How to assign countermeasures to specific threats?
According to the PTA threat model, countermeasures are assigned to vulnerabilities and not directly to threats. The countermeasures which are recommended for the mitigation of a specific threat are dynamically associated to the threat by the PTA calculative engine based on the vulnerabilities which are exploited by the threat. For assigning countermeasures to a specific vulnerability, use the Vulnerability Details screen. For assigning vulnerabilities for a specific threat, use the Threat Details screen. After associating vulnerabilities to a threat, PTA displays a list of Recommended Countermeasures in the lower part of the Threat Details screen all left is to decide which of the recommended countermeasures really contribute to the Threats Mitigation Plan and mark them by clicking the Include In Mitigation Plan button. For further information on the PTA’s threat model nuances please visit http://www.ptatechnologies.com/pta3.htm and/or open one of the sample threat models that come wit