Is a Consolidated Approach Better for WAAP Security?