Your company is establishing a BYOD policy and you are asked to create the appropriate security infrastructure In the policy, Internet access should only be provided to the BYOD wired and wireless devices.