As a security expert, you have asked of money to support a secure wireless implementation. The CIO has contacted you asking for an explanation for this requirement outlining threats to a wireless network.
Research the top threats to a wireless network. Pick one and describe to the CIO. Ensure you describe the threat, risk of it happening, damage it can do and the control or mitigation your team needs to implement to lower or prevent that risk