-
Created On: 04/07/2021
in Risks Bow-Tie Diagrams
Overview The Bowtie method is a risk evaluation method that can be used to analyze and demonstrate causal relationships in risk scenarios. The method takes its name from the shape of the diagram that you create, which looks like a men’s bowtie. ...
-
Created On: 04/08/2021
in Risks Bow-Tie Diagrams
Overview This page displays the Bow-tie diagram To specific Objectives. The bow-time diagram of the Event " Failed Integration with Failure Monitoring System Network " to the objective " Public Relations " is displayed below. The selecte...
-
Created On: 04/08/2021
in Risks Bow-Tie Diagrams
Overview This page displays the Bow-tie diagram from specific Threats. In Riskion, we refer to threats , causes , hazards , and sources interchangeably. While they may have slightly different nuances depending on the context in which th...
-
Created On: 04/12/2021
in Controls Identify
Overview Controls can be a combination of people, processes, and tools that are put in place to prevent, detect, or correct issues caused by unwanted events. Controls can also be referred to as Treatments , or as specified from the Workgroup...
-
Created On: 04/12/2021
in Risks Loss Exceedance Curve
Overview The LEC represents the annual frequency whereupon a determining economic loss will be exceeded. It is the most important and strongest measurement of risk since it provides basic information for the planning and appropriation of the re...
-
Created On: 04/15/2021
in Controls Identify
Controls for Threats/Sources can be viewed, added, and assigned to this page. The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding columns headings to the right are the threats/sources. You ca...
-
Created On: 04/16/2021
in Controls Identify
Controls for Events Vulnerabilities can be viewed, added, and assigned to this page. Here the controls are being assigned to one selected event given the threats/sources. From the grid above, you can assign the potential controls to mitigate ...
-
On this page, you can define the measurement method to use when evaluating the Controls for Threats/Sources. The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding column headings to the right ar...
-
Created On: 04/19/2021
in Controls Identify
Controls to mitigate Events Consequences can be viewed, added, and assigned to this page. Here the controls are being assigned to one selected event with respect to Objectives. From the grid above, you can assign the potential controls to mit...
-
Created On: 04/19/2021
in Controls Identify
In addition to managing (view, add, assign) the Controls for Events Vulnerabilities for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you c...