Need help with your Assignment?

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

Connecting to the Physical Network Layer

Connecting to the Physical Network Layer

Table: Devices Connected to the Physical Network Layer in My Home

Device Connection Type Network
Laptop Wi-Fi Home Wi-Fi Network
Smartphone Cellular AT&T Cellular Network
Smart TV Ethernet Home Wi-Fi Network
Gaming Console Wi-Fi Home Wi-Fi Network
Smart Home Hub Ethernet Home Wi-Fi Network

 Explanation

The devices are linked to a broader network via an Ethernet or Wi-Fi connection to my home Wi-Fi network. The internet service provider connects the home Wi-Fi network to a wider network (ISP). My smartphone is connected to the AT&T cellular network, a wider network offered by the cellular service provider.

Threats to My Connected Networks

Malware

Malware is software intended to harm or interfere with computer systems. It can infect every networked gadget in my house, including hubs for smart homes, smartphones, and laptops (Liu et al., 2021). Malicious websites, emails, and software downloads can all transmit malware. Once installed, the malware can harm files, steal important information, or even take over the device.

Cyberattacks

These are targeted attempts to harm or interfere with computer networks or systems. Attackers can enter my home network by taking advantage of flaws in software or hardware (Anderson et al., 2022). Once inside, they can steal confidential information, put malware on other computers, or start an attack. Cyberattacks have the potential to seriously harm the networks I’m connected to, resulting in losses in money or harm to my reputation.

Data Breaches

Unauthorized access to sensitive information, such as financial or personal data, constitutes a data breach (Wang et al., 2019). Data breaches can happen due to hacking into my devices or network or when personal information is taken using social engineering techniques like phishing emails. Data breaches may result in serious problems like identity theft or financial crime.

References

Anderson, S., Salamatian, L., Bischof, Z. S., Dainotti, A., & Barford, P. (2022, October). IMDb: connecting the physical and logical layers of the internet. In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 433-448).

Liu, Y., Wang, W., Chen, H. H., Lyu, F., Wang, L., Meng, W., & Shen, X. (2021). Physical layer security assisted computation offloading in intelligently connected vehicle networks. IEEE Transactions on Wireless Communications20(6), 3555-3570.

Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., & Zeng, K. (2019). Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities. IEEE Internet of Things Journal6(5), 8169-8181.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Create a table to illustrate how you are connected to the physical network layer of the cyber domain.

Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices.

Connecting to the Physical Network Layer

Connecting to the Physical Network Layer

Briefly explain how those devices are connected to a larger network, such as a cellular provider or ISP.
Research and list at least 3 threats to you and your connected networks.

Format any references according to APA guidelines.

Order Solution Now