<?xml version='1.0' encoding='utf-8' ?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
	<head>
		<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
		<title>TransitionConcepts</title>
		<link type="text/css" rel="stylesheet" href="PLUGINS_ROOT/org.polarsys.capella.doc/html/styles.css"/>
	</head>
	<body>
		<h1 id="Concepts">Concepts</h1>
		<p>The DARC Viewpoint allows the top-down transition of cybersecurity elements (Threats and Primary Assets) and their dependencies. For more details on transitions, check out the 
			<a href="/wiki/_../../../help/topic/org.polarsys.capella.transitions.doc/html/11.%20Iterative%20Transitions/11.1.%20Concepts.html" title=" ../../../help/topic/org.polarsys.capella.transitions.doc/html/11.%20Iterative%20Transitions/11.1.%20Concepts.html">Capella Documentation</a> on the subject.
		</p>
		<h2 id="Performing_a_transition">Performing a transition</h2>
		<h3 id="From_Activity_Explorer">From Activity Explorer</h3>
		<p>The user can perform automated transitions of Cybersecurity Threats and Assets for SA, LA and PA levels using the 
			<b>Perform an automated transition of Cybersecurity elements</b> tool, available in Activity Explorer. The tool will transition the content of Cybersecurity package (which contains Threats and Primary Assets).
		</p>
		<p>
			<img height="333" width="465" border="0" src="../../../Images/Activity_Explorer_Transition.png"/>
		</p>
		<h3 id="Using_the_transitions_menu">Using the transitions menu</h3>
		<p>Transition of cybersecurity elements can be done using the 
			<b>Cybersecurity Transition</b> command available in the transitions menu (in Project Explorer or in a diagram):
		</p>
		<p>
			<img height="297" width="492" border="0" src="../../../Images/cyber%20transition%20pkg.PNG"/>
		</p>
		<p>The cybersecurity transition command is available on the following elements:</p>
		<ul>
			<li>On the architecture levels (Operational, System or Logical)</li>
		</ul>
		<ul>
			<li>On the cybersecurity package</li>
		</ul>
		<ul>
			<li>On the cybersecurity elements (Threats and Primary Assets)</li>
		</ul>
	</body>
</html>