Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy 802.11 Security Basics Legacy 802.11 security Robust Security Segmentation Infrastructure Security VPN wireless…