diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
index 20991760d72857252815dc492d32072e4497799f..cd2a145ca2c603996ff21ef0e10824b333035224 100644
--- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
+++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
@@ -23,14 +23,16 @@ Modified by Margaret Palmieri on the 3rd of August, 2021,
 Curated for model collection by Kristin Giammarco and 
 	Pamela Dyer on the 20th of September, 2021.
 
-Purpose: 
+Purpose: To illustrate the modeling of a supply chain 
+that is threatened by two separate cyber-attacks, and to 
+demonstrate calculating individual and total risk scores.
 
 Description: This model demonstrates performing detailed 
 risk analysis on a supply chain potentially affected by 
 two cyber threats. This is made possible by combining two 
 MP models that each contain one threat: a cyber-attack on 
 the barge, and a cyber-attack on the Colonial Pipeline. 
-All three of these models can be found in (Palmieri 2021). 
+All three of these models can be found in (Palmieri 2021).
 
 This model first takes advantage of separate COORDINATE 
 statements to calculate and display risk associated with 
@@ -47,10 +49,8 @@ average risk, and a direction to sort traces by those
 marked first. Decision makers can reference models such as 
 this when in need of assessing and comparing risk across 
 multiple scenarios from multiple threats, especially when 
-there are limited resources 
-
-In order to assess risk in this two-threat scenario,
-combines a cyber-attack on the 
+it is necessary to best allocate limited resources for 
+investing in cyber security.
 
 References:
 Palmieri, Margaret. "Assessing and Visualizing Risk in