-
The welcome screen has been prepared by the Project Manager and typically contains instructions and possibly links for you to explore.
-
Overview The Threats Chart page displays a variety of charts for threats and sub-threats. It displays the same likelihoods as in the Threats Grid . In Riskion, we refer to threats , causes , hazards , and sources interchangeably. While...
-
Overview This page displays a similar grid as with the Risk of Events From Threats (without controls), but with added columns for results when Controls are in effect. In Riskion, we refer to threats , causes , hazards , and sources interc...
-
Overview This page displays a similar diagram as with the Bow-tie diagram from specific Threats (without controls) -- but on this page, the likelihoods, impacts, and risks are calculated with controls in effect. Controls can also be viewed, sel...
-
-
Overview The Two Dimensional sensitivity for Impact shows how well the events perform given any two objectives. 2D Analysis for the Overall Events Impacts
One objective is represented on the X-Axis and another on the Y-Axis. The ...
-
Last Updated: 04/20/2021
in Controls Identify
In addition to managing (view, add, assign) the Controls for Events Consequences for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you can s...
-
This page displays the same information as with the Impact's Sensitivity ∆ Events Sensitivity: One at a time but with four participants or groups at a time. Impact's Sensitivity Δ Delta Events - Four users/groups at a time
Sensit...
-
Last Updated: 06/04/2021
in Tips and Tricks
Models with a later database version will not be supported on a site with an earlier database version. This scenario may occur when a model was created or opened on a Comparion site with a later database version, and you try to access the model on...
-
The Direct Input method can be used when evaluating threats/objectives with respect to another threat/objective or when evaluating events with respect to a threat/objective. In the example below, we are asked to evaluate all the sources given Human...