5.4 Explain common threats, vulnerabilities, and mitigation techniques.

5.4 Explain common threats, vulnerabilities, and mitigation techniques.
 * Wireless:
 * War driving
 * War chalking
 * WEP cracking
 * WPA cracking
 * Evil twin
 * Rogue access point
 * Attacks:
 * DoS
 * DDoS
 * Man in the middle
 * Social engineering
 * Virus
 * Worms
 * Buffer overflow
 * Packet sniffing
 * FTP bounce
 * Smurf