-
Last Updated: 04/19/2021
in Controls Identify
Controls for Threats/Sources can be viewed, added, and assigned to this page. The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding columns headings to the right are the threats/sources. You ca...
-
The Event Vulnerabilities to Threats page allows you to define the contributions ( Vulnerabilities Grid ) in a mindmap or chart format. You can select the event by clicking on the events list: The connected source nodes to the event node a...
-
Overview This page displays a similar grid as with the Overall Risk Results (without controls), with additional columns for results when Controls are in effect.
Overall Likelihoods, Impacts, and Risks of each Event without and wi...
-
Last Updated: 04/28/2021
in Risks Risk of Events
Overview This page displays the Overall Likelihoods, Impacts, and Risks of each Event . Overall Likelihoods, Impacts, and Risks of Events
The results for the "All Participants" group are displayed by default as indicated in the c...
-
The Workgroup Wording Template can be used as the default wording when creating a new model by checking the "Use workgroup wording template" checkbox. Wording changes for an existing model can be made on the Model Properties > Model Details...
-
Overview The Events Grid for Likelihood displays: the likelihoods or vulnerabilities of the events for Risk Events or the likelihoods/ applicabilities for Opportunity Events. By default, the grid shows the events' likelihoods due...
-
Last Updated: 06/08/2021
in Manage Models Deleted
Models that are marked as deleted are put in the deleted tab and remain there until: they are permanently deleted by pressing the Delete option they are restored by pressing the Restore (undelete) option or, until some period of time has elaps...
-
Last Updated: 06/08/2021
in Identify/Structure Identify
-
Last Updated: 05/05/2021
in Controls Optimize
After identifying and measuring all the potential controls, you can now select which of these controls will be in effect either: manually , or by optimization On this page, we will determine the controls to be funded by Optimization. The Por...
-
The Direct Input method can be used when evaluating threats/objectives with respect to another threat/objective or when evaluating events with respect to a threat/objective. In the example below, we are asked to evaluate all the sources given Human...