Identifying and Mitigating Exploitation of the Multiple Vulnerabilities in the Cisco Wireless Control System