-
On this page, you can define the measurement method to use when evaluating the Controls for Threats/Sources. The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding column headings to the right ar...
-
On this page, you can define the measurement method to use when evaluating the Controls for Event Consequences (by Control). This is found on CONTROLS > Measure > Measurement Methods > f or Controls for Event Consequences (by Control ) . Fr...
-
Participants' roles can be defined when evaluating controls: for Sources for Event Vulnerabilities for Event Consequences This can be found on the CONTROLS > Measure > Participants > Participant Roles page: The controls are listed on ...
-
Last Updated: 04/20/2021
in Controls Identify
In addition to managing (view, add, assign) the Controls for Events Consequences for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you can s...
-
Last Updated: 04/20/2021
in Controls Identify
Controls to mitigate Events Consequences can be viewed, added, and assigned to this page. Here the controls are being assigned to one selected event with respect to Objectives. From the grid above, you can assign the potential controls to mit...
-
Last Updated: 04/20/2021
in Controls Identify
In addition to managing (view, add, assign) the Controls for Events Vulnerabilities for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you c...
-
Last Updated: 04/20/2021
in Controls Identify
Controls for Events Vulnerabilities can be viewed, added, and assigned to this page. Here the controls are being assigned to one selected event given the threats/sources. From the grid above, you can assign the potential controls to mitigate ...
-
Last Updated: 04/19/2021
in Controls Identify
Controls for Threats/Sources can be viewed, added, and assigned to this page. The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding columns headings to the right are the threats/sources. You ca...
-
Last Updated: 04/05/2021
in Risks Risk of Events
Click the button to open the display and simulation settings modal. Events Numbers - select from ID, Inder, or Rank Display Settings Consequences simulation mode: Diluted or Undiluted WRT calculation (applicable only when a lower node is...
-
Last Updated: 04/05/2021
in Risks Risk of Events
The risk of an event is the product of the event's likelihood and impact. However, the computed likelihood of an event may depend on the event being caused by more than one threat. If these threats are not mutually exclusive, then the computed like...