<?xml version='1.0' encoding='utf-8' ?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
	<head>
		<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
		<title>ThreatTransition</title>
		<link type="text/css" rel="stylesheet" href="PLUGINS_ROOT/org.polarsys.capella.doc/html/styles.css"/> 
	</head>
	<body>
		<h1 id="Transition_of_Threats">Transition of Threats</h1>
		<p>Similar to the transition of Primary Assets, Threats are transitioned by selecting the "Cybersecurity Transition" in the transitions menu. See below an example on threat transition from operational to system level:</p>
		<p>
			<img border="0" src="../../../Images/threat%20transition.PNG"/>
		</p>
	</body>
</html>