Example diagram. Figure 12 shows the addition of incidents in the diagram. In this particular example, there is only a single incident. We have also added an incoming leads-to relation to the incident, as well as an In addition to connecting the incident to the rest of the model, we have also added another vulnerability on the incoming leads-to relation to the incident. This means that all leads-to relations have an attached vulnerability. Although this is not a requirement, it may be a good idea to support the identification of indicators in the next step.
Appears in 1 contract
Sources: Grant Agreement
Example diagram. Figure 12 10 shows the addition of incidents in the diagram. In this particular example, there is only a single incident. We have also added an incoming leads-to relation to the incident, as well as an impacts relation from the incident to the asset. This means that all threats, threat scenarios, incidents and assets are now properly connected to other elements of the model. In addition to connecting the incident to the rest of the model, we have also added another vulnerability on the incoming leads-to relation to the incident. This means that all leads-to relations have an attached vulnerability. Although this is not a requirement, it may be a good idea to support the identification of indicators in the next step.
Appears in 1 contract
Sources: Grant Agreement