Wireless Security: A Discussion