Welcome
First screen
License
Edit / Options
Options – Valuation
Options – Likelihood
Options – Effects
Options – Threats
Options – Maturity
Options – Special phases
Options – CSV
Options – Value model
Options – Project phases
Security domains and project phases
Options – Xor
Options – Loops
Options – Save
Options – Export: safeguards
Options – Cross dimension value transfer
Options – Timing
Options – Privacy risk
Options – Residual risk
Options – ROLL
Discontinued
Options - Authenticity
Options - Accountability
Options – LOG (experimental)
Reports
From template
Textual reports
Graphical reports
Databases
Perimeters
OK, Cancel, Help
Main control panel
Basic controls
Project controls
Project
Project data
Information sources
Edition
Applicability stages
Edition
Security domains
Edition
Removal
Dimensions selection
Asset classes selection
Selection of criteria for valuation
Threats selection
Project phases
Combination and removal of phases
Edit one phase
Risk Treatment
Project translation
Alternative format: CSV
Risk analysis
Assets / Identification
Layers menu
Assets menu
Statistics menu
Asset operations
Assets / Edit one asset
Asset classes
GDPR: privacy
Assets / Sources
Assets / Classes
Assets / CPE names
Assets / Dependencies
Dependencies – Layers
Dependencies – Graph
Dependencies – Buses
Dependencies – Blocks
Dependencies – Map
Dependencies per dimension of security
Assets / Valuation
Valuation by domains
Valuation asset by asset
To set a qualitative valuation
To set a quantitative valuation
To nullify a valuation
Availability valuation
Zones
Asset classes
Zones and borders
Zone definition
Attack paths
Border protection
Time analysis
Threats
Aggravating & mitigating factors
Identification
Valuation
TSV – Threat Standard Values
Technical vulnerabilities (CVE)
Incidents
Edit one incident
Safeguards
Aspect
Type of protection
Relative weight
Hooks
Additional information
On safeguards’ tree
Applicability summary
Valuation (phases)
Central table
Bottom tool bar
SoA – Statement of Applicability
Valuation (domains)
Reference and target phases
Safeguard maturity valuation
Operation combo
Suggest operation
Find
Security actions
Security action
Risk scenarios
Edit one risk scenario
Automated estimation of residual risk
Manual calculus of residual risk
Impact & risk
Criticality levels – Colour encoding
Accumulated impact
Alternate view
Accumulated risk
Alternate view
Accumulated impact and risk table
Impact summary
Risk summary
Deflected impact
Alternate view
Deflected risk
Deflected impact and risk table
Impact summary
Risk summary
Security profiles (EVL)
EVL - Basic usage
EVL - View options
EVL - Control options
EVL - Hooks
EVL – Applicability
EVL – Mandatory controls
EVL - Valuation
EVL – Compensating controls
EVL – Additional measures
EVL - Reference and target phases
EVL – Valuation by phases
EVL - Valuation by security domains
Groups of security domains
Mapping (EVL à EVL)