From 846f1f7399aa1b5da5fb2ec47a7a1508f64e26fe Mon Sep 17 00:00:00 2001 From: Pamela Dyer <pamela.dyer@uconn.edu> Date: Fri, 24 Sep 2021 11:23:59 -0700 Subject: [PATCH] Update models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp --- .../Supply_Chain_with_Two_Cyber_Threats.mp | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp index 2099176..cd2a145 100644 --- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp +++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp @@ -23,14 +23,16 @@ Modified by Margaret Palmieri on the 3rd of August, 2021, Curated for model collection by Kristin Giammarco and Pamela Dyer on the 20th of September, 2021. -Purpose: +Purpose: To illustrate the modeling of a supply chain +that is threatened by two separate cyber-attacks, and to +demonstrate calculating individual and total risk scores. Description: This model demonstrates performing detailed risk analysis on a supply chain potentially affected by two cyber threats. This is made possible by combining two MP models that each contain one threat: a cyber-attack on the barge, and a cyber-attack on the Colonial Pipeline. -All three of these models can be found in (Palmieri 2021). +All three of these models can be found in (Palmieri 2021). This model first takes advantage of separate COORDINATE statements to calculate and display risk associated with @@ -47,10 +49,8 @@ average risk, and a direction to sort traces by those marked first. Decision makers can reference models such as this when in need of assessing and comparing risk across multiple scenarios from multiple threats, especially when -there are limited resources - -In order to assess risk in this two-threat scenario, -combines a cyber-attack on the +it is necessary to best allocate limited resources for +investing in cyber security. References: Palmieri, Margaret. "Assessing and Visualizing Risk in -- GitLab