Wireless access poses additional security risks• Some perpetrators connect to other’s wireless networks to gain free Internet access or confidential data• Others connect to a network through an unsecured wireless access point (WAP) or combination router/WAP