"Securing Wireless Access" Please respond to the following:
Examine at least three risks associated with using public wireless access points to gain access to a corporate network. Provide one real-world example that demonstrates the severity of the identified risks.
Based on the risks you have identified in Part 1 of this discussion, suggest the approach you would use to mitigate those types of risks. Justify the use of your suggested approach.