Assume you are the IT manager for an organization tasked with evaluating whether or not to deploy internal wireless access for employees. Discussing the advantages and disadvantages of deploying a WLAN in an organization. Compare the benefits and risks of three security methods, then identify and justify the best approach for securing a WLAN. You must include a minimum of two scholarly sources, in addition to the text book, with a minimum of one source from peer-reviewed sources from the Ashford University Library.