======== Alter Inhalt (ggf. übernehmen) ===========
TODO:
- Transparency: legal vs. IT
- Unlinkability vs. Purpose-binding: legal vs. academic definition
- Anonymity vs. Pseudonymity (often erroneously in privacy policies and public statements)
TODO: Entries marked with (CC) were taken from the Protection Profile for Mobile Device Fundamentals (PDF).
- Eavasdropping (CC)
- Network Attack (CC)
- Physical Access (CC)
- Malicious / Flawed Application (CC)
- Persistent Presence (CC)
- Insider Attacks - [ ] Rogue Employee - [ ] Accidental Misconfiguration
TODO: Explain the differences between the classical and the legal perspectives on CIA again? They are explained in the SDM.