In this assessment, you will identify a security threat to a wireless network. You will then identify which points of the network might be vulnerable and recommend policies, defenses, and practices to ensure network security.