Discussion: "Computer Security"
Please respond to the following:
• From the e-Activity, discuss two security issues related to the researched technologies.
• Select a Wi-Fi device you are familiar with and analyze the security protection currently implemented on the device. Speculate whether the protection on the selected device is sufficient for the data it contains.