Business Finance
Regis University DCP Midstream Organization Paper

Regis University

Question Description

Can you help me understand this Business question?

In this assignment you will apply systems thinking to analyze one of your chosen organization’s work processes, problems, or initiatives* and make recommendations for improvement. Conduct research on your chosen organization to identify a work process, problem, or initiative. The process, problem, or initiative you choose should be simple, having only five to ten variables, and have definable boundaries which are small in scope. Write a three to four page APA paper analyzing the work process, problem, or initiative using systems thinking to make recommendations for improvement. Using the information provided in the readings and From the Experts, create a Causal Loop Diagram in support of your analysis and submit it with the paper.

* An example of a work process would be making coffee as presented in the whiteboard project video
An example of a problem would be how to reduce stress as presented in the Daniel Kim reading.
An example of an initiative would be the drive to increase membership as presented in the casual loop info above.

APA Style and include 5 credible references

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

1

Running Head: COMPUTER SECURITY

Computer Security
Student Name
University Affiliation
Date

COMPUTER SECURITY

2

Question One
i.

Rivest-Shamir-Adleman (RSA) is an algorithm that is applied in computers to encrypt
and decrypt messages. The algorithm was got its initials after its founders, Ron Rivest,
Adi Shamir, and Leonard Adleman. After being founded as an independent corporation in
1982, the RSA security algorithm was taken by EMC Company in the year 2006.
The algorithm uses two different keys for encryption and decryption. This, therefore,
implies that the RSA algorithm is found in the family of asymmetric cryptography. RSA
uses two different keys: a public and a private key. The public key is known to anyone,
and it the key that is applied when encrypting the message. On the other hand, the private
key is used for decryption, and it's only known to the person the message is intended for.

ii.

In encryption, Caesar cipher is said to be one of the most straightforward encryption
algorithms. It uses substitution where letters in the plain text are substituted by some
number of positions that are fixed down the alphabet. For example, when using a left
shift of 3, the information will look as follows.
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW
Therefore, when one sends the message:
Plain: Yesterday, the lessons were interesting since the lecturer was in a good mood.
Cipher: VBPQBOAXV QEB IBPPKJP TBOB VJQBOBPQVJD PVJZB QEB
IBZQROBO TXP VJ X DKKA IKKA
Therefore, the message that will be sent is:
VBPQBOAXV QEB IBPPKJP TBOB VJQBOBPQVJD PVJZB QEB IBZQROBO TXP
VJ X DKKA IKKA

COMPUTER SECURITY

3

Question Two
A firewall is said to be a security measure that is imposed on a network that monitors the
network traffic that is incoming and outgoing and permits or blocks the data packets basing on
the set of security rules. The primary function of the firewall is to create a block between the
internal network and the external sources so that the malicious traffic like viruses are blocked.
There are different firewall security techniques which include:
i.

Packet filtering firewall

This type of firewall is responsible for filtering and checking incoming data packets and only
allowing data from specific IP addresses and port numbers.
ii.

Circuit level firewall

This is the type of firewall that operates at the session level to monitor the TCP handshakes.
iii.

Stateful inspection firewall

The firewall is used to filter both data packet as well as filtering the sessions. It chec...

RyanTopTutor (23820)
Carnegie Mellon University

Anonymous
The tutor managed to follow the requirements for my assignment and helped me understand the concepts on it.

Anonymous
The tutor was knowledgeable, will be using the service again.

Anonymous
Awesome quality of the tutor. They were helpful and accommodating given my needs.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags