Wireless links, wired links, and equipment items each have a list of
common vulnerabilities. These vulnerabilities apply to all nodes of that
type. In the checklist window you can:
modify the name or description of a vulnerability by
clicking that item (press Enter/click elsewhere to confirm, press Escape
to cancel)
modify the type between natural and malicious
using the icons on the left.
remove a vulnerability, by clicking the minus-button on the
right.
add a new vulnerability, by clicking the “+ Add
vulnerability” button.
reorder the vulnerabilities, by dragging them into the
desired order.
Any changes you make will affect all current and future nodes as
well.