H | Illegal access | Network attacks | Leak | Trojan Horse | Illegal acquisition of control information |
Illegal access | 1 | 1 | 2 | 3 | 3 |
Network attacks | 1 | 1 | 3 | 1/2 | 4 |
Leak | 1/2 | 1/3 | 1 | 2 | 2 |
Trojan Horse | 1/3 | 2 | 1/2 | 1 | 4 |
Illegal acquisition of control information | 1/3 | 1/4 | 1/2 | 1/4 | 1 |