Popular Articles

  1. Controls for Threats

    Controls for Threats/Sources can be viewed, added, and assigned to this page.  The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding columns headings to the right are the threats/sources.  You ca...
  2. Event Vulnerabilities to Threats

    The Event Vulnerabilities to Threats page allows you to define the contributions ( Vulnerabilities Grid ) in a mindmap or chart format. You can select the event by clicking on the events list: The connected source nodes to the event node a...
  3. Overall Risks with Controls

    Overview This page displays a similar grid as with the Overall Risk Results (without controls), with additional columns for results when Controls are in effect. Overall Likelihoods, Impacts, and Risks  of each Event without  and wi...
  4. Overall Risks

    Overview This page displays the Overall Likelihoods, Impacts, and Risks of each Event . Overall Likelihoods, Impacts, and Risks of Events The results for the "All  Participants" group are displayed by default as indicated in the c...
  5. Workgroup Wording Template

    The Workgroup Wording Template can be used as the default wording when creating a new model by checking the "Use workgroup wording template" checkbox.  Wording changes for an existing model can be made on the Model Properties > Model Details...
  6. Likelihood: Events Grid

    Overview The Events  Grid  for Likelihood   displays: the likelihoods or vulnerabilities of the events for Risk Events or the likelihoods/ applicabilities for Opportunity Events.  By default, the grid shows the events' likelihoods due...
  7. Permanently delete or restore deleted models

    Models that are marked as deleted are put in the deleted tab and remain there until:   they are permanently deleted by pressing the Delete option they are restored by pressing the Restore (undelete) option or, until some period of time has elaps...
  8. Threats

  9. Optimize Controls to be in effect

    After identifying and measuring all the potential controls, you can now select which of these controls will be in effect either: manually , or by optimization On this page, we will determine the controls to be funded by Optimization.  The Por...
  10. Direct Entry Evaluation

    The Direct Input method can be used when evaluating threats/objectives with respect to another threat/objective or when evaluating events with respect to a threat/objective. In the example below, we are asked to evaluate all the sources given Human...