Problem
You are the cybersecurity professional for your company, which is a mid-size, single building, multi-floor organization. Due to the nature of your organization's business, you operate in a secure (physical) building, where only authorized users can enter. There is a "guard desk" at the front entrance along with ID card scanners, which are used to access the building. Due to this secure nature, your predecessor did not implement a NAC based system for the ethernet connection. This predecessor conducted a cost-benefit analysis and determined that it was not a cost that was warranted since the building was secure.
You have recently noticed suspicious activity on your network, resulting in the theft of corporate trade secrets. It has been determined that a "Rogue AP (Access Point)" attack has happened. You have stopped the current attack, but you have not been able to identify the attacker. Your organization cannot afford to deploy an ethernet based NAC such as the 802.1X protocol, but you have been tasked with mitigating this type of attack in the future.
Using what you have learned, develop several mitigation plans that your company can deploy, and estimate the cost of deployment1. You will present these mitigation plans to the Board of Directors for their consideration.
Formulate three to four different mitigation techniques for the scenario above. I would like for you to have techniques that represent different costs to implement, meaning possibly a couple low cost and a high cost, or a medium cost and a high cost technique. Furthermore, for each mitigations strategy, justify the effectiveness of the solution proposed (you can use reference articles too), and select the overall preferred method that balances cost and effectiveness in mitigating the threat this rogue AP is presenting.