This module allows users to define and manage threat vectors, which are methods or pathways used to exploit vulnerabilities and disrupt operations.

Using the Module:

  1. Creating Threat Vectors

To add a new threat vector, click the Add button. A new row will appear in the grid, allowing users to enter the necessary details.

  • Active: Check this box to mark the threat vector as active, or leave it unchecked to mark it as inactive.
  • Name: Enter a descriptive name for the threat vector.


  1. Managing Threat Vectors

After adding a threat vector, users can perform the following actions:

  • Editing Threat Vectors: Click directly in a grid cell to edit its contents.
  1. Saving & Discarding Changes
  • Save Changes: Click the Save Changes button or click outside the grid to apply modifications.

  • Discard Changes: Click the Discard Changes button to revert any unsaved modifications.

Feedback

Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Post Comment