Skip to content
Snippets Groups Projects
Commit 846f1f73 authored by Pamela Dyer's avatar Pamela Dyer
Browse files

Update models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp

parent 849932aa
No related branches found
No related tags found
1 merge request!392 into 3
......@@ -23,14 +23,16 @@ Modified by Margaret Palmieri on the 3rd of August, 2021,
Curated for model collection by Kristin Giammarco and
Pamela Dyer on the 20th of September, 2021.
Purpose:
Purpose: To illustrate the modeling of a supply chain
that is threatened by two separate cyber-attacks, and to
demonstrate calculating individual and total risk scores.
Description: This model demonstrates performing detailed
risk analysis on a supply chain potentially affected by
two cyber threats. This is made possible by combining two
MP models that each contain one threat: a cyber-attack on
the barge, and a cyber-attack on the Colonial Pipeline.
All three of these models can be found in (Palmieri 2021).
All three of these models can be found in (Palmieri 2021).
This model first takes advantage of separate COORDINATE
statements to calculate and display risk associated with
......@@ -47,10 +49,8 @@ average risk, and a direction to sort traces by those
marked first. Decision makers can reference models such as
this when in need of assessing and comparing risk across
multiple scenarios from multiple threats, especially when
there are limited resources
In order to assess risk in this two-threat scenario,
combines a cyber-attack on the
it is necessary to best allocate limited resources for
investing in cyber security.
References:
Palmieri, Margaret. "Assessing and Visualizing Risk in
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment