E | Illegal access | Network attacks | Leak | Trojan Horse | Illegal acquisition of control information |
Illegal access | 1 | 2 | 3 | 1/3 | 1/2 |
Network attacks | 1/2 | 1 | 2 | 1/3 | 1/2 |
Leak | 1/3 | 1/2 | 1 | 1 | 1/3 |
Trojan Horse | 3 | 3 | 1 | 1 | 3 |
Illegal acquisition of control information | 2 | 2 | 3 | 1/3 | 1 |