Skip to content
Snippets Groups Projects
Commit 74120129 authored by Aida Nikkhah Nasab's avatar Aida Nikkhah Nasab
Browse files

update Mastersthesis.pdf and main.tex to improve content quality and adjust figure placement

parent a4171b86
No related branches found
Tags v1.143
No related merge requests found
Pipeline #57907 failed
No preview for this file type
......@@ -49,7 +49,7 @@ APT actors employ various covert tactics to remain undetected and achieve their
\section{Enterprise Networks}
Enterprise networks are the backbone of modern organizations, providing the necessary infrastructure for communication, data sharing, and operational efficiency. However, their complexity and scale make them attractive targets for cyber attackers. Understanding the architecture, components, and vulnerabilities of enterprise networks is important for developing effective cybersecurity strategies.
\begin{figure}[htbp]
\begin{figure}
\centering
\includegraphics[width=0.7\textwidth]{../Thesis_Docs/media/enterprise_network_diagram.png}
\caption{Enterprise network diagram}
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment