H

Illegal access

Network attacks

Leak

Trojan Horse

Illegal acquisition of control information

Illegal access

1

1

2

3

3

Network attacks

1

1

3

1/2

4

Leak

1/2

1/3

1

2

2

Trojan Horse

1/3

2

1/2

1

4

Illegal acquisition of control information

1/3

1/4

1/2

1/4

1