Updated Articles

  1. Measurement Methods for Controls for Threats

    On this page, you can define the measurement method to use when evaluating the Controls for Threats/Sources.  The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding column headings to the right ar...
  2. Measurement Methods for Controls for Event Consequences (by Control)

    On this page, you can define the measurement method to use when evaluating the Controls for Event Consequences (by Control).  This is found on CONTROLS > Measure > Measurement Methods > f or Controls for Event Consequences (by Control ) . Fr...
  3. Participant Roles for Evaluating Controls

    Participants' roles can be defined when evaluating controls: for Sources for Event Vulnerabilities for Event Consequences This can be found on the CONTROLS > Measure > Participants > Participant Roles page:  The controls are listed on ...
  4. Controls for Event Consequences (by Control)

    In addition to managing (view, add, assign) the Controls for Events Consequences for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you can s...
  5. Controls for Event Consequences (by Event)

    Controls to mitigate Events Consequences can be viewed, added, and assigned to this page.  Here the controls are being assigned to one selected event with respect to Objectives.  From the grid above, you can assign the potential controls to mit...
  6. Controls for Event Vulnerabilities (by Control)

    In addition to managing (view, add, assign) the Controls for Events Vulnerabilities for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you c...
  7. Controls for Event Vulnerabilities (by Event)

    Controls for Events Vulnerabilities can be viewed, added, and assigned to this page.  Here the controls are being assigned to one selected event given the threats/sources.  From the grid above, you can assign the potential controls to mitigate ...
  8. Controls for Threats

    Controls for Threats/Sources can be viewed, added, and assigned to this page.  The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding columns headings to the right are the threats/sources.  You ca...
  9. Preferences

    Click the button to open the display and simulation settings modal.  Events Numbers - select from ID, Inder, or Rank  Display Settings Consequences simulation mode: Diluted or Undiluted  WRT calculation (applicable only when a lower node is...
  10. Simulated vs Computed Event Likelihoods, Impacts, and Risks (Flaw of Averages)

    The risk of an event is the product of the event's likelihood and impact.  However, the computed likelihood of an event may depend on the event being caused by more than one threat. If these threats are not mutually exclusive, then the computed like...