\setcounter{numTAs}{1} \setcounter{totalSections}{1} \def\secNum{{"001",""}} \def\tenSchFileName{{"",""}} \def\classTime{{"MWF 1250-1340",""}} \def\classRm{{"DRSDCK-036",""}} \def\classLive{{"",""}} \def\classInstructor{{"Danai Chasaki",""}} \def\classInstrContact{{"https://www1.villanova.edu/university/engineering/academic-programs/departments/electrical-computer/directory/biodetail.html?mail=danai.chasaki@villanova.edu&xsl=bio_long",""}} \def\classInstrOffHrs{{"M/W: 11:30-12:30 pm",""}} \def\classInstrLive{{"https://villanova.zoom.us/j/5258112428?pwd=d3F1dndCYUtRdWwwUEh2ZDJjQUoxUT09",""}} \def\TA{{{"",""},{""}}} \def\TAEmail{{{"",""},{""}}} \def\TAOffHrs{{{"Fridays 9:30-12:30",""},{""}}} \def\TARoom{{{"",""},{""}}} \newcommand\semester{Spring 2026} \newcommand\rsemester{202630} \newcommand\courseNum{ECE 3476} \newcommand\courseName{Computer and Network Security} \newcommand\courseCoordinator{Danai Chasaki} \newcommand\credits{3} \newcommand\contactHrs{3} \newcommand\lecture{1} \newcommand\lab{0} \newcommand\undergradCourse{1} \newcommand\isFreshmanCourse{0} \newcommand\isCustomElecPolicy{0} \newcommand\AIPolicyExists{0} \newcommand\isClassLive{1} \newcommand\isLabLive{0} \newcommand\meetingMiscExists{0} \newcommand\isClassInstrLive{1} \newcommand\isLabInstrLive{1} \newcommand\instrMiscExists{0} \newcommand\hasTARoom{1} \newcommand\meetingDesc{} \newcommand\meetingMisc{Special notes on meeting info go here, if specified} \newcommand\instructorMisc{} \newcommand\textBookExists{0} \newcommand\textBookReqd{0} \newcommand\textBookMiscExists{0} \newcommand\referencesExist{0} \newcommand\txtBkAuthExists{0} \newcommand\txtBkPublExists{0} \newcommand\txtBkYrExists{0} \newcommand\txtBkISBNExists{0} \newcommand\textBookTitle{} \newcommand\textBookAuth{} \newcommand\textBookPub{} \newcommand\textBookYr{} \newcommand\textBookISBN{} \newcommand\supplMaterials{Cryptography and Network Security: Principles and Practice (7th edition) by William Stallings; Prentice Hall} \newcommand\refPapers{References go here, if specified} \newcommand\textBookMisc{Special notes on textbook(s) go here, if specified} \newcommand\catalogDesc{Computer security in the context of the Internet, including hands-on exercises and experiments in the areas of authentication, attacks and threats, email and communication digital signatures and encryption, mobile devices, privacy, safe browsing and certificates.} \newcommand\preReqs{Electrical \& Computer Engr 3180 Or Computer Science 2405} \newcommand\coReqs{None} \newcommand\coreRequirement{Required for BS CPE} \newcommand\courseExpectation{The goals for the students in this course is to learn the fundamentals of network/operating system/web security, as well as fundamentals of secret key cryptography, hash functions and public key cryptography. Students will also learn best practices when designing network protocols.} \newcommand\ABETOutOneA{0} \newcommand\ABETOutOneB{0} \newcommand\ABETOutTwoA{0} \newcommand\ABETOutTwoB{0} \newcommand\ABETOutTwoC{0} \newcommand\ABETOutTwoD{0} \newcommand\ABETOutThree{1} \newcommand\ABETOutFourA{0} \newcommand\ABETOutFourB{0} \newcommand\ABETOutFourC{0} \newcommand\ABETOutFive{1} \newcommand\ABETOutSixA{0} \newcommand\ABETOutSixB{0} \newcommand\ABETOutSevenA{1} \newcommand\ABETOutSevenB{1} \newcommand\covTopics{\item Network/operating system/web security introduction and current trends \item Wireless security/wireless attacks \item Operating system security \item Malware \item Buffer overflows \item Passwords/combinations/permutations/entropy \item Authentication \item Introduction to cryptography \item Hash functions \item Public key cryptography \item Network protocols \item Physical attacks \item Secure Software Development} \newcommand\isScheduleExternal{0} \newcommand\isScheduleCommon{1} \newcommand\scheduleRows{18} \newcommand\scheduleCols{3} \newcommand\scheduleHeight{4} \newcommand\schedule{\begin{table}[h!] \centering \caption*{Tentative Schedule for \textbf{All Sections}} \vspace{0.05in} {\renewcommand{\arraystretch}{1.5} \small \begin{tabularx}{\linewidth}{c|l|X} \toprule \large \textbf{Week \#} & \large \textbf{Dates} & \large \textbf{Topics, Reading, etc.}\\ \midrule \midrule 1 & 1/12 - 1/16 & \\ 2 & 1/19 - 1/22 & MLK 1/19\\ 3 & 1/26- 1/30 & \\ 4 & 2/2 - 2/6 & \\ 5 & 2/9 - 2/13 & \\ 6 & 2/16 - 2/20 & Conference travel\\ 7 & 2/23 - 2/27 & Midterm exam (2/25)\\ 8 & 3/2 - 3/6 & Semester Recess\\ 9 & 3/9- 3/13 & \\ 10 & 3/16 - 3/20 & \\ 11 & 3/23 - 3/27 & \\ 12 & 3/30 - 4/3 & Easter Recess (4/1)\\ 13 & 4/6 - 4/10 & Easter Recess (4/6)\\ 14 & 4/13 - 4/17 & Student presentations start (4/15)\\ 15 & 4/20 - 4/24 & Student presentations\\ 16 & 4/27 - 5/1 & Student presentations\\ 17 & 5/4 - 5/8 & Final Exam (Wed, May 6, 02:30 pm - 05:00 pm)\\ \bottomrule \end{tabularx} } \end{table}} \newcommand\gradingPolicy{A composite score (out of 100) will be computed by assigning weights as follows.\\ \\ \textcolor{violet}{ HW/Lab Assignments: 10\% \\ Midterm Exam: 25\% \\ Final Exam: 25\% \\ Project: 40\% \\ } The final grade will be norm-referenced (i.e., "curved").} \newcommand\HWandLabPolicy{The assignments will be posted on the class website and announced in class. Students will work individually; the due date for each assignment will be given at the time it is assigned. The assignments are due at midnight of the announced date or latest at noon the following day. Please note that the instructor and the TA reserve the right to check the submitted answers for familiarity score; please make sure to use your own words when you explain something.} \newcommand\AIPolicy{\textcolor{red}{ Since you opted for an AI Policy, you should edit this part, choosing one of the following statements, modifying as desired:\\ \\ The use of AI-generated content is not permitted in this course. Its use will result in an academic integrity violation and a zero on the assignment.\\ \\ OR\\ \\ The use of AI-generated content is allowed in this course.\\ \\ OR\\ \\ The use of AI-generated content is permitted as follows: (a) for generating a first draft or (b) for generating an outline or (c) for generating XXX.\\ \\ AND, if AI is allowed:\\ \\ Even if you have significantly edited AI-generated material, you must identify the AI tool used to assist in generating your work. You are required to provide the name of the tool, date used, and prompts used to generate the output. As you may be required to submit the original AI output, you must keep a copy of the original output and provide it when requested. If questions arise about the authorship of submitted work, you are responsible for authenticating your authorship. You should save evidence of your authorial process, such as drafts, notes, version histories, and complete transcripts of AI assistance. }} \newcommand\AttendancePolicy{The primary teaching method will be class lectures and discussions. Class attendance is defined as being up-to-date with class material every week, taking notes from fellow students when needed, or watching recorded videos when available.} \newcommand\ElectronicsPolicy{\textcolor{red}{Since you opted for a customize electronics policy, you should edit this part. Your policy should address your general stance on recording of class sessions and the circumstances under which recording will be allowed or prohibited. If you generally prohibit recording, yet allow recording of certain classes for some reason, then ypu should notify all students that those classes will be recorded. If recording is permitted as an ADA accommodation for a student, you obviously should not identify that student(s).)}}