. "After that, a network was created and secured with its own layered protection plan, in order for it to connect to the laptops, desktops, and other scientific equipment within the various labs." . . .