diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp index 82403108c554d4801ce36e8d250967d289ab5b4f..df560ff815ebc6eb101ff9d3786d9052e3d50db0 100644 --- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp +++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp @@ -1,7 +1,7 @@ -/* -Two-Cyber-Threats-Model +/* Model of Supply Chain with Two Cyber Threats + Based on the "Baseline Supply Chain" model -created by Nathaniel Alden with help from Rachel Talkington 2020-07-05 +Created by Nathaniel Alden with help from Rachel Talkington 2020-07-05 updated by Nathaniel Alden and Kristin Giammarco 2020-12-16 modified by Margaret Palmieri, added outcomes modified by Margaret Palmieri, added risk and probability @@ -12,7 +12,21 @@ modified by Margaret Palmieri 2021-07-29, added Pipeline use case, updated globa modified by Kristin Giammarco 2021-08-01, revised global report model for two scenarios modified by Margaret Palmieri 2021-08-03, updated attributes and model notes curated for model collection by Kristin Giammarco and Pamela Dyer, 2021-09-20 -*/ + +Purpose: + +Description: + +References: +Palmieri, Margaret. "Assessing and Visualizing Supply Chain +Cyber Risk in Monterey Phoenix." NPS Master's Thesis, +Monterey, CA: September 2021. + +Search terms: + +Instructions: + +==========================================================*/ SCHEMA Supply_Chain_with_Two_Cyber_Threats