Discussion: "Wireless Security Threats and Vulnerabilities"
Respond to the following:
• A few of the lessons have addressed wireless threats and vulnerabilities. Describe what you consider to be the two to three most significant wireless threats and vulnerabilities, and to what degree these concerns keep some organizations from adopting wireless technologies as part of their corporate strategy.
• Analyze the security controls measures that are needed to mitigate these vulnerabilities so that organizations will adopt wireless technologies to the same degree as wired networks.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.