You are part of a security team at a large corporation. Recently, a colleague asked why there is a policy against using public wireless networks with their company laptops. You explain that hackers use software to steal and analyze network traffic on public wireless networks. To demonstrate your point, you show your colleague how hackers exploit public wireless networks. Download Wireshark (http://www.wireshark.org/download.html), or any other packet analysis tool. Configure and use your chosen packet analysis tool to analyze wireless network traffic. Only capture legally permissible traffic such as your own home wireless traffic. Create a presentation based on your observations. Include the following in your presentation: Screenshots of the steps taken to download, install, and use a packet capture utility. Identified unencrypted traffic in captures. Identified encrypted traffic in captures, as well as ciphers. The differences in encrypted versus unencrypted traffic, as well as available plain text. Use Microsoft® PowerPoint or any other slide presentation tool of your choice. Provide detailed speaker notes to explain bullet points. The speaker notes should be well-formatted and easy to read, not just a single paragraph of text. All slides must be scripted and include APA citations as needed.