In: Computer Science
A wireless network has a loosely defined boundary as described in the lecture slides. Describe the security issues of such a network boundary. For at least one of the security issues, describe why CIA will not be able to solve the issue, and briefly describe a method which may be used as a solution.