This report discusses the design and implementation of a secure enterprise wireless network for maintaining confidentiality and preventing network intrusion. It explores ethical implications and analysis of the network. The report covers the design of the network, analysis of the network, and implementation of the network. It also discusses the different types of attacks and defence mechanisms for the network.