%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TB A["Network Security (ความปลอดภัยเครือข่าย)"] --> B["Confidentiality (ความลับ)"] A --> C["Integrity (ความสมบูรณ์)"] A --> D["Availability (ความพร้อมใช้)"] A --> E["Authentication (การพิสูจน์ตัวตน)"] A --> F["Non-repudiation (การไม่ปฏิเสธ)"] style A fill:#d65d0e,stroke:#ebdbb2,stroke-width:3px,color:#282828 style B fill:#98971a,stroke:#ebdbb2,color:#282828 style C fill:#98971a,stroke:#ebdbb2,color:#282828 style D fill:#98971a,stroke:#ebdbb2,color:#282828 style E fill:#458588,stroke:#ebdbb2,color:#282828 style F fill:#458588,stroke:#ebdbb2,color:#282828
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph LR subgraph CIA["CIA Triad"] C["Confidentiality (ความลับ) - Encryption - Access Control - Authentication"] I["Integrity (ความสมบูรณ์) - Hashing - Digital Signatures - Checksums"] A["Availability (ความพร้อมใช้) - Redundancy - Load Balancing - DDoS Protection"] end C -.-> I I -.-> A A -.-> C style C fill:#b16286,stroke:#ebdbb2,stroke-width:2px,color:#282828 style I fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828 style A fill:#689d6a,stroke:#ebdbb2,stroke-width:2px,color:#282828
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TD A["Risk Assessment (การประเมินความเสี่ยง)"] --> B["Identify Assets (ระบุทรัพย์สิน)"] A --> C["Identify Threats (ระบุภัยคุกคาม)"] A --> D["Identify Vulnerabilities (ระบุจุดอ่อน)"] B --> E["Risk Analysis (วิเคราะห์ความเสี่ยง)"] C --> E D --> E E --> F["Calculate Risk Level (คำนวณระดับความเสี่ยง)"] style A fill:#d65d0e,stroke:#ebdbb2,stroke-width:3px,color:#282828 style E fill:#98971a,stroke:#ebdbb2,stroke-width:2px,color:#282828 style F fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TD F["Calculate Risk Level"] --> G{"Risk Level (ระดับความเสี่ยง)"} G -->|High| H["Immediate Action (ดำเนินการทันที)"] G -->|Medium| I["Plan Mitigation (วางแผนลดความเสี่ยง)"] G -->|Low| J["Monitor (ติดตาม)"] style F fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828 style H fill:#cc241d,stroke:#ebdbb2,stroke-width:2px,color:#ebdbb2 style I fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828 style J fill:#689d6a,stroke:#ebdbb2,stroke-width:2px,color:#282828
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph LR A["Prevention (การป้องกัน)"] --> B{"Threat - Detected?"} B -->|No| C[Normal Operations] B -->|Yes| D["Detection (การตรวจจับ)"] D --> E["Response (การตอบสนอง)"] E --> F[Containment] F --> G[Eradication] G --> H[Recovery] H --> I[Lessons Learned] I --> A C --> A style A fill:#689d6a,stroke:#ebdbb2,stroke-width:2px,color:#282828 style D fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828 style E fill:#cc241d,stroke:#ebdbb2,stroke-width:2px,color:#ebdbb2
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TB subgraph Intruders["Types of Intruders"] M["Masquerader (ผู้แอบอ้าง) - Outsider - Stolen Credentials"] MF["Misfeasor (ผู้ใช้ที่กระทำผิด) - Insider - Privilege Abuse"] C["Clandestine User (ผู้ใช้ลับ) - Highly Skilled - Evades Detection"] end M --> D1[Detection:Login Anomalies] MF --> D2[Detection:DLP, UAM] C --> D3[Detection:Behavioral Analytics] style M fill:#cc241d,stroke:#ebdbb2,stroke-width:2px,color:#ebdbb2 style MF fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828 style C fill:#b16286,stroke:#ebdbb2,stroke-width:2px,color:#282828
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TB A[Network Traffic] --> B{Detection Method} B --> C["Statistical Anomaly - Detection"] B --> D["Rule-Based - Detection"] C --> E["Analyze Deviation - from Baseline"] D --> F["Match Against - Signatures"] E --> G{"Anomaly - Detected?"} F --> H{"Match - Found?"} G -->|Yes| I[Alert: Anomaly] G -->|No| J[Normal Traffic] H -->|Yes| K[Alert: Known Threat] H -->|No| J style C fill:#98971a,stroke:#ebdbb2,stroke-width:2px,color:#282828 style D fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828 style I fill:#cc241d,stroke:#ebdbb2,stroke-width:2px,color:#ebdbb2 style K fill:#cc241d,stroke:#ebdbb2,stroke-width:2px,color:#ebdbb2
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TB subgraph L1["Layer 1: Perimeter"] P["Firewall - IDS/IPS - DMZ"] end subgraph L2["Layer 2: Network"] N["Segmentation - VLANs - ACLs"] end subgraph L3["Layer 3: Host"] H["Antivirus - Host Firewall - Patches"] end subgraph L4["Layer 4: Application"] A["Input Validation - Authentication - Authorization"] end subgraph L5["Layer 5: Data"] D["Encryption - DLP - Access Control"] end L1 --> L2 L2 --> L3 L3 --> L4 L4 --> L5 style L1 fill:#cc241d,stroke:#ebdbb2,color:#ebdbb2 style L2 fill:#d79921,stroke:#ebdbb2,color:#282828 style L3 fill:#b8bb26,stroke:#ebdbb2,color:#282828 style L4 fill:#689d6a,stroke:#ebdbb2,color:#282828 style L5 fill:#458588,stroke:#ebdbb2,color:#282828
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TB A[Authentication Factors] --> B["Type 1: - Something You Know"] A --> C["Type 2: - Something You Have"] A --> D["Type 3: - Something You Are"] B --> E["Password - PIN - Security Questions"] C --> F["Token - Smart Card - Mobile Device"] D --> G["Fingerprint - Iris - Face Recognition"] E --> H["Single Factor - Authentication"] E --> I["Multi-Factor - Authentication - MFA"] F --> I G --> I style A fill:#d65d0e,stroke:#ebdbb2,stroke-width:3px,color:#282828 style B fill:#458588,stroke:#ebdbb2,color:#282828 style C fill:#b16286,stroke:#ebdbb2,color:#282828 style D fill:#689d6a,stroke:#ebdbb2,color:#282828 style I fill:#98971a,stroke:#ebdbb2,stroke-width:2px,color:#282828
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TB A[User Login Attempt] --> B{Risk Assessment} B --> C[Analyze Context:- Location- Device- Time- Behavior] C --> D{Risk Level} D -->|Low Risk| E[Password Only] D -->|Medium Risk| F[Password + OTP] D -->|High Risk| G[Password + OTP+ Email Verification] E --> H{Authenticated?} F --> H G --> H H -->|Yes| I[Grant Access] H -->|No| J[Deny Access] style A fill:#458588,stroke:#ebdbb2,color:#282828 style D fill:#d79921,stroke:#ebdbb2,stroke-width:2px,color:#282828 style I fill:#689d6a,stroke:#ebdbb2,color:#282828 style J fill:#cc241d,stroke:#ebdbb2,color:#ebdbb2
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% stateDiagram-v2 [*] --> Provisioning: New User Request Provisioning --> Active: Account Created Active --> Modification: Job Change Modification --> Active: Updated Active --> Suspended: Security Incident Suspended --> Active: Resolved Suspended --> Deprovisioned: Termination Active --> Deprovisioned: Employee Leaves Deprovisioned --> Archived: 90 Days Archived --> [*]: Deleted
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph LR U1[User: Alice] --> R1[Role: Doctor] U2[User: Bob] --> R2[Role: Nurse] U3[User: Carol] --> R2 R1 --> P1[Read Patient Records] R1 --> P2[Write Prescriptions] R2 --> P1 R2 --> P3[Update Vitals] style U1 fill:#458588,stroke:#ebdbb2 style U2 fill:#458588,stroke:#ebdbb2 style R1 fill:#d79921,stroke:#ebdbb2 style R2 fill:#98971a,stroke:#ebdbb2
%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#282828','primaryTextColor':'#ebdbb2','primaryBorderColor':'#d65d0e','lineColor':'#98971a','secondaryColor':'#3c3836','tertiaryColor':'#504945','background':'#282828','mainBkg':'#3c3836','secondBkg':'#504945','textColor':'#ebdbb2','border1':'#d65d0e','border2':'#98971a'}}}%% graph TB subgraph Layer1["Layer 1: Perimeter"] L1["Fencing - Gates - Lighting"] end subgraph Layer2["Layer 2: Building"] L2["Access Control - Security Desk - Guards"] end subgraph Layer3["Layer 3: Room"] L3["Locked Doors - Card Access - Biometric"] end subgraph Layer4["Layer 4: Equipment"] L4["Cable Locks - Asset Tags - Cages"] end subgraph Core["Data Center Core"] SERVER["Servers - Storage - Network"] end Layer1 --> Layer2 Layer2 --> Layer3 Layer3 --> Layer4 Layer4 --> Core style Layer1 fill:#cc241d,stroke:#ebdbb2 style Layer2 fill:#d79921,stroke:#ebdbb2 style Layer3 fill:#b8bb26,stroke:#ebdbb2 style Layer4 fill:#689d6a,stroke:#ebdbb2 style Core fill:#458588,stroke:#ebdbb2,stroke-width:3px