Its use from the IT field simply cannot always be in comparison with its use in security vital industries, given that in normality the usage of RCA in IT market just isn't supported by pre-existing fault trees or other design specs. Rather a mixture of debugging, party dependent detection and checking methods (exactly where the solutions are separa