Part of the communication infrastructure used by the university is an 802.11g wireless network implemented throughout the university dorm rooms and library. Upon inspection by your consulting team, it is discovered that the wireless network is not secure and that data is being exchanged over the air without encryption. Research the latest technology for use with wireless encryption. Provide a memorandum to the dean of information technology addressing the needed for encryption within the wireless infrastructure and the types of wireless encryption that may be deployed to secure the wireless network and devices.