{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/4WDicDWPLugPmfBxANTm/OLr8heTRybbY2GrPTxzD/Lyv2q3pwY-13.js"],
  "sourcesContent": ["import{jsx as e,jsxs as i}from\"react/jsx-runtime\";import*as n from\"react\";export const richText=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Quick Response Code (QR Code) is a two-dimensional barcode readable by smartphones and QR readers, linking directly to text, emails, websites, phone numbers, and more.\"}),/*#__PURE__*/e(\"h2\",{children:\"How QR Codes Enhance Security\"}),/*#__PURE__*/e(\"p\",{children:\"QR codes have become a vital tool in enhancing security across various applications. Their ability to store and quickly share information makes them indispensable, but they also come with unique security features that help protect users and data.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" QR codes can be used to verify login details and authenticate online accounts securely.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" They can store encryption details for secure Wi-Fi access, reducing the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Traceability:\"}),\" Advanced QR codes include traceability features to prevent counterfeiting and ensure product authenticity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing Protection:\"}),\" Trusted QR scanners can detect and alert users to potential phishing scams and malicious links.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Generating Your Own QR Code\"}),/*#__PURE__*/e(\"p\",{children:\"Generating your own QR code is straightforward and can be done using various online tools. Start by selecting a QR code generator, many of which are free and user-friendly. Enter the data you want to encode, such as a URL, text, or contact information, and customize the design if desired.\"}),/*#__PURE__*/e(\"p\",{children:\"Once your QR code is generated, download it in a suitable format like PNG or SVG. Test the QR code with multiple devices to ensure it scans correctly. Finally, integrate the QR code into your desired medium, whether it's printed material or a digital platform.\"}),/*#__PURE__*/e(\"h2\",{children:\"QR Codes vs. Traditional Barcodes\"}),/*#__PURE__*/e(\"p\",{children:\"QR codes and traditional barcodes serve similar purposes but differ significantly in functionality and application.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Capacity:\"}),\" QR codes can store a vast amount of information, including URLs, text, and contact details, whereas traditional barcodes are limited to alphanumeric data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scanning Technology:\"}),\" Traditional barcodes require specialized scanners, while QR codes can be scanned using smartphones and tablets, making them more versatile and accessible.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Innovative Uses of QR Codes in Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"QR codes are increasingly being used in innovative ways to enhance cybersecurity. They can be utilized for secure authentication by verifying user identities and access permissions, while secure QR codes (SQRC) can store encrypted data to ensure information privacy. Additionally, QR codes offer traceability by logging and tracking access attempts, providing valuable data for security audits. These applications make QR codes a versatile tool in strengthening cybersecurity measures.\"})]});export const richText1=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Extensible Authentication Protocol (EAP) is a flexible framework supporting multiple authentication methods, such as passwords, smart cards, and digital certificates, primarily used in network communications.\"}),/*#__PURE__*/e(\"h2\",{children:\"History and Evolution of EAP\"}),/*#__PURE__*/e(\"p\",{children:\"The Extensible Authentication Protocol (EAP) has undergone significant changes since its inception, evolving to meet the growing demands of network security. Initially designed for PPP connections, EAP has expanded its reach to various network types, including wireless LANs and dial-up connections.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Origins:\"}),\" Developed to support multiple authentication mechanisms for PPP.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Expansion:\"}),\" Adapted to include wireless networks and LANs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technological Impact:\"}),\" Leveraged advancements in wireless technology for enhanced security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Future Directions:\"}),\" Expected to integrate seamlessly with 5G networks.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Types of EAP Methods\"}),/*#__PURE__*/e(\"p\",{children:\"EAP-TLS (Transport Layer Security) is a widely used EAP method that employs certificate-based mutual authentication, ensuring both client and server verify each other's identity. EAP-TTLS (Tunneled TLS) simplifies this by requiring only server-side certificates, making it easier to implement while still providing robust security.\"}),/*#__PURE__*/e(\"p\",{children:\"PEAP (Protected EAP) creates a secure TLS tunnel using server certificates, within which client authentication occurs, enhancing security without needing client-side certificates. EAP-FAST (Flexible Authentication via Secure Tunneling) offers mutual authentication using a Protected Access Credential (PAC), eliminating the need for server certificates.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing EAP in Network Security\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing EAP in network security can significantly enhance the protection of your network by providing a flexible and scalable authentication framework. EAP supports various authentication methods, making it adaptable to different security requirements and network environments.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexibility:\"}),\" EAP supports multiple authentication mechanisms, including passwords, smart cards, and digital certificates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability:\"}),\" Suitable for both small local networks and large enterprise environments.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Enhances security by allowing the use of strong authentication methods.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Adaptability:\"}),\" Can be integrated with emerging technologies like 5G networks.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"EAP versus Other Authentication Protocols\"}),/*#__PURE__*/e(\"p\",{children:\"EAP offers a flexible and secure authentication framework compared to other protocols. Its flexibility allows it to support multiple authentication methods, such as smart cards and digital certificates, while simpler protocols like PAP rely on less secure mechanisms. In terms of security, EAP's ability to use strong authentication methods like public-key encryption provides enhanced protection, whereas protocols like CHAP are more vulnerable to certain types of attacks. This makes EAP a more robust and adaptable option for secure authentication.\"})]});export const richText2=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Access and Identity Management (AIM) involves managing digital identities and controlling user access to resources. It includes authentication, authorization, and access control to ensure security and operational efficiency.\"}),/*#__PURE__*/e(\"h2\",{children:\"Principles of Secure Identity Management\"}),/*#__PURE__*/e(\"p\",{children:\"Secure identity management is crucial for protecting sensitive information and ensuring that only authorized users have access to resources. By implementing robust identity management principles, organizations can enhance security and operational efficiency.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" Verifying the identity of users, processes, or devices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authorization:\"}),\" Determining access privileges based on evaluated access control information.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Granting or denying requests to use information and related services.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Role-Based Access Control:\"}),\" Regulating access based on user roles defined by job title and responsibility.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Challenges and Solutions in Access Management\"}),/*#__PURE__*/e(\"p\",{children:\"Access management faces several challenges, including unauthorized access, data breaches, and the presence of malicious code. These issues can compromise the security and integrity of sensitive information, making it crucial to implement robust security measures.\"}),/*#__PURE__*/e(\"p\",{children:\"Solutions to these challenges include implementing strong authentication and authorization processes, using encryption to protect data, and having an incident response plan in place. These strategies help ensure that only authorized users can access resources, thereby enhancing overall security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Identity, Access, and Authentication\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the distinctions between identity, access, and authentication is crucial for effective cybersecurity management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identity:\"}),\" Refers to the unique characteristics or attributes that define an entity, such as a user or device.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access:\"}),\" Involves the permissions and privileges granted to users to interact with resources, ensuring they can perform their roles.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" The process of verifying and validating the identity of a user or device to confirm they are who they claim to be.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing an Identity Management Framework\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing an identity management framework involves several essential steps to ensure robust security and operational efficiency. This includes verifying the identity of users, processes, or devices through authentication, determining access privileges based on evaluated access control information through authorization, and granting or denying requests to use information and related services through access control. These steps together help create a secure and efficient identity management system, ensuring that only authorized entities can access the necessary resources.\"})]});export const richText3=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An active attack is a deliberate attempt by a threat actor to alter a system, its resources, data, or operations. It involves direct interaction with the target to disrupt or manipulate its functioning.\"}),/*#__PURE__*/e(\"h2\",{children:\"Types of Active Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"Active attacks are deliberate attempts by threat actors to disrupt or manipulate systems, data, or operations. These attacks involve direct interaction with the target and can have severe consequences for organizations.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Masquerade Attack:\"}),\" Pretending to be a legitimate user to gain unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Session Hijacking:\"}),\" Stealing a user's session ID to impersonate the user.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Denial-of-Service (DoS):\"}),\" Overwhelming a system with traffic to make it inaccessible.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Message Modification:\"}),\" Altering data packets to redirect or modify messages.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Detection and Prevention Strategies\"}),/*#__PURE__*/e(\"p\",{children:\"Detection strategies for active attacks include using firewalls and Intrusion Detection Systems (IDS) to monitor network traffic for suspicious activities. Indicators of Compromise (IoC) and alerts also play a crucial role in identifying potential breaches. Regular monitoring and logging help in early detection and response.\"}),/*#__PURE__*/e(\"p\",{children:\"Prevention strategies involve implementing strong access control measures and using antivirus software to block malicious code. Employing data loss prevention techniques and ensuring regular software updates and patching are essential. Security awareness training for employees further strengthens the organization's defense against active attacks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Active vs. Passive Attacks: Understanding the Difference\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between active and passive attacks is crucial for effective cybersecurity.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Active Attacks:\"}),\" These involve direct interaction with the target system to alter its operations, data, or resources. Examples include DDoS attacks and session hijacking.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Passive Attacks:\"}),\" These focus on monitoring and intercepting data without altering the system. Examples include eavesdropping and traffic analysis.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Mitigating the Impact of Active Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"Mitigating the impact of active attacks requires a multi-faceted approach. This includes implementing an effective incident response to swiftly address and contain the attack, focusing on recovery to restore systems and data to normal operations, and enhancing resilience by building systems that can withstand and quickly recover from attacks. Together, these strategies help minimize damage and ensure operational continuity during and after an attack.\"})]});export const richText4=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The National Cybersecurity Education Council (NCEC) promotes and enhances cybersecurity education and training initiatives, fostering collaboration between educational institutions, government agencies, and industry partners to develop cybersecurity standards and curricula.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding NCEC Operations\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the operations of the National Cybersecurity Education Council (NCEC) involves examining its key functions and initiatives. The NCEC plays a crucial role in shaping cybersecurity education and fostering collaboration among various stakeholders.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Glossary:\"}),\" Provides a comprehensive list of cybersecurity terms and definitions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Colloquium:\"}),\" Hosts events like the National Cybersecurity Education Colloquium to discuss trends and advancements.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Partnerships:\"}),\" Collaborates with academic institutions and federal agencies to enhance cybersecurity education.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Standards:\"}),\" Establishes and maintains high standards for cybersecurity curricula and academic excellence.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Services Provided by NCEC\"}),/*#__PURE__*/e(\"p\",{children:\"The National Cybersecurity Education Council (NCEC) offers a comprehensive glossary of cybersecurity terms, providing definitions, synonyms, and related terms. This resource aids in standardizing terminology across the cybersecurity community, ensuring consistent understanding and communication.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, the NCEC organizes the National Cybersecurity Education Colloquium, featuring workshops, briefings, and research symposiums. These events foster collaboration and knowledge sharing among educators, researchers, and industry professionals, enhancing the overall quality of cybersecurity education.\"}),/*#__PURE__*/e(\"h2\",{children:\"NCEC vs. Other Cybersecurity Centers\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing the National Cybersecurity Education Council (NCEC) with other cybersecurity centers reveals distinct differences in focus and approach.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus:\"}),\" NCEC emphasizes cybersecurity education and standardization, while other centers like NCAE-C prioritize specialized workshops and research symposiums.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration:\"}),\" NCEC is integrated into the NICCS platform, enhancing its reach and resources, whereas other centers often operate independently or under different government agencies.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Impact of NCEC on National Security\"}),/*#__PURE__*/e(\"p\",{children:\"The National Cybersecurity Education Council (NCEC) plays a critical role in enhancing national security through its initiatives. It develops a well-trained cybersecurity workforce by promoting education, establishes high standards for cybersecurity curricula, and fosters collaboration between educational institutions and federal agencies. These efforts collectively strengthen the nation\u2019s ability to defend against cyber threats and maintain a secure digital infrastructure.\"})]});export const richText5=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Systems development involves creating and maintaining information systems through a structured process, ensuring security and functionality at every phase.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Principles of Systems Development\"}),/*#__PURE__*/e(\"p\",{children:\"Effective systems development hinges on several key principles that ensure both security and functionality. These principles guide the development process, helping teams create robust and reliable systems.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Integration\"}),\": Incorporate security measures at every phase of development.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Documentation\"}),\": Maintain comprehensive system documentation to support security and compliance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Risk Assessment\"}),\": Regularly assess and document potential risks and necessary controls.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Management\"}),\": Implement processes to manage and control system changes effectively.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Phases in Systems Development Lifecycle\"}),/*#__PURE__*/e(\"p\",{children:\"The Systems Development Lifecycle (SDLC) consists of several phases, each crucial for creating secure and functional systems. These phases typically include planning, analysis, design, implementation, testing, deployment, and maintenance. Each phase integrates security measures to ensure compliance with regulatory standards and protect against potential threats.\"}),/*#__PURE__*/e(\"p\",{children:\"During the planning phase, security roles and responsibilities are defined. The analysis phase involves assessing risks and classifying information. In the design phase, security controls are selected and documented. Implementation and testing ensure that security measures are effective, while deployment and maintenance focus on continuous security compliance and system updates.\"}),/*#__PURE__*/e(\"h2\",{children:\"Systems Development: Best Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Adopting best practices in systems development is crucial for creating secure and efficient systems.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Build Security In\"}),\": Integrate security measures from the initial design phase.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Integration\"}),\": Regularly merge code changes to detect and address issues promptly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Documentation\"}),\": Maintain detailed records to support security and compliance.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Systems Development Models\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing Systems Development Models highlights different approaches to integrating security and managing development phases. The SDLC follows a structured approach with distinct phases, whereas the SSDLC integrates security tasks into every phase, ensuring comprehensive security throughout the process. While the SDLC is more straightforward, it can be rigid and time-consuming, whereas the SSDLC introduces added complexity and overhead due to its detailed security requirements and extensive documentation. These differences influence the adaptability and security focus of each model.\"})]});export const richText6=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Baselining is the process of monitoring system behavior to establish a standard of normal activity, enabling the detection of anomalies that may indicate security threats.\"}),/*#__PURE__*/e(\"h2\",{children:\"Steps for Effective Baselining\"}),/*#__PURE__*/e(\"p\",{children:\"Effective baselining is crucial for maintaining robust cybersecurity. By establishing a standard of normal activity, organizations can quickly identify and address anomalies. Here are some key steps for effective baselining:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Monitoring:\"}),\" Continuously observe system behavior to maintain up-to-date baselines.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trend Analysis:\"}),\" Compare data over different periods to identify patterns and trends.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Impact Assessment:\"}),\" Evaluate the effects of system updates by comparing post-update performance to the baseline.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alternative Testing:\"}),\" Test new solutions against the baseline to ensure they meet performance standards.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Importance of Baselining in Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Baselining is essential in cybersecurity for identifying deviations from normal system behavior, which can indicate potential threats. By establishing a standard reference point, organizations can detect anomalies more effectively, ensuring timely responses to security incidents.\"}),/*#__PURE__*/e(\"p\",{children:\"Regular monitoring and comparison against the baseline help maintain network stability and performance. This proactive approach not only enhances threat detection but also aids in assessing the impact of system updates and exploring alternative solutions, ultimately contributing to a more secure and resilient infrastructure.\"}),/*#__PURE__*/e(\"h2\",{children:\"Baselining vs. Benchmarking: Understanding the Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between baselining and benchmarking is crucial for effective cybersecurity management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Baselining:\"}),\" Involves monitoring system behavior to establish a standard of normal activity, enabling the detection of anomalies that may indicate security threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benchmarking:\"}),\" Focuses on comparing performance metrics against industry standards or best practices to identify areas for improvement and ensure optimal performance.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of a Strong Baselining Strategy\"}),/*#__PURE__*/e(\"p\",{children:\"A strong baselining strategy involves several key components that ensure the stability and effectiveness of system performance. Continuous monitoring is essential for regularly observing system behavior to maintain an accurate baseline. Trend analysis helps by comparing data over time to identify patterns and anticipate future needs. Impact assessment allows for the evaluation of changes by comparing post-update performance to the established baseline, ensuring any modifications do not negatively affect system operations. These components work together to maintain optimal system performance.\"})]});export const richText7=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The Internet Engineering Task Force (IETF) is a global organization that defines standard Internet protocols like TCP/IP, ensuring smooth and efficient Internet operations. It operates under the Internet Society's Internet Architecture Board (IAB).\"}),/*#__PURE__*/e(\"h2\",{children:\"The Role of Internet Engineering Task Force\"}),/*#__PURE__*/e(\"p\",{children:\"The Internet Engineering Task Force (IETF) plays a crucial role in shaping the standards that ensure the smooth operation of the Internet. As an open standards organization, it is responsible for defining protocols like TCP/IP, which are fundamental to Internet functionality.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Standards:\"}),\" Defines protocols such as TCP/IP.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Collaboration:\"}),\" Works with organizations like ISO and ITU.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Initiatives:\"}),\" Hosts hackathons to improve Internet quality.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Develops robust standards for secure operations.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Achievements of IETF\"}),/*#__PURE__*/e(\"p\",{children:\"The IETF has made significant strides in defining and standardizing key internet protocols, such as TCP/IP and IPsec. These protocols are fundamental to the operation and security of the internet, ensuring reliable data transmission and robust network security.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, the IETF has been instrumental in developing internet governance standards for the Internet of Things (IoT) and hosting hackathons to improve internet interoperability. Their collaborative efforts with other standards bodies have further solidified their role in shaping the future of internet technology.\"}),/*#__PURE__*/e(\"h2\",{children:\"IETF vs. Other Standard Bodies\"}),/*#__PURE__*/e(\"p\",{children:\"When comparing the IETF to other standard bodies, several key differences emerge:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Structure:\"}),\" The IETF is an open standards organization with volunteer-based membership, while ISO is a voluntary, non-treaty organization, and ITU-T is a United Nations treaty organization.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus:\"}),\" The IETF primarily defines internet protocols like TCP/IP, ISO publishes a wide range of international standards, and ITU-T focuses on telecommunication standards.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Understanding IETF Documents\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding IETF documents is essential for anyone involved in internet technology. These documents define standard Internet operating protocols like TCP/IP, ensuring consistent communication across networks. They include various types of specifications, often approved by the IESG and published as RFCs. IETF documents are publicly available and can be easily accessed through the IETF's official website, providing open resources for developers, engineers, and researchers.\"})]});export const richText8=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"IP forwarding allows a host to act as a router, enabling it to route packets between different networks. This is crucial for network communication and connectivity, especially in multi-network environments.\"}),/*#__PURE__*/e(\"h2\",{children:\"How IP Forwarding Works\"}),/*#__PURE__*/e(\"p\",{children:\"IP forwarding is a critical process that allows a system to route packets between different networks, acting as a router. This functionality is essential for network communication and connectivity, especially in multi-network environments.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Definition:\"}),\" IP forwarding enables a host to act as a router, routing packets between networks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Functionality:\"}),\" When enabled, the system forwards packets from one network interface to another.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Routing Mechanism:\"}),\" Packets are routed based on the destination IP address using the system's routing table.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Configuration:\"}),\" On Linux, IP forwarding can be enabled by editing the \",/*#__PURE__*/e(\"code\",{children:\"/etc/sysctl.conf\"}),\" file and running the \",/*#__PURE__*/e(\"code\",{children:\"sysctl -p\"}),\" command.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Utilizing IP Forwarding\"}),/*#__PURE__*/e(\"p\",{children:\"Utilizing IP forwarding offers several benefits. It enables efficient network traffic management by allowing a host to route packets between different networks. This capability is essential for systems that act as routers or gateways, ensuring seamless data transmission across network segments.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, IP forwarding enhances security by controlling traffic flow and implementing access controls. It also supports network segmentation, which improves performance and security by isolating different network segments. Proper configuration is crucial to maximize these benefits and prevent potential cybersecurity threats.\"}),/*#__PURE__*/e(\"h2\",{children:\"IP Forwarding vs. IP Routing: Clarifying the Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between IP forwarding and IP routing is crucial for network management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Forwarding:\"}),\" This refers to the capability of an operating system to pass network traffic from one network interface to another, effectively allowing the host to function as a router.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Routing:\"}),\" Involves the actual process and protocols used to determine the best path for data packets to travel across interconnected networks, utilizing routing tables and algorithms.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Enabling IP Forwarding on Various Devices\"}),/*#__PURE__*/e(\"p\",{children:\"Enabling IP forwarding on various devices is a straightforward process that enhances network functionality. On Windows, this involves modifying the registry to enable IP forwarding. For Linux systems, you need to edit the /etc/sysctl.conf file and run the sysctl -p command. On macOS, the process requires using terminal commands to adjust the system settings. Each of these steps ensures proper configuration for efficient network routing across devices.\"})]});export const richText9=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A threat vector is the method a threat uses to reach its target. Examples include phishing, malware, and exploiting software vulnerabilities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Threat Vector Origins\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the origins of threat vectors is crucial for developing effective cybersecurity strategies. Threat vectors have evolved significantly over time, adapting to new technologies and exploiting vulnerabilities in various systems.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing:\"}),\" A long-standing method that remains prevalent.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SQL Injection:\"}),\" Inserting malicious SQL code into queries to manipulate databases.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Man-in-the-Middle Attack:\"}),\" Intercepting and relaying messages between two parties.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Buffer Overflow:\"}),\" Storing more data in a buffer than it can hold, leading to potential code execution.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Differentiating Threat Vectors and Threat Actors\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the distinction between threat vectors and threat actors is essential for effective cybersecurity.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Vectors:\"}),\" These are the methods or pathways used by cybercriminals to infiltrate systems, such as phishing, malware, and exploiting software vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Actors:\"}),\" These are the individuals or groups who utilize threat vectors, including hackers, disgruntled employees, and state-sponsored groups.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Mitigating Threat Vectors\"}),/*#__PURE__*/e(\"p\",{children:\"Mitigating threat vectors involves implementing various strategies to protect against potential cyber threats.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Patching:\"}),\" Ensuring software and systems are up-to-date to fix vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strong Authentication:\"}),\" Using multi-factor authentication to enhance security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Segmentation:\"}),\" Dividing networks to limit the spread of attacks.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Evolution of Threat Vectors\"}),/*#__PURE__*/e(\"p\",{children:\"Threat vectors have evolved from simple phishing emails to sophisticated multi-stage attacks. Early cyber threats like the Morris Worm highlighted vulnerabilities in networked systems, leading to increased awareness and development of cybersecurity measures. Over time, attackers have adapted, using more advanced techniques such as zero-day exploits and man-in-the-middle attacks.\"}),/*#__PURE__*/e(\"p\",{children:\"Modern threat vectors include phishing, malware, and browser-based attacks, exploiting both technological and human vulnerabilities. As technology advances, new attack methods continue to emerge, necessitating ongoing vigilance and adaptation in cybersecurity practices.\"})]});export const richText10=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Wireless Application Protocol (WAP) is a set of communication protocols designed to standardize internet access on wireless devices like mobile phones and radio transceivers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Evolution of Wireless Application Protocol\"}),/*#__PURE__*/e(\"p\",{children:\"The evolution of Wireless Application Protocol (WAP) has been marked by significant milestones and technological advancements. Initially conceived in 1997, WAP aimed to standardize internet access on mobile devices, overcoming various limitations of the time.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Conception:\"}),\" Developed in 1997 by Ericsson, Motorola, Nokia, and Unwired Planet.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Standardization:\"}),\" Provided a unified protocol for mobile internet access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technological Stack:\"}),\" Included layers like Wireless Application Environment and Wireless Transport Layer Security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Decline:\"}),\" WAP usage decreased around 2010 due to the rise of HTML-compatible mobile browsers.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Features of WAP Technology\"}),/*#__PURE__*/e(\"p\",{children:\"Wireless Application Protocol (WAP) offers several key features that make it a significant technology for mobile internet access. It standardizes communication protocols, enabling seamless internet access on wireless devices. WAP also supports various internet services, including email, web browsing, and chat, enhancing the functionality of mobile devices.\"}),/*#__PURE__*/e(\"p\",{children:\"Another notable feature is its layered architecture, which includes components like the Wireless Application Environment and Wireless Transport Layer Security. These layers ensure secure, efficient data transmission and support for mobile-specific applications, making WAP a versatile and robust solution for mobile internet access.\"}),/*#__PURE__*/e(\"h2\",{children:\"WAP Vs. Mobile Internet Explained\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between Wireless Application Protocol (WAP) and modern mobile internet is crucial for grasping the evolution of mobile connectivity.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technology:\"}),\" WAP is a set of protocols designed for early mobile internet access, while modern mobile internet uses advanced technologies like 4G and 5G for faster, more comprehensive connectivity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Capabilities:\"}),\" WAP supported basic services like email and web browsing, whereas modern mobile internet enables full web experiences, streaming, and app usage.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Security Measures in WAP Systems\"}),/*#__PURE__*/e(\"p\",{children:\"Security measures in WAP systems are essential for ensuring safe and reliable mobile internet access. These include using Wireless Transport Layer Security (WTLS) for encryption to protect data, employing public key cryptography for authentication to verify users, and ensuring data integrity by making sure data is not altered during transmission. Together, these measures help maintain a secure and trustworthy mobile browsing experience.\"})]});export const richText11=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"CSEC stands for Cyber Security Education Consortium. It is a collaborative initiative aimed at developing comprehensive curricular guidelines to enhance cybersecurity education and prepare students for real-world challenges.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding CSEC Threats\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the various threats in Cyber Security Education Consortium (CSEC) is crucial for developing effective defense strategies. These threats range from sophisticated attacks to more common vulnerabilities, each posing unique challenges to cybersecurity professionals.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Advanced Persistent Threat (APT):\"}),\" A sophisticated adversary using multiple attack vectors to achieve objectives.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malware:\"}),\" Software designed to disrupt, damage, or gain unauthorized access to computer systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing:\"}),\" Deceptive attempts to obtain sensitive information by masquerading as a trustworthy entity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ransomware:\"}),\" Malware that encrypts files and demands a ransom for their release.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of CSEC Prevention\"}),/*#__PURE__*/e(\"p\",{children:\"Key components of CSEC prevention include robust access control, effective authentication, and comprehensive encryption. These measures ensure that only authorized users can access sensitive information, verify identities, and protect data from unauthorized access.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, incident response and risk management are crucial. Incident response addresses immediate threats, while risk management involves identifying and mitigating potential risks. Together, these strategies form a solid foundation for preventing cybersecurity threats and ensuring a secure environment.\"}),/*#__PURE__*/e(\"h2\",{children:\"CSEC vs. Traditional Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing CSEC and traditional cybersecurity reveals distinct approaches to enhancing cybersecurity education and practice.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus:\"}),\" CSEC emphasizes educational initiatives and curricular guidelines, while traditional cybersecurity covers a broader range of activities, including policy-making and threat reduction.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Approach:\"}),\" CSEC provides structured guidance for program development, whereas traditional cybersecurity involves practical, interdisciplinary aspects like law, policy, and risk management.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Effective CSEC Measures\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing effective CSEC measures requires a combination of strategic planning and practical application. Key steps include implementing access control mechanisms to restrict unauthorized access, establishing incident response procedures to detect and address cyber incidents, and conducting risk management by identifying, assessing, and mitigating potential risks. Together, these measures help strengthen the overall cybersecurity posture and protect organizational assets.\"})]});export const richText12=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"DNSTwist is a tool that generates similar-looking domain names to a given domain, helping detect phishing, typosquatting, and other malicious activities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding DNSTwist Mechanisms\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the mechanisms behind DNSTwist is crucial for leveraging its full potential in cybersecurity. DNSTwist operates by generating domain names that are visually similar to a target domain and then performing DNS queries to gather information about these domains.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Generation:\"}),\" Creates a list of similar-looking domain names based on the target domain.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"DNS Queries:\"}),\" Performs DNS queries (A, AAAA, NS, MX) for each generated domain.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Similarity Checks:\"}),\" Calculates visual and HTML similarity to the target domain.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Detection:\"}),\" Identifies potential phishing and malicious domains.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Importance of DNSTwist in Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"DNSTwist plays a crucial role in cybersecurity by identifying phishing and typosquatting domains that mimic legitimate websites. This proactive approach helps organizations protect their brand and users from malicious activities. By generating similar-looking domain names and performing DNS queries, DNSTwist can intercept misdirected traffic and detect potential threats.\"}),/*#__PURE__*/e(\"p\",{children:\"Integrating DNSTwist into cybersecurity workflows enhances threat intelligence and incident response. It allows analysts to visualize domain relationships, making it easier to identify patterns and mitigate risks. This tool is essential for maintaining robust cybersecurity defenses in an increasingly digital world.\"}),/*#__PURE__*/e(\"h2\",{children:\"Detecting Phishing with DNSTwist\"}),/*#__PURE__*/e(\"p\",{children:\"Detecting phishing with DNSTwist involves generating similar-looking domain names and analyzing them for potential threats.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Generation:\"}),\" Creates a list of similar-looking domain names.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Analysis:\"}),\" Performs DNS queries and similarity checks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detection:\"}),\" Identifies potential phishing and malicious domains.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Practical Uses of DNSTwist in Security Audits\"}),/*#__PURE__*/e(\"p\",{children:\"DNSTwist is a versatile tool that can significantly enhance security audits by identifying potential threats. It enables proactive detection by generating similar-looking domain names and performing DNS queries to identify potential phishing and typosquatting domains, allowing security teams to mitigate risks before they escalate. Additionally, DNSTwist provides comprehensive analysis by examining visual and HTML similarities to detect cloned sites and malicious domains, offering a thorough assessment of potential threats during security audits. This makes DNSTwist a valuable asset in strengthening security measures.\"})]});export const richText13=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An internal network connects an organization's internal systems, facilitating secure communication and data exchange. It is typically organization-controlled, ensuring confidentiality and integrity through direct security measures.\"}),/*#__PURE__*/e(\"h2\",{children:\"Securing Your Internal Network\"}),/*#__PURE__*/e(\"p\",{children:\"Securing your internal network is crucial to protect sensitive data and maintain the integrity of your organization's operations. Implementing robust security measures can help mitigate risks and ensure that your network remains secure from internal and external threats.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Configuring systems so that individuals and other systems can only perform allowed functions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Using algorithms to convert clear text into cipher text to protect data from unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Patch Management:\"}),\" Regularly downloading and applying patches to correct functional problems or security vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Segmentation:\"}),\" Dividing the network into isolated segments to compartmentalize sensitive data and limit access.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of Internal Networks\"}),/*#__PURE__*/e(\"p\",{children:\"Key components of internal networks include Local Area Networks (LANs), which connect computers within a specific location, and Intranets, which are internal web servers not accessible from the internet. These components ensure efficient communication and data exchange within an organization.\"}),/*#__PURE__*/e(\"p\",{children:\"Devices like routers, switches, and firewalls play crucial roles in managing and securing internal networks. Routers direct data packets, switches connect devices, and firewalls filter traffic to protect against unauthorized access, ensuring the network's integrity and security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Internal vs. External Networks: Understanding the Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between internal and external networks is crucial for effective network management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Accessibility:\"}),\" Internal networks are typically restricted to organizational use, while external networks allow access to partners or customers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Control:\"}),\" Internal networks are managed directly by the organization, ensuring higher security, whereas external networks require robust external security measures.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Internal Network Management\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing best practices for internal network management is essential for maintaining a secure and efficient network. This includes configuring systems with strict access control so individuals and other systems can only perform allowed functions, managing user accounts through adding, modifying, and deleting accounts on systems and applications, and using configuration management to record, monitor, and verify system configurations to prevent unexpected security issues. These measures help ensure the network remains both secure and functional.\"})]});export const richText14=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Key exchange in cryptography is the process of securely exchanging cryptographic keys between parties to enable encrypted communication, ensuring only the intended recipient can decrypt the message.\"}),/*#__PURE__*/e(\"h2\",{children:\"Principles of Secure Key Exchange\"}),/*#__PURE__*/e(\"p\",{children:\"Secure key exchange is fundamental to maintaining the confidentiality and integrity of communications over insecure networks. It ensures that only the intended parties can access the encrypted information, preventing unauthorized access.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Ensures that only the intended recipient can decrypt the message.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integrity:\"}),\" Guarantees that the message has not been altered during transmission.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" Verifies the identities of the communicating parties.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Non-repudiation:\"}),\" Prevents either party from denying their involvement in the communication.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Methods of Key Exchange\"}),/*#__PURE__*/e(\"p\",{children:\"Key exchange methods are essential for secure communication. Common protocols include Diffie-Hellman, which allows two parties to exchange secret keys over a public channel, and RSA-OAEP, which uses RSA encryption with added randomness for enhanced security.\"}),/*#__PURE__*/e(\"p\",{children:\"Other methods like Kerberos and manual key transport also play significant roles. Innovations such as elliptic curve cryptography have introduced more secure and efficient protocols like ECDH and ECDHE, further advancing the field of cryptographic key exchange.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Exchange Protocols Explained\"}),/*#__PURE__*/e(\"p\",{children:\"Key exchange protocols are essential for secure communication over insecure networks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Diffie-Hellman:\"}),\" Enables secure key exchange over a public channel but is vulnerable to man-in-the-middle attacks due to lack of user authentication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"RSA-OAEP:\"}),\" Provides strong asymmetric encryption with added randomness, but is computationally intensive and requires a secure method to distribute the public key.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Challenges in Key Exchange\"}),/*#__PURE__*/e(\"p\",{children:\"Key exchange in cryptography faces several significant challenges that impact its effectiveness. One key issue is ensuring security, as keys must be protected from interception by unauthorized parties. Scalability is another challenge, as managing key exchanges efficiently becomes difficult in large networks. Finally, usability is critical, as methods must be designed to balance both security and user-friendliness to ensure widespread adoption and effective use.\"})]});export const richText15=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between an identity provider and a service provider.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding the Core Components of SAML\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the core components of SAML is essential for grasping how this protocol facilitates secure authentication and authorization. SAML operates through a series of interactions between different entities, ensuring that user credentials are managed efficiently and securely.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Assertions:\"}),\" XML-based statements that convey information about a user, such as authentication, attributes, and authorization decisions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Protocols:\"}),\" Define how SAML requests and responses are communicated between identity providers and service providers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bindings:\"}),\" Specify how SAML protocol messages are mapped onto standard messaging formats like HTTP or SOAP.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Profiles:\"}),\" Describe specific use cases for SAML, such as Web Browser Single Sign-On (SSO), detailing how the protocol should be used in different scenarios.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Advantages of Implementing SAML\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing SAML offers significant advantages for organizations. It enhances interoperability by enabling single sign-on (SSO) across various systems and platforms, simplifying user access. Centralized authentication reduces the need for multiple passwords, bolstering security and streamlining user management.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, SAML improves the user experience by allowing access to multiple applications with a single set of credentials. This not only simplifies the login process but also reduces the time spent on password resets and related issues, leading to increased productivity.\"}),/*#__PURE__*/e(\"h2\",{children:\"SAML vs. OAuth: A Comparative Analysis\"}),/*#__PURE__*/e(\"p\",{children:\"SAML and OAuth are two distinct protocols used for authentication and authorization, each with its own strengths and use cases.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication vs. Authorization:\"}),\" SAML focuses on authentication, providing assertions about user identity, while OAuth is designed for authorization, allowing third-party applications to access user resources without exposing credentials.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use Cases:\"}),\" SAML is primarily used for Single Sign-On (SSO) in enterprise environments, whereas OAuth is widely adopted for granting limited access to user data in mobile and web applications.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing SAML: Best Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing SAML effectively requires adherence to best practices to ensure both security and efficiency. This includes using HTTPS to protect data in transit, ensuring that identity providers and service providers are properly configured, and keeping SAML software patched and up-to-date. By following these practices, organizations can enhance the security and reliability of their SAML implementations.\"})]});export const richText16=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Web filtering software blocks access to harmful or unwanted internet content, enhancing network security by preventing exposure to malicious websites, inappropriate material, and potential security risks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Types of Web Filtering Techniques\"}),/*#__PURE__*/e(\"p\",{children:\"Web filtering techniques are essential for maintaining a secure and productive online environment. These methods help organizations control access to internet content, ensuring that users are protected from harmful sites and distractions.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Allowlist:\"}),\" Only permits access to pre-approved websites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Denylist:\"}),\" Blocks access to sites deemed undesirable based on set criteria.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL Analysis:\"}),\" Examines URLs to decide if access should be granted or denied.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Content Scanning:\"}),\" Searches site content for restricted keywords to block or allow access.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Benefits of Web Filtering\"}),/*#__PURE__*/e(\"p\",{children:\"Web filtering offers several key benefits for organizations. It enhances security by blocking access to malicious websites, reducing the risk of malware infections. Additionally, it helps maintain productivity by preventing access to non-work-related sites, ensuring employees stay focused on their tasks.\"}),/*#__PURE__*/e(\"p\",{children:\"Another significant advantage is compliance. Web filtering aids in adhering to regulatory requirements by restricting access to inappropriate or illegal content. This not only protects the organization but also ensures a safer online environment for all users.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Web Filtering Successfully\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing web filtering successfully requires a strategic approach to ensure both security and productivity. By following best practices, organizations can effectively manage internet access and protect their networks from potential threats.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Allow List:\"}),\" Only permits access to pre-approved websites, enhancing security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"False Positives:\"}),\" Minimize instances where legitimate content is mistakenly blocked.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Web Filtering Software:\"}),\" Deploy software to block access to harmful or unwanted sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Firewall:\"}),\" Use firewalls to filter traffic and prevent unauthorized connections.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Web Filtering Challenges and Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"Web filtering presents several challenges, but effective solutions can address these issues. One significant challenge is keeping up with the constantly changing landscape of online threats while managing false positives and negatives in filtering. A viable solution is to implement advanced web filtering software that utilizes real-time threat intelligence and machine learning to adapt to new threats and reduce errors. This approach helps ensure more accurate filtering and improved security for users.\"})]});export const richText17=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An ephemeral port is a temporary port assigned for the duration of a communication session, typically ranging from 1024 to 65535. It is used by client applications to connect to servers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Ephemeral Port Ranges\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding ephemeral port ranges is crucial for managing network communications effectively. These ports are temporary and are used for the duration of a communication session, facilitating connections between client and server applications.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Definition:\"}),\" Temporary ports used by client applications to connect to servers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Range:\"}),\" Typically from 49152 to 65535, as specified by IANA.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Variability:\"}),\" Different operating systems may have different default ranges.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Restricting port selection can enhance security by limiting unauthorized access.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Utilizing Ephemeral Ports Securely\"}),/*#__PURE__*/e(\"p\",{children:\"Utilizing ephemeral ports securely is essential for maintaining robust network security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring:\"}),\" Regularly analyze network traffic and logs to detect unusual activities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Restrictions:\"}),\" Use firewalls and ACLs to limit access to ephemeral ports.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Updates:\"}),\" Keep systems patched to mitigate vulnerabilities.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Ephemeral and Static Ports\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing ephemeral and static ports reveals key differences in their usage and characteristics.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Assignment:\"}),\" Ephemeral ports are dynamically assigned for temporary connections, while static ports are permanently assigned to specific services.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Ephemeral ports can enhance security by being less predictable, whereas static ports are more susceptible to targeted attacks due to their fixed nature.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Significance of Ephemeral Ports in Networking\"}),/*#__PURE__*/e(\"p\",{children:\"Ephemeral ports play a crucial role in networking by enabling client applications to establish temporary connections with server applications. These ports are dynamically assigned from a predefined range and are used for the duration of the connection, ensuring efficient management of multiple simultaneous connections without port conflicts. By using ephemeral ports, client applications can securely and efficiently communicate with servers, enhancing overall network performance. This mechanism also helps in maintaining robust security by making it harder for unauthorized users to predict and exploit port numbers.\"})]});export const richText18=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Fast Flux is a technique used by cybercriminals to rapidly change the DNS records of a domain, cycling through multiple IP addresses to evade detection and maintain uptime for malicious activities.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Fast Flux Operates\"}),/*#__PURE__*/e(\"p\",{children:\"Fast Flux operates by leveraging the DNS system to frequently change the IP addresses associated with a domain name. This technique is used by cybercriminals to evade detection and maintain the uptime of their malicious activities.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Dynamic DNS:\"}),\" Rapidly updates DNS records to point to different IP addresses.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Botnet Utilization:\"}),\" Uses a network of compromised hosts to act as proxies.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Short TTLs:\"}),\" Sets low Time-To-Live values to ensure frequent DNS updates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Double Flux:\"}),\" Changes both DNS A records and DNS NS records for added complexity.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Indicators of Fast Flux Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"Detecting Fast Flux attacks involves recognizing certain key indicators that suggest malicious activity.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Frequent DNS Changes:\"}),\" Rapid updates to DNS records for a domain name.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multiple IP Addresses:\"}),\" Numerous IP addresses linked to a single domain in a short time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Short TTL Values:\"}),\" Low Time-To-Live settings to ensure constant DNS updates.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Mitigating Fast Flux Threats\"}),/*#__PURE__*/e(\"p\",{children:\"Mitigating Fast Flux threats involves several strategies. One effective method is to take down the domain name associated with the malicious activity. Network administrators can also implement DNS filtering to block queries for known malicious domains within their network.\"}),/*#__PURE__*/e(\"p\",{children:\"Another approach is to require users to use DNS servers controlled by the organization, ensuring that malicious domains are not resolved. Collaboration between network administrators and domain name registrars is crucial for promptly taking down domains used in Fast Flux attacks.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Impact of Fast Flux on Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Fast Flux significantly impacts cybersecurity by complicating the detection and mitigation of malicious activities.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detection Challenges:\"}),\" Fast Flux rapidly changes DNS records, making it difficult for security systems to track and block malicious domains effectively.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mitigation Complexity:\"}),\" The technique uses compromised hosts as proxies, requiring more advanced and coordinated efforts to dismantle the botnet infrastructure.\"]})})]})]});export const richText19=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Incident Handling is a structured approach to managing and addressing security breaches or cyberattacks. It involves six key steps: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.\"}),/*#__PURE__*/e(\"h2\",{children:\"Stages of Effective Incident Handling\"}),/*#__PURE__*/e(\"p\",{children:\"Effective incident handling is crucial for minimizing the impact of security breaches. By following a structured approach, organizations can ensure a swift and efficient response to incidents.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Preparation:\"}),\" Establishing and maintaining an incident response capability.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identification:\"}),\" Detecting and determining the nature of the incident.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Containment:\"}),\" Limiting the scope and magnitude of the incident.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Eradication:\"}),\" Removing the cause of the incident.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of Incident Handling\"}),/*#__PURE__*/e(\"p\",{children:\"Key components of incident handling include preparation, identification, containment, eradication, recovery, and lessons learned. Preparation involves establishing and training an incident response team, while identification focuses on detecting and determining the nature of the incident.\"}),/*#__PURE__*/e(\"p\",{children:\"Containment aims to limit the scope and impact of the incident, followed by eradication, which removes the cause. Recovery restores system functionality, and lessons learned analyze the incident to improve future responses.\"}),/*#__PURE__*/e(\"h2\",{children:\"Incident Handling vs. Incident Response\"}),/*#__PURE__*/e(\"p\",{children:\"Incident Handling and Incident Response are often used interchangeably, but they have distinct differences.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Incident Handling encompasses a comprehensive action plan, including preparation and post-incident activities, while Incident Response focuses on immediate actions during an incident.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus:\"}),\" Incident Handling aims to manage and mitigate security incidents holistically, whereas Incident Response aims to contain and mitigate the impact of the incident as it occurs.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Incident Handling\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing best practices for incident handling is essential for effective cybersecurity management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Preparation:\"}),\" Establish and maintain an incident response capability.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Containment:\"}),\" Limit the scope and magnitude of the incident.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recovery:\"}),\" Restore systems to normal operation.\"]})})]})]});export const richText20=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Internet Message Access Protocol (IMAP) allows email clients to access and manage emails on a mail server. Unlike POP, IMAP keeps emails on the server, enabling synchronization across multiple devices.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding IMAP and Its Functions\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding IMAP and its functions is crucial for managing emails efficiently across multiple devices. IMAP, or Internet Message Access Protocol, allows users to access and manipulate their emails stored on a mail server, providing a seamless experience across various platforms.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Synchronization:\"}),\" Keeps emails on the server, allowing access from multiple devices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Server-side Management:\"}),\" Users can organize emails into folders on the server.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Partial Fetching:\"}),\" Allows clients to fetch only specific parts of emails, saving bandwidth.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Search Capabilities:\"}),\" Enables searching through emails on the server without downloading them.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Benefits of Using IMAP\"}),/*#__PURE__*/e(\"p\",{children:\"IMAP offers significant benefits for email management, particularly in terms of synchronization and accessibility. By keeping emails on the server, IMAP ensures that actions like reading, deleting, or organizing emails are reflected across all devices. This provides a consistent and seamless email experience.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, IMAP supports server-side searches and multiple mailboxes, enhancing email organization and retrieval. Its ability to manage emails without transferring messages between devices reduces the risk of data loss and unauthorized access, making it a secure and efficient choice for modern email management.\"}),/*#__PURE__*/e(\"h2\",{children:\"Comparing IMAP to POP: Key Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing IMAP to POP reveals key differences in how they handle email management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Synchronization:\"}),\" IMAP keeps emails on the server, allowing access from multiple devices, while POP downloads emails to a single device and typically deletes them from the server.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Server Management:\"}),\" IMAP supports server-side searches and multiple mailboxes, whereas POP provides a simpler, static view of the mailbox with fewer features.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for IMAP Management\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing best practices for IMAP management ensures efficient and secure email handling.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Synchronization:\"}),\" Regularly sync devices to maintain up-to-date email status.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Use SSL/TLS to encrypt IMAP connections and protect data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Maintenance:\"}),\" Periodically clean up mailboxes to optimize server performance.\"]})})]})]});export const richText21=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Role-Based Access Control (RBAC) is a security mechanism that restricts system access by assigning roles to users, which determine their permissions and privileges. It ensures users can only access information and perform actions necessary for their job roles.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Role-Based Access Control Efficiently\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Role-Based Access Control (RBAC) efficiently requires a strategic approach to ensure security and operational effectiveness. By following best practices, organizations can streamline access management and enhance security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Needs Analysis:\"}),\" Conduct a comprehensive assessment of job functions and business processes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope Planning:\"}),\" Identify and plan the RBAC implementation to align with organizational needs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Role Definition:\"}),\" Define roles based on tasks and avoid excessive granularity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Staged Implementation:\"}),\" Roll out RBAC in stages to minimize disruption and gather feedback.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Role-Based Access Control\"}),/*#__PURE__*/e(\"p\",{children:\"Role-Based Access Control (RBAC) offers significant benefits by enhancing security and operational efficiency. It ensures that users can only access the information necessary for their roles, thereby protecting sensitive data and minimizing the risk of unauthorized access. This principle of least privilege is crucial for maintaining a secure environment.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, RBAC simplifies the management of user permissions by assigning roles rather than individual permissions. This approach reduces administrative overhead and streamlines the process of granting and revoking access, making it easier to manage large numbers of users efficiently.\"}),/*#__PURE__*/e(\"h2\",{children:\"Role-Based Access Control vs. Discretionary Access Control\"}),/*#__PURE__*/e(\"p\",{children:\"Role-Based Access Control (RBAC) and Discretionary Access Control (DAC) are two distinct methods for managing access to resources.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Control:\"}),\" RBAC centralizes access control by assigning permissions to roles, ensuring consistent policies. DAC allows resource owners to set permissions, offering more flexibility but less centralized control.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexibility:\"}),\" DAC is more adaptable to changing access needs as it lets owners decide permissions. RBAC requires predefined roles, making it less flexible but more secure.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of Role-Based Access Control\"}),/*#__PURE__*/e(\"p\",{children:\"Role-Based Access Control (RBAC) is built on several key components that ensure effective access management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Roles:\"}),\" Defined based on job functions within an organization.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Permissions:\"}),\" Specific access rights assigned to roles.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Users:\"}),\" Individuals who are assigned to roles.\"]})})]})]});export const richText22=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Key management involves generating, distributing, storing, replacing, and destroying cryptographic keys to ensure data security and integrity throughout their lifecycle.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Effective Key Management\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing effective key management is crucial for maintaining the security and integrity of cryptographic systems. Proper key management practices ensure that keys are generated, stored, and destroyed securely, minimizing the risk of unauthorized access.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Generation:\"}),\" Secure methods for creating cryptographic keys.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Storage:\"}),\" Using Hardware Security Modules (HSMs) for safe key storage.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rotation:\"}),\" Regularly changing keys to limit exposure.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Destruction:\"}),\" Securely destroying keys that are no longer needed.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Challenges in Managing Cryptographic Keys\"}),/*#__PURE__*/e(\"p\",{children:\"Managing cryptographic keys presents several challenges that can impact the security and efficiency of an organization.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability:\"}),\" As the number of keys grows, managing them becomes increasingly complex, requiring robust systems to handle key generation, storage, and rotation.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Risks:\"}),\" Ensuring secure key exchange and storage is critical to prevent unauthorized access, which can lead to data breaches and compromised systems.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Management Best Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Effective key management is essential for maintaining robust security. Best practices include using Hardware Security Modules (HSMs) for secure key storage and automating key lifecycle processes to ensure efficiency. Regularly rotating keys and enforcing strict access controls further enhance security.\"}),/*#__PURE__*/e(\"p\",{children:\"Compliance with standards such as NIST, PCI DSS, and HIPAA is crucial. Implementing least privilege access, avoiding hard-coding keys, and separating duties are recommended practices. These measures help prevent unauthorized access and ensure the integrity of cryptographic systems.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Future of Key Management Technologies\"}),/*#__PURE__*/e(\"p\",{children:\"The future of key management technologies is poised for significant advancements driven by emerging trends and innovations.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quantum Computing:\"}),\" Revolutionizing cryptographic methods with unparalleled processing power.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Interoperability:\"}),\" Enhanced by protocols like KMIP for seamless key management across systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Secure Storage:\"}),\" Leveraging virtual HSMs and non-volatile FPGAs for robust key protection.\"]})})]})]});export const richText23=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Secure Shell (SSH) is a protocol for securely accessing and managing a computer over an unsecured network. It enables encrypted command execution, file transfers, and tunneling.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Secure Shell Authentication Methods\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding Secure Shell (SSH) authentication methods is crucial for maintaining secure remote access. SSH offers various ways to authenticate users and devices, ensuring that only authorized entities can establish connections.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Key Authentication:\"}),\" Uses cryptographic keys to verify identities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Password Authentication:\"}),\" Requires a username and password for access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Host-based Authentication:\"}),\" Verifies the client machine's identity using its host key.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Pair Authentication:\"}),\" Enhances security by using key pairs instead of passwords.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Secure Shell for Secure Communication\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Secure Shell (SSH) for secure communication involves setting up encrypted connections between devices over an unsecured network. SSH ensures data security by encrypting commands, file transfers, and administrative tasks. It supports secure file transfer protocols like SCP and SFTP, enabling safe data movement between machines.\"}),/*#__PURE__*/e(\"p\",{children:\"To configure SSH, install it on both client and server machines, typically using OpenSSH. Key settings in the SSH server configuration file include port number, root login permissions, and authentication methods. Proper setup and management of SSH keys are crucial for maintaining security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Secure Shell with Telnet and FTP\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing Secure Shell (SSH) with Telnet and FTP reveals significant differences in security and functionality.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" SSH encrypts all data, ensuring secure communication, while Telnet and FTP transmit data in plaintext, making them vulnerable to interception.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" SSH uses robust public key cryptography for authentication, whereas Telnet and FTP rely on less secure methods, often sending credentials in plaintext.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Essential Secure Shell Commands for Beginners\"}),/*#__PURE__*/e(\"p\",{children:\"Mastering essential Secure Shell (SSH) commands is crucial for beginners to manage remote systems effectively.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Login:\"}),\" Use \",/*#__PURE__*/e(\"code\",{children:\"ssh user@hostname\"}),\" to access a remote machine.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Copy:\"}),\" Transfer files securely with \",/*#__PURE__*/e(\"code\",{children:\"scp file.txt user@hostname:/path\"}),\".\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Generation:\"}),\" Create SSH keys using \",/*#__PURE__*/e(\"code\",{children:\"ssh-keygen\"}),\" for secure authentication.\"]})})]})]});export const richText24=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Bluesnarfing is a hacking technique that exploits Bluetooth connections to access data on wireless devices without the user's permission.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Bluesnarfing Works\"}),/*#__PURE__*/e(\"p\",{children:\"Bluesnarfing attacks exploit Bluetooth vulnerabilities to gain unauthorized access to data on wireless devices. These attacks can be executed from a distance, making them a significant threat to personal and business information security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proximity:\"}),\" Attackers need to be within 10 to 15 meters of the target device.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Exploitation:\"}),\" Hackers use tools to bypass the Bluetooth pairing process.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Theft:\"}),\" Once connected, attackers can steal passwords, emails, and other personal information.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vulnerable Devices:\"}),\" Mobile phones, tablets, smartwatches, and other wearables are at risk.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preventing Bluesnarfing Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing bluesnarfing attacks requires a few simple but effective measures.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Disable:\"}),\" Turn off Bluetooth when not in use.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Invisible:\"}),' Switch off the device\\'s \"discoverable\" mode.']})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Update:\"}),\" Keep software up to date with the latest security patches.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Bluesnarfing Versus Bluejacking\"}),/*#__PURE__*/e(\"p\",{children:\"Bluesnarfing and Bluejacking are two distinct types of Bluetooth-based attacks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bluesnarfing:\"}),\" Involves unauthorized access to a device via Bluetooth, allowing hackers to steal information such as emails, passwords, and personal files.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bluejacking:\"}),\" Entails sending unsolicited messages to a Bluetooth-enabled device, which is more of an annoyance or prank rather than a method for data theft.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Real-World Examples of Bluesnarfing\"}),/*#__PURE__*/e(\"p\",{children:\"In 2003, security expert Adam Laurie confirmed the existence of serious vulnerabilities in Bluetooth devices. He demonstrated that attackers could access data without the owner's knowledge, revealing significant flaws in Bluetooth's authentication and data transfer mechanisms. This discovery highlighted the potential for unauthorized data access through bluesnarfing.\"}),/*#__PURE__*/e(\"p\",{children:\"Another notable incident involved researcher Martin Herfurt, who found that attackers could exploit Bluetooth to access data, voice, and messaging services on compromised devices. These real-world examples underscore the importance of securing Bluetooth connections to prevent unauthorized access and data theft.\"})]});export const richText25=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuing Professional Development (CPD) involves ongoing learning to maintain and enhance professional skills and knowledge, ensuring individuals stay current and effective in their roles.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Continuing Professional Development\"}),/*#__PURE__*/e(\"p\",{children:\"Continuing Professional Development (CPD) ensures that professionals maintain and enhance their knowledge and skills, keeping them updated with the latest developments in their field. This ongoing learning process is crucial for career advancement and professional growth, often required for maintaining professional registration or chartered status.\"}),/*#__PURE__*/e(\"p\",{children:\"CPD activities, such as formal training, workshops, and self-learning, demonstrate a commitment to professional excellence. These activities not only improve existing skills but also prepare professionals for future challenges, making them more competitive in the job market and better equipped to meet business needs.\"}),/*#__PURE__*/e(\"h2\",{children:\"Strategies for Effective Continuing Professional Development\"}),/*#__PURE__*/e(\"p\",{children:\"Effective Continuing Professional Development (CPD) strategies are essential for maintaining and enhancing professional skills. These strategies ensure that individuals stay current with industry trends and are well-prepared for future challenges.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Active Learning:\"}),\" Engaging in activities beyond passive listening, such as collaborative exercises.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Self-Paced Learning:\"}),\" Allowing individuals to control the schedule and pace of their learning.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Formal Training:\"}),\" Participating in structured training sessions, workshops, and seminars.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recording Progress:\"}),\" Keeping track of CPD points through certificates and documented attendance.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Continuing Professional Development vs. Traditional Learning\"}),/*#__PURE__*/e(\"p\",{children:\"Continuing Professional Development (CPD) and Traditional Learning differ significantly in their approach and impact on professional growth.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexibility:\"}),\" CPD offers a variety of learning activities like seminars, workshops, and self-paced courses, allowing professionals to tailor their learning to their specific needs and schedules. Traditional Learning, on the other hand, often involves rigid, classroom-based sessions that may not adapt to individual career goals.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Relevance:\"}),\" CPD ensures that professionals stay current with industry trends and evolving threats, particularly in fields like cybersecurity. Traditional Learning may lag in updating its curriculum, potentially leaving professionals with outdated knowledge.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of a CPD Program\"}),/*#__PURE__*/e(\"p\",{children:\"Key components of a CPD program ensure professionals remain effective and competitive in their fields.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Commitment:\"}),\" Actively engaging in ongoing learning and development activities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Accreditation:\"}),\" Ensuring CPD activities are recognized by reputable bodies.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recording:\"}),\" Systematically tracking and documenting CPD points and achievements.\"]})})]})]});export const richText26=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Defacement is the act of altering a website's content to vandalize or embarrass the owner, often by adding unauthorized messages or images.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding the Impact of Defacement\"}),/*#__PURE__*/e(\"p\",{children:\"Website defacement can have significant repercussions for businesses and organizations. It not only tarnishes the reputation of the affected site but also disrupts user access and can lead to financial losses.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reputation:\"}),\" Damage to the credibility and trustworthiness of the website.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access:\"}),\" Users are unable to access the intended content.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remediation:\"}),\" Requires technical efforts to restore and secure the site.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Financial:\"}),\" Potential costs associated with fixing the defacement and lost business.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preventive Measures Against Website Defacement\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing website defacement is crucial for maintaining the integrity and reputation of your online presence.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Audits:\"}),\" Conduct frequent security audits to identify and fix vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Patch Management:\"}),\" Keep all software and plugins up to date with the latest security patches.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Controls:\"}),\" Implement strong access controls to prevent unauthorized changes.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Examples of Notorious Defacement Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"One of the most notorious defacement attacks occurred in 2018 when the UK National Health Service's website was defaced by a hacker group known as AnoaGhost. The attackers replaced the site's content with a message that read \\\"Hacked by AnoaGhost,\\\" causing significant embarrassment and concern.\"}),/*#__PURE__*/e(\"p\",{children:\"Another high-profile incident involved Google Romania in 2012, where users were redirected to a defacement screen by the Algerian hacker MCA-CRB. Additionally, in 2019, Georgia experienced its largest cyber attack, with 15,000 websites, including government and media sites, being defaced and knocked offline.\"}),/*#__PURE__*/e(\"h2\",{children:\"Defacement vs. Other Cyber Threats\"}),/*#__PURE__*/e(\"p\",{children:\"Defacement is a unique cyber threat that stands out from other types of attacks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Visibility:\"}),\" Defacement is highly visible, altering the website's appearance, while threats like malware often operate covertly, stealing data without immediate detection.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Intent:\"}),\" Defacement aims to embarrass or send a message, whereas attacks like ransomware seek financial gain by encrypting data and demanding payment.\"]})})]})]});export const richText27=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Plaintext is ordinary readable text before encryption or after decryption. It is the original, intelligible form of data that can be understood without decryption.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Plaintext Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding plaintext encryption is crucial for maintaining data security. It involves converting readable data into an unreadable format to protect it from unauthorized access. Here are some key points to consider:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" The process of converting plaintext into ciphertext to conceal its original meaning.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Decryption:\"}),\" Transforming encrypted data back into its original readable form.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Ensuring that only authorized individuals can access the information.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integrity:\"}),\" Guaranteeing that the data remains accurate and unaltered during transmission or storage.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Importance of Plaintext Security\"}),/*#__PURE__*/e(\"p\",{children:\"Securing plaintext is essential to prevent unauthorized access and misuse of sensitive information. Encryption transforms readable data into an unreadable format, ensuring that only authorized individuals can access it. Without proper encryption, plaintext data is vulnerable to cyber attacks, exposing user credentials and other critical information.\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing strict access controls and secure transmission protocols like HTTPS can further protect plaintext data. Regular security audits and data masking techniques also help mitigate vulnerabilities, ensuring that sensitive information remains secure both in storage and transit.\"}),/*#__PURE__*/e(\"h2\",{children:\"Converting Plaintext to Ciphertext\"}),/*#__PURE__*/e(\"p\",{children:\"Converting plaintext to ciphertext is a fundamental process in cryptography.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" This process transforms readable data (plaintext) into an unreadable format (ciphertext) to protect it from unauthorized access. It ensures that sensitive information remains confidential during storage and transmission.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Decryption:\"}),\" The reverse process of encryption, where ciphertext is converted back into its original readable form (plaintext). This allows authorized users to access the original data securely.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Plaintext Management\"}),/*#__PURE__*/e(\"p\",{children:\"Effective plaintext management is essential for maintaining data security and integrity.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Encrypt plaintext data to protect it from unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Implement strict access controls to limit who can view plaintext data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Audits:\"}),\" Conduct regular security audits to identify and mitigate vulnerabilities.\"]})})]})]});export const richText28=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An external audit is an independent assessment of an organization's operations against specified standards. Conducted by third-party professionals, it ensures compliance, identifies vulnerabilities, and provides unbiased evaluations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Conducting External Audits\"}),/*#__PURE__*/e(\"p\",{children:\"Conducting external audits offers numerous benefits, including improved financial accuracy and enhanced credibility. By ensuring that financial records are accurate and comply with relevant standards, organizations can avoid costly errors and maintain trust among stakeholders.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, external audits help in identifying vulnerabilities and managing risks, thereby enhancing operational efficiency. They also foster continuous improvement and build stakeholder confidence by providing unbiased assessments and ensuring compliance with regulations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of an Effective External Audit\"}),/*#__PURE__*/e(\"p\",{children:\"Effective external audits are essential for ensuring compliance and identifying areas for improvement within an organization. They provide an unbiased evaluation of operations and help in managing risks. Here are the key components of an effective external audit:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Clearly define what needs to be covered and who will be involved.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tools:\"}),\" Utilize advanced tools and methodologies to identify gaps and vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Documentation:\"}),\" Record all findings and recommendations for future reference.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Implementation:\"}),\" Apply the audit findings and maintain ongoing surveillance.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"External Audit vs. Internal Audit: Understanding the Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between external and internal audits is crucial for effective organizational management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Independence:\"}),\" External audits are conducted by third-party professionals, ensuring an unbiased evaluation. Internal audits, however, are performed by the organization's own staff, which may introduce bias.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Objective:\"}),\" External audits focus on compliance with external standards and regulations, while internal audits aim to improve internal processes and prepare for external evaluations.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preparing for an External Audit: Essential Steps\"}),/*#__PURE__*/e(\"p\",{children:\"Preparing for an external audit involves several essential steps to ensure a smooth and effective process.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Documentation:\"}),\" Gather and organize all relevant information and records.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Clearly define the parameters and objectives of the audit.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance:\"}),\" Ensure adherence to regulatory requirements and standards.\"]})})]})]});export const richText29=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[\"User Datagram Protocol (UDP)\",/*#__PURE__*/e(\"strong\",{children:\" \"}),\"is a communication protocol that allows for quick data transmission without establishing a formal connection. It is used for time-sensitive applications like video streaming and online gaming.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Exploring the Benefits of UDP\"}),/*#__PURE__*/e(\"p\",{children:\"Exploring the benefits of UDP reveals why it is a preferred protocol for many real-time applications. Its design prioritizes speed and efficiency, making it ideal for scenarios where low latency is crucial.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Speed:\"}),\" UDP allows for faster data transfer by eliminating the need for connection establishment.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency:\"}),\" It is highly efficient for time-sensitive communications, tolerating occasional packet loss.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Low Latency:\"}),\" The absence of handshake and ordering processes results in lower latency.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-Time Applications:\"}),\" Ideal for VoIP, online gaming, and video streaming where quick data transmission is essential.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Differences Between UDP and TCP\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the key differences between UDP and TCP is crucial for selecting the right protocol for your application.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reliability:\"}),\" TCP ensures reliable data transfer with error checking and acknowledgment, making it suitable for applications where data integrity is crucial. UDP, on the other hand, does not guarantee reliable data transfer, making it ideal for time-sensitive applications where speed is more critical than reliability.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Connection:\"}),\" TCP is a connection-oriented protocol that establishes a connection before data transfer, ensuring ordered delivery. UDP is connectionless, sending data as individual packets without ensuring order or delivery.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Architecture of UDP\"}),/*#__PURE__*/e(\"p\",{children:\"UDP's architecture is designed for simplicity and speed. It operates without establishing a connection, sending packets directly to the target. This connectionless nature allows for minimal error recovery services, making it ideal for applications where speed is crucial.\"}),/*#__PURE__*/e(\"p\",{children:\"Key features include the absence of packet sequencing and reassembly, which reduces overhead. UDP's header is straightforward, consisting of source and destination port numbers, length, and an optional checksum. This streamlined approach ensures low latency, essential for real-time applications like VoIP and online gaming.\"}),/*#__PURE__*/e(\"h2\",{children:\"Real-World Applications of UDP\"}),/*#__PURE__*/e(\"p\",{children:\"UDP is widely used in various real-world applications due to its speed and efficiency.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gaming:\"}),\" Essential for online gaming where low latency is crucial.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Video Streaming:\"}),\" Ideal for live video streaming requiring quick data transmission.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VoIP:\"}),\" Used in VoIP services for real-time voice communication.\"]})})]})]});export const richText30=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Recovery Time Objective (RTO) is the maximum acceptable time to restore a system after a failure, ensuring minimal disruption to business operations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Determining Your Recovery Time Objectives\"}),/*#__PURE__*/e(\"p\",{children:\"Determining your Recovery Time Objectives (RTO) is crucial for ensuring business continuity and minimizing downtime. The RTO sets a benchmark for how quickly systems must be restored after a disruption. Here are key factors to consider:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Criticality:\"}),\" Assess the importance of each system to your business operations.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Impact:\"}),\" Evaluate the potential consequences of downtime on your business.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resources:\"}),\" Consider the availability of resources for recovery efforts.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Industry Standards:\"}),\" Align your RTO with industry-specific requirements and best practices.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Strategies for Achieving RTO Goals\"}),/*#__PURE__*/e(\"p\",{children:\"Achieving RTO goals requires a combination of proactive planning and efficient execution. Start by conducting a thorough risk assessment to identify potential threats and vulnerabilities. Develop a detailed disaster recovery plan that outlines specific steps for restoring critical systems and data.\"}),/*#__PURE__*/e(\"p\",{children:\"Regularly test and update your recovery procedures to ensure they remain effective. Invest in reliable backup solutions and consider implementing automated recovery tools to minimize downtime. Training your team on these procedures is also essential for a swift and coordinated response.\"}),/*#__PURE__*/e(\"h2\",{children:\"RTO Versus Recovery Point Objective\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between Recovery Time Objective (RTO) and Recovery Point Objective (RPO) is essential for effective disaster recovery planning.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"RTO:\"}),\" Focuses on the maximum acceptable downtime for a system or application. It defines how quickly a system must be restored after a failure to ensure business continuity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"RPO:\"}),\" Concentrates on the maximum acceptable amount of data loss measured in time. It defines the point in time to which data must be recovered to resume normal operations after a disruption.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Elements Influential to RTO Success\"}),/*#__PURE__*/e(\"p\",{children:\"Several elements are influential to the success of achieving Recovery Time Objectives (RTO).\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Planning:\"}),\" Comprehensive disaster recovery plans tailored to specific business needs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Testing:\"}),\" Regularly testing recovery procedures to ensure effectiveness.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resources:\"}),\" Adequate allocation of resources, including technology and personnel.\"]})})]})]});export const richText31=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An Autonomous System (AS) is a collection of IP networks and routers under a single administrative entity, identified by a unique Autonomous System Number (ASN). It manages routing policies and exchanges routing information with other ASes.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Autonomous System Numbers\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding Autonomous System Numbers (ASNs) is crucial for grasping how the internet functions. ASNs uniquely identify each network on the internet, facilitating efficient data routing between different networks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Definition:\"}),\" An ASN is a globally unique number assigned to an autonomous system.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Purpose:\"}),\" ASNs are essential for routing traffic between networks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Assignment:\"}),\" ASNs are allocated by organizations like IANA or regional internet registries.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Usage:\"}),\" ASNs are used in protocols like BGP to manage internet routing.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of an Autonomous System\"}),/*#__PURE__*/e(\"p\",{children:\"Key components of an Autonomous System include routers, routing policies, and Autonomous System Numbers (ASNs). Routers within an AS manage the flow of data packets, ensuring efficient communication. Routing policies dictate how data is directed, maintaining network integrity.\"}),/*#__PURE__*/e(\"p\",{children:\"ASNs uniquely identify each AS, facilitating global data routing. These components work together to ensure seamless data exchange across the internet, making Autonomous Systems essential for network management and connectivity.\"}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Autonomous Systems to Traditional Networks\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing Autonomous Systems to Traditional Networks reveals significant differences in management and routing efficiency.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Management:\"}),\" Autonomous Systems are managed under a single administrative entity, simplifying network control. Traditional Networks often involve multiple administrative domains, complicating management.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Routing Efficiency:\"}),\" Autonomous Systems use unique ASNs for efficient global routing. Traditional Networks may face routing inefficiencies due to the lack of centralized control.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Role of Autonomous Systems in the Internet\"}),/*#__PURE__*/e(\"p\",{children:\"Autonomous Systems (AS) are fundamental to the structure and operation of the internet.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Routing:\"}),\" They manage the flow of data across networks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identification:\"}),\" Each AS is assigned a unique ASN.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Control:\"}),\" Operate under a single administrative entity.\"]})})]})]});export const richText32=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Wardriving is the practice of searching for vulnerable or unsecured Wi-Fi networks from a moving vehicle using devices like laptops or smartphones.\"}),/*#__PURE__*/e(\"h2\",{children:\"The History and Evolution of Wardriving\"}),/*#__PURE__*/e(\"p\",{children:'Wardriving originated from the 1983 movie \"WarGames,\" where the protagonist searched for computer systems by dialing random phone numbers. Over time, this concept evolved into the practice of driving around to find vulnerable Wi-Fi networks using laptops or smartphones. Initially, wardrivers used basic tools, but advancements in technology have made the process more sophisticated.'}),/*#__PURE__*/e(\"p\",{children:\"Modern wardriving involves using high-powered antennas, GPS devices, and specialized software to map out unsecured networks. Despite increased security measures like WPA3, wardriving remains a concern, highlighting the need for robust network security practices to protect sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"Techniques and Tools for Wardriving\"}),/*#__PURE__*/e(\"p\",{children:\"Wardriving has evolved significantly with the advent of advanced technology. Modern wardrivers employ a variety of techniques and tools to identify and exploit vulnerable Wi-Fi networks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Software:\"}),\" Tools like NetStumbler, Kismet, and Aircrack are commonly used to detect and analyze wireless networks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Antennas:\"}),\" High-powered, omnidirectional antennas help in capturing Wi-Fi signals from a greater distance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GPS Devices:\"}),\" These are used to log the precise locations of discovered networks, aiding in the creation of detailed maps.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mobile Devices:\"}),\" Laptops, smartphones, and even Raspberry Pi devices are utilized for their portability and versatility in wardriving activities.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Legal and Ethical Considerations\"}),/*#__PURE__*/e(\"p\",{children:\"Legal and ethical considerations are crucial when discussing wardriving.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legality:\"}),\" Wardriving itself is not illegal, but exploiting insecure networks is.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Privacy:\"}),\" Compliance with privacy laws like GDPR and CCPA is essential.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ethics:\"}),\" Ethical concerns arise when data is used for malicious purposes.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preventing and Protecting Against Wardriving\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing and protecting against wardriving involves implementing robust security measures to safeguard wireless networks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Use WPA3 encryption to secure data transmitted over Wi-Fi networks, making it difficult for attackers to intercept and decipher information.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Implement strong access control mechanisms, such as changing default passwords and using multi-factor authentication, to prevent unauthorized access to the network.\"]})})]})]});export const richText33=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Radio Frequency Identification (RFID) is a technology that uses radio waves to identify and track objects or people without physical contact. It involves attaching passive electronic tags to assets, which respond with a unique identifier when exposed to radio waves.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Radio Frequency Identification Works\"}),/*#__PURE__*/e(\"p\",{children:\"Radio Frequency Identification (RFID) technology operates through a combination of electromagnetic fields and unique identifiers to track and manage objects or people. This system is composed of several key components that work together seamlessly to ensure efficient data transmission and identification.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tags:\"}),\" Passive or active devices attached to items, containing unique identifiers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Readers:\"}),\" Devices that emit radio waves to activate and read the tags.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Antenna:\"}),\" Facilitates communication between the tag and the reader.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Software:\"}),\" Manages and processes the data collected from the tags.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Applications and Uses of RFID\"}),/*#__PURE__*/e(\"p\",{children:\"RFID technology has a wide range of applications across various industries. In retail, it is used for inventory tracking, theft prevention, and enhancing the customer experience by providing accurate product availability information. Healthcare facilities utilize RFID for patient tracking, medical billing, and equipment management, ensuring efficient operations and improved patient care.\"}),/*#__PURE__*/e(\"p\",{children:\"In logistics, RFID optimizes supply chain management by providing real-time visibility of cargo and assets. This technology is also employed in security access systems, highway toll tags, and trusted traveler programs, streamlining processes and enhancing security measures.\"}),/*#__PURE__*/e(\"h2\",{children:\"Comparing RFID with Barcode Technology\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing RFID with Barcode Technology reveals distinct differences in functionality and application.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Line of Sight:\"}),\" RFID does not require a direct line of sight to read tags, whereas barcodes must be scanned directly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Capacity:\"}),\" RFID tags can store more data and be read from greater distances, while barcodes have limited data storage and require close proximity.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Security Implications of RFID Technology\"}),/*#__PURE__*/e(\"p\",{children:\"RFID technology, while highly efficient, presents several security implications.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unauthorized Access:\"}),\" Potential for unauthorized scanning and data interception.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloning:\"}),\" Risk of duplicating RFID tags to gain illicit access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Eavesdropping:\"}),\" Vulnerability to interception of data during transmission.\"]})})]})]});export const richText34=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Security posture refers to an organization's overall cybersecurity readiness, including the state of its systems, controls, and ability to respond to incidents.\"}),/*#__PURE__*/e(\"h2\",{children:\"Evaluating Your Security Posture\"}),/*#__PURE__*/e(\"p\",{children:\"Evaluating your security posture is crucial for understanding your organization's readiness to handle cyber threats. It involves assessing various components and metrics to ensure robust defenses and quick response capabilities.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Asset Inventory:\"}),\" Comprehensive listing of all hardware, software, and network elements.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Attack Surface Mapping:\"}),\" Identifying all potential entry points for adversaries.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cyber Risk Understanding:\"}),\" Calculating risk based on vulnerability severity, threat level, and business criticality.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Controls:\"}),\" Implementing firewalls, endpoint protection, and intrusion detection systems.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of a Strong Security Posture\"}),/*#__PURE__*/e(\"p\",{children:\"Key components of a strong security posture include a comprehensive asset inventory, effective security controls, and a well-defined incident response plan. Maintaining an up-to-date inventory of all IT assets ensures that no element is overlooked in security assessments. Implementing robust security controls, such as firewalls and intrusion detection systems, helps mitigate potential threats.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, having a detailed incident response plan is crucial for quickly addressing and mitigating security incidents. Regular audits and continuous monitoring of assets for vulnerabilities further strengthen an organization's security posture, ensuring preparedness against evolving cyber threats.\"}),/*#__PURE__*/e(\"h2\",{children:\"Improving Security Posture: Best Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Improving your security posture involves implementing best practices to safeguard your organization.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Configuring systems to ensure individuals and systems can only perform authorized functions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Least Privilege:\"}),\" Assigning users only the privileges they need to perform their job.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Patch Management:\"}),\" Regularly downloading and applying patches to keep systems up to date.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Security Posture vs. Security Framework: Understanding the Difference\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between security posture and security framework is essential for effective cybersecurity management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Posture:\"}),\" Refers to the current state and readiness of an organization's security measures and its ability to respond to security incidents.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Framework:\"}),\" Typically refers to a set of guidelines, standards, and best practices that an organization follows to manage and improve its security measures systematically.\"]})})]})]});export const richText35=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Exfiltration\"}),\" is the unauthorized transfer of data from a computer or server, typically by cybercriminals who gain network access and extract sensitive information for malicious purposes.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Methods of Data Exfiltration\"}),/*#__PURE__*/e(\"p\",{children:\"Data exfiltration can occur through various sophisticated methods, often making it challenging to detect and prevent. Cybercriminals employ a range of techniques to extract sensitive information from targeted systems.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing:\"}),\" Deceptive emails tricking users into revealing credentials or downloading malware.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malware:\"}),\" Malicious software designed to steal data or provide remote access to attackers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Insider Threats:\"}),\" Employees or contractors with access to sensitive data who misuse their privileges.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Command and Control Servers:\"}),\" Remote servers used by attackers to manage and extract stolen data.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Signs of Data Exfiltration\"}),/*#__PURE__*/e(\"p\",{children:\"Recognizing signs of data exfiltration is crucial for preventing data breaches.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unusual Network Activity:\"}),\" Unexpected spikes in data transfer or irregular access patterns.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unauthorized Access:\"}),\" Logins from unfamiliar locations or devices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Anomalies:\"}),\" Sudden changes in data volume or file modifications.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preventing Data Exfiltration\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing data exfiltration requires a multi-faceted approach that combines technology, policies, and user education. Organizations must implement robust security measures to safeguard sensitive information from unauthorized access and extraction.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Loss Prevention (DLP):\"}),\" Tools that monitor and control data transfer to prevent unauthorized sharing.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Endpoint Protection:\"}),\" Comprehensive solutions to monitor and secure all endpoints within the network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Blocking Unauthorized Communication:\"}),\" Detecting and preventing malware from communicating with external servers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Education:\"}),\" Training employees to recognize and avoid phishing and social engineering attacks.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Consequences of Data Exfiltration\"}),/*#__PURE__*/e(\"p\",{children:\"Data exfiltration can have severe consequences for organizations. Financial losses are a significant concern, as companies may face hefty costs related to data recovery and potential ransomware payments. Additionally, the loss of sensitive corporate data and user credentials can lead to further exploitation by cybercriminals.\"}),/*#__PURE__*/e(\"p\",{children:\"Reputational damage is another critical impact, as data breaches erode customer trust and can tarnish a company's image. The long-term effects include diminished customer loyalty and potential legal ramifications, which can further strain an organization's resources and stability.\"})]});export const richText36=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Discretionary Access Control (DAC)\"}),\" allows resource owners to manage access permissions, granting or restricting access based on user identity. This flexible model enables detailed control over individual files and documents.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Discretionary Access Control Effectively\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Discretionary Access Control (DAC) effectively requires a strategic approach to ensure security and usability. Here are some key considerations to keep in mind:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authorization:\"}),\" Ensure only authorized users have access to sensitive information.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control Lists:\"}),\" Regularly update and manage access control lists to reflect changes in user roles.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Password Policies:\"}),\" Implement strong password policies and user authentication mechanisms.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring:\"}),\" Continuously monitor and audit access to resources to detect unauthorized access attempts.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Principles in Discretionary Access Control\"}),/*#__PURE__*/e(\"p\",{children:\"Key principles in Discretionary Access Control (DAC) revolve around user management, flexibility, and ownership. Users have the autonomy to manage access to their resources, granting or revoking permissions as needed. This flexibility allows for tailored access control, ensuring that only authorized individuals can interact with specific resources.\"}),/*#__PURE__*/e(\"p\",{children:\"Ownership is a fundamental aspect of DAC, where the resource owner has complete control over access permissions. This model relies on access control lists (ACLs) to define user permissions, making it essential for owners to regularly update these lists to maintain security and usability.\"}),/*#__PURE__*/e(\"h2\",{children:\"Discretionary vs. Mandatory Access Control: A Comparison\"}),/*#__PURE__*/e(\"p\",{children:\"Discretionary Access Control (DAC) and Mandatory Access Control (MAC) offer distinct approaches to managing access permissions.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexibility:\"}),\" DAC allows resource owners to set access permissions, offering greater flexibility. In contrast, MAC enforces strict access policies based on classification levels, limiting user control.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" DAC is more prone to unauthorized access due to its discretionary nature. MAC provides higher security by centralizing control and preventing users from altering access permissions.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Using Discretionary Access Control\"}),/*#__PURE__*/e(\"p\",{children:\"Discretionary Access Control (DAC) offers several advantages for managing access permissions.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexibility:\"}),\" Owners can easily grant and modify access rights.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Control:\"}),\" Users manage their own resource permissions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Unauthorized users cannot view object characteristics.\"]})})]})]});export const richText37=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A wildcard certificate is a digital certificate that secures a domain and all its subdomains. It simplifies management and reduces costs but can expose multiple subdomains to risk if compromised.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Using Wildcard Certificates\"}),/*#__PURE__*/e(\"p\",{children:\"Wildcard certificates offer significant benefits, including cost-effectiveness and ease of management. By using a single certificate for multiple subdomains, organizations save on the cost of purchasing individual certificates. This approach also simplifies administrative tasks, reducing the overhead associated with managing multiple certificates.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, wildcard certificates enhance scalability and security. They allow new subdomains to be added under the same certificate without requiring additional SSL certificates. This ensures secure communication across all subdomains, making it easier to manage and expand the domain structure.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Wildcard Certificates Securely\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing wildcard certificates securely is crucial to maintaining the integrity of your domain and its subdomains. Here are some best practices to ensure your wildcard certificates are used safely and effectively:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strong Encryption:\"}),\" Use robust encryption algorithms to protect data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Limit Scope:\"}),\" Apply wildcard certificates only to necessary subdomains to minimize risk.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Audits:\"}),\" Conduct frequent audits to ensure proper and secure usage.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Restrict certificate access to authorized personnel only.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Wildcard vs. Single-Domain Certificates\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing between wildcard and single-domain certificates depends on your specific needs and security considerations.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Wildcard certificates secure multiple subdomains under a single domain, offering convenience but posing higher risks if compromised. Single-domain certificates, on the other hand, secure only one specific domain or subdomain, providing a more focused security approach.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost and Management:\"}),\" Wildcard certificates are cost-effective and simplify management by covering multiple subdomains with one certificate. Single-domain certificates require individual certificates for each domain, which can be more secure but also more expensive and administratively intensive.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Common Misconceptions about Wildcard Certificates\"}),/*#__PURE__*/e(\"p\",{children:\"There are several common misconceptions about wildcard certificates that can lead to misunderstandings about their use and security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Wildcard certificates do not provide the same level of security as individual certificates for each subdomain.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Best Option:\"}),\" They are not always the best choice for securing subdomains, especially where high security is required.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Revocation:\"}),\" If one subdomain is compromised, the entire wildcard certificate must be revoked, affecting all subdomains.\"]})})]})]});export const richText38=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Database as a Service (DBaaS)\"}),\" is a cloud-based service that provides access to a database without the need to manage the underlying infrastructure. It simplifies database management and enhances scalability.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Choosing DBaaS\"}),/*#__PURE__*/e(\"p\",{children:\"Choosing DBaaS offers numerous benefits, including simplified management and cost-efficiency. By offloading infrastructure management to the service provider, organizations can focus on using the database rather than maintaining it. This not only reduces the need for in-house resources but also operates on a pay-as-you-go model, leading to significant cost savings.\"}),/*#__PURE__*/e(\"p\",{children:\"DBaaS also enhances scalability and security. Providers handle performance optimization and disaster recovery, ensuring data protection and availability. Additionally, automatic updates and robust security features protect against unauthorized access, making DBaaS a reliable and secure choice for businesses.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of DBaaS\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the key components of Database as a Service (DBaaS) is essential for leveraging its full potential. These components ensure that DBaaS provides a seamless, efficient, and secure database management experience.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Elasticity\"}),\": Ability to scale resources up or down based on demand.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Managed Service\"}),\": Provider handles database administration and maintenance tasks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security\"}),\": Enterprise-level features like encryption and access controls.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subscription Model\"}),\": Typically offered on a pay-as-you-go basis.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"DBaaS vs. Traditional Databases\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing DBaaS and traditional databases reveals significant differences in management and scalability.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Management:\"}),\" DBaaS offloads maintenance tasks like patching and backups to the provider, while traditional databases require in-house IT teams to handle these tasks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability:\"}),\" DBaaS offers seamless scalability with minimal manual intervention, whereas traditional databases often need significant infrastructure investment to scale.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Securing Your DBaaS Deployment\"}),/*#__PURE__*/e(\"p\",{children:\"Securing your DBaaS deployment is crucial for protecting sensitive data and ensuring compliance.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Controls\"}),\": Implement strong identity management and user permissions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption\"}),\": Encrypt data both at rest and in transit.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring\"}),\": Regularly log and monitor database activities.\"]})})]})]});export const richText39=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An audit log is a chronological record of system activities, documenting user actions, system accesses, and operations performed. It is essential for monitoring, compliance, and forensic analysis.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Elements of Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Audit logs are essential for maintaining the security and integrity of systems by providing a detailed record of activities. They help organizations monitor user actions, detect anomalies, and ensure compliance with regulatory requirements.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Name:\"}),\" Identifies the specific action or event recorded in the log.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Timestamp:\"}),\" Indicates the exact time the event occurred.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Actor:\"}),\" Specifies the user or service responsible for the event.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Impact:\"}),\" Details the system or resource affected by the event.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Importance of Maintaining Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Maintaining audit logs is crucial for both security and compliance. They provide a detailed record of system activities, helping organizations monitor user actions and detect anomalies. This is essential for ensuring that systems operate as expected and for identifying potential security breaches.\"}),/*#__PURE__*/e(\"p\",{children:\"Audit logs also play a vital role in forensic analysis. In the event of a security incident, they offer a chronological record that helps investigators understand what happened and take corrective actions. This makes them indispensable for both immediate response and long-term security planning.\"}),/*#__PURE__*/e(\"h2\",{children:\"Audit Logs vs. Event Logs: Understanding the Difference\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between audit logs and event logs is crucial for effective system monitoring and security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Audit logs focus on user activities and system accesses, providing a detailed record for compliance and forensic analysis. Event logs, on the other hand, capture a broader range of system events, including errors and operational activities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Purpose:\"}),\" Audit logs are essential for tracking user actions and ensuring regulatory compliance. Event logs are primarily used for troubleshooting and monitoring the operational status of systems.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Audit Log Management\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing best practices for audit log management is essential for maintaining system security and compliance.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retention:\"}),\" Ensure logs are stored for a sufficient period to meet compliance requirements.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Restrict access and use tamper-proof methods to protect log integrity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Analysis:\"}),\" Regularly review logs to detect anomalies and ensure system integrity.\"]})})]})]});export const richText40=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Security Information and Event Management (SIEM) systems collect, analyze, and respond to security threats by aggregating log and event data from various sources, providing real-time threat detection and compliance reporting.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of SIEM Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"Key components of SIEM solutions are essential for effective security management. These components work together to provide comprehensive threat detection, analysis, and response capabilities.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Log Management:\"}),\" Collects and organizes data from various sources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Correlation:\"}),\" Identifies patterns and relationships in the data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Monitoring:\"}),\" Monitors security incidents across the network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert Generation:\"}),\" Notifies security teams of potential threats.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing SIEM: Best Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing SIEM effectively requires adherence to best practices to ensure optimal performance and security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Define Requirements:\"}),\" Clearly outline what you need from your SIEM solution.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Conduct Test Runs:\"}),\" Perform thorough testing before full deployment.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Improvement:\"}),\" Regularly update and refine your SIEM processes.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"SIEM vs. SOC: Understanding the Difference\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between SIEM and SOC is crucial for effective cybersecurity management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SIEM:\"}),\" A technology that collects and analyzes log data from various sources to detect and respond to security threats in real-time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SOC:\"}),\" A centralized team that monitors and manages security issues, often utilizing SIEM tools to enhance their threat detection and incident response capabilities.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Evolution of SIEM Technology\"}),/*#__PURE__*/e(\"p\",{children:\"SIEM technology has significantly evolved from its early days of basic log management to sophisticated, AI-driven systems. Initially, SIEM tools focused on aggregating log data and generating alerts. Over time, advancements in machine learning and artificial intelligence have enabled real-time threat detection and automated incident response.\"}),/*#__PURE__*/e(\"p\",{children:\"Modern SIEM solutions are now cloud-based, offering enhanced scalability and integration with other security tools like SOAR and XDR. These integrations streamline security workflows, making threat detection and response more efficient and cost-effective for organizations.\"})]});export const richText41=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Mandatory Access Control (MAC) restricts access based on classification levels assigned to users and resources. Policies are centrally managed and enforced by the system, ensuring high security and consistency.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Mandatory Access Control Works\"}),/*#__PURE__*/e(\"p\",{children:\"Mandatory Access Control (MAC) operates by enforcing strict access policies based on classification levels assigned to both users and resources. This centralized approach ensures that access decisions are made by the system, not by individual users.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Central Authority:\"}),\" Access decisions are made by a central authority, not by individual users.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Uniform Enforcement:\"}),\" Policies are uniformly enforced across all subjects and objects within the system.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Constraints:\"}),\" Users cannot pass information to unauthorized entities or change security attributes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trusted Subjects:\"}),\" Certain subjects may be granted specific privileges exempting them from some constraints.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Types of Mandatory Access Control Models\"}),/*#__PURE__*/e(\"p\",{children:\"Types of Mandatory Access Control (MAC) models include Bell-LaPadula and Biba. The Bell-LaPadula model focuses on maintaining data confidentiality by preventing unauthorized access to classified information. The Biba model, on the other hand, emphasizes data integrity, ensuring that information is not altered by unauthorized users.\"}),/*#__PURE__*/e(\"p\",{children:\"Another notable MAC model is the Clark-Wilson model, which enforces well-formed transactions and separation of duties. This model is particularly effective in commercial applications where data integrity and consistency are crucial.\"}),/*#__PURE__*/e(\"h2\",{children:\"Mandatory Access Control vs. Discretionary Access Control\"}),/*#__PURE__*/e(\"p\",{children:\"Mandatory Access Control (MAC) and Discretionary Access Control (DAC) are two distinct approaches to managing access to resources.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Control Mechanism:\"}),\" MAC enforces access based on predefined policies and classification levels, while DAC allows users to manage access controls themselves.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexibility:\"}),\" MAC is less flexible due to its rigid system control, whereas DAC offers more flexibility as users can modify permissions.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Mandatory Access Control in Your Organization\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Mandatory Access Control (MAC) in your organization can significantly enhance security and consistency.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Classification:\"}),\" Assign classification labels to resources and security levels to users.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Centralized Management:\"}),\" Ensure policies are managed and enforced by a central authority.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Monitoring:\"}),\" Regularly update and monitor classifications and access controls.\"]})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "oFAAiF,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uGAAuG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6GAA6G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6JAA6J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,6JAA6J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ueAAue,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mWAAmW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,+GAA+G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yiBAAyiB,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,8HAA8H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,qHAAqH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,skBAAskB,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8VAA8V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4JAA4J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oIAAoI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wcAAwc,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,yJAAyJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2KAA2K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qeAAge,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8WAA8W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+XAA+X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+kBAA+kB,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,+FAA+F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,0JAA0J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wlBAAwlB,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,oLAAoL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,sKAAsK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+dAA+d,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,0DAAuEA,EAAE,OAAO,CAAC,SAAS,kBAAkB,CAAC,EAAE,yBAAsCA,EAAE,OAAO,CAAC,SAAS,WAAW,CAAC,EAAE,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6KAA6K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gLAAgL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ycAAyc,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,sJAAsJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,wIAAwI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+XAA+X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,+FAA+F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,sFAAsF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wWAAwW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8UAA8U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2LAA2L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,mJAAmJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAuT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,yLAAyL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ieAAie,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAkR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uXAAuX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAA8T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,knBAAknB,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yGAAyG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+DAA+D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,mIAAmI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,6JAA6J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2iBAA2iB,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,uIAAuI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,2JAA2J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,odAAod,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,8HAA8H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,4GAA4G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,oJAAoJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,gNAAgN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,uLAAuL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4fAA4f,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wIAAwI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,2JAA2J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8mBAA8mB,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,oIAAoI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,2IAA2I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,0LAA0L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2MAA2M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oKAAoK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,6IAA6I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sWAAsW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,0MAA0M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,gKAAgK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,4CAA4C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,qJAAqJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gJAAgJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uVAAuV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oSAAoS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iJAAiJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,QAAqBA,EAAE,OAAO,CAAC,SAAS,mBAAmB,CAAC,EAAE,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,iCAA8CA,EAAE,OAAO,CAAC,SAAS,kCAAkC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,0BAAuCA,EAAE,OAAO,CAAC,SAAS,YAAY,CAAC,EAAE,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,+CAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+IAA+I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kJAAkJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gWAAgW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,8TAA8T,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,wPAAwP,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wSAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAuT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iKAAiK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,gJAAgJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,+NAA+N,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wLAAwL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB9B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kEAAkE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,kMAAkM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,6KAA6K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6B,EAAwB/B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,kMAAkM,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,+FAA+F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,oTAAoT,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qNAAqN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sUAAsU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8B,EAAwBhC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uJAAuJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iSAAiS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,0KAA0K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,4LAA4L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwBjC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iMAAiM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,gKAAgK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iYAAiY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,+GAA+G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mIAAmI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,+IAA+I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,uKAAuK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiC,EAAwBnC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wYAAwY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,0IAA0I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekC,EAAwBpC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,+FAA+F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uEAAuE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qIAAqI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,kKAAkK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemC,EAAwBrC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,gLAAgL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sFAAsF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yUAAyU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,CAAC,CAAC,CAAC,EAAeoC,EAAwBtC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,gMAAgM,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gWAAgW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAAkS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,8LAA8L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,wLAAwL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqC,EAAwBvC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA+V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,gRAAgR,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,sRAAsR,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2GAA2G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,8GAA8G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesC,EAAwBxC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,oLAAoL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iXAAiX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAuT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2JAA2J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,+JAA+J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuC,EAAwBzC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,mPAAmP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewC,EAAwB1C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,gIAAgI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,iKAAiK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,CAAC,CAAC,CAAC,EAAeyC,EAAwB3C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+UAA+U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2IAA2I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,6HAA6H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAC3ilK0C,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "richText32", "richText33", "richText34", "richText35", "richText36", "richText37", "richText38", "richText39", "richText40", "richText41", "__FramerMetadata__"]
}
