Files
Seguridad-Informatica/Vista General 1.canvas
2025-11-28 15:55:46 +01:00

164 lines
23 KiB
Plaintext
Executable File

{
"nodes":[
{"id":"bcf787d45cb5b1e0","type":"group","x":-4581,"y":-8168,"width":9308,"height":13700,"label":"Árbol de conocimiento - Seguridad informática"},
{"id":"766a6671ea3a8039","type":"group","x":-4340,"y":-563,"width":5960,"height":4340,"label":"M1_Pre-Compromiso"},
{"id":"e2ce8f2f12bcc491","type":"group","x":-4340,"y":-6840,"width":2705,"height":5880,"label":"Explicaciones Generales"},
{"id":"962ff1c95517d57e","type":"group","x":1440,"y":-6600,"width":2900,"height":3420,"label":"Tools"},
{"id":"921470a60ff7bbb0","type":"group","x":-4320,"y":-2840,"width":2665,"height":1860,"label":"General"},
{"id":"54670618b2cf658c","type":"group","x":1150,"y":-2493,"width":3350,"height":1393,"label":"MALWARE"},
{"id":"26798fb1359058a1","type":"group","x":1520,"y":-4620,"width":2740,"height":920,"label":"Operating System (OS)"},
{"id":"2ca3c199e6e19f94","type":"group","x":1460,"y":-6540,"width":1400,"height":1580,"label":"Tools/hardware"},
{"id":"4e30c8e2c6af9e48","type":"group","x":2890,"y":-6540,"width":1345,"height":1580,"label":"Tools/software"},
{"id":"cfd2ba133e67105f","type":"group","x":-4320,"y":-4460,"width":1320,"height":1500,"label":"Hackers"},
{"id":"9c5580a142bb224d","type":"group","x":-4320,"y":-6720,"width":1280,"height":1430,"label":"TRIADA CID"},
{"id":"986fc9e277a6da4b","type":"group","x":1500,"y":-7980,"width":1165,"height":1000,"label":"Experiencia"},
{"id":"a9b9222856ab6e1e","type":"group","x":-4320,"y":-5140,"width":1360,"height":480,"label":"Criptografia"},
{"id":"b52e5b3ecc65f7cb","type":"group","x":-3440,"y":-3460,"width":1360,"height":460,"label":"Pentesting"},
{"id":"5e77bd4acfb9b28f","type":"group","x":-4300,"y":-6600,"width":1240,"height":500,"label":"CID"},
{"id":"362124fd34bcfcb4","type":"group","x":-2960,"y":-4460,"width":1180,"height":480,"label":"Ciberseguridad"},
{"id":"a9d2601e9171141d","type":"file","file":"Seguridad Informática/Explicaciones Generales/Malware.md","x":-3400,"y":-1860,"width":400,"height":400},
{"id":"072ed4f13fa95893","type":"file","file":"Seguridad Informática/Explicaciones Generales/HoneyPot.md","x":-3000,"y":-2315,"width":480,"height":400},
{"id":"868319b6d9354e3b","type":"file","file":"Seguridad Informática/Explicaciones Generales/Medio Inseguro.md","x":-2520,"y":-1860,"width":400,"height":400},
{"id":"b7ffa26c5abfae7e","type":"file","file":"Seguridad Informática/Explicaciones Generales/DMZ (Zona Desmilitarizada).md","x":-3400,"y":-2315,"width":400,"height":400},
{"id":"2a0f53b8d1a16d09","type":"file","file":"Seguridad Informática/Explicaciones Generales/Vulnerabilidad.md","x":-2960,"y":-1400,"width":400,"height":400},
{"id":"a705880e914f19cc","type":"file","file":"Seguridad Informática/Explicaciones Generales/Suplantación de identidad.md","x":-3400,"y":-1400,"width":400,"height":400},
{"id":"4bafb6db42ab7d6f","type":"file","file":"Seguridad Informática/Explicaciones Generales/RAID.md","x":-4300,"y":-1400,"width":400,"height":400},
{"id":"af595f094586e221","type":"file","file":"Seguridad Informática/Explicaciones Generales/Lamers.md","x":-4300,"y":-1860,"width":400,"height":400},
{"id":"ac67b92df0985fd0","type":"file","file":"Seguridad Informática/Explicaciones Generales/Defacer.md","x":-3850,"y":-1860,"width":400,"height":400},
{"id":"61492858d9564ed5","type":"file","file":"Seguridad Informática/Explicaciones Generales/Script.md","x":-3850,"y":-1400,"width":400,"height":400},
{"id":"d2f0dcc4dec9115e","type":"file","file":"Seguridad Informática/Explicaciones Generales/2FA.md","x":-3400,"y":-2780,"width":400,"height":400},
{"id":"7e0042d6275c3414","type":"file","file":"Seguridad Informática/Explicaciones Generales/Clúster.md","x":-2520,"y":-2780,"width":400,"height":400},
{"id":"290cec24fb075b2d","type":"file","file":"Seguridad Informática/Explicaciones Generales/CPD.md","x":-2075,"y":-2780,"width":400,"height":400},
{"id":"75753edc797a58dc","type":"file","file":"Seguridad Informática/Explicaciones Generales/Deep Web (Web oscura).md","x":-4300,"y":-2780,"width":400,"height":400},
{"id":"a3bf48b483795d91","type":"file","file":"Seguridad Informática/Explicaciones Generales/Cracker.md","x":-3850,"y":-2780,"width":400,"height":400},
{"id":"a81a6e774d1e6294","type":"file","file":"Seguridad Informática/Explicaciones Generales/Ingeniería inversa.md","x":-2520,"y":-2315,"width":400,"height":400},
{"id":"505425d56655a216","type":"file","file":"Seguridad Informática/Explicaciones Generales/Ingenieria Social.md","x":-2075,"y":-2315,"width":400,"height":400},
{"id":"7f767cbc7435dd24","type":"file","file":"Seguridad Informática/Explicaciones Generales/Proxy.md","x":-2075,"y":-1860,"width":400,"height":400},
{"id":"ff787fe02e90e44d","type":"file","file":"Seguridad Informática/Explicaciones Generales/Medio Seguro.md","x":-2960,"y":-1860,"width":400,"height":400},
{"id":"0b54bda8cafeb597","type":"file","file":"Seguridad Informática/Explicaciones Generales/Chernobyl (virus informatico).md","x":-2960,"y":-2780,"width":400,"height":400},
{"id":"0effbb9bf0676b1e","type":"file","file":"Seguridad Informática/Tipos de ataque/Virus/Tipos de virus/Stuxnet.md","x":3080,"y":-1520,"width":400,"height":400},
{"id":"448113ad1196ee4d","type":"file","file":"Seguridad Informática/Tipos de ataque/Kerberoasting/Kerberoasting.md","x":3600,"y":-1520,"width":400,"height":400},
{"id":"5c0b74c2efcf7c0e","type":"file","file":"Seguridad Informática/Tipos de ataque/Exploit/Exploits.md","x":3600,"y":-2473,"width":400,"height":400},
{"id":"1db1cc325fcedc2c","type":"file","file":"Seguridad Informática/Tipos de ataque/SQL inyection/Inyección SQL.md","x":3600,"y":-2000,"width":400,"height":400},
{"id":"5bc38ec8239bef99","type":"file","file":"Seguridad Informática/Explicaciones Generales/Defacer.md","x":-4300,"y":-2315,"width":400,"height":400},
{"id":"a7e112eb0ad83d7d","type":"file","file":"Seguridad Informática/Explicaciones Generales/Espionaje.md","x":-3850,"y":-2315,"width":400,"height":400},
{"id":"ee95734098dab30b","type":"file","file":"Seguridad Informática/Tipos de ataque/DoS/DoS.md","x":3080,"y":-2473,"width":400,"height":400},
{"id":"bac7fef542c9a44c","type":"file","file":"Seguridad Informática/Tipos de ataque/Spyware/Spyware.md","x":3080,"y":-2000,"width":400,"height":400},
{"id":"ec6d2bd63afac0a2","type":"text","text":"","x":3209,"y":-1461,"width":250,"height":60},
{"id":"9c375f075abbda38","type":"file","file":"Seguridad Informática/Tipos de ataque/Ransomware/Ransomware.md","x":2120,"y":-2000,"width":400,"height":400},
{"id":"1bf31cc00b554329","type":"file","file":"Seguridad Informática/Tipos de ataque/DDoS/DDoS.md","x":2600,"y":-2473,"width":400,"height":400},
{"id":"bedb994bafddde7d","type":"file","file":"Seguridad Informática/Tipos de ataque/XSS/Cross-Site Scripting (XSS).md","x":2120,"y":-1520,"width":400,"height":400},
{"id":"d7aebe8cc38440e4","type":"file","file":"Seguridad Informática/Tipos de ataque/Brute Force/Ataque a fuerza bruta.md","x":2120,"y":-2473,"width":400,"height":400},
{"id":"868ae1ad65f020f3","type":"file","file":"Seguridad Informática/Tipos de ataque/Sniffing/Sniffing.md","x":2600,"y":-2000,"width":400,"height":400},
{"id":"1f2acfd81f652127","type":"file","file":"Seguridad Informática/Tipos de ataque/Ransomware/Ransomware.md","x":2600,"y":-1520,"width":400,"height":400},
{"id":"675041afb7e0abf4","type":"file","file":"Seguridad Informática/Tipos de ataque/Keylogger/Keylogger.md","x":4080,"y":-2473,"width":400,"height":400},
{"id":"49f77b828fc65aab","type":"file","file":"Seguridad Informática/Tipos de ataque/Trojan/Troyano (Caballo de Troya).md","x":4080,"y":-2000,"width":400,"height":400},
{"id":"e1a5562245d35244","type":"file","file":"Seguridad Informática/Tipos de ataque/Botnet/Botnet.md","x":1640,"y":-2473,"width":400,"height":400},
{"id":"552e1ce4df8417a3","type":"file","file":"Seguridad Informática/Tipos de ataque/MITM ATTACK/MITM ATTACK.md","x":1640,"y":-2000,"width":400,"height":400},
{"id":"e40dda5ce14ecef3","type":"text","text":"\n\nTools\n","x":660,"y":-4900,"width":136,"height":50},
{"id":"f476b04c07bf50b7","type":"text","text":"software\n","x":1088,"y":-4860,"width":176,"height":55},
{"id":"19d906d907052c79","type":"text","text":"Sistemas operativos\n","x":660,"y":-4340,"width":250,"height":60},
{"id":"f894b028cf79b1ca","type":"file","file":"Seguridad Informática/Tipos de ataque/Backdoor/Backdoor (Puerta trasera).md","x":1170,"y":-2473,"width":400,"height":400},
{"id":"0fe0259d39b06414","type":"file","file":"Seguridad Informática/Tipos de ataque/Logic Bomb/Bomba Lógica.md","x":1170,"y":-2000,"width":400,"height":400},
{"id":"8a1011b3702b71e0","type":"file","file":"Seguridad Informática/Tipos de ataque/Virus/Virus informatico.md","x":1170,"y":-1520,"width":400,"height":400},
{"id":"020fe98ea4b5148a","type":"file","file":"Seguridad Informática/Tipos de ataque/Worm/Gusano.md","x":1640,"y":-1520,"width":400,"height":400},
{"id":"3e76f5ce1054dbe0","type":"file","file":"Seguridad Informática/1.Tools/Hardware/Cable O.MG.md","x":2060,"y":-5435,"width":760,"height":415},
{"id":"8c3d832f95098ea7","type":"file","file":"Seguridad Informática/1.Tools/Operating Systems/SherLock.md","x":2465,"y":-4600,"width":400,"height":400},
{"id":"f4f372cc0cfd5c11","type":"file","file":"Seguridad Informática/1.Tools/Hardware/USB KILLER.md","x":1515,"y":-5435,"width":470,"height":415},
{"id":"2d28970b5dad88e1","type":"file","file":"Seguridad Informática/1.Tools/Operating Systems/NodeZero.md","x":1540,"y":-4600,"width":400,"height":400},
{"id":"09f70715effaa5bc","type":"file","file":"Seguridad Informática/1.Tools/Operating Systems/ArchStrike.md","x":2010,"y":-4600,"width":400,"height":400},
{"id":"58438159a57246e3","type":"file","file":"Seguridad Informática/1.Tools/Hardware/PICO TPM SNIFFER.md","x":2060,"y":-6460,"width":760,"height":520},
{"id":"febbda832decab18","type":"file","file":"Seguridad Informática/1.Tools/Hardware/Rubber Ducky.md","x":2060,"y":-5860,"width":760,"height":375},
{"id":"89f602ce0f5580b5","type":"file","file":"Seguridad Informática/1.Tools/Hardware/BadUSB.md","x":1515,"y":-6460,"width":470,"height":520},
{"id":"38fe75ef543b1404","type":"file","file":"Seguridad Informática/1.Tools/Hardware/FLIPPER ZERO.md","x":1515,"y":-5860,"width":470,"height":375},
{"id":"e7823055c3434c65","type":"file","file":"Seguridad Informática/1.Tools/Operating Systems/BlackArch Linux.md","x":2935,"y":-4600,"width":400,"height":400},
{"id":"f3afd4033a2e566e","type":"file","file":"Seguridad Informática/1.Tools/Software/SATAN (Security Administrator Tool for Analyzing Networks).md","x":2910,"y":-5980,"width":470,"height":400},
{"id":"cbaf05ee8e2bbbe8","type":"file","file":"Seguridad Informática/1.Tools/Operating Systems/BackBox.md","x":3405,"y":-4600,"width":400,"height":400},
{"id":"9fc47716a8162e76","type":"file","file":"Seguridad Informática/1.Tools/Software/NMAP.md","x":2910,"y":-6460,"width":470,"height":400},
{"id":"5206b645125b1246","type":"file","file":"Seguridad Informática/1.Tools/Software/Metasploit.md","x":3455,"y":-6460,"width":760,"height":400},
{"id":"5821fba16a1bc572","type":"file","file":"Seguridad Informática/1.Tools/Software/NESSUS.md","x":3455,"y":-5980,"width":760,"height":400},
{"id":"9b681975df2a0593","type":"file","file":"Seguridad Informática/1.Tools/Software/SpecOps.md","x":3455,"y":-5500,"width":760,"height":400},
{"id":"9ee84e261ac8f4b0","type":"file","file":"Seguridad Informática/1.Tools/Operating Systems/Kali.md","x":1540,"y":-4120,"width":2700,"height":400},
{"id":"82b528abf69d72dc","type":"file","file":"Seguridad Informática/1.Tools/Operating Systems/Parrot Security OS.md","x":3840,"y":-4600,"width":400,"height":400},
{"id":"3ad00d1c5fd97b03","type":"file","file":"Seguridad Informática/Explicaciones Generales/Triada CIA/Triada CID.md","x":-3880,"y":-5920,"width":400,"height":320},
{"id":"add5600ace07fbe8","type":"file","file":"Seguridad Informática/Explicaciones Generales/Criptografia/Criptografia.md","x":-3630,"y":-5080,"width":650,"height":400},
{"id":"7a2b18b619b1b178","type":"file","file":"Seguridad Informática/Explicaciones Generales/Criptografia/Cifrado.md","x":-4300,"y":-5080,"width":620,"height":400},
{"id":"3d856fce9de49783","type":"text","text":"Triada CIA","x":-3805,"y":-5480,"width":250,"height":60},
{"id":"541413a97fade290","type":"file","file":"Seguridad Informática/EXPERIENCIA/1r Ataque - Robar tokens de sesión de Discord.md","x":1580,"y":-7460,"width":500,"height":400},
{"id":"58ecd48f45c6f732","type":"file","file":"Seguridad Informática/EXPERIENCIA/Creación de un USB RUBBER DUCKY.md","x":2120,"y":-7460,"width":500,"height":400},
{"id":"f821c71afb4911c2","type":"file","file":"Seguridad Informática/Explicaciones Generales/Triada CIA/Confidencialidad.md","x":-4280,"y":-6520,"width":400,"height":400},
{"id":"1d876bfedc756fd6","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Grey Hat (Sombrero gris).md","x":-4300,"y":-3920,"width":400,"height":400},
{"id":"68f4b5e823c47a36","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/White Hat (sombrero blanco).md","x":-3860,"y":-4400,"width":400,"height":400},
{"id":"9b884ad72cfd1556","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Hacktivismo.md","x":-4300,"y":-4400,"width":400,"height":400},
{"id":"a62a45050dab197f","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Red Hat (Sombrero rojo).md","x":-3860,"y":-3920,"width":400,"height":400},
{"id":"ccbae40e751a130c","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Blue Hat (sombrero azul).md","x":-3420,"y":-3920,"width":400,"height":400},
{"id":"c745b4caca0a0737","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Hacker.md","x":-3420,"y":-4400,"width":400,"height":400},
{"id":"a6ae15bb074ed380","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Script kiddie.md","x":-4300,"y":-3410,"width":400,"height":400},
{"id":"f9a74cdb1bf0035d","type":"file","file":"Seguridad Informática/Explicaciones Generales/Triada CIA/Integridad.md","x":-3880,"y":-6520,"width":400,"height":400},
{"id":"cc2f3173632e7e93","type":"file","file":"Seguridad Informática/Explicaciones Generales/Triada CIA/Disponibilidad.md","x":-3480,"y":-6520,"width":400,"height":400},
{"id":"56103d57c37bbd8a","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Pentesting/Tipos de prueba de penetracion/Tipos de pruebas de penetración.md","x":-2500,"y":-3410,"width":400,"height":400},
{"id":"1353def653057f66","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Pentesting/Pentester.md","x":-3420,"y":-3410,"width":400,"height":400},
{"id":"29af70025c6115a2","type":"file","file":"Seguridad Informática/Explicaciones Generales/Hacker/Tipo de hackers/Pentesting/Hacker Ético.md","x":-3860,"y":-3410,"width":400,"height":400},
{"id":"7b6977e76192ef82","type":"text","text":"Explicaciones generales","x":-743,"y":-4374,"width":250,"height":80},
{"id":"2d5462cd70afecbd","type":"file","file":"Seguridad Informática/Explicaciones Generales/Ciberataque.md","x":-2940,"y":-4400,"width":580,"height":400},
{"id":"f00e2223d5ae12e5","type":"text","text":"Hackers\n","x":-2325,"y":-3720,"width":250,"height":60},
{"id":"05cec395aa53c38b","type":"file","file":"Seguridad Informática/Explicaciones Generales/Ciberseguridad/Ciberseguridad.md","x":-2360,"y":-4400,"width":560,"height":400},
{"id":"7535236138a4a420","type":"text","text":"Pruebas de penetración","x":-2860,"y":-3240,"width":250,"height":60},
{"id":"c1077304574ddb93","type":"text","text":"\nhardware\n","x":1000,"y":-5780,"width":176,"height":60},
{"id":"17f93b6d296c5115","type":"text","text":"Criptografia","x":-1925,"y":-4910,"width":250,"height":60},
{"id":"48050462b582fc7e","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/Preparación para la CPTS.md","x":-1284,"y":-1998,"width":1760,"height":860},
{"id":"6751c371b9dd3436","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje--Organizacion.md","x":-3387,"y":-486,"width":705,"height":400},
{"id":"3bf2f236c1a992fc","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje--Enfocate.md","x":-2616,"y":-486,"width":747,"height":400},
{"id":"0efd8df8ac4cd4e9","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje--Atencion.md","x":-1817,"y":-486,"width":648,"height":400},
{"id":"a2c83406d04bd9dd","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje.md","x":-4320,"y":-483,"width":840,"height":400},
{"id":"0d42ce3e3e748e09","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/2_Linux.md","x":-4320,"y":-3,"width":840,"height":400},
{"id":"1a32c4ecc17501b8","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/3_Windows.md","x":-4320,"y":477,"width":840,"height":400},
{"id":"7f3ec2a2602ed4c9","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje--Confort.md","x":-1108,"y":-485,"width":586,"height":400},
{"id":"8d322a448450553e","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje--Obstaculos.md","x":-470,"y":-485,"width":570,"height":400},
{"id":"65b5062fd86017c9","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje--Preguntar.md","x":165,"y":-485,"width":574,"height":400},
{"id":"61e9f0334dd26d1f","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/1_Proceso de aprendizaje/1_Proceso de aprendizaje--Manejar la frustración.md","x":824,"y":-485,"width":711,"height":400},
{"id":"a68847304776f8a3","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/6_Solicitud Web.md","x":-4320,"y":1917,"width":840,"height":400},
{"id":"60a0442de077fdf5","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/7_Ofuscamiento de JavaScript.md","x":-4320,"y":2397,"width":840,"height":400},
{"id":"9a06d51dd1d1d1d2","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/8_Introducción a Active Directory.md","x":-4320,"y":2877,"width":840,"height":400},
{"id":"af132fa674b32a5d","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/9_Empezar.md","x":-4320,"y":3357,"width":840,"height":400},
{"id":"618637fee9e0a6ba","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/4_Introducción a redes.md","x":-4320,"y":957,"width":840,"height":400},
{"id":"623c9d90960932dd","type":"file","file":"Seguridad Informática/EXPERIENCIA/Certificados/CPTS/M1_Pre-Compromiso/5_Introduccion a aplicaciones Web.md","x":-4320,"y":1437,"width":840,"height":400},
{"id":"2c60aecf67a2cbb2","type":"file","file":"Seguridad Informática/EXPERIENCIA/Mi experiencia.md","x":1760,"y":-7920,"width":680,"height":400},
{"id":"456a9cb3162f41b8","type":"text","text":"Experiencia\n","x":1046,"y":-7368,"width":250,"height":60},
{"id":"52888ef2277e591c","type":"file","file":"Seguridad Informática/Bienvenido.md","x":-379,"y":-4575,"width":660,"height":498}
],
"edges":[
{"id":"6621e1ef963b3226","fromNode":"e40dda5ce14ecef3","fromSide":"right","toNode":"c1077304574ddb93","toSide":"left"},
{"id":"1b2ffad9c76d87ae","fromNode":"e40dda5ce14ecef3","fromSide":"right","toNode":"f476b04c07bf50b7","toSide":"left"},
{"id":"37414f25800592ab","fromNode":"52888ef2277e591c","fromSide":"right","toNode":"e40dda5ce14ecef3","toSide":"left"},
{"id":"bbac1fa72c8abd1e","fromNode":"c1077304574ddb93","fromSide":"right","toNode":"2ca3c199e6e19f94","toSide":"left"},
{"id":"810c468785e3b70f","fromNode":"52888ef2277e591c","fromSide":"top","toNode":"456a9cb3162f41b8","toSide":"left"},
{"id":"9ff8e9e0085d3efb","fromNode":"456a9cb3162f41b8","fromSide":"right","toNode":"986fc9e277a6da4b","toSide":"left"},
{"id":"58888465ca541d95","fromNode":"52888ef2277e591c","fromSide":"left","toNode":"7b6977e76192ef82","toSide":"right"},
{"id":"81d1b1e10ef37384","fromNode":"7b6977e76192ef82","fromSide":"left","toNode":"05cec395aa53c38b","toSide":"right"},
{"id":"2b5a4bdc8838b8d7","fromNode":"7b6977e76192ef82","fromSide":"left","toNode":"17f93b6d296c5115","toSide":"right"},
{"id":"f9a5e3090cdcc23e","fromNode":"17f93b6d296c5115","fromSide":"left","toNode":"a9b9222856ab6e1e","toSide":"right"},
{"id":"9f62b1f6b9867bb2","fromNode":"7b6977e76192ef82","fromSide":"left","toNode":"f00e2223d5ae12e5","toSide":"right"},
{"id":"06cf03ab8950c8e2","fromNode":"f00e2223d5ae12e5","fromSide":"left","toNode":"cfd2ba133e67105f","toSide":"right"},
{"id":"a8ef7a456f79d66e","fromNode":"1353def653057f66","fromSide":"right","toNode":"7535236138a4a420","toSide":"left"},
{"id":"c9fa82cdc275609b","fromNode":"7535236138a4a420","fromSide":"right","toNode":"56103d57c37bbd8a","toSide":"left"},
{"id":"b5f1e0a59cfe2610","fromNode":"3ad00d1c5fd97b03","fromSide":"top","toNode":"f821c71afb4911c2","toSide":"bottom"},
{"id":"2744874552b49c87","fromNode":"3ad00d1c5fd97b03","fromSide":"top","toNode":"f9a74cdb1bf0035d","toSide":"bottom"},
{"id":"7f4f2425251fc0c0","fromNode":"3ad00d1c5fd97b03","fromSide":"top","toNode":"cc2f3173632e7e93","toSide":"bottom"},
{"id":"8ded12bbeff6c33e","fromNode":"3d856fce9de49783","fromSide":"top","toNode":"3ad00d1c5fd97b03","toSide":"bottom"},
{"id":"cb80698d246ec7f5","fromNode":"7b6977e76192ef82","fromSide":"left","toNode":"9c5580a142bb224d","toSide":"right"},
{"id":"e33a08784c11d9cb","fromNode":"f476b04c07bf50b7","fromSide":"right","toNode":"4e30c8e2c6af9e48","toSide":"bottom"},
{"id":"96e823971261ea30","fromNode":"e40dda5ce14ecef3","fromSide":"bottom","toNode":"19d906d907052c79","toSide":"top"},
{"id":"b90fd075e9c80565","fromNode":"19d906d907052c79","fromSide":"right","toNode":"26798fb1359058a1","toSide":"left"},
{"id":"8384e52690d715e1","fromNode":"52888ef2277e591c","fromSide":"bottom","toNode":"54670618b2cf658c","toSide":"left"},
{"id":"1bb635e3f9e331b0","fromNode":"52888ef2277e591c","fromSide":"bottom","toNode":"48050462b582fc7e","toSide":"top"},
{"id":"3997c301dd5170b0","fromNode":"48050462b582fc7e","fromSide":"bottom","toNode":"766a6671ea3a8039","toSide":"top"},
{"id":"eaf050994d1167d7","fromNode":"a2c83406d04bd9dd","fromSide":"right","toNode":"6751c371b9dd3436","toSide":"left"},
{"id":"f487bbc8305d77af","fromNode":"6751c371b9dd3436","fromSide":"right","toNode":"3bf2f236c1a992fc","toSide":"left"},
{"id":"b979eafa2fa084e6","fromNode":"3bf2f236c1a992fc","fromSide":"right","toNode":"0efd8df8ac4cd4e9","toSide":"left"},
{"id":"c1308ce79eb31f8a","fromNode":"0efd8df8ac4cd4e9","fromSide":"right","toNode":"7f3ec2a2602ed4c9","toSide":"left"},
{"id":"0155024a9aff9cf2","fromNode":"7f3ec2a2602ed4c9","fromSide":"right","toNode":"8d322a448450553e","toSide":"left"},
{"id":"c11bd4eb093e77bb","fromNode":"8d322a448450553e","fromSide":"right","toNode":"65b5062fd86017c9","toSide":"left"},
{"id":"b79e7b51dcb11c0f","fromNode":"65b5062fd86017c9","fromSide":"right","toNode":"61e9f0334dd26d1f","toSide":"left"}
]
}