{"id":27782,"date":"2026-04-08T09:23:35","date_gmt":"2026-04-08T07:23:35","guid":{"rendered":"https:\/\/defenderbox.de\/?page_id=27782"},"modified":"2026-04-08T09:30:25","modified_gmt":"2026-04-08T07:30:25","slug":"test-graphics","status":"publish","type":"page","link":"https:\/\/defenderbox.de\/en\/test-grafiken\/","title":{"rendered":"Test graphics"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"27782\" class=\"elementor elementor-27782\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-269aee0 e-con-full e-flex e-con e-parent\" data-id=\"269aee0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0d2af3 elementor-widget elementor-widget-html\" data-id=\"d0d2af3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!DOCTYPE html>\n<html lang=\"de\">\n<head>\n<meta charset=\"UTF-8\">\n<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n<title>Security Cycle<\/title>\n<link rel=\"preconnect\" href=\"https:\/\/fonts.googleapis.com\">\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Plus+Jakarta+Sans:wght@400;500;600;700;800&display=swap\" rel=\"stylesheet\">\n<style>\n*, *::before, *::after { box-sizing: border-box; margin: 0; padding: 0; }\n\n:root {\n  --bg:        #f0f3fa;\n  --surface:   #ffffff;\n  --border:    #e2e8f2;\n  --blue:      #2563eb;\n  --blue-l:    #eff4ff;\n  --blue-2:    #1d4ed8;\n  --teal:      #0891b2;\n  --teal-l:    #ecfeff;\n  --orange:    #d97706;\n  --orange-l:  #fffbeb;\n  --text:      #0f172a;\n  --text-2:    #475569;\n  --text-3:    #94a3b8;\n  --sh-sm:     0 1px 3px rgba(15,23,42,.07),0 1px 2px rgba(15,23,42,.04);\n  --sh-md:     0 4px 18px rgba(15,23,42,.09),0 1px 4px rgba(15,23,42,.05);\n  --sh-lg:     0 12px 40px rgba(15,23,42,.11),0 3px 10px rgba(15,23,42,.06);\n  --sh-xl:     0 20px 60px rgba(15,23,42,.13),0 6px 18px rgba(15,23,42,.07);\n}\n\nbody {\n  background: var(--bg);\n  font-family: 'Plus Jakarta Sans', sans-serif;\n  min-height: 100vh;\n  display: flex;\n  align-items: center;\n  justify-content: center;\n  padding: 32px 20px;\n}\n\n\/* \u2500\u2500 OUTER SHELL \u2500\u2500 *\/\n.shell {\n  background: var(--surface);\n  border: 1px solid var(--border);\n  border-radius: 24px;\n  box-shadow: var(--sh-xl);\n  width: 100%;\n  max-width: 1020px;\n  overflow: hidden;\n  display: grid;\n  grid-template-columns: 1fr 1fr;\n}\n\n\/* \u2500\u2500 LEFT PANEL (diagram) \u2500\u2500 *\/\n.panel-left {\n  background: linear-gradient(145deg, #f8faff 0%, #eef3fe 100%);\n  border-right: 1px solid var(--border);\n  display: flex;\n  align-items: center;\n  justify-content: center;\n  padding: 48px 32px;\n  position: relative;\n  overflow: hidden;\n}\n\n\/* decorative dots grid *\/\n.panel-left::before {\n  content: '';\n  position: absolute;\n  inset: 0;\n  background-image: radial-gradient(circle, #cbd5e1 1px, transparent 1px);\n  background-size: 28px 28px;\n  opacity: 0.35;\n  pointer-events: none;\n}\n\n\/* subtle corner blobs *\/\n.panel-left::after {\n  content: '';\n  position: absolute;\n  width: 300px; height: 300px;\n  border-radius: 50%;\n  background: radial-gradient(circle, rgba(37,99,235,0.07) 0%, transparent 70%);\n  top: -80px; right: -80px;\n  pointer-events: none;\n}\n\n.diagram {\n  position: relative;\n  width: 100%;\n  max-width: 400px;\n  aspect-ratio: 1;\n  z-index: 1;\n}\n\n.diagram svg { width: 100%; height: 100%; overflow: visible; }\n\n\/* \u2500\u2500 RIGHT PANEL \u2500\u2500 *\/\n.panel-right {\n  display: flex;\n  flex-direction: column;\n  padding: 48px 44px 44px;\n  gap: 0;\n}\n\n.eyebrow {\n  display: inline-flex;\n  align-items: center;\n  gap: 6px;\n  background: var(--blue-l);\n  color: var(--blue);\n  font-size: 10.5px;\n  font-weight: 700;\n  letter-spacing: .09em;\n  text-transform: uppercase;\n  padding: 5px 12px;\n  border-radius: 100px;\n  width: fit-content;\n  margin-bottom: 16px;\n  opacity: 0;\n  animation: fadeUp .5s .1s ease forwards;\n}\n\n.card-title {\n  font-size: 26px;\n  font-weight: 800;\n  color: var(--text);\n  line-height: 1.25;\n  margin-bottom: 6px;\n  opacity: 0;\n  animation: fadeUp .5s .2s ease forwards;\n}\n\n.card-sub {\n  font-size: 14px;\n  color: var(--text-2);\n  line-height: 1.6;\n  margin-bottom: 32px;\n  opacity: 0;\n  animation: fadeUp .5s .3s ease forwards;\n}\n\n\/* \u2500\u2500 STEP LIST \u2500\u2500 *\/\n.steps {\n  display: flex;\n  flex-direction: column;\n  gap: 12px;\n  flex: 1;\n}\n\n.step {\n  background: var(--bg);\n  border: 1px solid var(--border);\n  border-radius: 14px;\n  padding: 14px 16px;\n  display: flex;\n  align-items: center;\n  gap: 14px;\n  cursor: default;\n  transition: box-shadow .22s, transform .22s, border-color .22s;\n  opacity: 0;\n  animation: fadeUp .45s ease forwards;\n}\n.step:hover {\n  box-shadow: var(--sh-md);\n  transform: translateX(3px);\n  border-color: #c7d2e8;\n}\n.step.s1 { animation-delay: 1.5s; }\n.step.s2 { animation-delay: 1.65s; }\n.step.s3 { animation-delay: 1.8s; }\n.step.s4 { animation-delay: 1.95s; }\n\n.step-icon {\n  width: 40px; height: 40px;\n  border-radius: 10px;\n  display: flex;\n  align-items: center;\n  justify-content: center;\n  flex-shrink: 0;\n}\n.step-icon.blue   { background: var(--blue-l); }\n.step-icon.teal   { background: var(--teal-l); }\n.step-icon.orange { background: var(--orange-l); }\n\n.step-body { flex: 1; }\n.step-title {\n  font-size: 13.5px;\n  font-weight: 700;\n  color: var(--text);\n  margin-bottom: 2px;\n}\n.step-desc {\n  font-size: 12px;\n  color: var(--text-3);\n  font-weight: 400;\n}\n\n.step-badge {\n  font-size: 10px;\n  font-weight: 700;\n  letter-spacing: .05em;\n  padding: 3px 8px;\n  border-radius: 100px;\n  flex-shrink: 0;\n}\n.step-badge.blue   { background: var(--blue-l);   color: var(--blue); }\n.step-badge.teal   { background: var(--teal-l);   color: var(--teal); }\n.step-badge.orange { background: var(--orange-l); color: var(--orange); }\n\n\/* \u2500\u2500 DIVIDER \u2500\u2500 *\/\n.divider {\n  height: 1px;\n  background: var(--border);\n  margin: 28px 0 20px;\n  opacity: 0;\n  animation: fadeUp .4s 1.4s ease forwards;\n}\n\n.footer-note {\n  font-size: 11.5px;\n  color: var(--text-3);\n  display: flex;\n  align-items: center;\n  gap: 6px;\n  opacity: 0;\n  animation: fadeUp .4s 2.1s ease forwards;\n}\n.footer-note svg { flex-shrink: 0; }\n\n\/* \u2500\u2500 SVG ANIMATIONS \u2500\u2500 *\/\n.arc-b { stroke-dasharray: 700; stroke-dashoffset: 700; animation: draw 1.1s .35s cubic-bezier(.4,0,.2,1) forwards; }\n.arc-t { stroke-dasharray: 700; stroke-dashoffset: 700; animation: draw 1.1s .65s cubic-bezier(.4,0,.2,1) forwards; }\n.arc-o { stroke-dasharray: 700; stroke-dashoffset: 700; animation: draw 1.1s .95s cubic-bezier(.4,0,.2,1) forwards; }\n@keyframes draw { to { stroke-dashoffset: 0; } }\n\n.nd { opacity: 0; animation: popIn .35s ease forwards; }\n.nd1 { animation-delay: 1.1s; transform-origin: 200px 72px; }\n.nd2 { animation-delay: 1.25s; transform-origin: 328px 200px; }\n.nd3 { animation-delay: 1.4s; transform-origin: 200px 328px; }\n.nd4 { animation-delay: 1.55s; transform-origin: 72px 200px; }\n@keyframes popIn {\n  from { opacity:0; transform: scale(.55); }\n  to   { opacity:1; transform: scale(1); }\n}\n\n.arr { opacity:0; animation: fi .25s ease forwards; }\n.a1 { animation-delay:1.2s; }\n.a2 { animation-delay:1.5s; }\n.a3 { animation-delay:1.8s; }\n@keyframes fi { to { opacity:1; } }\n\n.center-g { animation: cIn .5s 1.55s cubic-bezier(.34,1.56,.64,1) both; transform-origin: 200px 200px; }\n@keyframes cIn {\n  from { opacity:0; transform: scale(.65); }\n  to   { opacity:1; transform: scale(1); }\n}\n\n.orb  { transform-origin: 200px 200px; animation: spin 7s linear infinite; }\n.orb2 { transform-origin: 200px 200px; animation: spin 7s 3.5s linear infinite; }\n@keyframes spin { to { transform: rotate(360deg); } }\n\n@keyframes fadeUp {\n  from { opacity:0; transform: translateY(10px); }\n  to   { opacity:1; transform: translateY(0); }\n}\n\n\/* \u2500\u2500 MOBILE COLLAPSE \u2500\u2500 *\/\n@media (max-width: 660px) {\n  .shell {\n    grid-template-columns: 1fr;\n    border-radius: 18px;\n  }\n  .panel-left {\n    border-right: none;\n    border-bottom: 1px solid var(--border);\n    padding: 36px 20px;\n  }\n  .panel-right { padding: 32px 20px 28px; }\n  .card-title { font-size: 20px; }\n}\n<\/style>\n<\/head>\n<body>\n<div class=\"shell\">\n\n  <!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 LEFT: DIAGRAM \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 -->\n  <div class=\"panel-left\">\n    <div class=\"diagram\">\n    <svg viewbox=\"0 0 400 400\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n    <defs>\n      <lineargradient id=\"gB\" x1=\"0%\" y1=\"0%\" x2=\"100%\" y2=\"100%\">\n        <stop offset=\"0%\" stop-color=\"#60a5fa\"\/><stop offset=\"100%\" stop-color=\"#1d4ed8\"\/>\n      <\/lineargradient>\n      <lineargradient id=\"gT\" x1=\"0%\" y1=\"0%\" x2=\"100%\" y2=\"100%\">\n        <stop offset=\"0%\" stop-color=\"#22d3ee\"\/><stop offset=\"100%\" stop-color=\"#0e7490\"\/>\n      <\/lineargradient>\n      <lineargradient id=\"gO\" x1=\"100%\" y1=\"0%\" x2=\"0%\" y2=\"100%\">\n        <stop offset=\"0%\" stop-color=\"#fbbf24\"\/><stop offset=\"100%\" stop-color=\"#b45309\"\/>\n      <\/lineargradient>\n      <lineargradient id=\"gCbg\" x1=\"0%\" y1=\"0%\" x2=\"100%\" y2=\"100%\">\n        <stop offset=\"0%\" stop-color=\"#eff4ff\"\/><stop offset=\"100%\" stop-color=\"#dbeafe\"\/>\n      <\/lineargradient>\n      <filter id=\"fN\" x=\"-50%\" y=\"-50%\" width=\"200%\" height=\"200%\">\n        <fedropshadow dx=\"0\" dy=\"3\" stddeviation=\"6\" flood-color=\"rgba(15,23,42,.11)\"\/>\n      <\/filter>\n      <filter id=\"fC\" x=\"-60%\" y=\"-60%\" width=\"220%\" height=\"220%\">\n        <fedropshadow dx=\"0\" dy=\"6\" stddeviation=\"12\" flood-color=\"rgba(37,99,235,.18)\"\/>\n      <\/filter>\n      <filter id=\"fOrb\" x=\"-200%\" y=\"-200%\" width=\"500%\" height=\"500%\">\n        <fegaussianblur stddeviation=\"3\" result=\"b\"\/>\n        <femerge><femergenode in=\"b\"\/><femergenode in=\"SourceGraphic\"\/><\/femerge>\n      <\/filter>\n    <\/defs>\n\n    <!-- faint dashed ring -->\n    <circle cx=\"200\" cy=\"200\" r=\"128\" fill=\"none\" stroke=\"#cbd5e1\" stroke-width=\"1.5\" stroke-dasharray=\"5,6\"\/>\n\n    <!-- \u2500\u2500 ARCS (r=128) \u2500\u2500 -->\n    <!-- Arc 1: top-left (225\u00b0) \u2192 right (345\u00b0) \u2014 BLUE -->\n    <!-- 225\u00b0: x=200+128*cos(225\u00b0)=200-90.5=109.5, y=200+128*sin(225\u00b0)=200-90.5=109.5 -->\n    <!-- 345\u00b0: x=200+128*cos(345\u00b0)=200+123.7=323.7, y=200+128*sin(345\u00b0)=200-33.1=166.9 -->\n    <path class=\"arc-b\" fill=\"none\" stroke=\"url(#gB)\" stroke-width=\"5.5\" stroke-linecap=\"round\"\n      d=\"M 109.5 109.5 A 128 128 0 0 1 323.7 166.9\"\/>\n\n    <!-- Arc 2: right (345\u00b0) \u2192 bottom-left (105\u00b0+180\u00b0=285\u00b0? No\u2014) -->\n    <!-- Let's use: 345\u00b0 \u2192 105\u00b0 going clockwise = 120\u00b0 sweep -->\n    <!-- 345\u00b0\u2192105\u00b0 cw: we need 105\u00b0 point: x=200+128*cos(105\u00b0)=200-33.1=166.9, y=200+128*sin(105\u00b0)=200+123.7=323.7 -->\n    <path class=\"arc-t\" fill=\"none\" stroke=\"url(#gT)\" stroke-width=\"5.5\" stroke-linecap=\"round\"\n      d=\"M 323.7 166.9 A 128 128 0 0 1 166.9 323.7\"\/>\n\n    <!-- Arc 3: 105\u00b0 \u2192 225\u00b0 cw (bottom-left to top-left) \u2014 ORANGE -->\n    <path class=\"arc-o\" fill=\"none\" stroke=\"url(#gO)\" stroke-width=\"5.5\" stroke-linecap=\"round\"\n      d=\"M 166.9 323.7 A 128 128 0 0 1 109.5 109.5\"\/>\n\n    <!-- ARROWHEADS -->\n    <g class=\"arr a1\" transform=\"translate(323.7,166.9) rotate(102)\">\n      <polygon points=\"-5,-7 0,7 5,-7\" fill=\"#1d4ed8\"\/>\n    <\/g>\n    <g class=\"arr a2\" transform=\"translate(166.9,323.7) rotate(222)\">\n      <polygon points=\"-5,-7 0,7 5,-7\" fill=\"#0e7490\"\/>\n    <\/g>\n    <g class=\"arr a3\" transform=\"translate(109.5,109.5) rotate(342)\">\n      <polygon points=\"-5,-7 0,7 5,-7\" fill=\"#b45309\"\/>\n    <\/g>\n\n    <!-- ORBITING DOTS -->\n    <g class=\"orb\"><circle cx=\"200\" cy=\"72\" r=\"5\" fill=\"#3b82f6\" filter=\"url(#fOrb)\" opacity=\".8\"\/><\/g>\n    <g class=\"orb2\"><circle cx=\"200\" cy=\"72\" r=\"5\" fill=\"#f59e0b\" filter=\"url(#fOrb)\" opacity=\".8\"\/><\/g>\n\n    <!-- \u2500\u2500 NODES \u2500\u2500 -->\n\n    <!-- Node 1: top (Schwachstellenanalyse) @ ~270\u00b0 = top center -->\n    <!-- Let's put nodes at the arc midpoints: arc1 mid=285\u00b0, arc2 mid=45\u00b0, arc3 mid=165\u00b0 and at top -->\n    <!-- Node top-right on arc1 (at ~285\u00b0: x=200+128*cos(285\u00b0)=200+33.1=233.1, y=200+128*sin(285\u00b0)=200-123.7=76.3) -->\n    <g class=\"nd nd1\" filter=\"url(#fN)\">\n      <rect x=\"168\" y=\"44\" width=\"64\" height=\"64\" rx=\"15\" fill=\"white\" stroke=\"#dbeafe\" stroke-width=\"1.5\"\/>\n      <!-- search-table -->\n      <rect x=\"181\" y=\"57\" width=\"38\" height=\"25\" rx=\"4\" fill=\"none\" stroke=\"#3b82f6\" stroke-width=\"1.8\"\/>\n      <line x1=\"181\" y1=\"65\" x2=\"219\" y2=\"65\" stroke=\"#3b82f6\" stroke-width=\"1.4\"\/>\n      <line x1=\"194\" y1=\"57\" x2=\"194\" y2=\"82\" stroke=\"#3b82f6\" stroke-width=\"1.4\"\/>\n      <circle cx=\"210\" cy=\"88\" r=\"6.5\" fill=\"none\" stroke=\"#3b82f6\" stroke-width=\"1.8\"\/>\n      <line x1=\"214.5\" y1=\"92.5\" x2=\"218\" y2=\"96\" stroke=\"#3b82f6\" stroke-width=\"2.2\" stroke-linecap=\"round\"\/>\n    <\/g>\n\n    <!-- Node 2: right (Pentesting) @ arc2 mid ~345+60=405\u00b0=45\u00b0: x=200+128*cos(45\u00b0)=290.5, y=200-128*sin(45\u00b0)? No\u2014clockwise 45\u00b0: x=200+128*cos(45\u00b0)=290.5, y=200+128*sin(45\u00b0)=290.5 \u2014 that's bottom right -->\n    <!-- Let me just place nodes visually: right side at (328,200), bottom (200,328), left (72,200), top (200,72) -->\n    <g class=\"nd nd2\" filter=\"url(#fN)\">\n      <rect x=\"296\" y=\"168\" width=\"64\" height=\"64\" rx=\"15\" fill=\"white\" stroke=\"#cffafe\" stroke-width=\"1.5\"\/>\n      <!-- server+lock -->\n      <rect x=\"308\" y=\"179\" width=\"40\" height=\"13\" rx=\"3\" fill=\"none\" stroke=\"#0891b2\" stroke-width=\"1.7\"\/>\n      <rect x=\"308\" y=\"194\" width=\"40\" height=\"13\" rx=\"3\" fill=\"none\" stroke=\"#0891b2\" stroke-width=\"1.7\"\/>\n      <circle cx=\"342\" cy=\"185.5\" r=\"2.5\" fill=\"#0891b2\"\/>\n      <circle cx=\"342\" cy=\"200.5\" r=\"2.5\" fill=\"#0891b2\"\/>\n      <rect x=\"317\" y=\"210\" width=\"11\" height=\"9\" rx=\"2\" fill=\"none\" stroke=\"#0891b2\" stroke-width=\"1.4\"\/>\n      <path d=\"M318.5 210 Q318.5 207 322.5 207 Q326.5 207 326.5 210\" fill=\"none\" stroke=\"#0891b2\" stroke-width=\"1.4\"\/>\n    <\/g>\n\n    <!-- Node 3: bottom (Darknet) -->\n    <g class=\"nd nd3\" filter=\"url(#fN)\">\n      <rect x=\"168\" y=\"296\" width=\"64\" height=\"64\" rx=\"15\" fill=\"white\" stroke=\"#fef3c7\" stroke-width=\"1.5\"\/>\n      <circle cx=\"200\" cy=\"328\" r=\"17\" fill=\"none\" stroke=\"#d97706\" stroke-width=\"1.7\"\/>\n      <ellipse cx=\"200\" cy=\"328\" rx=\"8\" ry=\"17\" fill=\"none\" stroke=\"#d97706\" stroke-width=\"1.3\"\/>\n      <line x1=\"183\" y1=\"328\" x2=\"217\" y2=\"328\" stroke=\"#d97706\" stroke-width=\"1.3\"\/>\n      <line x1=\"184\" y1=\"320\" x2=\"216\" y2=\"320\" stroke=\"#d97706\" stroke-width=\"1\" stroke-dasharray=\"2,2.5\"\/>\n      <line x1=\"184\" y1=\"336\" x2=\"216\" y2=\"336\" stroke=\"#d97706\" stroke-width=\"1\" stroke-dasharray=\"2,2.5\"\/>\n    <\/g>\n\n    <!-- Node 4: left (Zusatzpr\u00fcfungen) -->\n    <g class=\"nd nd4\" filter=\"url(#fN)\">\n      <rect x=\"40\" y=\"168\" width=\"64\" height=\"64\" rx=\"15\" fill=\"white\" stroke=\"#fef3c7\" stroke-width=\"1.5\"\/>\n      <rect x=\"52\" y=\"178\" width=\"40\" height=\"34\" rx=\"4\" fill=\"none\" stroke=\"#d97706\" stroke-width=\"1.7\"\/>\n      <line x1=\"60\" y1=\"178\" x2=\"60\" y2=\"173\" stroke=\"#d97706\" stroke-width=\"1.7\" stroke-linecap=\"round\"\/>\n      <line x1=\"84\" y1=\"178\" x2=\"84\" y2=\"173\" stroke=\"#d97706\" stroke-width=\"1.7\" stroke-linecap=\"round\"\/>\n      <line x1=\"52\" y1=\"187\" x2=\"92\" y2=\"187\" stroke=\"#d97706\" stroke-width=\"1.4\"\/>\n      <polyline points=\"60,196 65.5,203 82,191\" fill=\"none\" stroke=\"#d97706\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n    <\/g>\n\n    <!-- \u2500\u2500 CENTER \u2500\u2500 -->\n    <g class=\"center-g\" filter=\"url(#fC)\">\n      <rect x=\"152\" y=\"152\" width=\"96\" height=\"96\" rx=\"20\" fill=\"white\" stroke=\"#dbeafe\" stroke-width=\"1.5\"\/>\n      <rect x=\"152\" y=\"152\" width=\"96\" height=\"32\" rx=\"20\" fill=\"url(#gCbg)\"\/>\n      <rect x=\"152\" y=\"172\" width=\"96\" height=\"12\" fill=\"url(#gCbg)\"\/>\n      <!-- cube -->\n      <polygon points=\"200,163 219,173 219,193 200,203 181,193 181,173\"\n        fill=\"none\" stroke=\"#3b82f6\" stroke-width=\"1.8\" stroke-linejoin=\"round\"\/>\n      <polyline points=\"200,163 200,183 181,173\" fill=\"none\" stroke=\"#3b82f6\" stroke-width=\"1.4\"\/>\n      <line x1=\"200\" y1=\"183\" x2=\"219\" y2=\"173\" stroke=\"#3b82f6\" stroke-width=\"1.4\"\/>\n      <line x1=\"200\" y1=\"183\" x2=\"200\" y2=\"203\" stroke=\"#3b82f6\" stroke-width=\"1.4\"\/>\n      <!-- keyhole -->\n      <circle cx=\"200\" cy=\"180\" r=\"5.5\" fill=\"none\" stroke=\"#d97706\" stroke-width=\"1.8\"\/>\n      <line x1=\"200\" y1=\"185.5\" x2=\"200\" y2=\"193\" stroke=\"#d97706\" stroke-width=\"2.4\" stroke-linecap=\"round\"\/>\n      <line x1=\"197\" y1=\"191.5\" x2=\"203\" y2=\"191.5\" stroke=\"#d97706\" stroke-width=\"1.8\" stroke-linecap=\"round\"\/>\n      <!-- label -->\n      <text x=\"200\" y=\"218\" text-anchor=\"middle\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10\" font-weight=\"700\" fill=\"#0f172a\">Security Hub<\/text>\n    <\/g>\n\n    <!-- ARC LABELS inside SVG (so they scale) -->\n    <!-- top arc label -->\n    <text class=\"arr a1\" x=\"270\" y=\"96\" text-anchor=\"start\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10.5\" font-weight=\"700\" fill=\"#1e40af\">Vulnerabilities<\/text>\n    <text class=\"arr a1\" x=\"270\" y=\"110\" text-anchor=\"start\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10.5\" font-weight=\"700\" fill=\"#1e40af\">Analyze<\/text>\n\n    <!-- right label -->\n    <text class=\"arr a2\" x=\"368\" y=\"206\" text-anchor=\"start\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10.5\" font-weight=\"700\" fill=\"#0e7490\">Pentecost<\/text>\n    <text class=\"arr a2\" x=\"368\" y=\"220\" text-anchor=\"start\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10.5\" font-weight=\"700\" fill=\"#0e7490\">sting<\/text>\n\n    <!-- bottom label -->\n    <text class=\"arr a3\" x=\"200\" y=\"378\" text-anchor=\"middle\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10.5\" font-weight=\"700\" fill=\"#92400e\">Darknet research<\/text>\n\n    <!-- left label -->\n    <text class=\"arr a3\" x=\"30\" y=\"196\" text-anchor=\"end\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10.5\" font-weight=\"700\" fill=\"#92400e\">Additional<\/text>\n    <text class=\"arr a3\" x=\"30\" y=\"210\" text-anchor=\"end\" font-family=\"Plus Jakarta Sans,sans-serif\" font-size=\"10.5\" font-weight=\"700\" fill=\"#92400e\">exams<\/text>\n\n    <\/svg>\n    <\/div>\n  <\/div>\n\n  <!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 RIGHT: CONTENT \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 -->\n  <div class=\"panel-right\">\n\n    <div class=\"eyebrow\">\n      <svg width=\"10\" height=\"10\" viewbox=\"0 0 10 10\" fill=\"none\">\n        <circle cx=\"5\" cy=\"5\" r=\"4\" stroke=\"#2563eb\" stroke-width=\"1.5\"\/>\n        <circle cx=\"5\" cy=\"5\" r=\"1.5\" fill=\"#2563eb\"\/>\n      <\/svg>\n      IT security\n    <\/div>\n\n    <div class=\"card-title\">Security Analysis<br>in circulation<\/div>\n    <div class=\"card-sub\">Continuous protective measures that reinforce each other \u2014 from the initial vulnerability to ongoing monitoring.<\/div>\n\n    <div class=\"steps\">\n\n      <div class=\"step s1\">\n        <div class=\"step-icon blue\">\n          <svg width=\"18\" height=\"18\" viewbox=\"0 0 18 18\" fill=\"none\">\n            <rect x=\"1\" y=\"1\" width=\"16\" height=\"12\" rx=\"2.5\" stroke=\"#2563eb\" stroke-width=\"1.6\"\/>\n            <line x1=\"1\" y1=\"6\" x2=\"17\" y2=\"6\" stroke=\"#2563eb\" stroke-width=\"1.3\"\/>\n            <line x1=\"6\" y1=\"1\" x2=\"6\" y2=\"13\" stroke=\"#2563eb\" stroke-width=\"1.3\"\/>\n            <circle cx=\"12.5\" cy=\"15.5\" r=\"3\" fill=\"none\" stroke=\"#2563eb\" stroke-width=\"1.5\"\/>\n            <line x1=\"14.7\" y1=\"17.7\" x2=\"17\" y2=\"20\" stroke=\"#2563eb\" stroke-width=\"1.6\" stroke-linecap=\"round\"\/>\n          <\/svg>\n        <\/div>\n        <div class=\"step-body\">\n          <div class=\"step-title\">External vulnerability analysis<\/div>\n          <div class=\"step-desc\">Automated Scanning, CVE Mapping &amp; Prioritization of Open Vulnerabilities<\/div>\n        <\/div>\n        <span class=\"step-badge blue\">Level 1<\/span>\n      <\/div>\n\n      <div class=\"step s2\">\n        <div class=\"step-icon teal\">\n          <svg width=\"18\" height=\"18\" viewbox=\"0 0 18 18\" fill=\"none\">\n            <rect x=\"1\" y=\"1\" width=\"16\" height=\"7\" rx=\"2\" stroke=\"#0891b2\" stroke-width=\"1.6\"\/>\n            <rect x=\"1\" y=\"10\" width=\"16\" height=\"7\" rx=\"2\" stroke=\"#0891b2\" stroke-width=\"1.6\"\/>\n            <circle cx=\"14\" cy=\"4.5\" r=\"1.8\" fill=\"#0891b2\"\/>\n            <rect x=\"10\" y=\"12.5\" width=\"6\" height=\"5\" rx=\"1.2\" fill=\"none\" stroke=\"#0891b2\" stroke-width=\"1.4\"\/>\n            <path d=\"M11 12.5 Q11 10.5 13 10.5 Q15 10.5 15 12.5\" fill=\"none\" stroke=\"#0891b2\" stroke-width=\"1.4\"\/>\n          <\/svg>\n        <\/div>\n        <div class=\"step-body\">\n          <div class=\"step-title\">External &amp; Internal Pentesting<\/div>\n          <div class=\"step-desc\">Simulated attacks from a hacker's perspective \u2014 internal as well as external<\/div>\n        <\/div>\n        <span class=\"step-badge teal\">Level 2<\/span>\n      <\/div>\n\n      <div class=\"step s3\">\n        <div class=\"step-icon orange\">\n          <svg width=\"18\" height=\"18\" viewbox=\"0 0 18 18\" fill=\"none\">\n            <circle cx=\"9\" cy=\"9\" r=\"7.5\" stroke=\"#d97706\" stroke-width=\"1.6\"\/>\n            <ellipse cx=\"9\" cy=\"9\" rx=\"3.5\" ry=\"7.5\" stroke=\"#d97706\" stroke-width=\"1.3\"\/>\n            <line x1=\"1.5\" y1=\"9\" x2=\"16.5\" y2=\"9\" stroke=\"#d97706\" stroke-width=\"1.2\"\/>\n            <line x1=\"2.5\" y1=\"5.5\" x2=\"15.5\" y2=\"5.5\" stroke=\"#d97706\" stroke-width=\"1\" stroke-dasharray=\"2,2.5\"\/>\n            <line x1=\"2.5\" y1=\"12.5\" x2=\"15.5\" y2=\"12.5\" stroke=\"#d97706\" stroke-width=\"1\" stroke-dasharray=\"2,2.5\"\/>\n          <\/svg>\n        <\/div>\n        <div class=\"step-body\">\n          <div class=\"step-title\">Darknet research<\/div>\n          <div class=\"step-desc\">Leak Monitoring, Stolen Credentials &amp; OSINT Analysis<\/div>\n        <\/div>\n        <span class=\"step-badge orange\">Level 3<\/span>\n      <\/div>\n\n      <div class=\"step s4\">\n        <div class=\"step-icon orange\">\n          <svg width=\"18\" height=\"18\" viewbox=\"0 0 18 18\" fill=\"none\">\n            <rect x=\"1\" y=\"2\" width=\"16\" height=\"14\" rx=\"2.5\" stroke=\"#d97706\" stroke-width=\"1.6\"\/>\n            <line x1=\"5.5\" y1=\"0\" x2=\"5.5\" y2=\"4\" stroke=\"#d97706\" stroke-width=\"1.6\" stroke-linecap=\"round\"\/>\n            <line x1=\"12.5\" y1=\"0\" x2=\"12.5\" y2=\"4\" stroke=\"#d97706\" stroke-width=\"1.6\" stroke-linecap=\"round\"\/>\n            <line x1=\"1\" y1=\"7.5\" x2=\"17\" y2=\"7.5\" stroke=\"#d97706\" stroke-width=\"1.3\"\/>\n            <polyline points=\"4.5,11.5 7.5,14.5 13.5,10\" fill=\"none\" stroke=\"#d97706\" stroke-width=\"1.8\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/div>\n        <div class=\"step-body\">\n          <div class=\"step-title\">Additional tests<\/div>\n          <div class=\"step-desc\">Compliance Audits, Phishing Tests &amp; Individual Security Checks<\/div>\n        <\/div>\n        <span class=\"step-badge orange\">Level 4<\/span>\n      <\/div>\n\n    <\/div>\n\n    <div class=\"divider\"><\/div>\n    <div class=\"footer-note\">\n      <svg width=\"14\" height=\"14\" viewbox=\"0 0 14 14\" fill=\"none\">\n        <circle cx=\"7\" cy=\"7\" r=\"6\" stroke=\"#94a3b8\" stroke-width=\"1.3\"\/>\n        <line x1=\"7\" y1=\"6\" x2=\"7\" y2=\"10\" stroke=\"#94a3b8\" stroke-width=\"1.4\" stroke-linecap=\"round\"\/>\n        <circle cx=\"7\" cy=\"4\" r=\".8\" fill=\"#94a3b8\"\/>\n      <\/svg>\n      The cycle runs continuously \u2014 each phase feeds into the next.\n    <\/div>\n\n  <\/div>\n<\/div>\n<\/body>\n<\/html>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Cycle Security Hub Schwachstellen- analyse Pente- sting Darknet-Recherche Zusatz- pr\u00fcfungen IT-Sicherheit Security-Analyseim Kreislauf Kontinuierliche Schutzma\u00dfnahmen, die sich gegenseitig verst\u00e4rken \u2014 von der ersten Schwachstelle bis zur laufenden \u00dcberwachung. Externe Schwachstellenanalyse Automatisiertes Scanning, CVE-Mapping &#038; Priorisierung offener L\u00fccken Stufe 1 Externes &#038; Internes Pentesting Simulierte Angriffe aus Hacker-Perspektive \u2014 intern wie extern Stufe 2 Darknet-Recherche [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-27782","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Test Grafiken - DEFENDERBOX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/test-graphics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Test Grafiken - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"Security Cycle Security Hub Schwachstellen- analyse Pente- sting Darknet-Recherche Zusatz- pr\u00fcfungen IT-Sicherheit Security-Analyseim Kreislauf Kontinuierliche Schutzma\u00dfnahmen, die sich gegenseitig verst\u00e4rken \u2014 von der ersten Schwachstelle bis zur laufenden \u00dcberwachung. Externe Schwachstellenanalyse Automatisiertes Scanning, CVE-Mapping &#038; Priorisierung offener L\u00fccken Stufe 1 Externes &#038; Internes Pentesting Simulierte Angriffe aus Hacker-Perspektive \u2014 intern wie extern Stufe 2 Darknet-Recherche [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/test-graphics\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T07:30:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/test-grafiken\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/test-grafiken\\\/\",\"name\":\"Test Grafiken - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"datePublished\":\"2026-04-08T07:23:35+00:00\",\"dateModified\":\"2026-04-08T07:30:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/test-grafiken\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/test-grafiken\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/test-grafiken\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Test Grafiken\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Test Graphics - DEFENDERBOX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/test-graphics\/","og_locale":"en_US","og_type":"article","og_title":"Test Grafiken - DEFENDERBOX","og_description":"Security Cycle Security Hub Schwachstellen- analyse Pente- sting Darknet-Recherche Zusatz- pr\u00fcfungen IT-Sicherheit Security-Analyseim Kreislauf Kontinuierliche Schutzma\u00dfnahmen, die sich gegenseitig verst\u00e4rken \u2014 von der ersten Schwachstelle bis zur laufenden \u00dcberwachung. Externe Schwachstellenanalyse Automatisiertes Scanning, CVE-Mapping &#038; Priorisierung offener L\u00fccken Stufe 1 Externes &#038; Internes Pentesting Simulierte Angriffe aus Hacker-Perspektive \u2014 intern wie extern Stufe 2 Darknet-Recherche [&hellip;]","og_url":"https:\/\/defenderbox.de\/en\/test-graphics\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_modified_time":"2026-04-08T07:30:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/test-grafiken\/","url":"https:\/\/defenderbox.de\/test-grafiken\/","name":"Test Graphics - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"datePublished":"2026-04-08T07:23:35+00:00","dateModified":"2026-04-08T07:30:25+00:00","breadcrumb":{"@id":"https:\/\/defenderbox.de\/test-grafiken\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/test-grafiken\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/test-grafiken\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Test Grafiken"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/27782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=27782"}],"version-history":[{"count":4,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/27782\/revisions"}],"predecessor-version":[{"id":27796,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/pages\/27782\/revisions\/27796"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=27782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}