How is unauthorized access mitigated in the SAFE SMR midsize network design corporate Internet module?