{"id":299,"date":"2025-03-17T05:54:43","date_gmt":"2025-03-17T05:54:43","guid":{"rendered":"https:\/\/sectechinnovations.com\/?page_id=299"},"modified":"2025-03-17T06:49:30","modified_gmt":"2025-03-17T06:49:30","slug":"attack-surface","status":"publish","type":"page","link":"https:\/\/sectechinnovations.com\/index.php\/attack-surface\/","title":{"rendered":"Attack Surface"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"299\" class=\"elementor elementor-299\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc888b0 e-flex e-con-boxed e-con e-parent\" data-id=\"bc888b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c944204 elementor-widget elementor-widget-html\" data-id=\"c944204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n    <title>Interactive SME Network Security Architecture<\/title>\n    <style>\n        body {\n            font-family: Arial, sans-serif;\n            background-color: #f9f9f9;\n            margin: 0;\n            padding: 20px;\n        }\n        .component {\n            cursor: pointer;\n        }\n        .label {\n            font-weight: bold;\n            fill: #333;\n            cursor: pointer;\n            text-anchor: middle;\n        }\n        .wifi-area {\n            fill: #e6f2ff;\n            stroke: #66aaff;\n            stroke-dasharray: 4;\n        }\n        .arrow {\n            fill: none;\n            stroke: #000;\n            stroke-width: 2;\n            marker-end: url(#arrowhead-end);\n            marker-start: url(#arrowhead-start);\n        }\n        \/* Additional styling for laptop layers *\/\n        .layer-box {\n            fill: #fff;\n            stroke: #666;\n            stroke-width: 1;\n            filter: drop-shadow(0 0 5px rgba(0,0,0,0.3));\n        }\n        .layer-text {\n            font-size: 14px;\n            fill: #333;\n        }\n        .svg-container {\n          overflow-x: auto;\n        }\n\n        \/* ========================================= *\/\n        \/* NEW CODE: Animations and toggling styles *\/\n        \/* ========================================= *\/\n        \/* We'll fade in\/out detail groups *\/\n        g[visibility=\"hidden\"] {\n          opacity: 0;\n          pointer-events: none; \/* not clickable when hidden *\/\n          transition: opacity 0.4s ease-out; \/* smooth fade-out *\/\n        }\n        g[visibility=\"visible\"] {\n          opacity: 1;\n          transition: opacity 0.4s ease-in; \/* smooth fade-in *\/\n        }\n\n        \/* Pulsing circle or highlight effect *\/\n        .pulsing {\n          fill: none;\n          stroke: #f00;\n          stroke-width: 2;\n          animation: pulse 1.5s infinite ease-in-out;\n        }\n        @keyframes pulse {\n          0%   { stroke-opacity: 1; transform: scale(1); }\n          50%  { stroke-opacity: 0; transform: scale(1.5); }\n          100% { stroke-opacity: 1; transform: scale(1); }\n        }\n\n        \/* Attack arrow moving dash effect *\/\n        .attack-flow {\n          stroke: #f00;\n          stroke-width: 3;\n          stroke-dasharray: 5 5;\n          animation: dashMove 1.2s linear infinite;\n        }\n        @keyframes dashMove {\n          to { stroke-dashoffset: -10; }\n        }\n\n        \/* Info panel for CVEs *\/\n        #cveInfoPanel {\n          margin-top: 20px;\n          padding: 10px;\n          border: 1px solid #ccc;\n          background: #fff;\n          max-width: 1100px;\n          display: none; \/* hidden until we show something *\/\n        }\n        #cveInfoPanel h3 {\n          margin-top: 0;\n        }\n        #cveInfoPanel ul {\n          margin: 0;\n          padding: 0 1.2em;\n        }\n        #cveInfoPanel li {\n          margin-bottom: 0.5em;\n        }\n        #cveInfoPanel a {\n          color: #1565c0;\n          text-decoration: none;\n        }\n        #cveInfoPanel a:hover {\n          text-decoration: underline;\n        }\n    <\/style>\n<\/head>\n<body>\n    <h3>Interactive SME Network Security Architecture<\/h3>\n\n    <svg viewBox=\"0 0 1200 1000\" preserveAspectRatio=\"xMidYMid meet\" ...>\n        <defs>\n            <marker id=\"arrowhead-start\" markerWidth=\"10\" markerHeight=\"7\" refX=\"5\" refY=\"3.5\" orient=\"auto-start-reverse\">\n                <polygon points=\"0 0, 10 3.5, 0 7\" fill=\"#000\"\/>\n            <\/marker>\n            <marker id=\"arrowhead-end\" markerWidth=\"10\" markerHeight=\"7\" refX=\"5\" refY=\"3.5\" orient=\"auto\">\n                <polygon points=\"0 0, 10 3.5, 0 7\" fill=\"#000\"\/>\n            <\/marker>\n        <\/defs>\n\n        <!-- Cloud Container -->\n        <path d=\"M710 100 Q740 70,820 100 Q840 70,880 100 Q910 130,880 160 Q950 200,860 210 Q820 230,780 210 Q740 230,700 210 Q670 190,680 160 Q650 130,680 110 Z\"\n              fill=\"#e0f7ff\" stroke=\"#aaa\" stroke-width=\"3\"\/>\n        <text x=\"800\" y=\"115\" class=\"label\">Cloud Services<\/text>\n\n        <!-- Web Server -->\n        <image href=\"https:\/\/img.icons8.com\/fluency\/96\/server.png\" x=\"730\" y=\"130\" width=\"50\" height=\"50\" class=\"component\" onclick=\"toggleDetails('webServerLayers')\" \/>\n        <text class=\"label\" x=\"730\" y=\"195\">Web Server<\/text>\n\n        <!-- Database Server -->\n        <image href=\"https:\/\/img.icons8.com\/fluency\/96\/database.png\" x=\"820\" y=\"130\" width=\"50\" height=\"50\" class=\"component\" onclick=\"toggleDetails('dbServerLayers')\" \/>\n        <text class=\"label\" x=\"845\" y=\"195\">Database Server<\/text>\n\n        <!-- Firewall -->\n        <image href=\"https:\/\/img.icons8.com\/fluency\/96\/firewall.png\" x=\"580\" y=\"130\" width=\"50\" height=\"50\" class=\"component\" onclick=\"toggleDetails('firewallLayers')\" \/>\n        <text class=\"label\" x=\"605\" y=\"195\">Firewall<\/text>\n\n        <!-- Router -->\n        <image href=\"https:\/\/img.icons8.com\/fluency\/96\/router.png\" x=\"440\" y=\"130\" width=\"50\" height=\"50\" class=\"component\" onclick=\"toggleDetails('routerLayers')\" \/>\n        <text class=\"label\" x=\"465\" y=\"195\">Router<\/text>\n\n        <!-- Wi-Fi Switch with antennas -->\n        <image href=\"https:\/\/img.icons8.com\/color\/96\/wifi-router--v1.png\" x=\"290\" y=\"130\" width=\"60\" height=\"60\" class=\"component\" onclick=\"toggleDetails('switchWifiLayers')\" \/>\n        <text class=\"label\" x=\"320\" y=\"200\">Wi-Fi Switch<\/text>\n\n        <!-- Wi-Fi Coverage Area -->\n        <ellipse cx=\"320\" cy=\"350\" rx=\"120\" ry=\"80\" class=\"wifi-area\" \/>\n        <text class=\"label\" x=\"320\" y=\"300\">Wi-Fi Coverage<\/text>\n\n        <!-- Laptop -->\n        <image href=\"https:\/\/img.icons8.com\/fluency\/96\/laptop.png\"\n               x=\"260\" y=\"320\" width=\"50\" height=\"50\"\n               class=\"component\"\n               onclick=\"toggleDetails('laptopLayers')\" \/>\n        <text class=\"label\" x=\"285\" y=\"390\">Laptop<\/text>\n\n        <!-- Mobile -->\n        <image href=\"https:\/\/img.icons8.com\/fluency\/96\/smartphone.png\" x=\"340\" y=\"320\" width=\"50\" height=\"50\" class=\"component\" onclick=\"toggleDetails('mobileLayers')\" \/>\n        <text class=\"label\" x=\"365\" y=\"390\">Mobile<\/text>\n\n        <!-- Double-sided arrows for connections -->\n        <path d=\"M690 155 L630 155\" class=\"arrow\" \/>\n        <path d=\"M580 155 L495 155\" class=\"arrow\" \/>\n        <path d=\"M435 155 L350 155\" class=\"arrow\" \/>\n\n        <!-- NEW CODE: Attack-flow indicators (hidden initially).\n             Example: an arrow from the 'internet' on the left to the firewall, etc.\n             For demonstration, let's just place one from the Firewall to the Web Server, and so on. -->\n        <path id=\"attackFlowFirewall\" d=\"M605 155 L730 155\" \n              stroke-dashoffset=\"0\" \n              class=\"attack-flow\" \n              style=\"opacity:0;\" \/>\n\n        <!-- ============================================= -->\n        <!-- Laptop Attack Surface Details (Hidden at Start) -->\n        <!-- ============================================= -->\n        <g id=\"laptopLayers\" visibility=\"hidden\">\n            <!-- 1. Physical & Hardware -->\n            <g id=\"hardwareLayer\">\n              <rect class=\"layer-box\" x=\"50\" y=\"500\" width=\"550\" height=\"90\" fill=\"#e8f1ff\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/processor.png\"\n                     x=\"60\" y=\"510\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"325\" y=\"525\">Physical & Hardware<\/text>\n              <text class=\"layer-text\" x=\"120\" y=\"550\">\n                \u2022 Malicious peripherals (keyloggers), Side channel attacks (Microarchitecture)\n              <\/text>\n            <\/g>\n            <!-- 2. Firmware & Boot -->\n            <g id=\"firmwareLayer\">\n              <rect class=\"layer-box\" x=\"50\" y=\"600\" width=\"550\" height=\"90\" fill=\"#e1ffe8\" \/>\n              <image href=\"https:\/\/img.icons8.com\/?size=100&id=hbCljOlfk4WP&format=png&color=000000\"\n                     x=\"60\" y=\"610\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"325\" y=\"625\">Firmware & Boot<\/text>\n              <text class=\"layer-text\" x=\"120\" y=\"650\">\n                \u2022 UEFI\/BIOS tampering, bootkits\n              <\/text>\n            <\/g>\n            <!-- 3. OS & Kernel -->\n            <g id=\"osLayer\">\n              <rect class=\"layer-box\" x=\"50\" y=\"700\" width=\"550\" height=\"90\" fill=\"#ffe4e4\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/windows-client.png\"\n                     x=\"60\" y=\"710\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"325\" y=\"725\">OS & Kernel<\/text>\n              <text class=\"layer-text\" x=\"120\" y=\"750\">\n                \u2022 Privilege escalation, driver exploits, rootkits\n              <\/text>\n            <\/g>\n            <!-- 4. Memory Exploits -->\n            <g id=\"memoryLayer\">\n              <rect class=\"layer-box\" x=\"50\" y=\"800\" width=\"550\" height=\"90\" fill=\"#fff8e1\" \/>\n              <image href=\"https:\/\/img.icons8.com\/dusk\/48\/memory-slot.png\"\n                     x=\"60\" y=\"810\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"325\" y=\"825\">Memory & Software<\/text>\n              <text class=\"layer-text\" x=\"120\" y=\"850\">\n                \u2022 Buffer overflows, use-after-free, JIT exploits\n              <\/text>\n            <\/g>\n            <!-- 5. Network & Wireless -->\n            <g id=\"networkLayer\">\n              <rect class=\"layer-box\" x=\"50\" y=\"900\" width=\"550\" height=\"90\" fill=\"#e8e1ff\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/network.png\"\n                     x=\"60\" y=\"910\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"325\" y=\"925\">Network & Wireless<\/text>\n              <text class=\"layer-text\" x=\"120\" y=\"950\">\n                \u2022 Wi-Fi exploits, MITM, Bluetooth vulnerabilities\n              <\/text>\n            <\/g>\n            <!-- 6. Application & Remote -->\n            <g id=\"appLayer\">\n              <rect class=\"layer-box\" x=\"650\" y=\"500\" width=\"450\" height=\"90\" fill=\"#eafff3\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/application-window.png\"\n                     x=\"660\" y=\"510\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"875\" y=\"525\">Applications<\/text>\n              <text class=\"layer-text\" x=\"720\" y=\"550\">\n                \u2022 Unpatched software, RCE, plugin exploits\n              <\/text>\n            <\/g>\n            <!-- 7. User & Credential Attacks -->\n            <g id=\"userCredLayer\">\n              <rect class=\"layer-box\" x=\"650\" y=\"600\" width=\"450\" height=\"90\" fill=\"#f1f1f1\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/user-shield.png\"\n                     x=\"660\" y=\"610\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"875\" y=\"625\">User & Credential<\/text>\n              <text class=\"layer-text\" x=\"720\" y=\"650\">\n                \u2022 Keylogging, weak passwords, no MFA\n              <\/text>\n            <\/g>\n            <!-- 8. Supply Chain & Third-Party -->\n            <g id=\"supplyChainLayer\">\n              <rect class=\"layer-box\" x=\"650\" y=\"700\" width=\"450\" height=\"90\" fill=\"#f6e1ff\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/package.png\"\n                     x=\"660\" y=\"710\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"875\" y=\"725\">Supply Chain<\/text>\n              <text class=\"layer-text\" x=\"720\" y=\"750\">\n                \u2022 Compromised OEM components, backdoor updates\n              <\/text>\n            <\/g>\n            <!-- 9. USB & Physical -->\n            <g id=\"usbLayer\">\n              <rect class=\"layer-box\" x=\"650\" y=\"800\" width=\"450\" height=\"90\" fill=\"#ffeae1\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/usb-memory-stick.png\"\n                     x=\"660\" y=\"810\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"875\" y=\"825\">USB & Physical<\/text>\n              <text class=\"layer-text\" x=\"720\" y=\"850\">\n                \u2022 Malicious USB devices (Rubber Ducky), Evil Maid\n              <\/text>\n            <\/g>\n            <!-- 10. Social Engineering -->\n            <g id=\"socialLayer\">\n              <rect class=\"layer-box\" x=\"650\" y=\"900\" width=\"450\" height=\"90\" fill=\"#f6f6c9\" \/>\n              <image href=\"https:\/\/img.icons8.com\/color\/48\/phishing.png\"\n                     x=\"660\" y=\"910\" width=\"48\" height=\"48\"\/>\n              <text class=\"label\" x=\"875\" y=\"925\">Social Engineering<\/text>\n              <text class=\"layer-text\" x=\"720\" y=\"950\">\n                \u2022 Phishing emails, malicious links, tailgating\n              <\/text>\n            <\/g>\n        <\/g>\n        <!-- End of laptopLayers group -->\n\n        <!-- ================================================ -->\n        <!-- Web Server Attack Surface Details (Hidden at Start) -->\n        <!-- ================================================ -->\n        <g id=\"webServerLayers\" visibility=\"hidden\">\n          <!-- 1. Server & OS-Level -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"300\" width=\"480\" height=\"80\" fill=\"#ffeae1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/server.png\"\n                  x=\"610\" y=\"310\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"325\">Server & OS-Level<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"345\">\n              \u2022 Unpatched OS, weak system services\n            <\/text>\n          <\/g>\n          <!-- 2. Web Server Software -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"400\" width=\"480\" height=\"80\" fill=\"#e1ffe8\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/web.png\"\n                  x=\"610\" y=\"410\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"425\">Web Server Software<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"445\">\n              \u2022 Vulnerable modules, misconfigurations\n            <\/text>\n          <\/g>\n          <!-- 3. Application & Framework -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"500\" width=\"480\" height=\"100\" fill=\"#fff8e1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/react-native.png\"\n                  x=\"610\" y=\"515\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"530\">Application & Framework<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"555\">\n              \u2022 SQLi, XSS, CSRF, SSRF, insecure deserialization\n            <\/text>\n          <\/g>\n          <!-- 4. Auth & Session Management -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"620\" width=\"480\" height=\"80\" fill=\"#e8e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/fingerprint-scan.png\"\n                  x=\"610\" y=\"630\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"645\">Auth & Sessions<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"665\">\n              \u2022 Weak session tokens, brute force, missing MFA\n            <\/text>\n          <\/g>\n          <!-- 5. API & Microservices -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"720\" width=\"480\" height=\"80\" fill=\"#f6f6c9\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/api-settings.png\"\n                  x=\"610\" y=\"730\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"745\">API & Microservices<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"765\">\n              \u2022 Unvalidated endpoints, leaked keys\n            <\/text>\n          <\/g>\n          <!-- 6. Denial of Service -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"820\" width=\"480\" height=\"80\" fill=\"#ffe4e4\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/cancel-2.png\"\n                  x=\"610\" y=\"830\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"845\">Denial of Service<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"865\">\n              \u2022 DDoS, resource exhaustion\n            <\/text>\n          <\/g>\n          <!-- 7. Supply Chain -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"920\" width=\"480\" height=\"80\" fill=\"#f6e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/package.png\"\n                  x=\"610\" y=\"930\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"945\">Supply Chain<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"965\">\n              \u2022 Vulnerable libraries, malicious plugins\n            <\/text>\n          <\/g>\n        <\/g>\n        <!-- End of webServerLayers group -->\n\n        <!-- ================================================ -->\n        <!-- Database Server Attack Surface Details (Hidden) -->\n        <!-- ================================================ -->\n        <g id=\"dbServerLayers\" visibility=\"hidden\">\n          <!-- 1. OS & Host-Level -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"300\" width=\"480\" height=\"80\" fill=\"#ffeae1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/database.png\"\n                  x=\"610\" y=\"310\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"325\">OS & Host-Level<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"345\">\n              \u2022 Unpatched OS, weak system services\n            <\/text>\n          <\/g>\n          <!-- 2. Database Software -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"400\" width=\"480\" height=\"80\" fill=\"#e1ffe8\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/data-configuration.png\"\n                  x=\"610\" y=\"410\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"425\">Database Software<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"445\">\n              \u2022 Outdated engine, vulnerable extensions\n            <\/text>\n          <\/g>\n          <!-- 3. Misconfigurations -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"500\" width=\"480\" height=\"80\" fill=\"#fff8e1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/settings--v1.png\"\n                  x=\"610\" y=\"510\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"525\">Misconfiguration<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"545\">\n              \u2022 Default credentials, exposed interfaces\n            <\/text>\n          <\/g>\n          <!-- 4. Access Control & Auth -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"600\" width=\"480\" height=\"80\" fill=\"#e8e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/lock-2.png\"\n                  x=\"610\" y=\"610\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"625\">Access Control<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"645\">\n              \u2022 Weak passwords, excessive privileges\n            <\/text>\n          <\/g>\n          <!-- 5. Injection Attacks -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"700\" width=\"480\" height=\"80\" fill=\"#f6f6c9\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=tR8ereAVKwsT&format=png&color=000000\"\n                  x=\"610\" y=\"710\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"725\">Injection Attacks<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"745\">\n              \u2022 SQLi, NoSQLi, error-based injection\n            <\/text>\n          <\/g>\n          <!-- 6. Data Exfiltration -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"800\" width=\"480\" height=\"80\" fill=\"#ffe4e4\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=2140&format=png&color=000000\"\n                  x=\"610\" y=\"810\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"825\">Data Exfiltration<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"845\">\n              \u2022 Insecure backups, unencrypted exports\n            <\/text>\n          <\/g>\n          <!-- 7. Denial of Service -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"900\" width=\"480\" height=\"80\" fill=\"#f6e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/cancel-2.png\"\n                  x=\"610\" y=\"910\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"925\">Denial of Service<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"945\">\n              \u2022 Resource exhaustion via large queries\n            <\/text>\n          <\/g>\n          <!-- 8. Supply Chain -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"1000\" width=\"480\" height=\"80\" fill=\"#e8f1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/package.png\"\n                  x=\"610\" y=\"1010\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"1025\">Supply Chain<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"1045\">\n              \u2022 Vulnerable libraries, malicious updates\n            <\/text>\n          <\/g>\n        <\/g>\n        <!-- End of Database -->\n\n        <!-- =========================================== -->\n        <!-- Router Attack Surface Details (Hidden) -->\n        <!-- =========================================== -->\n        <g id=\"routerLayers\" visibility=\"hidden\">\n          <!-- 1. Firmware & OS -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"300\" width=\"480\" height=\"80\" fill=\"#ffeae1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=hbCljOlfk4WP&format=png&color=000000\"\n                  x=\"610\" y=\"310\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"325\">Firmware & OS<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"345\">\n              \u2022 Outdated firmware, backdoors, supply-chain risks\n            <\/text>\n          <\/g>\n          <!-- 2. Administrative Interface -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"400\" width=\"480\" height=\"80\" fill=\"#e1ffe8\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/password-window.png\"\n                  x=\"610\" y=\"410\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"425\">Admin Interface<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"445\">\n              \u2022 Default credentials, insecure remote login\n            <\/text>\n          <\/g>\n          <!-- 3. Routing & Network Protocols -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"500\" width=\"480\" height=\"80\" fill=\"#fff8e1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/split-transaction.png\"\n                  x=\"610\" y=\"510\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"525\">Routing Protocols<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"545\">\n              \u2022 BGP\/OSPF exploits, ARP\/DNS spoofing\n            <\/text>\n          <\/g>\n          <!-- 4. Configuration & Access Control -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"600\" width=\"480\" height=\"80\" fill=\"#e8e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/settings--v1.png\"\n                  x=\"610\" y=\"610\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"625\">Configuration & ACL<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"645\">\n              \u2022 Misconfigured ports, weak encryption, no VLANs\n            <\/text>\n          <\/g>\n          <!-- 5. Denial of Service (DoS\/DDoS) -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"700\" width=\"480\" height=\"80\" fill=\"#f6f6c9\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/cancel-2.png\"\n                  x=\"610\" y=\"710\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"725\">Denial of Service<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"745\">\n              \u2022 Packet floods, resource exhaustion\n            <\/text>\n          <\/g>\n          <!-- 6. Physical & Supply Chain -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"800\" width=\"480\" height=\"80\" fill=\"#ffe4e4\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/toolbox.png\"\n                  x=\"610\" y=\"810\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"825\">Physical & Supply Chain<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"845\">\n              \u2022 Unauthorized access, malicious hardware\n            <\/text>\n          <\/g>\n          <!-- 7. Logging & Monitoring -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"900\" width=\"480\" height=\"80\" fill=\"#f6e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/statistics.png\"\n                  x=\"610\" y=\"910\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"925\">Logging & Monitoring<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"945\">\n              \u2022 Insufficient logs, no intrusion alerts\n            <\/text>\n          <\/g>\n        <\/g>\n        <!-- ============================================== -->\n        <!-- Wi-Fi Switch Attack Surface Details (Hidden) -->\n        <!-- ============================================== -->\n        <g id=\"switchWifiLayers\" visibility=\"hidden\">\n          <!-- 1. Firmware & OS -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"300\" width=\"480\" height=\"80\" fill=\"#ffeae1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=hbCljOlfk4WP&format=png&color=000000\"\n                  x=\"610\" y=\"310\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"325\">Firmware & OS<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"345\">\n              \u2022 Outdated firmware, supply-chain backdoors\n            <\/text>\n          <\/g>\n          <!-- 2. Wireless Protocol & Encryption -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"400\" width=\"480\" height=\"80\" fill=\"#e1ffe8\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/wifi.png\"\n                  x=\"610\" y=\"410\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"425\">Wireless Encryption<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"445\">\n              \u2022 WEP\/WPA2\/WPA3 flaws, KRACK-like attacks\n            <\/text>\n          <\/g>\n          <!-- 3. Misconfiguration & Access Control -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"500\" width=\"480\" height=\"80\" fill=\"#fff8e1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/settings--v1.png\"\n                  x=\"610\" y=\"510\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"525\">Misconfig & ACL<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"545\">\n              \u2022 Default creds, VLAN misconfig, plaintext admin pages\n            <\/text>\n          <\/g>\n          <!-- 4. Rogue Clients & Association -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"600\" width=\"480\" height=\"80\" fill=\"#e8e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=TR4FNv588fw8&format=png&color=000000\"\n                  x=\"610\" y=\"610\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"625\">Rogue Clients<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"645\">\n              \u2022 Unauthorized access, MAC spoofing, no client isolation\n            <\/text>\n          <\/g>\n          <!-- 5. Denial of Service -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"700\" width=\"480\" height=\"80\" fill=\"#f6f6c9\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/cancel-2.png\"\n                  x=\"610\" y=\"710\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"725\">Denial of Service<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"745\">\n              \u2022 Deauth flooding, resource exhaustion\n            <\/text>\n          <\/g>\n          <!-- 6. Physical & Supply Chain -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"800\" width=\"480\" height=\"80\" fill=\"#ffe4e4\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/toolbox.png\"\n                  x=\"610\" y=\"810\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"825\">Physical & Supply Chain<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"845\">\n              \u2022 Tampering, malicious firmware updates\n            <\/text>\n          <\/g>\n          <!-- 7. Logging & Monitoring -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"900\" width=\"480\" height=\"80\" fill=\"#f6e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/statistics.png\"\n                  x=\"610\" y=\"910\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"925\">Logging & Monitoring<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"945\">\n              \u2022 Limited logs, no WIPS or intrusion detection\n            <\/text>\n          <\/g>\n        <\/g>\n\n        <!-- ============================================= -->\n        <!-- Mobile (Android) Attack Surface Details (Hidden) -->\n        <!-- ============================================= -->\n        <g id=\"mobileLayers\" visibility=\"hidden\">\n          <!-- 1. Firmware & Bootloader -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"300\" width=\"480\" height=\"80\" fill=\"#ffeae1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=hbCljOlfk4WP&format=png&color=000000\"\n                  x=\"610\" y=\"310\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"325\">Firmware & Bootloader<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"345\">\n              \u2022 Unlocked bootloaders, custom ROM vulnerabilities\n            <\/text>\n          <\/g>\n          <!-- 2. OS & Kernel -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"400\" width=\"480\" height=\"80\" fill=\"#e1ffe8\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/android-os.png\"\n                  x=\"610\" y=\"410\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"425\">OS & Kernel<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"445\">\n              \u2022 Privilege escalation, SELinux misconfigs\n            <\/text>\n          <\/g>\n          <!-- 3. Baseband & Radio -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"500\" width=\"480\" height=\"80\" fill=\"#fff8e1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=9124&format=png&color=000000\"\n                  x=\"610\" y=\"510\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"525\">Baseband & Radio<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"545\">\n              \u2022 Cellular protocol exploits (SIM toolkit, LTE flaws)\n            <\/text>\n          <\/g>\n          <!-- 4. Application & Play Store -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"600\" width=\"480\" height=\"80\" fill=\"#e8e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/google-play.png\"\n                  x=\"610\" y=\"610\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"625\">Apps & Play Store<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"645\">\n              \u2022 Malicious apps, unvetted third-party sources\n            <\/text>\n          <\/g>\n          <!-- 5. Browser & WebView -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"700\" width=\"480\" height=\"80\" fill=\"#f6f6c9\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/android-tablet.png\"\n                  x=\"610\" y=\"710\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"725\">Browser & WebView<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"745\">\n              \u2022 XSS, malicious JavaScript, drive-by downloads\n            <\/text>\n          <\/g>\n          <!-- 6. User Data & Encryption -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"800\" width=\"480\" height=\"80\" fill=\"#ffe4e4\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=jgY7AKusRLS4&format=png&color=000000\"\n                  x=\"610\" y=\"810\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"825\">User Data & Crypto<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"845\">\n              \u2022 Weak\/no encryption, insecure data storage\n            <\/text>\n          <\/g>\n          <!-- 7. Network & Wi-Fi -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"900\" width=\"480\" height=\"80\" fill=\"#f6e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/wifi.png\"\n                  x=\"610\" y=\"910\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"925\">Network & Wi-Fi<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"945\">\n              \u2022 MITM, rogue AP, insecure Wi-Fi protocols\n            <\/text>\n          <\/g>\n          <!-- 8. Social Engineering & Phishing -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"1000\" width=\"480\" height=\"80\" fill=\"#e1e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/phishing.png\"\n                  x=\"610\" y=\"1010\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"1025\">Social Engineering<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"1045\">\n              \u2022 Smishing, malicious links, credential theft\n            <\/text>\n          <\/g>\n          <!-- 9. Physical & Supply Chain -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"1100\" width=\"480\" height=\"80\" fill=\"#f1f1f1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/repair.png\"\n                  x=\"610\" y=\"1110\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"1125\">Physical & Supply Chain<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"1145\">\n              \u2022 Lost\/stolen device, malicious firmware\n            <\/text>\n          <\/g>\n        <\/g>\n        <!-- End of mobileLayers group -->\n        \n        <!-- =========================================== -->\n        <!-- Firewall Attack Surface Details (Hidden) -->\n        <!-- =========================================== -->\n        <g id=\"firewallLayers\" visibility=\"hidden\">\n          <!-- 1. Firmware & OS -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"300\" width=\"480\" height=\"80\" fill=\"#ffeae1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/?size=100&id=hbCljOlfk4WP&format=png&color=000000\"\n                  x=\"610\" y=\"310\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"325\">Firmware & OS<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"345\">\n              \u2022 Outdated firmware, unpatched kernel, supply-chain risks\n            <\/text>\n          <\/g>\n          <!-- 2. Admin Interface & Remote Mgmt -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"400\" width=\"480\" height=\"80\" fill=\"#e1ffe8\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/password-window.png\"\n                  x=\"610\" y=\"410\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"425\">Admin & Remote Mgmt<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"445\">\n              \u2022 Default credentials, exposed management ports\n            <\/text>\n          <\/g>\n          <!-- 3. Rule Config & Policy -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"500\" width=\"480\" height=\"80\" fill=\"#fff8e1\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/data-configuration.png\"\n                  x=\"610\" y=\"510\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"525\">Rule Config & Policy<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"545\">\n              \u2022 Overly permissive rules, misconfigured NAT\/port forwarding\n            <\/text>\n          <\/g>\n          <!-- 4. Bypass & Evasion -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"600\" width=\"480\" height=\"80\" fill=\"#e8e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/flow-chart.png\"\n                  x=\"610\" y=\"610\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"625\">Bypass & Evasion<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"645\">\n              \u2022 Fragmented packet attacks, protocol tunneling\n            <\/text>\n          <\/g>\n          <!-- 5. Logging & Monitoring -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"700\" width=\"480\" height=\"80\" fill=\"#f6f6c9\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/statistics.png\"\n                  x=\"610\" y=\"710\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"725\">Logging & Monitoring<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"745\">\n              \u2022 Insufficient logs, no SIEM integration\n            <\/text>\n          <\/g>\n          <!-- 6. Denial of Service -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"800\" width=\"480\" height=\"80\" fill=\"#ffe4e4\" \/>\n            <image href=\"https:\/\/img.icons8.com\/fluency\/48\/cancel-2.png\"\n                  x=\"610\" y=\"810\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"825\">Denial of Service<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"845\">\n              \u2022 Flooding, protocol exploits, resource exhaustion\n            <\/text>\n          <\/g>\n          <!-- 7. Physical & Supply-Chain -->\n          <g>\n            <rect class=\"layer-box\" x=\"600\" y=\"900\" width=\"480\" height=\"80\" fill=\"#f6e1ff\" \/>\n            <image href=\"https:\/\/img.icons8.com\/color\/48\/toolbox.png\"\n                  x=\"610\" y=\"910\" width=\"48\" height=\"48\"\/>\n            <text class=\"label\" x=\"820\" y=\"925\">Physical & Supply Chain<\/text>\n            <text class=\"layer-text\" x=\"670\" y=\"945\">\n              \u2022 Unauthorized console access, malicious updates\n            <\/text>\n          <\/g>\n        <\/g>\n        <!-- End of firewallLayers group -->\n    <\/svg>\n\n    <script>\n      \/* ================================================ *\/\n      \/* NEW CODE: Single toggle function with auto-close *\/\n      \/* ================================================ *\/\n      let lastOpen = null; \/\/ track which group was last opened\n\n      async function toggleDetails(groupId) {\n        \/\/ if the same group is clicked again, hide it\n        if (lastOpen === groupId) {\n          document.getElementById(groupId).style.visibility = 'hidden';\n          document.getElementById(groupId).style.opacity = '0';\n          lastOpen = null;\n          clearCvePanel();\n          hideAttackFlows(); \n          return;\n        }\n        \/\/ close previous if it exists\n        if (lastOpen && lastOpen !== groupId) {\n          document.getElementById(lastOpen).style.visibility = 'hidden';\n          document.getElementById(lastOpen).style.opacity = '0';\n        }\n        \/\/ show new group\n        const grp = document.getElementById(groupId);\n        grp.style.visibility = 'visible';\n        grp.style.opacity = '1';\n        lastOpen = groupId;\n\n        \/\/ fetch CVEs relevant to this group (sample logic)\n        showCvesForGroup(groupId);\n      }\n\n      \/* Optional: a function to hide all custom flows *\/\n      function hideAttackFlows() {\n        document.getElementById('attackFlowFirewall').style.opacity = '0';\n      }\n\n      \/* The original simpler toggles have been replaced with the new toggleDetails logic,\n         so they are no longer needed. *\/\n    <\/script>\n<\/body>\n<\/html>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c026fe elementor-widget elementor-widget-spacer\" data-id=\"7c026fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Interactive SME Network Security Architecture Interactive SME Network Security Architecture Cloud Services Web Server Database Server Firewall Router Wi-Fi Switch [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-299","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/pages\/299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":12,"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/pages\/299\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/pages\/299\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/sectechinnovations.com\/index.php\/wp-json\/wp\/v2\/media?parent=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}