4 Steps for Integrated Wireless and Wired Security