Figure 4: Network configuration and its attack graph.