This document discusses various wireless network security threats such as war driving, rogue access points, man-in-the-middle attacks, and denial-of-service attacks. It also explains the evolution of wireless security protocols from WEP to WPA and WPA2. WEP was the initial standard but had flaws that allowed the key to be cracked easily. WPA was an interim solution that added features to strengthen WEP, while WPA2 fully implements the ratified IEEE 802.11i standard and is considered the current best practice using AES encryption. The document also warns that the Wi-Fi Protected Setup standard has a security flaw and its use should be disabled.