diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp index 20991760d72857252815dc492d32072e4497799f..cd2a145ca2c603996ff21ef0e10824b333035224 100644 --- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp +++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp @@ -23,14 +23,16 @@ Modified by Margaret Palmieri on the 3rd of August, 2021, Curated for model collection by Kristin Giammarco and Pamela Dyer on the 20th of September, 2021. -Purpose: +Purpose: To illustrate the modeling of a supply chain +that is threatened by two separate cyber-attacks, and to +demonstrate calculating individual and total risk scores. Description: This model demonstrates performing detailed risk analysis on a supply chain potentially affected by two cyber threats. This is made possible by combining two MP models that each contain one threat: a cyber-attack on the barge, and a cyber-attack on the Colonial Pipeline. -All three of these models can be found in (Palmieri 2021). +All three of these models can be found in (Palmieri 2021). This model first takes advantage of separate COORDINATE statements to calculate and display risk associated with @@ -47,10 +49,8 @@ average risk, and a direction to sort traces by those marked first. Decision makers can reference models such as this when in need of assessing and comparing risk across multiple scenarios from multiple threats, especially when -there are limited resources - -In order to assess risk in this two-threat scenario, -combines a cyber-attack on the +it is necessary to best allocate limited resources for +investing in cyber security. References: Palmieri, Margaret. "Assessing and Visualizing Risk in