I need guidance to conduct attack surface mapping, I have my network topology diagram ready. My task is to "identify potential vulnerabilities and weaknesses within the network architecture and design,considering factors such as unauthorized access, ...