E

Illegal access

Network attacks

Leak

Trojan Horse

Illegal acquisition of control information

Illegal access

1

2

3

1/3

1/2

Network attacks

1/2

1

2

1/3

1/2

Leak

1/3

1/2

1

1

1/3

Trojan Horse

3

3

1

1

3

Illegal acquisition of control information

2

2

3

1/3

1