This report discusses the security threats of BYOD and wireless networks, including rogue access points, cyber kill chain, and identity theft. It also covers how to prevent identity theft and MAC spoofing, legal issues for investigation, and the importance of remote configuration management. The report concludes with a discussion of different types of wireless networks and their advantages and disadvantages.