From 846f1f7399aa1b5da5fb2ec47a7a1508f64e26fe Mon Sep 17 00:00:00 2001
From: Pamela Dyer <pamela.dyer@uconn.edu>
Date: Fri, 24 Sep 2021 11:23:59 -0700
Subject: [PATCH] Update
 models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp

---
 .../Supply_Chain_with_Two_Cyber_Threats.mp           | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
index 2099176..cd2a145 100644
--- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
+++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
@@ -23,14 +23,16 @@ Modified by Margaret Palmieri on the 3rd of August, 2021,
 Curated for model collection by Kristin Giammarco and 
 	Pamela Dyer on the 20th of September, 2021.
 
-Purpose: 
+Purpose: To illustrate the modeling of a supply chain 
+that is threatened by two separate cyber-attacks, and to 
+demonstrate calculating individual and total risk scores.
 
 Description: This model demonstrates performing detailed 
 risk analysis on a supply chain potentially affected by 
 two cyber threats. This is made possible by combining two 
 MP models that each contain one threat: a cyber-attack on 
 the barge, and a cyber-attack on the Colonial Pipeline. 
-All three of these models can be found in (Palmieri 2021). 
+All three of these models can be found in (Palmieri 2021).
 
 This model first takes advantage of separate COORDINATE 
 statements to calculate and display risk associated with 
@@ -47,10 +49,8 @@ average risk, and a direction to sort traces by those
 marked first. Decision makers can reference models such as 
 this when in need of assessing and comparing risk across 
 multiple scenarios from multiple threats, especially when 
-there are limited resources 
-
-In order to assess risk in this two-threat scenario,
-combines a cyber-attack on the 
+it is necessary to best allocate limited resources for 
+investing in cyber security.
 
 References:
 Palmieri, Margaret. "Assessing and Visualizing Risk in 
-- 
GitLab