Networks.
Describe the digital path of an encrypted email from a home LAN, over public networks (to include wireless), to its final destination on a mobile device.
Discuss points of vulnerability to include potential attacks for the data transmission.