SlideShare a Scribd company logo
1 of 22
Baccalaureate Generalist – Physical Assessment Reflection
Description: The baccalaureate-graduate nurse reflects upon the
learning and growth that occurs
in areas of previous knowledge.
Course Competency: 4) Synthesize assessment findings using
the Digital Clinical Experience
(DCE) and in written format using standardized terminology.
QSEN Competencies: 1) Patient-Centered Care 3) Evidenced-
Based Practice
BSN Essential IX
Area Gold
Mastery
Silver
Proficient
Bronze
Acceptable
Acceptable
Mastery not
Demonstrated
Reflection The presentation is
clear, focused, and
compelling – holds
the reader’s
attention. Includes
significant,
intriguing details –
the “Aha!”
moments are
supported by
specific examples
from the physical
assessment. When
appropriate, rich
use of figurative
language and
imagery to convey
ideas. Overall,
demonstrates depth
of thought and rich
use of language.
The presentation is
clear and focused
throughout.
Authentic and
convincing based
on experience or
learning from the
physical
assessment
Attempted to use
figurative language
and imagery (when
appropriate) Main
idea expanded,
well supported by
detail and evidence
The presentation is
fuzzy,
undeveloped,
rambling thoughts
outweigh focused
moments from the
physical
assessment. Makes
no attempt to use
figurative
language. Does not
support main ideas
with details and
evidence, brief
discussion.
Does not complete
reflection
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 1/5
%64
%6
%2
SafeAssign Originality Report
Summer 2020 - Cryptography (ISOL-535-50)(ISOL-535-51) -
COMBINE… • Week5: Individual Project
%72Total Score: High riskBhanu Teja Posani
Submission UUID: 9945a555-5e7c-85c9-8ba3-631361567578
Total Number of Reports
1
Highest Match
72 %
Individual Project PKI.docx
Average Match
72 %
Submitted on
06/06/20
09:01 PM CDT
Average Word Count
794
Highest: Individual Project PKI.docx
%72Attachment 1
Institutional database (3)
Student paper Student paper Student paper
Internet (4)
jihuomm jihuomm wikipedia
bobylive
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 794
Individual Project PKI.docx
2 6 3
5 4 1
7
8
2 Student paper 6 Student paper 5 jihuomm
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=f7f1093c-c6e3-
4336-9e91-
0a5f0f58bce4&course_id=_118722_1&download=true&include
Deleted=true&print=true&force=true
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 2/5
Source Matches (17)
Running head: PUBLIC KEY INFRASTRUCTURE 1
PUBLIC KEY INFRASTRUCTURE 3
Cryptography
Bhanu Teja Posani University of the Cumberlands
Date:06-06-2020
The most significant feature of PKI is that it uses keys to deal
with security services. There is both the public and private
keys, whereby the public key is in an open
field (Alrawais et al. 2018). PKI comprises several components,
such as the digital certificate, which is an ID used a person. A
digital certificate is applied over the
internet by a person of an organization to help in securing
transit data (Alrawais et al. 2018). It’s also known as identify a
certificate or a PK certificate. The second
component is the CA or certifying authority. CA's main purpose
is to issue clients with a certificate and help others in verifying
the certificate. The CA is handy because
it ensures the client asking for a certificate is correctly
identified before the certificate is issued. The third component
is RA or registration authority, which is used in
performing checks that are necessary for a person-organization
that may be asking for the certificate. The inspection helps in
confirming identity. The fourth
component is the CMS, which is subjected to publishing,
renewing, suspending, or revoking certificates (Lozupone,
2018). Certificate management systems may delete
the status of a person or organization due to legal reasons only.
CMS is run by both registration authority and certifying
authority so that responsibilities and liabilities
can be tracked (Alrawais et al. 2018). The last component is the
private key tokens, which help secure digital signatures and
authenticate users. Also, the private key is
used to prove the identity of the user. PKI is one of the trusted
ways of data monitoring within an organization. Instead of an
organization incorporating the use
of passwords to secure data, the network administrator within
that specific company can use public-key infrastructure (Guo et
al. 2016). Through the use of PKI
content monitoring strategy using a communication service
provider, there will be useful in monitoring capability supports
that are ongoing continuously and
authorized decisions. The internet is an essential tool at the
Quality Medical Company, which facilitates the flow of data
from one point to another. For these
regulations to be implemented and for the company to conform
to some of its compliance issues, there will need to be set as
well as the development of content
monitoring strategy through the use of Public Key Infrastructure
encryption. To identify multiple data types, PKI uses
certificates (Dang et al. 2016). The
certificates are also used in e-commerce for delivering secure
authentications and data confidentiality. PKI has power and
value that can be easily adapted to encrypt
data at rest through the implementation of PGP protocol. When
a message is in the channel, there are high possibilities of
getting incomprehensible by an intruder,
and this is what PKI avoids (Jiang et al. 2017). PKI, through the
process of cryptography, works through binding the public keys
with individuals of different
identities, and this process to occur requires registration and CA
issue certificates (Jiang et al. 2017). The importance of
encryption and decryption in a company is
manifested in how workers communicate. For example, because
the two sides are communicating, the message sent is encrypted
by the sender, or it is scrambled
before it is sent. There is the process of decryption where the
recipient will decrypt or unscramble the message after a
reception
References
Alrawais, A., Alhothaily, A., Cheng, X., Hu, C., & Yu, J.
(2018). Secureguard: a certificate validation system in public
key infrastructure. IEEE Transactions
on Vehicular Technology, 67(6), 5399-5408. Retrieved from
https://ieeexplore.ieee.org/abstract/document/8290970/?
casa_token=WHp7JgxpEpgAAAAA:inPLuSB1JrJuGn5osZeiyVS
uD0YfaW72wVHeRe4zaqTqmXup6Qi3o1-
VfkTGLVqkfjZi638rIA
Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J.
(2016, July). The Research on the Privacy Protection of
Hospital Patient in the Age of Internet Plus. In
2016 2nd International Conference on Humanities and Social
Science Research (ICHSSR 2016). Atlantis Press. Retrieved
from https://www.atlantis-
press.com/proceedings/ichssr-16/25861689
Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. K. R.
(2016). Fine-grained database field search using attribute-based
encryption for e-healthcare clouds.
Journal of medical systems, 40(11), 235. Retrieved from
https://link.springer.com/article/10.1007/s10916-016-0588-0
Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z.
(2018). Encryption Switching Service: Securely Switch Your
Encrypted Data to Another Format. IEEE
Transactions on Services Computing. Retrieved from
https://ieeexplore.ieee.org/abstract/document/8496822/
Lozupone, V. (2018). Analyze encryption and
public key infrastructure (PKI). International Journal of
Information Management, 38(1), 42-44. Retrieved from
https://www.sciencedirect.com/science/article/pii/S0268401217
303195
1
2
2
2
2
3 4 5
6
2 2
2
2
2
6 7
8
Sensitivity: Internal & Restricted
Sensitivity: Internal & Restricted
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 3/5
wikipedia 81%
Student paper 81%
Student paper 91%
Student paper 93%
1
Student paper
PUBLIC KEY INFRASTRUCTURE 1 PUBLIC
KEY INFRASTRUCTURE 3
Original source
Public key infrastructure Public key
infrastructure
2
Student paper
PKI is one of the trusted ways of data
monitoring within an organization.
Instead of an organization incorporating
the use of passwords to secure data, the
network administrator within that
specific company can use public-key
infrastructure (Guo et al.
Original source
PKI is one of the trusted ways of data
monitoring within an organization
(Zhang, Chen, Meng, & Wu, 2019) Instead
of an organization incorporating the use
of passwords to secure data, the network
administrator within that specific
company can use public-key encryption
2
Student paper
Through the use of PKI content
monitoring strategy using a
communication service provider, there
will be useful in monitoring capability
supports that are ongoing continuously
and authorized decisions. The internet is
an essential tool at the Quality Medical
Company, which facilitates the flow of
data from one point to another. For
these regulations to be implemented and
for the company to conform to some of
its compliance issues, there will need to
be set as well as the development of
content monitoring strategy through the
use of Public Key Infrastructure
encryption. To identify multiple data
types, PKI uses certificates (Dang et al.
Original source
Through the use of PKI content
monitoring strategy using a
communication service provider, there
will be useful in monitoring capability
supports that are ongoing continuously
and authorized decisions The internet is
an essential tool at the Quality Medical
Company, which facilitates the flow of
data from one point to another (Zhang,
Chen, Meng, & Wu, 2019) For these
regulations to be implemented and for
the company to conform to some of its
compliance issues, there will need to be
set as well as the development of
content monitoring strategy through the
use of Public Key Infrastructure
encryption To identify multiple data
types, PKI uses certificates
2
Student paper
The certificates are also used in e-
commerce for delivering secure
authentications and data confidentiality.
PKI has power and value that can be
easily adapted to encrypt data at rest
through the implementation of PGP
protocol. When a message is in the
channel, there are high possibilities of
getting incomprehensible by an intruder,
and this is what PKI avoids (Jiang et al.
Original source
The certificates are also used in e-
commerce for delivering secure
authentications and data confidentiality
PKI has power and value that can be
easily adapted to encrypt data at rest
through the implementation of PGP
protocol (Jiang et al When the message is
in the channel, there are high
possibilities of it getting
incomprehensible by an intruder, and
this what PKI avoids
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 4/5
Student paper 80%
Student paper 86%
jihuomm 84%
jihuomm 67%
Student paper 72%
Student paper 100%
Student paper 100%
Student paper 100%
2
Student paper
PKI, through the process of
cryptography, works through binding the
public keys with individuals of different
identities, and this process to occur
requires registration and CA issue
certificates (Jiang et al.
Original source
PKI, through the process of
cryptography, works through binding the
public keys with individuals of different
identities, and this process to occur there
has to be a registration process, and
certificates are issued by CA
3
Student paper
Alrawais, A., Alhothaily, A., Cheng, X., Hu,
C., & Yu, J.
Original source
Alrawais, A., Alhothaily, A., Hu, C., &
Cheng, X
4
Student paper
a certificate validation system in public
key infrastructure.
Original source
A Certificate Validation System in Public
Key Infrastructure,''
5
Student paper
IEEE Transactions on Vehicular
Technology, 67(6), 5399-5408.
Original source
A Certificate Validation System in Public
Key Infrastructure., IEEE Transactions on
Vehicular Technology, Vol.67, No.6,
2018,pp.5399-5408
6
Student paper
Retrieved from
https://ieeexplore.ieee.org/abstract/docu
ment/8290970/?
casa_token=WHp7JgxpEpgAAAAA:inPLuS
B1JrJuGn5osZeiyVSuD0YfaW72wVHeRe4z
aqTqmXup6Qi3o1-VfkTGLVqkfjZi638rIA
Original source
Retrieved from
https://ieeexplore.ieee.org/abstract/docu
ment/990433/
2
Student paper
Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo,
J., & Sun, J.
Original source
Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo,
J., & Sun, J
2
Student paper
The Research on the Privacy Protection
of Hospital Patient in the Age of Internet
Plus. In 2016 2nd International
Conference on Humanities and Social
Science Research (ICHSSR 2016).
Original source
The Research on the Privacy Protection
of Hospital Patient in the Age of Internet
Plus In 2016 2nd International
Conference on Humanities and Social
Science Research (ICHSSR 2016)
2
Student paper
Retrieved from https://www.atlantis-
press.com/proceedings/ichssr-
16/25861689 Guo, C., Zhuang, R., Jie, Y.,
Ren, Y., Wu, T., & Choo, K.
Original source
Retrieved from https://www.atlantis-
press.com/proceedings/ichssr-
16/25861689 Guo, C., Zhuang, R., Jie, Y.,
Ren, Y., Wu, T., & Choo, K
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 5/5
Student paper 100%
Student paper 100%
Student paper 79%
bobylive 68%
Student paper 88%
2
Student paper
Fine-grained database field search using
attribute-based encryption for e-
healthcare clouds. Journal of medical
systems, 40(11), 235. Retrieved from
https://link.springer.com/article/10.1007/
s10916-016-0588-0 Jiang, P., Ning, J.,
Liang, K., Dong, C., Chen, J., & Cao, Z.
Original source
Fine-grained database field search using
attribute-based encryption for e-
healthcare clouds Journal of medical
systems, 40(11), 235 Retrieved from
https://link.springer.com/article/10.1007/
s10916-016-0588-0 Jiang, P., Ning, J.,
Liang, K., Dong, C., Chen, J., & Cao, Z
2
Student paper
Encryption Switching Service: Securely
Switch Your Encrypted Data to Another
Format. IEEE Transactions on Services
Computing.
Original source
Encryption Switching Service Securely
Switch Your Encrypted Data to Another
Format IEEE Transactions on Services
Computing
6
Student paper
Retrieved from
https://ieeexplore.ieee.org/abstract/docu
ment/8496822/ Lozupone, V.
Original source
Retrieved from
https://ieeexplore.ieee.org/abstract/docu
ment/990433/
7
Student paper
Analyze encryption and public key
infrastructure (PKI).
Original source
Public Key Infrastructure (PKI) Functions
8
Student paper
Retrieved from
https://www.sciencedirect.com/science/a
rticle/pii/S0268401217303195
Original source
Retrieved from
https://www.sciencedirect.com/science/a
rticle/pii/S073658531830830X
Baccalaureate Generalist – Physical Assessment Reflection     .docx

More Related Content

Similar to Baccalaureate Generalist – Physical Assessment Reflection .docx

The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)JISC.AM
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
Blockchain for Education: Lifelong Learning Passport. Wolfgang Gräther & others
Blockchain for Education: Lifelong Learning Passport.  Wolfgang Gräther & othersBlockchain for Education: Lifelong Learning Passport.  Wolfgang Gräther & others
Blockchain for Education: Lifelong Learning Passport. Wolfgang Gräther & otherseraser Juan José Calderón
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)Gord Reynolds
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management SystemsAbbie Barbir
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...Tutors India
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
DocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate VerificationDocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate VerificationIRJET Journal
 
Personality Prediction with CV Analysis
Personality Prediction with CV AnalysisPersonality Prediction with CV Analysis
Personality Prediction with CV AnalysisIRJET Journal
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsIRJET Journal
 
222020 Originality Reporthttpsucumberlands.blackboard.docx
222020 Originality Reporthttpsucumberlands.blackboard.docx222020 Originality Reporthttpsucumberlands.blackboard.docx
222020 Originality Reporthttpsucumberlands.blackboard.docxlorainedeserre
 
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...IJNSA Journal
 
76 s201923
76 s20192376 s201923
76 s201923IJRAT
 
Pots pan workpackage 3
Pots pan workpackage 3Pots pan workpackage 3
Pots pan workpackage 3Tony Toole
 

Similar to Baccalaureate Generalist – Physical Assessment Reflection .docx (20)

The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
Blockchain for Education: Lifelong Learning Passport. Wolfgang Gräther & others
Blockchain for Education: Lifelong Learning Passport.  Wolfgang Gräther & othersBlockchain for Education: Lifelong Learning Passport.  Wolfgang Gräther & others
Blockchain for Education: Lifelong Learning Passport. Wolfgang Gräther & others
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management Systems
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
DocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate VerificationDocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
 
Personality Prediction with CV Analysis
Personality Prediction with CV AnalysisPersonality Prediction with CV Analysis
Personality Prediction with CV Analysis
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
 
222020 Originality Reporthttpsucumberlands.blackboard.docx
222020 Originality Reporthttpsucumberlands.blackboard.docx222020 Originality Reporthttpsucumberlands.blackboard.docx
222020 Originality Reporthttpsucumberlands.blackboard.docx
 
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
 
76 s201923
76 s20192376 s201923
76 s201923
 
Pots pan workpackage 3
Pots pan workpackage 3Pots pan workpackage 3
Pots pan workpackage 3
 

More from wilcockiris

Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxBarbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxwilcockiris
 
BARGAIN CITY Your career is moving along faster than you e.docx
BARGAIN CITY Your career is moving along faster than you e.docxBARGAIN CITY Your career is moving along faster than you e.docx
BARGAIN CITY Your career is moving along faster than you e.docxwilcockiris
 
Barbara schedules a meeting with a core group of clinic  managers. T.docx
Barbara schedules a meeting with a core group of clinic  managers. T.docxBarbara schedules a meeting with a core group of clinic  managers. T.docx
Barbara schedules a meeting with a core group of clinic  managers. T.docxwilcockiris
 
Barbara schedules a meeting with a core group of clinic managers.docx
Barbara schedules a meeting with a core group of clinic managers.docxBarbara schedules a meeting with a core group of clinic managers.docx
Barbara schedules a meeting with a core group of clinic managers.docxwilcockiris
 
Barbara schedules a meeting with a core group of clinic managers. Th.docx
Barbara schedules a meeting with a core group of clinic managers. Th.docxBarbara schedules a meeting with a core group of clinic managers. Th.docx
Barbara schedules a meeting with a core group of clinic managers. Th.docxwilcockiris
 
Barbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docx
Barbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docxBarbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docx
Barbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docxwilcockiris
 
BARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docx
BARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docxBARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docx
BARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docxwilcockiris
 
Banks 5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docx
Banks    5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docxBanks    5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docx
Banks 5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docxwilcockiris
 
Banking industry•Databases that storeocorporate sensiti.docx
Banking industry•Databases that storeocorporate sensiti.docxBanking industry•Databases that storeocorporate sensiti.docx
Banking industry•Databases that storeocorporate sensiti.docxwilcockiris
 
BAOL 531 Managerial AccountingWeek Three Article Research Pape.docx
BAOL 531 Managerial AccountingWeek Three Article Research Pape.docxBAOL 531 Managerial AccountingWeek Three Article Research Pape.docx
BAOL 531 Managerial AccountingWeek Three Article Research Pape.docxwilcockiris
 
bankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docx
bankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docxbankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docx
bankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docxwilcockiris
 
Barbara and Judi entered into a contract with Linda, which provi.docx
Barbara and Judi entered into a contract with Linda, which provi.docxBarbara and Judi entered into a contract with Linda, which provi.docx
Barbara and Judi entered into a contract with Linda, which provi.docxwilcockiris
 
bappsum.indd 614 182014 30258 PMHuman Reso.docx
bappsum.indd   614 182014   30258 PMHuman Reso.docxbappsum.indd   614 182014   30258 PMHuman Reso.docx
bappsum.indd 614 182014 30258 PMHuman Reso.docxwilcockiris
 
Bank ReservesSuppose that the reserve ratio is .25, and that a b.docx
Bank ReservesSuppose that the reserve ratio is .25, and that a b.docxBank ReservesSuppose that the reserve ratio is .25, and that a b.docx
Bank ReservesSuppose that the reserve ratio is .25, and that a b.docxwilcockiris
 
Bank Services, Grading GuideFIN366 Version 21Individual.docx
Bank Services, Grading GuideFIN366 Version 21Individual.docxBank Services, Grading GuideFIN366 Version 21Individual.docx
Bank Services, Grading GuideFIN366 Version 21Individual.docxwilcockiris
 
Baldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docx
Baldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docxBaldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docx
Baldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docxwilcockiris
 
Bank confirmations are critical to the cash audit. What information .docx
Bank confirmations are critical to the cash audit. What information .docxBank confirmations are critical to the cash audit. What information .docx
Bank confirmations are critical to the cash audit. What information .docxwilcockiris
 
BalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docx
BalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docxBalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docx
BalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docxwilcockiris
 
BAM 515 - Organizational Behavior(Enter your answers on th.docx
BAM 515 - Organizational Behavior(Enter your answers on th.docxBAM 515 - Organizational Behavior(Enter your answers on th.docx
BAM 515 - Organizational Behavior(Enter your answers on th.docxwilcockiris
 
BalanchineGeorge Balanchine is an important figure in the histor.docx
BalanchineGeorge Balanchine is an important figure in the histor.docxBalanchineGeorge Balanchine is an important figure in the histor.docx
BalanchineGeorge Balanchine is an important figure in the histor.docxwilcockiris
 

More from wilcockiris (20)

Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docxBarbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
 
BARGAIN CITY Your career is moving along faster than you e.docx
BARGAIN CITY Your career is moving along faster than you e.docxBARGAIN CITY Your career is moving along faster than you e.docx
BARGAIN CITY Your career is moving along faster than you e.docx
 
Barbara schedules a meeting with a core group of clinic  managers. T.docx
Barbara schedules a meeting with a core group of clinic  managers. T.docxBarbara schedules a meeting with a core group of clinic  managers. T.docx
Barbara schedules a meeting with a core group of clinic  managers. T.docx
 
Barbara schedules a meeting with a core group of clinic managers.docx
Barbara schedules a meeting with a core group of clinic managers.docxBarbara schedules a meeting with a core group of clinic managers.docx
Barbara schedules a meeting with a core group of clinic managers.docx
 
Barbara schedules a meeting with a core group of clinic managers. Th.docx
Barbara schedules a meeting with a core group of clinic managers. Th.docxBarbara schedules a meeting with a core group of clinic managers. Th.docx
Barbara schedules a meeting with a core group of clinic managers. Th.docx
 
Barbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docx
Barbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docxBarbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docx
Barbara Rosenwein, A Short History of the Middle Ages 4th edition (U.docx
 
BARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docx
BARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docxBARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docx
BARBARA NGAM, MPAShoreline, WA 98155 ▪ 801.317.5999 ▪ [email pro.docx
 
Banks 5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docx
Banks    5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docxBanks    5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docx
Banks 5Maya BanksProfessor Debra MartinEN106DLGU1A2018.docx
 
Banking industry•Databases that storeocorporate sensiti.docx
Banking industry•Databases that storeocorporate sensiti.docxBanking industry•Databases that storeocorporate sensiti.docx
Banking industry•Databases that storeocorporate sensiti.docx
 
BAOL 531 Managerial AccountingWeek Three Article Research Pape.docx
BAOL 531 Managerial AccountingWeek Three Article Research Pape.docxBAOL 531 Managerial AccountingWeek Three Article Research Pape.docx
BAOL 531 Managerial AccountingWeek Three Article Research Pape.docx
 
bankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docx
bankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docxbankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docx
bankCustomer1223333SmithJamesbbbbbb12345 Abrams Rd Dallas TX 75043.docx
 
Barbara and Judi entered into a contract with Linda, which provi.docx
Barbara and Judi entered into a contract with Linda, which provi.docxBarbara and Judi entered into a contract with Linda, which provi.docx
Barbara and Judi entered into a contract with Linda, which provi.docx
 
bappsum.indd 614 182014 30258 PMHuman Reso.docx
bappsum.indd   614 182014   30258 PMHuman Reso.docxbappsum.indd   614 182014   30258 PMHuman Reso.docx
bappsum.indd 614 182014 30258 PMHuman Reso.docx
 
Bank ReservesSuppose that the reserve ratio is .25, and that a b.docx
Bank ReservesSuppose that the reserve ratio is .25, and that a b.docxBank ReservesSuppose that the reserve ratio is .25, and that a b.docx
Bank ReservesSuppose that the reserve ratio is .25, and that a b.docx
 
Bank Services, Grading GuideFIN366 Version 21Individual.docx
Bank Services, Grading GuideFIN366 Version 21Individual.docxBank Services, Grading GuideFIN366 Version 21Individual.docx
Bank Services, Grading GuideFIN366 Version 21Individual.docx
 
Baldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docx
Baldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docxBaldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docx
Baldwins Kentucky Revised Statutes AnnotatedTitle XXXV. Domesti.docx
 
Bank confirmations are critical to the cash audit. What information .docx
Bank confirmations are critical to the cash audit. What information .docxBank confirmations are critical to the cash audit. What information .docx
Bank confirmations are critical to the cash audit. What information .docx
 
BalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docx
BalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docxBalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docx
BalShtBalance SheetBalance SheetBalance SheetBalance SheetThe Fran.docx
 
BAM 515 - Organizational Behavior(Enter your answers on th.docx
BAM 515 - Organizational Behavior(Enter your answers on th.docxBAM 515 - Organizational Behavior(Enter your answers on th.docx
BAM 515 - Organizational Behavior(Enter your answers on th.docx
 
BalanchineGeorge Balanchine is an important figure in the histor.docx
BalanchineGeorge Balanchine is an important figure in the histor.docxBalanchineGeorge Balanchine is an important figure in the histor.docx
BalanchineGeorge Balanchine is an important figure in the histor.docx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Baccalaureate Generalist – Physical Assessment Reflection .docx

  • 1. Baccalaureate Generalist – Physical Assessment Reflection Description: The baccalaureate-graduate nurse reflects upon the learning and growth that occurs in areas of previous knowledge. Course Competency: 4) Synthesize assessment findings using the Digital Clinical Experience (DCE) and in written format using standardized terminology. QSEN Competencies: 1) Patient-Centered Care 3) Evidenced- Based Practice BSN Essential IX Area Gold Mastery Silver Proficient Bronze Acceptable Acceptable Mastery not
  • 2. Demonstrated Reflection The presentation is clear, focused, and compelling – holds the reader’s attention. Includes significant, intriguing details – the “Aha!” moments are supported by specific examples from the physical assessment. When appropriate, rich use of figurative language and imagery to convey
  • 3. ideas. Overall, demonstrates depth of thought and rich use of language. The presentation is clear and focused throughout. Authentic and convincing based on experience or learning from the physical assessment Attempted to use figurative language and imagery (when appropriate) Main idea expanded,
  • 4. well supported by detail and evidence The presentation is fuzzy, undeveloped, rambling thoughts outweigh focused moments from the physical assessment. Makes no attempt to use figurative language. Does not support main ideas with details and evidence, brief discussion. Does not complete
  • 5. reflection 6/9/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c- c6e3-4336-9e91-0a5f0f58bce4… 1/5 %64 %6 %2 SafeAssign Originality Report Summer 2020 - Cryptography (ISOL-535-50)(ISOL-535-51) - COMBINE… • Week5: Individual Project %72Total Score: High riskBhanu Teja Posani Submission UUID: 9945a555-5e7c-85c9-8ba3-631361567578 Total Number of Reports 1 Highest Match 72 % Individual Project PKI.docx Average Match
  • 6. 72 % Submitted on 06/06/20 09:01 PM CDT Average Word Count 794 Highest: Individual Project PKI.docx %72Attachment 1 Institutional database (3) Student paper Student paper Student paper Internet (4) jihuomm jihuomm wikipedia bobylive Global database (1) Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 794 Individual Project PKI.docx
  • 7. 2 6 3 5 4 1 7 8 2 Student paper 6 Student paper 5 jihuomm https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport?attemptId=f7f1093c-c6e3- 4336-9e91- 0a5f0f58bce4&course_id=_118722_1&download=true&include Deleted=true&print=true&force=true 6/9/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c- c6e3-4336-9e91-0a5f0f58bce4… 2/5 Source Matches (17) Running head: PUBLIC KEY INFRASTRUCTURE 1 PUBLIC KEY INFRASTRUCTURE 3 Cryptography Bhanu Teja Posani University of the Cumberlands Date:06-06-2020
  • 8. The most significant feature of PKI is that it uses keys to deal with security services. There is both the public and private keys, whereby the public key is in an open field (Alrawais et al. 2018). PKI comprises several components, such as the digital certificate, which is an ID used a person. A digital certificate is applied over the internet by a person of an organization to help in securing transit data (Alrawais et al. 2018). It’s also known as identify a certificate or a PK certificate. The second component is the CA or certifying authority. CA's main purpose is to issue clients with a certificate and help others in verifying the certificate. The CA is handy because it ensures the client asking for a certificate is correctly identified before the certificate is issued. The third component is RA or registration authority, which is used in performing checks that are necessary for a person-organization that may be asking for the certificate. The inspection helps in confirming identity. The fourth component is the CMS, which is subjected to publishing, renewing, suspending, or revoking certificates (Lozupone, 2018). Certificate management systems may delete the status of a person or organization due to legal reasons only. CMS is run by both registration authority and certifying authority so that responsibilities and liabilities can be tracked (Alrawais et al. 2018). The last component is the private key tokens, which help secure digital signatures and authenticate users. Also, the private key is used to prove the identity of the user. PKI is one of the trusted ways of data monitoring within an organization. Instead of an organization incorporating the use of passwords to secure data, the network administrator within that specific company can use public-key infrastructure (Guo et al. 2016). Through the use of PKI content monitoring strategy using a communication service
  • 9. provider, there will be useful in monitoring capability supports that are ongoing continuously and authorized decisions. The internet is an essential tool at the Quality Medical Company, which facilitates the flow of data from one point to another. For these regulations to be implemented and for the company to conform to some of its compliance issues, there will need to be set as well as the development of content monitoring strategy through the use of Public Key Infrastructure encryption. To identify multiple data types, PKI uses certificates (Dang et al. 2016). The certificates are also used in e-commerce for delivering secure authentications and data confidentiality. PKI has power and value that can be easily adapted to encrypt data at rest through the implementation of PGP protocol. When a message is in the channel, there are high possibilities of getting incomprehensible by an intruder, and this is what PKI avoids (Jiang et al. 2017). PKI, through the process of cryptography, works through binding the public keys with individuals of different identities, and this process to occur requires registration and CA issue certificates (Jiang et al. 2017). The importance of encryption and decryption in a company is manifested in how workers communicate. For example, because the two sides are communicating, the message sent is encrypted by the sender, or it is scrambled before it is sent. There is the process of decryption where the recipient will decrypt or unscramble the message after a reception References Alrawais, A., Alhothaily, A., Cheng, X., Hu, C., & Yu, J. (2018). Secureguard: a certificate validation system in public
  • 10. key infrastructure. IEEE Transactions on Vehicular Technology, 67(6), 5399-5408. Retrieved from https://ieeexplore.ieee.org/abstract/document/8290970/? casa_token=WHp7JgxpEpgAAAAA:inPLuSB1JrJuGn5osZeiyVS uD0YfaW72wVHeRe4zaqTqmXup6Qi3o1- VfkTGLVqkfjZi638rIA Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J. (2016, July). The Research on the Privacy Protection of Hospital Patient in the Age of Internet Plus. In 2016 2nd International Conference on Humanities and Social Science Research (ICHSSR 2016). Atlantis Press. Retrieved from https://www.atlantis- press.com/proceedings/ichssr-16/25861689 Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. K. R. (2016). Fine-grained database field search using attribute-based encryption for e-healthcare clouds. Journal of medical systems, 40(11), 235. Retrieved from https://link.springer.com/article/10.1007/s10916-016-0588-0 Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z. (2018). Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Transactions on Services Computing. Retrieved from https://ieeexplore.ieee.org/abstract/document/8496822/ Lozupone, V. (2018). Analyze encryption and public key infrastructure (PKI). International Journal of Information Management, 38(1), 42-44. Retrieved from
  • 11. https://www.sciencedirect.com/science/article/pii/S0268401217 303195 1 2 2 2 2 3 4 5 6 2 2 2 2 2 6 7 8 Sensitivity: Internal & Restricted Sensitivity: Internal & Restricted
  • 12. 6/9/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c- c6e3-4336-9e91-0a5f0f58bce4… 3/5 wikipedia 81% Student paper 81% Student paper 91% Student paper 93% 1 Student paper PUBLIC KEY INFRASTRUCTURE 1 PUBLIC KEY INFRASTRUCTURE 3 Original source Public key infrastructure Public key infrastructure 2 Student paper PKI is one of the trusted ways of data monitoring within an organization. Instead of an organization incorporating the use of passwords to secure data, the network administrator within that specific company can use public-key
  • 13. infrastructure (Guo et al. Original source PKI is one of the trusted ways of data monitoring within an organization (Zhang, Chen, Meng, & Wu, 2019) Instead of an organization incorporating the use of passwords to secure data, the network administrator within that specific company can use public-key encryption 2 Student paper Through the use of PKI content monitoring strategy using a communication service provider, there will be useful in monitoring capability supports that are ongoing continuously and authorized decisions. The internet is an essential tool at the Quality Medical Company, which facilitates the flow of data from one point to another. For these regulations to be implemented and for the company to conform to some of its compliance issues, there will need to be set as well as the development of content monitoring strategy through the use of Public Key Infrastructure encryption. To identify multiple data types, PKI uses certificates (Dang et al. Original source
  • 14. Through the use of PKI content monitoring strategy using a communication service provider, there will be useful in monitoring capability supports that are ongoing continuously and authorized decisions The internet is an essential tool at the Quality Medical Company, which facilitates the flow of data from one point to another (Zhang, Chen, Meng, & Wu, 2019) For these regulations to be implemented and for the company to conform to some of its compliance issues, there will need to be set as well as the development of content monitoring strategy through the use of Public Key Infrastructure encryption To identify multiple data types, PKI uses certificates 2 Student paper The certificates are also used in e- commerce for delivering secure authentications and data confidentiality. PKI has power and value that can be easily adapted to encrypt data at rest through the implementation of PGP protocol. When a message is in the channel, there are high possibilities of getting incomprehensible by an intruder, and this is what PKI avoids (Jiang et al. Original source
  • 15. The certificates are also used in e- commerce for delivering secure authentications and data confidentiality PKI has power and value that can be easily adapted to encrypt data at rest through the implementation of PGP protocol (Jiang et al When the message is in the channel, there are high possibilities of it getting incomprehensible by an intruder, and this what PKI avoids 6/9/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c- c6e3-4336-9e91-0a5f0f58bce4… 4/5 Student paper 80% Student paper 86% jihuomm 84% jihuomm 67% Student paper 72% Student paper 100% Student paper 100% Student paper 100%
  • 16. 2 Student paper PKI, through the process of cryptography, works through binding the public keys with individuals of different identities, and this process to occur requires registration and CA issue certificates (Jiang et al. Original source PKI, through the process of cryptography, works through binding the public keys with individuals of different identities, and this process to occur there has to be a registration process, and certificates are issued by CA 3 Student paper Alrawais, A., Alhothaily, A., Cheng, X., Hu, C., & Yu, J. Original source Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X 4 Student paper
  • 17. a certificate validation system in public key infrastructure. Original source A Certificate Validation System in Public Key Infrastructure,'' 5 Student paper IEEE Transactions on Vehicular Technology, 67(6), 5399-5408. Original source A Certificate Validation System in Public Key Infrastructure., IEEE Transactions on Vehicular Technology, Vol.67, No.6, 2018,pp.5399-5408 6 Student paper Retrieved from https://ieeexplore.ieee.org/abstract/docu ment/8290970/? casa_token=WHp7JgxpEpgAAAAA:inPLuS B1JrJuGn5osZeiyVSuD0YfaW72wVHeRe4z aqTqmXup6Qi3o1-VfkTGLVqkfjZi638rIA Original source Retrieved from
  • 18. https://ieeexplore.ieee.org/abstract/docu ment/990433/ 2 Student paper Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J. Original source Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J 2 Student paper The Research on the Privacy Protection of Hospital Patient in the Age of Internet Plus. In 2016 2nd International Conference on Humanities and Social Science Research (ICHSSR 2016). Original source The Research on the Privacy Protection of Hospital Patient in the Age of Internet Plus In 2016 2nd International Conference on Humanities and Social Science Research (ICHSSR 2016) 2 Student paper
  • 19. Retrieved from https://www.atlantis- press.com/proceedings/ichssr- 16/25861689 Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. Original source Retrieved from https://www.atlantis- press.com/proceedings/ichssr- 16/25861689 Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K 6/9/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c- c6e3-4336-9e91-0a5f0f58bce4… 5/5 Student paper 100% Student paper 100% Student paper 79% bobylive 68% Student paper 88% 2 Student paper Fine-grained database field search using
  • 20. attribute-based encryption for e- healthcare clouds. Journal of medical systems, 40(11), 235. Retrieved from https://link.springer.com/article/10.1007/ s10916-016-0588-0 Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z. Original source Fine-grained database field search using attribute-based encryption for e- healthcare clouds Journal of medical systems, 40(11), 235 Retrieved from https://link.springer.com/article/10.1007/ s10916-016-0588-0 Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z 2 Student paper Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Transactions on Services Computing. Original source Encryption Switching Service Securely Switch Your Encrypted Data to Another Format IEEE Transactions on Services Computing 6 Student paper
  • 21. Retrieved from https://ieeexplore.ieee.org/abstract/docu ment/8496822/ Lozupone, V. Original source Retrieved from https://ieeexplore.ieee.org/abstract/docu ment/990433/ 7 Student paper Analyze encryption and public key infrastructure (PKI). Original source Public Key Infrastructure (PKI) Functions 8 Student paper Retrieved from https://www.sciencedirect.com/science/a rticle/pii/S0268401217303195 Original source Retrieved from https://www.sciencedirect.com/science/a rticle/pii/S073658531830830X