aging : How to Begin: For this assignment, you will analyze images of aging that surround us in popular culture. This can include images about aging seen in ads, programs, magazines, birthday cards, etc.
Make comparison between united kingdom systems : Make Comparison between United Kingdom systems (In the United Kingdom the common law approach to the admissibility of expert opinion evidence)And American system (In the American the common law approach to the admissibility of expert opinion evide..
Problem releated to mental status plan : Details of your assessment plan: What areas of need your treatment plan should address, specific instruments selected, along with reasons for selecting them.
Sociological perspectives to the individuals : Apply one of the sociological perspectives to the individuals' lives. Why did you choose this particular perspective? How does it explain each person's life and life choices?
The difference root cause analysis and simply identifying : It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also t..
What is ending inventory under a periodic inventory system : What is the present value of a $10,000 bond, 7%, 5-year that pays interest annually? Market interest rate is 10%. What is the ending inventory under a periodic inventory system assuming average cost (rounding unit cost to three decimal places)?
Discussing the case and explaining the courts decision : Write a 1-2 page summary discussing the case, explaining the court's decision, and relating the information to the materials covered in this week's readings
Difference between data and information : Diversification is a means to reduce risk. What are two funds that will provide the investor good diversification at a low cost
Leadership situation and analysis of the factors : Description of the leadership situation and analysis of the factors that influenced the leaders decisions and actions. Discussion on why these factors emerged.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difference between a security policy and a security plan

Discuss the difference between a security policy and a security plan

  Will your file system of choice provide security

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

  Provide a list of security activities or controls

List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Difference between a stream cipher and a block cipher

What is your understanding of the difference between a stream cipher and a block cipher?

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security, you have determined that there was no security plan in place and no ..

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Is there a significance to caribbean island of nevis

Does it have the characteristic of being one way or can this number be end result of some other rule if so which rule?

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd