9.13 Vulnerability assessment window

The vulnerability assess­ment window is called up using the node menu on diagram nodes (except actors). In the vulnerability assessment window, you can add, remove, and assess vulnerabilities to the node. In this window you can:

Using the buttons in the toolbar, you can:

Be careful when pasting vulnerability assessments; these three rules are used:

  1. Vulnerabilities that were present (based on their name) in the source as well as the destination will be combined.
  2. On combination, if the probability or impact has been set in both the source and destination, the worst value will be used.
  3. Any vulnerabilities listed in the source but not yet present in the destination will be created.

It is not yet possible to add/edit descriptions for vulnerabilities, other than using the checklists.