Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure