... threats
Denial of service due to radio interference or malicious
user
Unauthorized or unaccounted access to the network and
Internet
Eavesdropping and recording other users’ traffic
Faked servers and networks, intercepting other users’
traffic
Network performance loss due to extensive traffic using
private network addresses and bypassing the security
gateway