diff --git a/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf b/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf index a7a985310b151049f708989ff1b5dc29d8e6f45f..01309432ecd91a718bead3977d6a7779bd6a2f28 100644 Binary files a/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf and b/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf differ diff --git a/Thesis_Docs/main.tex b/Thesis_Docs/main.tex index bcb1e5d61f9d6dee359f7af0ad2fef8e62dc0bb1..5fda9771fcbfdc1b5bdce9840a7b16025bdd16b7 100644 --- a/Thesis_Docs/main.tex +++ b/Thesis_Docs/main.tex @@ -49,7 +49,7 @@ APT actors employ various covert tactics to remain undetected and achieve their \section{Enterprise Networks} Enterprise networks are the backbone of modern organizations, providing the necessary infrastructure for communication, data sharing, and operational efficiency. However, their complexity and scale make them attractive targets for cyber attackers. Understanding the architecture, components, and vulnerabilities of enterprise networks is important for developing effective cybersecurity strategies. -\begin{figure}[htbp] +\begin{figure} \centering \includegraphics[width=0.7\textwidth]{../Thesis_Docs/media/enterprise_network_diagram.png} \caption{Enterprise network diagram}