The installation of a wireless access point requires only basic skills (and sometimes only the push of a button [4]), allowing any innocent employee to easily attach it to a wired corporate network.
In doing so, the user inadvertently bypasses the inherent physical endpoint security of the wired network, possibly subverting careful access control policies like WPA2 for easily spoofed MAC filtering [5, 6].