Discussion

Question1: What are the various technologies  employed by wireless devices to maximize their use of the available  radio frequencies? Also discuss methods used to secure 802.11 wireless  networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Question2: After  reading chapter 1, compare and contrast two fundamental security design  principles. Analyze how these principles and how they impact an  organizations security posture.  The initial post must be completed by  Thursday at 11:59 eastern.  You are also required to post a response to a  minimum of two other student in the class by the end of the week.  You must use at least one scholarly resource.