Baccalaureate Generalist – Physical Assessment Reflection
Description: The baccalaureate-graduate nurse reflects upon the learning and growth that occurs
in areas of previous knowledge.
Course Competency: 4) Synthesize assessment findings using the Digital Clinical Experience
(DCE) and in written format using standardized terminology.
QSEN Competencies: 1) Patient-Centered Care 3) Evidenced-Based Practice
BSN Essential IX
Area Gold
Mastery
Silver
Proficient
Bronze
Acceptable
Acceptable
Mastery not
Demonstrated
Reflection The presentation is
clear, focused, and
compelling – holds
the reader’s
attention. Includes
significant,
intriguing details –
the “Aha!”
moments are
supported by
specific examples
from the physical
assessment. When
appropriate, rich
use of figurative
language and
imagery to convey
ideas. Overall,
demonstrates depth
of thought and rich
use of language.
The presentation is
clear and focused
throughout.
Authentic and
convincing based
on experience or
learning from the
physical
assessment
Attempted to use
figurative language
and imagery (when
appropriate) Main
idea expanded,
well supported by
detail and evidence
The presentation is
fuzzy,
undeveloped,
rambling thoughts
outweigh focused
moments from the
physical
assessment. Makes
no attempt to use
figurative
language. Does not
support main ideas
with details and
evidence, brief
discussion.
Does not complete
reflection
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4… 1/5
%64
%6
%2
SafeAssign Originality Report
Summer 2020 - Cryptography (ISOL-535-50)(ISOL-535-51) - COMBINE… • Week5: Individual Project
%72Total Score: High riskBhanu Teja Posani
Submission UUID: 9945a555-5e7c-85c9-8ba3-631361567578
Total Number of Reports
1
Highest Match
72 %
Individual Project PKI.docx
Average Match
72 %
Submitted on
06/06/20
09:01 PM CDT
Average Word Count
794
Highest: Individual Project PKI.docx
%72Attachment 1
Institutional database (3)
Student paper Student paper Student paper
Internet (4)
jihuomm jihuomm wikipedia
bobylive
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 794
Individual Project PKI.docx
2 6 3
5 4 1
7
8
2 Student paper 6 Student paper 5 jihuomm
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4&course_id=_118722_1&download=true&includeDeleted=true&print=true&force=true
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4… 2/5
Source Matches (17)
Running head: PUBLIC KEY INFRASTRUCTURE 1
PUBLIC KEY INFRASTRUCT.
1. Baccalaureate Generalist – Physical Assessment Reflection
Description: The baccalaureate-graduate nurse reflects upon the
learning and growth that occurs
in areas of previous knowledge.
Course Competency: 4) Synthesize assessment findings using
the Digital Clinical Experience
(DCE) and in written format using standardized terminology.
QSEN Competencies: 1) Patient-Centered Care 3) Evidenced-
Based Practice
BSN Essential IX
Area Gold
Mastery
Silver
Proficient
Bronze
Acceptable
Acceptable
Mastery not
2. Demonstrated
Reflection The presentation is
clear, focused, and
compelling – holds
the reader’s
attention. Includes
significant,
intriguing details –
the “Aha!”
moments are
supported by
specific examples
from the physical
assessment. When
appropriate, rich
use of figurative
language and
imagery to convey
3. ideas. Overall,
demonstrates depth
of thought and rich
use of language.
The presentation is
clear and focused
throughout.
Authentic and
convincing based
on experience or
learning from the
physical
assessment
Attempted to use
figurative language
and imagery (when
appropriate) Main
idea expanded,
4. well supported by
detail and evidence
The presentation is
fuzzy,
undeveloped,
rambling thoughts
outweigh focused
moments from the
physical
assessment. Makes
no attempt to use
figurative
language. Does not
support main ideas
with details and
evidence, brief
discussion.
Does not complete
6. 72 %
Submitted on
06/06/20
09:01 PM CDT
Average Word Count
794
Highest: Individual Project PKI.docx
%72Attachment 1
Institutional database (3)
Student paper Student paper Student paper
Internet (4)
jihuomm jihuomm wikipedia
bobylive
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 794
Individual Project PKI.docx
7. 2 6 3
5 4 1
7
8
2 Student paper 6 Student paper 5 jihuomm
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=f7f1093c-c6e3-
4336-9e91-
0a5f0f58bce4&course_id=_118722_1&download=true&include
Deleted=true&print=true&force=true
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 2/5
Source Matches (17)
Running head: PUBLIC KEY INFRASTRUCTURE 1
PUBLIC KEY INFRASTRUCTURE 3
Cryptography
Bhanu Teja Posani University of the Cumberlands
Date:06-06-2020
8. The most significant feature of PKI is that it uses keys to deal
with security services. There is both the public and private
keys, whereby the public key is in an open
field (Alrawais et al. 2018). PKI comprises several components,
such as the digital certificate, which is an ID used a person. A
digital certificate is applied over the
internet by a person of an organization to help in securing
transit data (Alrawais et al. 2018). It’s also known as identify a
certificate or a PK certificate. The second
component is the CA or certifying authority. CA's main purpose
is to issue clients with a certificate and help others in verifying
the certificate. The CA is handy because
it ensures the client asking for a certificate is correctly
identified before the certificate is issued. The third component
is RA or registration authority, which is used in
performing checks that are necessary for a person-organization
that may be asking for the certificate. The inspection helps in
confirming identity. The fourth
component is the CMS, which is subjected to publishing,
renewing, suspending, or revoking certificates (Lozupone,
2018). Certificate management systems may delete
the status of a person or organization due to legal reasons only.
CMS is run by both registration authority and certifying
authority so that responsibilities and liabilities
can be tracked (Alrawais et al. 2018). The last component is the
private key tokens, which help secure digital signatures and
authenticate users. Also, the private key is
used to prove the identity of the user. PKI is one of the trusted
ways of data monitoring within an organization. Instead of an
organization incorporating the use
of passwords to secure data, the network administrator within
that specific company can use public-key infrastructure (Guo et
al. 2016). Through the use of PKI
content monitoring strategy using a communication service
9. provider, there will be useful in monitoring capability supports
that are ongoing continuously and
authorized decisions. The internet is an essential tool at the
Quality Medical Company, which facilitates the flow of data
from one point to another. For these
regulations to be implemented and for the company to conform
to some of its compliance issues, there will need to be set as
well as the development of content
monitoring strategy through the use of Public Key Infrastructure
encryption. To identify multiple data types, PKI uses
certificates (Dang et al. 2016). The
certificates are also used in e-commerce for delivering secure
authentications and data confidentiality. PKI has power and
value that can be easily adapted to encrypt
data at rest through the implementation of PGP protocol. When
a message is in the channel, there are high possibilities of
getting incomprehensible by an intruder,
and this is what PKI avoids (Jiang et al. 2017). PKI, through the
process of cryptography, works through binding the public keys
with individuals of different
identities, and this process to occur requires registration and CA
issue certificates (Jiang et al. 2017). The importance of
encryption and decryption in a company is
manifested in how workers communicate. For example, because
the two sides are communicating, the message sent is encrypted
by the sender, or it is scrambled
before it is sent. There is the process of decryption where the
recipient will decrypt or unscramble the message after a
reception
References
Alrawais, A., Alhothaily, A., Cheng, X., Hu, C., & Yu, J.
(2018). Secureguard: a certificate validation system in public
10. key infrastructure. IEEE Transactions
on Vehicular Technology, 67(6), 5399-5408. Retrieved from
https://ieeexplore.ieee.org/abstract/document/8290970/?
casa_token=WHp7JgxpEpgAAAAA:inPLuSB1JrJuGn5osZeiyVS
uD0YfaW72wVHeRe4zaqTqmXup6Qi3o1-
VfkTGLVqkfjZi638rIA
Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J.
(2016, July). The Research on the Privacy Protection of
Hospital Patient in the Age of Internet Plus. In
2016 2nd International Conference on Humanities and Social
Science Research (ICHSSR 2016). Atlantis Press. Retrieved
from https://www.atlantis-
press.com/proceedings/ichssr-16/25861689
Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. K. R.
(2016). Fine-grained database field search using attribute-based
encryption for e-healthcare clouds.
Journal of medical systems, 40(11), 235. Retrieved from
https://link.springer.com/article/10.1007/s10916-016-0588-0
Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z.
(2018). Encryption Switching Service: Securely Switch Your
Encrypted Data to Another Format. IEEE
Transactions on Services Computing. Retrieved from
https://ieeexplore.ieee.org/abstract/document/8496822/
Lozupone, V. (2018). Analyze encryption and
public key infrastructure (PKI). International Journal of
Information Management, 38(1), 42-44. Retrieved from
13. infrastructure (Guo et al.
Original source
PKI is one of the trusted ways of data
monitoring within an organization
(Zhang, Chen, Meng, & Wu, 2019) Instead
of an organization incorporating the use
of passwords to secure data, the network
administrator within that specific
company can use public-key encryption
2
Student paper
Through the use of PKI content
monitoring strategy using a
communication service provider, there
will be useful in monitoring capability
supports that are ongoing continuously
and authorized decisions. The internet is
an essential tool at the Quality Medical
Company, which facilitates the flow of
data from one point to another. For
these regulations to be implemented and
for the company to conform to some of
its compliance issues, there will need to
be set as well as the development of
content monitoring strategy through the
use of Public Key Infrastructure
encryption. To identify multiple data
types, PKI uses certificates (Dang et al.
Original source
14. Through the use of PKI content
monitoring strategy using a
communication service provider, there
will be useful in monitoring capability
supports that are ongoing continuously
and authorized decisions The internet is
an essential tool at the Quality Medical
Company, which facilitates the flow of
data from one point to another (Zhang,
Chen, Meng, & Wu, 2019) For these
regulations to be implemented and for
the company to conform to some of its
compliance issues, there will need to be
set as well as the development of
content monitoring strategy through the
use of Public Key Infrastructure
encryption To identify multiple data
types, PKI uses certificates
2
Student paper
The certificates are also used in e-
commerce for delivering secure
authentications and data confidentiality.
PKI has power and value that can be
easily adapted to encrypt data at rest
through the implementation of PGP
protocol. When a message is in the
channel, there are high possibilities of
getting incomprehensible by an intruder,
and this is what PKI avoids (Jiang et al.
Original source
15. The certificates are also used in e-
commerce for delivering secure
authentications and data confidentiality
PKI has power and value that can be
easily adapted to encrypt data at rest
through the implementation of PGP
protocol (Jiang et al When the message is
in the channel, there are high
possibilities of it getting
incomprehensible by an intruder, and
this what PKI avoids
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 4/5
Student paper 80%
Student paper 86%
jihuomm 84%
jihuomm 67%
Student paper 72%
Student paper 100%
Student paper 100%
Student paper 100%
16. 2
Student paper
PKI, through the process of
cryptography, works through binding the
public keys with individuals of different
identities, and this process to occur
requires registration and CA issue
certificates (Jiang et al.
Original source
PKI, through the process of
cryptography, works through binding the
public keys with individuals of different
identities, and this process to occur there
has to be a registration process, and
certificates are issued by CA
3
Student paper
Alrawais, A., Alhothaily, A., Cheng, X., Hu,
C., & Yu, J.
Original source
Alrawais, A., Alhothaily, A., Hu, C., &
Cheng, X
4
Student paper
17. a certificate validation system in public
key infrastructure.
Original source
A Certificate Validation System in Public
Key Infrastructure,''
5
Student paper
IEEE Transactions on Vehicular
Technology, 67(6), 5399-5408.
Original source
A Certificate Validation System in Public
Key Infrastructure., IEEE Transactions on
Vehicular Technology, Vol.67, No.6,
2018,pp.5399-5408
6
Student paper
Retrieved from
https://ieeexplore.ieee.org/abstract/docu
ment/8290970/?
casa_token=WHp7JgxpEpgAAAAA:inPLuS
B1JrJuGn5osZeiyVSuD0YfaW72wVHeRe4z
aqTqmXup6Qi3o1-VfkTGLVqkfjZi638rIA
Original source
Retrieved from
18. https://ieeexplore.ieee.org/abstract/docu
ment/990433/
2
Student paper
Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo,
J., & Sun, J.
Original source
Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo,
J., & Sun, J
2
Student paper
The Research on the Privacy Protection
of Hospital Patient in the Age of Internet
Plus. In 2016 2nd International
Conference on Humanities and Social
Science Research (ICHSSR 2016).
Original source
The Research on the Privacy Protection
of Hospital Patient in the Age of Internet
Plus In 2016 2nd International
Conference on Humanities and Social
Science Research (ICHSSR 2016)
2
Student paper
19. Retrieved from https://www.atlantis-
press.com/proceedings/ichssr-
16/25861689 Guo, C., Zhuang, R., Jie, Y.,
Ren, Y., Wu, T., & Choo, K.
Original source
Retrieved from https://www.atlantis-
press.com/proceedings/ichssr-
16/25861689 Guo, C., Zhuang, R., Jie, Y.,
Ren, Y., Wu, T., & Choo, K
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-
c6e3-4336-9e91-0a5f0f58bce4… 5/5
Student paper 100%
Student paper 100%
Student paper 79%
bobylive 68%
Student paper 88%
2
Student paper
Fine-grained database field search using
20. attribute-based encryption for e-
healthcare clouds. Journal of medical
systems, 40(11), 235. Retrieved from
https://link.springer.com/article/10.1007/
s10916-016-0588-0 Jiang, P., Ning, J.,
Liang, K., Dong, C., Chen, J., & Cao, Z.
Original source
Fine-grained database field search using
attribute-based encryption for e-
healthcare clouds Journal of medical
systems, 40(11), 235 Retrieved from
https://link.springer.com/article/10.1007/
s10916-016-0588-0 Jiang, P., Ning, J.,
Liang, K., Dong, C., Chen, J., & Cao, Z
2
Student paper
Encryption Switching Service: Securely
Switch Your Encrypted Data to Another
Format. IEEE Transactions on Services
Computing.
Original source
Encryption Switching Service Securely
Switch Your Encrypted Data to Another
Format IEEE Transactions on Services
Computing
6
Student paper
21. Retrieved from
https://ieeexplore.ieee.org/abstract/docu
ment/8496822/ Lozupone, V.
Original source
Retrieved from
https://ieeexplore.ieee.org/abstract/docu
ment/990433/
7
Student paper
Analyze encryption and public key
infrastructure (PKI).
Original source
Public Key Infrastructure (PKI) Functions
8
Student paper
Retrieved from
https://www.sciencedirect.com/science/a
rticle/pii/S0268401217303195
Original source
Retrieved from
https://www.sciencedirect.com/science/a
rticle/pii/S073658531830830X