Connecting to the Physical Network Layer
Table: Devices Connected to the Physical Network Layer in My Home
Device | Connection Type | Network |
Laptop | Wi-Fi | Home Wi-Fi Network |
Smartphone | Cellular | AT&T Cellular Network |
Smart TV | Ethernet | Home Wi-Fi Network |
Gaming Console | Wi-Fi | Home Wi-Fi Network |
Smart Home Hub | Ethernet | Home Wi-Fi Network |
Explanation
The devices are linked to a broader network via an Ethernet or Wi-Fi connection to my home Wi-Fi network. The internet service provider connects the home Wi-Fi network to a wider network (ISP). My smartphone is connected to the AT&T cellular network, a wider network offered by the cellular service provider. Our assignment writing help is at affordable prices to students of all academic levels and academic disciplines.
Threats to My Connected Networks
Malware
Malware is software intended to harm or interfere with computer systems. It can infect every networked gadget in my house, including hubs for smart homes, smartphones, and laptops (Liu et al., 2021). Malicious websites, emails, and software downloads can all transmit malware. Once installed, the malware can harm files, steal important information, or even take over the device.
Cyberattacks
These are targeted attempts to harm or interfere with computer networks or systems. Attackers can enter my home network by taking advantage of flaws in software or hardware (Anderson et al., 2022). Once inside, they can steal confidential information, put malware on other computers, or start an attack. Cyberattacks have the potential to seriously harm the networks I’m connected to, resulting in losses in money or harm to my reputation.
Data Breaches
Unauthorized access to sensitive information, such as financial or personal data, constitutes a data breach (Wang et al., 2019). Data breaches can happen due to hacking into my devices or network or when personal information is taken using social engineering techniques like phishing emails. Data breaches may result in serious problems like identity theft or financial crime.
References
Anderson, S., Salamatian, L., Bischof, Z. S., Dainotti, A., & Barford, P. (2022, October). IMDb: connecting the physical and logical layers of the internet. In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 433-448).
Liu, Y., Wang, W., Chen, H. H., Lyu, F., Wang, L., Meng, W., & Shen, X. (2021). Physical layer security assisted computation offloading in intelligently connected vehicle networks. IEEE Transactions on Wireless Communications, 20(6), 3555-3570.
Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., & Zeng, K. (2019). Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities. IEEE Internet of Things Journal, 6(5), 8169-8181.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Create a table to illustrate how you are connected to the physical network layer of the cyber domain.
Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices.
Briefly explain how those devices are connected to a larger network, such as a cellular provider or ISP.
Research and list at least 3 threats to you and your connected networks.
Format any references according to APA guidelines.