<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=koi8-r">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Aptos;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:12.0pt;
font-family:"Aptos",sans-serif;
mso-ligatures:standardcontextual;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#467886;
text-decoration:underline;}
span.EmailStyle18
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
font-weight:bold;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;
mso-ligatures:none;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#467886" vlink="#96607D" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal" style="margin-left:.5in"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Title</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: Understanding the Threat: Wi-Fi Impersonation and the Human Layer
of Cybersecurity</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Synopsis</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">:</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">In this teaching demonstration, I will guide the committee/students through an immersive and instructional exploration of wireless network trust by
simulating a rogue access point (Evil Twin) scenario. Students are introduced to the mechanics and psychology behind Evil Twin attacks—where a malicious actor mimics a legitimate Wi-Fi network to intercept traffic or harvest sensitive credentials.</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">The lesson begins by unpacking how devices establish Wi-Fi connections and how trust is often granted implicitly. Using live, non-exploitative props
like a Wi-Fi Pineapple and an ESP32 Marauder board, I’ll demonstrate how an attacker can stage a fake login portal and leverage it as a social engineering tool, focusing on how login pages communicate assumptions, context, and intent to the user.</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">To bridge theory and practice, this lesson will incorporate learning frameworks that cybersecurity practitioners actively use in the field:</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:1.0in;text-indent:-.25in"><span style="font-size:10.0pt;font-family:Symbol">ž</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif">
</span><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">NICE Framework Work Roles</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: Cyber Defense Analyst, Vulnerability Analyst, and Security Awareness Trainer</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:1.0in;text-indent:-.25in"><span style="font-size:10.0pt;font-family:Symbol">ž</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif">
</span><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">MITRE ATT&CK Techniques</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: T1557 (Adversary-in-the-Middle), T1185 (Browser Session Hijacking)</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:1.0in;text-indent:-.25in"><span style="font-size:10.0pt;font-family:Symbol">ž</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif">
</span><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Cyber Kill Chain</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: Emphasizing
<i>Reconnaissance</i>, <i>Weaponization</i>, and <i>Delivery</i> stages, with analysis of attacker intent during each phase.</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Throughout the session, I will model active learning techniques that promote learner agency—posing reflective prompts, inviting collaborative analysis,
and guiding discussion through real-world analogies. The class will conclude with a “Spot the Trap” exercise using anonymized screenshots of suspicious login screens, allowing participants to apply what they've observed.</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">By the end of the demonstration, the committee will have experienced how I design lessons that deconstruct technical myths, build confidence through
accessible tools, and develop cybersecurity reasoning that students can replicate independently.</span><o:p></o:p></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Join Zoom Meeting<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftamucc.zoom.us%2Fj%2F92994933914%3Fpwd%3DbF8jZFTXkbcB7KbFNQiHdTmeSeVHDd.1&data=05%7C02%7Ccosc-grad-students-list%40listserv.tamucc.edu%7Cb68c0a0616c34b56396808de207ac8fe%7C34cbfaf167a64781a9ca514eb2550b66%7C0%7C0%7C638983908886533581%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Z2IPE%2BvOrzzFOMB1P4DLMx3TjS19a4ZX%2F3Ft9R3B%2Brc%3D&reserved=0" originalsrc="https://tamucc.zoom.us/j/92994933914?pwd=bF8jZFTXkbcB7KbFNQiHdTmeSeVHDd.1" target="_blank">https://tamucc.zoom.us/j/92994933914?pwd=bF8jZFTXkbcB7KbFNQiHdTmeSeVHDd.1</a><o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Meeting ID: 929 9493 3914<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Passcode: 574973<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">---<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">One tap mobile<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">+13462487799,,92994933914#,,,,*574973# US (Houston)<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">+12532158782,,92994933914#,,,,*574973# US (Tacoma)<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">---<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Join by SIP<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">•
<a href="mailto:92994933914@zoomcrc.com">92994933914@zoomcrc.com</a><o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Passcode: 574973<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Join instructions<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftamucc.zoom.us%2Fmeetings%2F92994933914%2Finvitations%3Fsignature%3DYlFPCS5pa8xqUmrggboZ4mlcQmuQZlAUdyp8x9Bt5DI&data=05%7C02%7Ccosc-grad-students-list%40listserv.tamucc.edu%7Cb68c0a0616c34b56396808de207ac8fe%7C34cbfaf167a64781a9ca514eb2550b66%7C0%7C0%7C638983908886557413%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=FcfR7bbIbBI92fCwIqKUkUIfcI6BmU0AwgoyrBe81ik%3D&reserved=0" originalsrc="https://tamucc.zoom.us/meetings/92994933914/invitations?signature=YlFPCS5pa8xqUmrggboZ4mlcQmuQZlAUdyp8x9Bt5DI" target="_blank">https://tamucc.zoom.us/meetings/92994933914/invitations?signature=YlFPCS5pa8xqUmrggboZ4mlcQmuQZlAUdyp8x9Bt5DI</a><o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">€€€€€€€€€€<o:p></o:p></span></b></p>
<p class="MsoNormal" style="margin-left:.5in"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal" style="margin-left:.5in"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Title</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: Understanding the Threat: Wi-Fi Impersonation and the Human Layer
of Cybersecurity</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Synopsis</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">:</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">In this teaching demonstration, I will guide the committee/students through an immersive and instructional exploration of wireless network trust by
simulating a rogue access point (Evil Twin) scenario. Students are introduced to the mechanics and psychology behind Evil Twin attacks—where a malicious actor mimics a legitimate Wi-Fi network to intercept traffic or harvest sensitive credentials.</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">The lesson begins by unpacking how devices establish Wi-Fi connections and how trust is often granted implicitly. Using live, non-exploitative props
like a Wi-Fi Pineapple and an ESP32 Marauder board, I’ll demonstrate how an attacker can stage a fake login portal and leverage it as a social engineering tool, focusing on how login pages communicate assumptions, context, and intent to the user.</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">To bridge theory and practice, this lesson will incorporate learning frameworks that cybersecurity practitioners actively use in the field:</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:1.0in;text-indent:-.25in"><span style="font-size:10.0pt;font-family:Symbol">ž</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif">
</span><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">NICE Framework Work Roles</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: Cyber Defense Analyst, Vulnerability Analyst, and Security Awareness Trainer</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:1.0in;text-indent:-.25in"><span style="font-size:10.0pt;font-family:Symbol">ž</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif">
</span><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">MITRE ATT&CK Techniques</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: T1557 (Adversary-in-the-Middle), T1185 (Browser Session Hijacking)</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:1.0in;text-indent:-.25in"><span style="font-size:10.0pt;font-family:Symbol">ž</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif">
</span><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Cyber Kill Chain</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">: Emphasizing
<i>Reconnaissance</i>, <i>Weaponization</i>, and <i>Delivery</i> stages, with analysis of attacker intent during each phase.</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Throughout the session, I will model active learning techniques that promote learner agency—posing reflective prompts, inviting collaborative analysis,
and guiding discussion through real-world analogies. The class will conclude with a “Spot the Trap” exercise using anonymized screenshots of suspicious login screens, allowing participants to apply what they've observed.</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> </span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.5in"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">By the end of the demonstration, the committee will have experienced how I design lessons that deconstruct technical myths, build confidence through
accessible tools, and develop cybersecurity reasoning that students can replicate independently.</span><span style="font-size:10.0pt"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
</div>
</body>
</html>