Purpose To assess your ability to: Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one. Explain how the four major threats to wireless networks can damage a business. Action Items Research the following areas related to protecting sensitive data for the Woodworker Cabinet company. Write a two-to three-page report to the CIO addressing the following issues: Methods used by various companies to protect organization data. Consider: Data encryption; Authentication and authorization; and Network security measures (e.g., firewalls, spyware protection, etc.). Ethical issues regarding protection of data. Consider: Privacy considerations; Trade secrets (e.g., manufacturing processes, etc.); Client lists; and Organizational financial information. .