dissertation examples cyber security

Cyber Security Hub

  • Research projects
  • PhD research

Euroopa Regionaalarengu Fond

MSc thesis on Cyber Security related topics defended at the University of Tartu :

  • Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System"
  • Mammadzada. K., "Blockchain Oracles"
  • Matsalu. M., "The Development of Digital Forensics Workforce Competency on the Example of Estonian Defence League"
  • Padur. K., "Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution"
  • Puniani. R., "Conceptualization of a Blockchain Based Voting Ecosystem in Estonia"
  • Pure. I., "An Automated Methodology for Validating Web Related Cyber Threat Intelligence by Implementing a Honeyclient"
  • Produit. B.D., "Optimization of the ROCA (CVE-2017-15361) Attack"
  • Sarapuu. D., "Penetration Testing of Glia’s Web Application"
  • Seeba. M., "A Specification of Layer-Based Information Security Management System for the Issue Tracking System"
  • Simisker. M., "Security of Health Information Databases"
  • Tõnisson. R., "Tighter Post-quantum Secure Encryption Schemes Using Semi-classical Oracles"
  • Yerokhin. M., "Multi-level Policy-aware Privacy Analysis"

See more at the thesis database .

  • Abbasi A., GDPR Implementation in an Airline’s Contact Center
  • Akande A., Disruptive Power of Blockchain on the Insurance Industry
  • Avramenko V., Cost-Benefit Analysis of a Hybrid Terrorist Attack on a Power Plant

  • Affia A-A. O., Security Risk Management of E-commerce Systems
  • Çelebi I., 
Privacy Enhanced Secure Tropos:
 A Privacy Modeling Language for GDPR Compliance
  • Cherednychenko O., Designing Visually Effective and Intuitive Modelling Notations for Security Risk Management
  • Elazazy A. A. A. A., HoneyProxy Implementation in Cloud Environment with Docker Container HoneyFarm
  • Filipczak K. M., Testing the Security Awareness using Open-Source Tools: Spear Phishing
  • Islami L., Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations
  • Jüristo K., How to Conduct Email Phishing Experiments
  • Kaasik M., A Tool for Supporting Multi-perspective System Development Through Security Risk Management
  • Kopylash V., An Ethereum-Based Real Estate Application with Tampering-Resilient Document Storage
  • Luomala M., Evaluation of Efficiency of Cybersecurity
  • Mendelman K., Fingerprint Organization Using Metadata of Public Documents
  • Mitt S., Blockchain Application - Case Study on Hyperledger Fabric
  • Mohamed G. Z. A. R., Detecting Social Spamming on Facebook Platform
  • Nugis R., Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
  • Orange A., Blockchain-based Provenance Solution for Handcrafted Jewellery
  • Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists’ Cyber Incident Reporting Skills
  • Rebane R.-M., Post-Quantum Secure Time-Stamping
  • Ristikivi A., Ensuring the Integrity of Electronic Health Records
  • Räni E., Prediction Model for tendencies in Cybercesurity
  • Sing E., A Meta-Model Driven Method for Establishing Business Process Compliance to GDPR
  • Shapaval R., Security Risk Management for the IoT systems
  • Soonberg M., The Employee-Based Information Security Risks on the Example of the Estonian Literary Museum
  • Sõgel K., Distributed Ledger Technology and External Mandatory Reporting in Banking Industry
  • Velázquez J. A. S., ''Securing openHAB Smart Home Through User Authentication and Authorization'
  • Värva I., Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application
  • Zaitsev A., Comparison of STS and ArchiMate Risk and Security Overlay
  • AbuSeada W. M. F. A., Alternative Approach to Automate Detection of DOM-XSS Vulnerabilities
  • Bascuñana G. F., Method for Effective PDF Files Manipulation Detection
  • Brodar G., Analysis of Exploit-kit Incidents and Campaigns Through a Graph Database Framework
  • Djagilev V., Android Chat Application Forensic Process Improvement & XRY Support
  • Ellervee A., A Reference Model for Blockchain-Based Distributed Ledger Technology
  • Jõgi M., Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance
  • Kinger M., Enterprise Cloud Security Guidance and Strategies for Enterprises
  • Kuldmaa A., On Secure Bulletin Boards for E-Voting
  • Lahesoo P., The Electronic Evidence Examination Reporting System by the Example of West Prefecture
  • Lashkarara S., Managing Security Risks Using Attack-Defense Trees
  • Maennel K., Improving and Measuring Learning Effectiveness at Cyber Defence Exercises
  • Nafies A., A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver
  • Sivalingapandi D., Comparison and Alignment of Access Control Models
  • Oksvort R., A Prototype for Learning Privacy-Preserving Data Publishing
  • Pappas S., Investigation of JTAG and ISP Techniques for Forensic Procedures
  • Proskurin A., Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application
  • Treier D., Research and Proof of Concept of Selected ISKE Highest Level Integrity Requirements
  • Tschida C., The Way to the Specialist and Management Level of Cyber Hygiene Initiative
  • Tsintsabadze L., A Prototype to Analyze Role- and Attribute-Based Access Control Models
  • Vallaots A., Federation of Cyber Ranges
  • Vunk M., A Framework for Assessing Organisational IT Governance Risk and Compliance
  • Allyson I. H., Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises
  • Duran S. A. U., Organizational Interaction Mechanisms Affecting Strategic Decision-Making During Cybercrime Investigations
  • Herrera V. L. C., A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
  • Martínez F. C. A., Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding and Development
  • Pantoja V. C. A., Analysis of the Cyber Attacks against ADS-B Perspective of Aviation Experts
  • Pinto R. Y. A., Development of National Cyber Security Strategies (NCSSs), and an Application of Perspective to the Colombian Case
  • Rozario V. I. D. J., Model-based Role Based Access Control for RESTful Spring applications
  • Samarütel S., Revision of Security Risk-oriented Patterns for Distributed Systems
  • Sarmiento B. S. A., Detection Solution Analysis for Simplistic Spoofing Attacks in Commercial Mini and Micro UAVs
  • Sergeev A., Role Based Access Control as SecureUML Model in Web Applications Development with Spring Security
  • Siim J., Secure and Efficient Mix-Nets
  • Siim S., A Comprehensive Protocol Suite for Secure Two-Party Computation
  • Sokk V., An Improved Type System for a Privacy-aware Programming Language and its Practical Applications
  • Suarez M. D. D., Assessment of Web-based Information Security Awareness Courses
  • Velasquez H. L. A., Colombia and the Intelligence Cycle in the 21st Century, the Digital Age
  • Guler S., Secure Bitcoin Wallet
  • Kiiver J., NFC Security Solution for Web Applications
  • Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation
  • Rao S. P. Analysis and Mitigation of Recent Attacks on Mobile Communication Backend
  • Rrenja A., Pattern Based Security Requirements Derivation with Security Risk-aware Secure Tropos
  • Tursunova S., Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks
  • Vaht M., The Analysis and Design of a Privacy-Preserving Survey System
  • AbuLamddi M., Safety and Security Dependability Analysis
  • Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes
  • Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools
  • Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis
  • Okugbeni J., Security Implementation of Mission Control System for ESTCube-1 Satellite
  • Pikma T., Auditing of Secure Multiparty Computations
  • Preobrazenskaja A., Development of Security Risk Measurement Model within Misuse Cases and BPMN
  • Teder T. Extracting Bole-based Access Control Models from Business Process Event Logs
  • Tovstukha I., Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities
  • Turban T., A Secure Multi-Party Computation Protocol Suite Inspired by Shamir’s Secret Sharing Scheme
  • Altuhhova O., Developing System Security through Business Process Modelling
  • Onchukova A., Transformation rules between MUC and MAD
  • Pankova A., Insecurity of Transformation-Based Privacy-Preserving Linear Programming
  • Pullonen P., Actively Secure Two-Party Computation: Efficient Beaver Triple Generation
  • Rebane R., A Feasibility Analysis of Secure Multiparty Computation Deployments
  • Tark K., Role Based Access Model in XML based Documents
  • Cakabey O., Role-based Access Control Using Knowledge Acquisition in Automated Specification
  • Khan N. H., A Pattern-based Development of Secure Business Processes
  • Lakk H., Model-driven Role-based Access Control for Databases
  • Soomro I. U., Alignment of Misuse Cases to ISSRM
  • Turan Y., Extension and Application of Event-driven Process Chain for Information System Security Risk Management
  • Chowdhury M. J. M., Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
  • Seeba I., Adding a transformation language to the Cryptoanalyser
  • Talviste R., Deploying secure multiparty computation for joint data analysis - a case study

Google Custom Search

Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.

Hinweise zum Einsatz der Google Suche

Technical University of Munich

  • Professorship of Cyber Trust
  • TUM School of Computation, Information and Technology
  • Technical University of Munich

Technical University of Munich

Teaching at the Professorship of Cyber Trust

Theses and student projects.

We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.

Application

Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.

Open Student Projects

This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.

Assigned Student Projects

Completed student projects.

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Dissertations / Theses on the topic 'Cybersecurity strategy'

Create a spot-on reference in apa, mla, chicago, harvard, and other styles.

Consult the top 21 dissertations / theses for your research on the topic 'Cybersecurity strategy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

Boutwell, Mark. "Exploring Industry Cybersecurity Strategy in Protecting Critical Infrastructure." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7965.

Gcaza, Noluxolo. "A national strategy towards cultivating a cybersecurity culture in South Africa." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.

Galán, Carlos Manuel, and Cordero Carlos Galán. "Public cybersecurity as guarantee of the exercise of rights." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117704.

Raina, Ravi. "A systems perspective on cybersecurity in the cloud : frameworks, metrics and migration strategy." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107602.

Cornel, Cariana June. "Cybersecurity Education in Utah High Schools: An Analysis and Strategy for Teacher Adoption." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8592.

Kang, Johan, and Sebastian Westskytte. "Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027.

Chomyšyn, Maxim. "Dopad bezpečnosti IIoT na proaktivní údržbu firemních aktiv." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417807.

Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.

Sulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.

Dahlquist, Kyla N. "Strategic Protection of Vital U.S. Assets Abroad: Intellectual Property Protection in the Trans-Pacific Partnership." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1408709770.

Senate, University of Arizona Faculty. "Faculty Senate Minutes February 6, 2017." University of Arizona Faculty Senate (Tucson, AZ), 2017. http://hdl.handle.net/10150/622775.

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Rajan, R., Nripendra P. Rana, N. Parameswar, S. Dhir, Sushil, and Y. K. Dwivedi. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management." 2021. http://hdl.handle.net/10454/18482.

Huang, Chih-Hsuan, and 黃志軒. "The Development of U.S. Cybersecurity Strategy Under The Concept of Homeland Security." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/45617348022547593270.

Jandura, Lukáš. "Možnosti zlepšení strategií pro kybernetickou bezpečnost." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-344663.

Lopes, Carvalho Viana André. "NATO and Offensive Cybersecurity: A Strategic Analysis." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-387165.

(5929946), James E. Lerums. "Measuring the State of Indiana's Cybersecurity." Thesis, 2019.

This dissertation introduces a scorecard to enable the State of Indiana to measure the cybersecurity of its public and private critical infrastructure and key resource sector organizations. The scorecard was designed to be non-threatening and understandable so that even small organizations without cybersecurity expertise can voluntarily self-asses their cybersecurity strength and weaknesses. The scorecard was also intended to enable organizations to learn, so that they may identify and self-correct their cybersecurity vulnerabilities. The scorecard provided quantifiable feedback to enable organizations to benchmark their initial status and measure their future progress.

Using the scorecard, the Indiana Executive Council for Cybersecurity launched a Pilot to measure cybersecurity of large, medium, and small organizations across eleven critical infrastructure and key resources sectors. This dissertation presents the analysis and results from scorecard data provided by the Pilot group of 56 organizations. The cybersecurity scorecard developed as part of this dissertation has been included in the Indiana Cybersecurity Strategy Plan published September 21, 2018.

Magina, Matilde Rodrigues Ribeiro. "O Instituto da Defesa Nacional como Centro de Pensamento Estratégico na sensibilização pública para a Cibersegurança." Master's thesis, 2019. http://hdl.handle.net/10362/91706.

Onumo, Aristotle, Andrea J. Cullen, and Irfan U. Awan. "Empirical study of cultural dimensions and cybersecurity development." 2017. http://hdl.handle.net/10454/12442.

Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.

Persoglia, Davide. "Between Defence and Offence: An Analysis Of The US "Cyber Strategic Culture"." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-388122.

TheDissertation - Dissertation Examples - Cybersecurity

Cybersecurity Dissertation Examples For Free Download

Challenges facing policing of illegal immigrants in the uk.

Words: 1375

Department of Defense (DoD) Cyber Workforce Challenges

Words: 4950

Couldn't find the right Cybersecurity dissertation example?

Order it at our dissertation writing service from proficient writers

Banner

Cyber security and networks

  • How we can help
  • Planning your search
  • Information sources
  • Searching effectively
  • Using databases
  • Evaluating information
  • Poster Presentations
  • Academic Integrity

Can I view previous dissertations/honours projects?

The Library holds a small selection of digitised dissertations which are available to  view online  (you may need to log in to GCULearn). Previous examples may also be available by contacting your department directly.

For help around format, structure and layout  we recommend contacting the Learning Development Centre (LDC) within your School. They can also help with skills related to academic writing and critical analysis/thinking.  

  • Learning Development Centres Information to help you contact the Learning Development Centre (LDC) for your course/programme.

Fulltext access to journal articles

Not all databases will host the full text of the article you need.  Here are some tips to help you locate the the fulltext article 

  • Search Discover using the article title.
  • To check if we hold a specific journal and if available online or in print, s earch Discover using the journal title .
  • You can also try a search using Google Scholar for an open access journal article. Search by the article title.

Watch our short video for more help.

Finding and accessing full text

This video demonstrates how to find and access the full text of journal articles.

Inter-library loan

You can request a journal article or a book not available in our Library stock via our Inter-library loan (ILL) service. View our Inter-library loan webpages using the link below for more details on how to submit a request and contact details for ILL team.

Journal articles, conference papers and book chapters are supplied electronically where possible but some processing time is required for ILL requests so w e recommend factoring this in to your time management for your assignment/dissertation or honours project.

Help and support on the ILL process including frequently asked questions are also available on our ILL webpages.

  • Inter-library loan Request an item for your research, teaching or coursework not available in Library stock.

Where can I search for reliable statistics?

Statistics, data and figures are useful to back up ideas, opinions and provide evidence.

  • What are statistics?
  • Why use statistics?
  • How do you find statistics?
  • What are reliable sources?

Statistics are a type of information generally presented in numbers.

Statistics can be presented in the body of your text:

74% of the world's population has access to clean drinking water (World Health Organization, 2022).

Statistics can also be represented graphically, such as in a table or chart:

              (Scottish Government, 2022, p.41)

You must cite and reference any statistics the same as with any other information source.

Scottish Government (2022)  The Scottish Health Survey: 2021 edition . Available at: https://www.gov.scot/publications/scottish-health-survey-2021-volume-1-main-report/ (Accessed: 11 November 2022).

World Health Organization (2022) World Health Statistics 2022. Available at: https://www.who.int/publications/i/item/9789240051157 (Accessed: 11 November 2022).

You can use statistics to:

  • Illustrate a point or back up an argument
  • Put your topic in a real-life context
  • Make decisions based on the evidence available
  • Report on work that other people have done on your topic

Statistics are published in a wide variety of places. Some organisations, such as the Office for National Statistics, collate statistics and publish them in reports. Other statistics are available in organisational reports and publications.

Statistics can often be misrepresented or used without context in the media. If you are using a source that has quoted a statistic from somewhere else, you should always find the original source of the statistic.

If you are unsure who is publishing statistics on your topic, you can do a Google search to see what is out there. For example, if you Google 'climate change statistics Scotland', you will find a report from the Scottish Government about greenhouse gas emissions.

It is very important to evaluate the source of any statistics you find to judge whether they are credible and suitable for your academic assignments.

International bodies like the United Nations and the World Bank are a good source of generic statistics like demographic information.

  • United Nations

You might also consider professional bodies like BCS or ACM for subject specific statistics.

Look at the Scottish Government or Local Authority websites for location specific information.

Charities and non-governmental organisations can also be a good source of research and statistics.

For industry and company specific information check out IBISWorld - a great source of industry overviews and market sector information.

  • BCS, the professional body for IT
  • ACM digital library ACM (Association for Computing Machinery) digital library - including journals, conference proceedings, technical magazines, newsletters and books.
  • Scottish Government statistics
  • IBISWorld IBISWorld includes industry research on a variety of UK sectors. It includes an overview of each sector, the current outlook and information about key companies and issues.
  • << Previous: Evaluating information
  • Next: Poster Presentations >>
  • Last Updated: Feb 28, 2024 3:28 PM
  • URL: https://gcu.libguides.com/cyber

Home » Blog » Dissertation » Topics » Information Technology » 80 Cyber Security Research Topics

Dissertation Help Logo

80 Cyber Security Research Topics

FacebookXEmailWhatsAppRedditPinterestLinkedInIf you are a student seeking compelling research topics in Cyber Security, you have come to the right place. Embarking on the journey of academic research can be both exhilarating and daunting, especially when it comes to choosing the right cyber security research topics for your undergraduate, master’s, or doctoral thesis or dissertation. In today’s […]

Cyber Security Research Topics

If you are a student seeking compelling research topics in Cyber Security, you have come to the right place. Embarking on the journey of academic research can be both exhilarating and daunting, especially when it comes to choosing the right cyber security research topics for your undergraduate, master’s, or doctoral thesis or dissertation. In today’s hyperconnected world, where digital threats and vulnerabilities evolve at a relentless pace, research in cybersecurity has never been more critical. The realm of cybersecurity offers a vast landscape of possibilities, encompassing diverse aspects such as network security, data protection, ethical hacking, and more. As you delve into the realm of cybersecurity research topics, we are here to guide you in navigating this dynamic field, helping you uncover exciting and relevant research topics that will not only fuel your academic curiosity but also contribute to the ever-evolving landscape of digital security.

Cybersecurity, often synonymous with “information security” or “computer security,” encompasses the comprehensive measures, practices, and technologies implemented to protect digital systems, networks, and data from unauthorized access, attacks, and vulnerabilities. It safeguards the integrity, confidentiality, and availability of digital assets, ensuring the resilience of organizations and individuals in an increasingly interconnected and data-dependent world.

A List Of Potential Research Topics In Cyber Security:

  • A Critical Review of Cybersecurity in the Supply Chain and Logistics Industry.
  • Investigating the Use of Homomorphic Encryption for Secure Data Outsourcing.
  • A Review of Cybersecurity Risks in Autonomous Vehicles and Connected Transportation.
  • Investigating the Security Implications of Quantum-Safe Cryptography.
  • Analyzing the Security Risks of AI-Generated Deepfake Videos.
  • Evaluating the Effectiveness of Biometric Access Control Systems in Organizations.
  • Exploring the Challenges and Solutions in Securing Cloud-Native Applications.
  • Assessing the Resilience of Healthcare Cybersecurity Post-COVID.
  • Investigating the Cybersecurity Challenges of Quantum Cryptocurrency Systems.
  • A Comparative Review of Cybersecurity Frameworks for Critical Infrastructure Protection.
  • A Systematic Review of Cybersecurity Strategies for Protecting Intellectual Property.
  • Evaluating the Security Implications of 5G Networks in a Hyperconnected World.
  • Assessing the Privacy and Security Challenges of IoT Devices in Healthcare.
  • Evaluating the Cybersecurity Risks Associated with Remote Work in the Post-Pandemic Era.
  • Analyzing the Challenges of Cybersecurity in the Aviation Industry.
  • Assessing the Cybersecurity Readiness of Critical Infrastructure in the UK.
  • Analyzing the Impact of Remote Work on Cybersecurity Post-COVID.
  • Exploring the Security Challenges of Autonomous Drones and UAVs.
  • Analyzing Cyber Threat Intelligence Sharing among UK Organizations.
  • Exploring the Threat Landscape of Nation-State Cyberattacks in the Modern World.
  • Investigating the Security of Voice Assistants and Smart Speakers in Homes.
  • Topic related to cybersecurity and data mining : Identifying anomalous patterns in network traffic for cybersecurity threat detection.
  • Evaluating the Privacy Concerns of Wearable Health Devices and Fitness Trackers.
  • A Comprehensive Review of Cybersecurity in the Context of Global Pandemics.
  • A Comprehensive Review of Cybersecurity Threats in the Retail Sector.
  • Investigating the Security Implications of Cyber-Physical Systems (CPS) in Industry.
  • Investigating the Use of Cyber Deception Techniques for Intrusion Detection.
  • A Review of Ethical Considerations in Vulnerability Disclosure.
  • Analyzing the Security Challenges of Supply Chain Attacks in the Cyber Domain.
  • A Review of Cybersecurity Best Practices in Small and Medium Enterprises (SMEs).
  • Exploring the Role of Cybersecurity in Protecting Financial Markets and Cryptocurrency Exchanges.
  • Exploring the Role of Artificial Intelligence in Enhancing Cyber Incident Response.
  • Analyzing the Impact of Deep Learning in Enhancing Malware Detection.
  • Analyzing the Role of Cyber Insurance in Mitigating Cybersecurity Risks.
  • Investigating the Impact of Quantum Computing on Contemporary Cybersecurity Protocols.
  • Exploring the Ethics of Cybersecurity Research and Vulnerability Disclosure.
  • Exploring the Role of Contactless Technologies in Pandemic-Driven Cybersecurity.
  • Investigating the Effectiveness of Blockchain in Securing IoT Devices.
  • Analyzing the Threat Landscape of Internet of Medical Things (IoMT) Devices.
  • Exploring the Role of Cybersecurity in Protecting Smart Grids from Attacks.
  • Assessing the Role of Cybersecurity in Protecting Space-based Assets and Satellites.
  • A Review of Cybersecurity Challenges in Smart Agriculture and Precision Farming.
  • Investigating the Impact of Brexit on UK Cybersecurity.
  • Investigating the Role of Cybersecurity in Protecting Personal Health Records (PHRs).
  • Exploring the Role of Cybersecurity in Ensuring the Integrity of Digital Elections.
  • Evaluating the Privacy Implications of Contact Tracing Apps during a Pandemic.
  • Assessing the Vulnerabilities of Smart Hospitals in the Healthcare Sector.
  • Analyzing the Threats to Privacy and Security in Social Media Platforms.
  • A Systematic Review of Cybersecurity Risk Assessment Frameworks.
  • A Systematic Review of Machine Learning-Based Intrusion Detection Systems.
  • Assessing the Security of Industrial Control Systems (ICS) in Critical Infrastructure.
  • Exploring the Role of Cybersecurity in Protecting Autonomous Vehicles from Attacks.
  • Assessing the Security of Edge Computing Environments in IoT Applications.
  • A Comparative Review of Cybersecurity Threats in the Financial Technology (FinTech) Industry.
  • A Review of Cybersecurity in the Context of 5G and Beyond Networks.
  • Topic related to cybersecurity and data science : Machine learning approaches for predicting cybersecurity threats.
  • Evaluating the Effectiveness of Cybersecurity Education and Training Programs in the UK.
  • Exploring the Security Implications of Biometric Authentication Systems.
  • Exploring the Role of UK Government Policies in Enhancing National Cybersecurity.
  • A Critical Review of Cybersecurity Incident Response Strategies.
  • A Comparative Review of Cybersecurity Measures in the Energy Sector.
  • A Critical Review of the Role of Cybersecurity in Smart Cities Development.
  • Assessing the Efficacy of Machine Learning Algorithms in Detecting Advanced Persistent Threats (APTs).
  • A Systematic Review of Cybersecurity in the Aviation and Aerospace Industry.
  • Assessing the Cybersecurity Risks of 3D Printing Technology.
  • A Comprehensive Review of Cybersecurity Awareness and Training Programs.
  • Investigating the Security Challenges of Hybrid Work Environments Post-COVID.
  • Evaluating the Impact of Cybersecurity on the Future of Quantum Internet.
  • Assessing the Role of Cybersecurity in Safeguarding Elections and Democracy.
  • Evaluating the Cybersecurity Implications of Rapid Digital Transformation Post-COVID.
  • Evaluating the Effectiveness of Cybersecurity Awareness Training Programs in Organizations.
  • Assessing the Security of Augmented Reality (AR) and Virtual Reality (VR) Technologies.
  • A Comparative Review of Cybersecurity Regulations and Standards.
  • Analyzing the Threat Landscape of Ransomware Attacks in Critical Infrastructure.
  • A Comprehensive Review of Insider Threat Detection and Prevention Strategies.
  • Evaluating the Privacy Concerns of Smart Cities’ Surveillance Systems.
  • A Review of Privacy-Preserving Technologies in the Era of Big Data and AI.
  • A Comprehensive Review of Cyber Threat Intelligence Sharing Practices.
  • Analyzing the Risks and Benefits of Cybersecurity Information Sharing.
  • A Review of Cybersecurity Implications of Biotechnology and Genetic Research.

In this digital age, the importance of cybersecurity cannot be overstated. As we’ve explored a diverse array of cybersecurity research topics suitable for undergraduate, master’s, and doctoral level research, remember that your chosen path in this field has the potential to make a profound impact on the security of our interconnected world. From examining the intricacies of blockchain security to exploring the ethical considerations of cybersecurity, each topic presents a unique opportunity for innovation and discovery. So, whether you’re just beginning your academic journey or seeking to expand your expertise, the world of cybersecurity research offers boundless opportunities to contribute to a safer digital future. Choose your research topic wisely, and let your academic exploration begin!

Order Cyber Security Dissertation Now!

External Links:

  • Download Cyber Security Dissertation Sample For Your Perusal

Research Topic Help Service

Get unique research topics exactly as per your requirements. We will send you a mini proposal on the chosen topic which includes;

  • Research Statement
  • Research Questions
  • Key Literature Highlights
  • Proposed Methodology
  • View a Sample of Service

Ensure Your Good Grades With Our Writing Help

  • Talk to the assigned writer before payment
  • Get topic if you don't have one
  • Multiple draft submissions to have supervisor's feedback
  • Free revisions
  • Complete privacy
  • Plagiarism Free work
  • Guaranteed 2:1 (With help of your supervisor's feedback)
  • 2 Installments plan
  • Special discounts

Other Posts

  • 80 Artificial Intelligence Research Topics September 10, 2023 -->
  • 80 Data Mining Research Topics September 10, 2023 -->
  • 80 Data Science Research Topics September 10, 2023 -->
  • 80 Information Technology Research Topics July 30, 2023 -->

WhatsApp us

PHD PRIME

Cybersecurity Dissertation Topics

Cybersecurity is the mechanism to shield the computing resources and information in the connected network. Here, it applies the set of standard rules and laws over the system to ensure the system, data, and network security, integrity , and privacy against malicious threats.  This page is intended to give new Cybersecurity Dissertation Topics with the Important Information of Dissertation Writing!!!

There exist semi-honest adversary and malicious adversary models. On the one hand, the semi-honest model relies on pre-defined algorithm instructions . Through the protocol transcript, it also attempts to study more. On the other hand, a malicious model executes any sort of random approach to handling attacks. Overall, several adversaries are intended to defend the system from attacks.

Since a greater number of security threats is rising day by day due to the tremendous growth of web-assisted systems. In recent times, the attackers are very refined to break current security solutions.

For instance: Zero-day attacks use the system weakness before it is fixed. So, it is essential to compute the unbreakable preventive/defensive measures against the known and unknown attacks. Now, we can see the summary about the cyber-attacks which comprises their nature, targeting layers, effect, security concern, and applications . Hope, this will give you a better understanding of the attacks in cyber security.

Research Cybersecurity dissertation topics

Cyber Attackers Overview 

  • System Integrity and Availability
  • Data Confidentiality and Integrity
  • Information Accessibility
  • Device or User or Data Authentication
  • Observed or Unobserved
  • External or Internal
  • Changed or Unchanged
  • Arbitrary or Synchronized
  • Defensive Cyber Application for Military Threats
  • Financial Solution for Business
  • National Cyber Security
  • Information Security in Industrial Application
  • Remote Patient Monitoring System

In addition, our experts from the research team also listed the widely known attacks, threats, and vulnerabilities under specific classifications . Our resource teams are skillful in handling any sort of attack despite the difficulties. We guide research scholars in building cybersecurity dissertation topics .  So, we will be sure to help you in providing an efficient solution for any cyber threats.

List of Cyber Attacks

  • Social Engineering Exploitation
  • Supply Chain Risk
  • Other Attacks
  • Blended Attack
  • Denial-of-Service and Distributed DoS (DoS / DDoS) Attack
  • Ping flood Attack
  • Ping of Death-DDoS Attack
  • Man-in-the-middle / browser (MitM / MitB)
  • Smurf-DDoS Attack
  • Address Resolution Protocol (ARP) Poisoning
  • DNS/ IP Spoofing Attack
  • Format String Misuse
  • Heap and Stack based Attacks (overflow)
  • Stack Buffer overflow  

Cyber Security issues

As matter of fact, cyber security subjects are widely spread in all the research areas through the unsolved system susceptibilities and security gaps . With an intention to detect security risk which attempts to disturb aimed devices/software, security solutions are needed to be designed. For that, it will be categorized to simplify the work of the problem-solving process. Let’s see some important research challenges in cyber security which is not successfully addressed or solved yet,

  • Poor Authorization Scheme:  Improper authorization will be unsuccessful to address the right physical access which depends on the allocated access controls
  • Verification / Validation Fail:  Weak authentication scheme may let the illegal users track the legal user credential information and also it fails to take account of bio-metric characteristics
  • No Reliability:  This enables the usage of weak authentication protocols. Also, these protocols may let the attackers modify the data.
  • Poor programming and system configuration:  It will affect the envisioned activities of the system. As a result, it also disturbs the performance of the system level.
  • Inadequate privacy scheme : This is on network information will allow the intruders to break the weak cryptographic approaches
  • Insufficient network security: It leads to low interaction among devices and high network threats and attacks

In a short period, cyber security techniques have reached a unique place in handling different safety-related challenges. Because of the rapid growth of wireless digital information, there are numerous security threats and vulnerabilities growing in daily life. The cybersecurity techniques are used at different levels (network, data, application, and host) of the system. Now, we can see in what way the attacks of a cyber-physical system are effectively handled .

How to mitigate cyber attackers? 

  • Security Vulnerability Analysis:  Deliver dynamic security vulnerabilities handling techniques with real-time security consciousness.
  • Analyze Security Requirements:  Inspect the necessity of the security in order to develop robust safety strategies and executive techniques.
  • Strong Security Policies:  Need to develop strong security policies to guarantee cyber-security in any sort of application.
  • Operational Risks Minimization:  Minimize the operational risks (like a data breach, loss, damage) to control the financial incomes and losses.
  • Security Attacks Detection: Describe the proper security operations for the areas which are not related to cryptography such as IDS, honey spot, IPS, firewall, and more.

Further, our developers have revealed how the developed cybersecurity models are assessed for better performance. In order to achieve the best results, some important factors are examined in the evaluation process. Reach us for interesting cybersecurity dissertation topics. For your reference, here our experts have listed out that.

What are the criteria to evaluate the cybersecurity model? 

  • Refer to the existing techniques of the required subject in published books for a better understanding
  • Analyze the available attacks in different classifications
  • Modeling and implementing new defensive measures for security risks
  • Finding and solving the existences of the security weakness
  • Develop the effective mitigation plan for immediate respond
  • Assessing the security threats

In addition, our experts have shared the common approaches used for identifying the attacks and attackers in an intelligent system. Moreover, it also helps to mitigate the cyber-attacks and cyber attackers in an operative manner.

Standard Methods for Cyber Attackers Detection and Mitigation 

  • Prevention and Defensive Approaches  to managing constant system weakness. Also, it is used for continuous system or application observation and validation.
  • Machine learning (ML) and Artificial Intelligence (AI) techniques  for identifying security threats with an assurance of greater accuracy.
  • Improved authentication and authorization scheme  to control the user accessibility. Further, including end-to-end encryption in the network for precise data classification.
  • Anomaly-based
  • Signature-based
  • Behavior-based
  • Real-Time Continuous Monitoring: Technique to verify the behavior threshold in comparison with the usual pattern. Whereas, it is based on the performance of the devices which is monitored from the beginning.  

Types of cyber security control methods 

There are various techniques involved in controlling cyber security . Further, it is categorized based on the following factors. These factors denote how the controls are intermittently categorized in terms of security gap:

  • Detective controls:  measures are needed to take for recognizing and distinguishing an incident while execution. For instance: Alert service in the intrusion detection system
  • Corrective controls:  measures are needed to take for restricting the incident to create harm to the system after execution. For instance: system recovery
  • Preventive controls: measures are needed to take for avoiding the incident before execution. For instance: an intrusion prevention system

In addition, the control methods are categorized based on their in-built individualities and features. Now let’s see other kinds of control or measures:

  • For instance: Security procedures, rules, and regulations
  • For instance: Fire exit devices and auto-locked door
  • For instance: Firewall, authentication, and access control schemes
  • For instance: Event control, incident handling, and security responsiveness

As a matter of fact, our resource team usually refers to all recent year’s research journal papers, magazines, and articles to frame unique cybersecurity dissertation topics . Through this frequent in-depth study practice, we are always filled with the knowledge of up-to-date technological advancement of cyber security. For your awareness, we have listed a few vital research ideas for phd research topics in cybersecurity .

Latest Cybersecurity Dissertation Topics 

  • Information Warfare in Cyber Hub
  • Vehicle Hacking Challenges in Cybersecurity
  • Insider Threats Prevention and Prediction
  • Cyber Security in Mobile Trends
  • Security Automation in Integrated Cyber System
  • Cloud Data Breaches and Vulnerabilities
  • Risk Analysis of Targeted Ransomware Attack
  • Collaboration of Cybersecurity with Artificial Intelligence
  • Employment of 5G Communication in IoT Systems

Further, we are also glad to give information on the future research scope of cyber security . Beyond this, we are ready to share other aspects of cybersecurity-related research areas with you. Once you tie-up with us, our experts will make you know all the interesting facts to implement cyber security projects for college students .

Future Directions of Cybersecurity 

  • Design of reliable and robust system with standard structure against any emerging-malware
  • Concern on usable security for personal security to control the access
  • Assurance of privacy over private information in wireless dense data transmission
  • Modeling of effective traceback and identity mechanism to detect the cause of attacks
  • Focusing towards the next generation of the web which is expected to meet the new needs of the internet such as subject-based advancement and pattern utilization   

How to write a good dissertation? 

So far, we have had a conversation about cybersecurity attacks, attack types, attacker’s intention, attack detection as well as mitigation techniques, research issues, and more. Hope, you are clear with all these important details for cybersecurity research.

Now, we can see about the Cybersecurity Dissertation Topics writing service . To support you in dissertation writing, we have an individual team of writers to convert your research efforts through value-added words. Here, we are sure to perfectly expose how you practically implement the proposed topic, how you collect, inspect, and assess data . All these factors are vital factors to address in the dissertation. So, our writers give special attention in handling and writing dissertations to present precise research details ineffective results. Below, we have given the key points to be considered for performing advanced research.   

GET NOVEL IDEAS!!! LATEST APPROACH!!! PERFECT WRITING!!!

Here are some guidelines for dissertation writing, 

  • Identify the interested area and select the appropriate topic that meets the research objective
  • Analyze the merits and demerits of exiting techniques used for related subjects. Then propose the novel research solutions which are the best fitting with the research pattern
  • Decide the samples size and type of data (random or intended) that are suited for research solutions
  • Analyze and Quantify the samples by implementing the quantitative techniques
  • Discuss results and organize the collected data in logical order.
  • Detect and classify the primary and secondary evidence to prove your research point

For more clarity, our research, development, PhD Paper Publication help , Conference paper development and writing teams have shortly highlighted the significant steps in PhD / MS cybersecurity study.

  • Confirm the best topic which has the future scope of research
  • Define the appropriate samples for research inspection
  • Execute experiential analysis on the required subject matter
  • Obtain the most precise results through suitable statistical and numerical approaches
  • Plan the rough draft of the dissertation based on institution needs
  • Include the most important evidence and proofs for defensive purposes in future
  • Do unlimited revisions to get the top-quality dissertation (i.e., Proofreading)

To sum up, we are pleased to inform you that we will support you in all the steps of the research journey . So, make a bond with us for formulating novel cybersecurity dissertation topics and use this opportunity to shine in your research career.

dissertation examples cyber security

Opening Hours

  • Mon-Sat 09.00 am – 6.30 pm
  • Lunch Time 12.30 pm – 01.30 pm
  • Break Time 04.00 pm – 04.30 pm
  • 18 years service excellence
  • 40+ country reach
  • 36+ university mou
  • 194+ college mou
  • 6000+ happy customers
  • 100+ employees
  • 240+ writers
  • 60+ developers
  • 45+ researchers
  • 540+ Journal tieup

Payment Options

money gram

Our Clients

dissertation examples cyber security

Social Links

dissertation examples cyber security

  • Terms of Use

dissertation examples cyber security

Opening Time

dissertation examples cyber security

Closing Time

  • We follow Indian time zone

award1

Premier-Dissertations-Logo

Get an experienced writer start working

Review our examples before placing an order, learn how to draft academic papers, cyber security dissertation topics.

Cryptocurrency-Dissertation-Topics

Cryptocurrency Dissertation Topics

Methodology

Methodology

dissertation examples cyber security

  • Dissertation Topics

Cyber Security Dissertation Topics

Cyber security is the field of study that deals with methods of protecting electronic systems and networks from various malicious attacks. Cybersecurity is crucial for global digital connectivity through computer networks. Thus, students in Computer Science must look for new cybersecurity dissertation topics using modern technology.

Review Our Quality Computer Science Dissertation Examples

Premier Dissertations has prepared a list of top cybersecurity research topics for 2024.

Simply drop us a WhatsApp or an Email , If you would like to choose any of the given thesis topics on cybercrime.

You may also like to review :

Computer Science Dissertation Topics | Social Media Dissertation Topics

3-Step  Dissertation Process!

dissertation examples cyber security

Get 3+ Topics

dissertation examples cyber security

Dissertation Proposal

dissertation examples cyber security

Get Final Dissertation

Cyber security dissertation topics for 2024, trending dissertation topics in cyber security, research-based cyber security dissertation topics.

Testimonials

Very satisfied students

This is our reason for working. We want to make all students happy, every day. Review us on Sitejabber

Best Cyber Crime Dissertation Topics

Top cybersecurity dissertation topics, how does it work .

dissertation examples cyber security

Fill the Form

dissertation examples cyber security

Writer Starts Working

dissertation examples cyber security

3+ Topics Emailed!

Importance of selecting the best cyber security dissertation topic.

In a highly globalized world, cyber security is essential. It protects individuals, communities, and states from cyber crimes. Cybercriminals with their expertise in hacking, spreading misinformation, and stealing sensitive data pose a significant threat to global peace. Such malicious activities can pose a threat to global peace as cybercrime is one of the leading 5 th Generation Warfare tools. Therefore, the protection of cyber activities is crucial for both public and private sectors to ensure the smooth functioning of online businesses and maintain global peace.

Review Our Quality Information Technology Dissertation Topics

Cybersecurity is crucial for safe online operations. Students must choose a quality dissertation topic in this field to achieve academic success and contribute to global security.

Discover More:

Get 3+ free   dissertation topics within 24 hours.

Your Number

Academic Level Select Academic Level Undergraduate Masters PhD

Area of Research

admin ha

Related posts

Controversial Psychology Topics

Controversial Psychology Topics

70 Visual Aid Speech Topics for Your Next Presentation

70 Visual Aid Speech Topics for Your Next Presentation

100+ Quantitative Research Titles and Topics

100+ Quantitative Research Titles and Topics

Comments are closed.

Do a more advanced search »

Search for dissertations about: "Cyber security"

Showing result 1 - 5 of 64 swedish dissertations containing the words Cyber security .

1. Security metrics and allocation of security resources for control systems

Author : Jezdimir Milošević ; Henrik Sandberg ; Ling Shi ; KTH ; [] Keywords : TEKNIK OCH TEKNOLOGIER ; ENGINEERING AND TECHNOLOGY ; Cyber-Security ; Cyber-Attacks ; Cyber-Physical Systems ; Networked Control Systems ; Model Based Impact Analysis ; Security Metrics ; Risk Management ; Electrical Engineering ; Elektro- och systemteknik ;

Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE

2. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles

Author : Wenjun Xiong ; Robert Lagerström ; Simon Hacks ; Jelena Zdravkovic ; KTH ; [] Keywords : TEKNIK OCH TEKNOLOGIER ; ENGINEERING AND TECHNOLOGY ; Cyber Security ; Threat Modeling ; Attack Simulations ; IT Systems ; Security Analysis ; Electrical Engineering ; Elektro- och systemteknik ;

Abstract : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. READ MORE

3. Securing Judgement : Rethinking Security and Online Information Threats

Author : Hedvig Ördén ; Hans Agné ; Sharon Rider ; Stefan Borg ; Magnus Ekengren ; Stockholms universitet ; [] Keywords : SAMHÄLLSVETENSKAP ; SOCIAL SCIENCES ; security studies ; critical security studies ; cyber security ; disinformation ; Arendt ; post-foundationalism ; political theory ; EU security policy ; Political Science ; statsvetenskap ;

Abstract : The contemporary debate in democracies routinely describes online information threats such as misinformation, disinformation and deception as security-issues in need of urgent attention. Despite this pervasive discourse, policymakers often appear incapable of articulating what security means in this context. READ MORE

4. Tool Support for Enterprise Architecture Analysis : with application in cyber security

Author : Markus Buschle ; Pontus Johnson ; Stephan Aier ; KTH ; [] Keywords : NATURVETENSKAP ; NATURAL SCIENCES ; Enterprise Architecture ; Decision-making ; Model-based analysis ; Property analysis ; Cyber security ; Software tool ; Design Science ; Electrical Engineering ; Elektro- och systemteknik ;

Abstract : In today’s companies, business processes and information technology areinterwoven. Old and new systems as well as off-the-shelf products and tailoredsolutions are used. This results in heterogeneous, often complex ITlandscapes. The impact of changes and the affected systems are difficult toidentify. READ MORE

5. A framework and theory for cyber security assessments

Author : Teodor Sommestad ; Mathias Ekstedt ; Ruth Breu ; KTH ; [] Keywords : TEKNIK OCH TEKNOLOGIER ; ENGINEERING AND TECHNOLOGY ; cyber security ; security assessment ; vulnerability assessment ; architecture modeling ; enterprise architecture ;

Abstract : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. READ MORE

Searchphrases right now

  • organic geochemistry
  • thesis bushing
  • Land management practices
  • demarcations
  • Intestinal epithelial cells
  • synaptophysin
  • Inventory systems
  • Karin Professor
  • Know performance
  • archaeothanatology

Popular searches

  • wound healing animal model
  • three level
  • Wet Pressing
  • electricity
  • cell detection
  • Patient care in perioperative area

Popular dissertations yesterday (2024-04-16)

  • A structural investigation into the complexity of mesoporous silica crystals : From a view of curvature and micellar interaction to quasicrystallinity
  • Compound Republics as viable Political Systems : A Comparison of the Holy Roman Empire of the German Nation and the European Union
  • Plasmodium falciparum-mediated modulation of innate immune cells: responses and regulation
  • Enhancing Censorship Resistance in the Tor Anonymity Network
  • Investigator bias: Contextual influences on the assessment of criminal evidence
  • Wnt signaling and metaphyseal bone healing
  • The loss of a husband to cancer : additional and avoidable psychological traumata
  • The Inflammatory Prequel of Pediatric Appendicitis
  • Analysis of Response and Development of Permanent Deformation of Unbound Granular Materials Using a Testing Box Technique
  • Gendered Journalism Cultures. Strategies and Tactics in the Fields of Journalism in Britain and Sweden
  • Popular complementary terms: essays, phd thesis, master thesis, papers, importance, trend, impact, advantages, disadvantages, role of, example, case study.

See yesterday's most popular searches here . Dissertations.se is the english language version of Avhandlingar.se .

IMAGES

  1. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    dissertation examples cyber security

  2. Dissertation Cyber Security Research Topics [Professional Writers]

    dissertation examples cyber security

  3. Research-Cyber-Security-Dissertation-Topics

    dissertation examples cyber security

  4. ⇉Biometrics in Cyber Security Essay Example

    dissertation examples cyber security

  5. Cybersecurity as a form of digital protection

    dissertation examples cyber security

  6. Dissertation

    dissertation examples cyber security

VIDEO

  1. Cyber Crime

  2. How to write chapter 1 for a dissertation project?

  3. A Brief Dissertation on Security Culture

  4. Top 5 Attacks In Live Practical (PHISHING,MITM,MALWARE,DDOS,ZERODAY) || Real Hacking In Telugu

  5. University of Management and Technology -Theory in Research Part 4/4:Variables & Observation

  6. Cyber Crimes and Cyber Security

COMMENTS

  1. Exploring Cybersecurity Awareness and Training Strategies To Protect

    compliance, technical solutions, physical security, and security education, training, and awareness (SETA). The weakest layer in an organization's defense-in-depth strategy is related to the user's unawareness of cybersecurity best practices, cybersecurity threats, and vulnerabilities (de Bruijn & Janssen, 2017).

  2. Exploring Industry Cybersecurity Strategy in Protecting Critical

    crucial, make infrastructure resiliency a priority, importance of security awareness, and importance of organizational leadership support and investment. This study revealed key strategies that may help improve cybersecurity strategies used by IT and compliance professionals, which can mitigate successful attacks against critical infrastructure ...

  3. Cyber Security Dissertations

    Dissertations on Cyber Security. Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation. View All Dissertation Examples.

  4. Cybersecurity Strategies to Protect Information Systems in Small

    Cybersecurity has challenged business leaders and policymakers of international relations in the digital information age (Carr, 2016). Reid and Van Niekerk (2014) stated the term cybersecurity was interchangeable with the term information security. Reid and Van Niekerk defined cybersecurity as the collection of instruments, strategies, security

  5. PDF Managing Cybersecurity As a Business Risk for Small and Medium

    There are endless definitions for cybercrime because there is a variety of aspects. to consider about cybercrime. The components of a cybercrime vary in three ways of 1) In some cybercrimes that computers or data are the targets. 2) Computers or digital. technologies used as tools for committing cybercrimes.

  6. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    our national security depends on a strong cyber culture. To stay ahead of the threat, cybersecurity needs to be steeped into the national consciousness through education, sustained messaging and increased cooperation among businesses and government. My research examines the vulnerabilities, and cites case studies, national policy and expert ...

  7. Cyber Security Hub

    Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists' Cyber Incident Reporting Skills. Rebane R.-M., Post-Quantum Secure Time-Stamping. Ristikivi A., Ensuring the Integrity of Electronic Health Records. Räni E., Prediction Model for tendencies in Cybercesurity.

  8. THREE ESSAYS ON CYBERSECURITY-RELATED ISSUES

    Cybersecurity is "the process of implementing and operating controls and other risk management activities to protect information and systems from security events that could compromise them and, when security events are not prevented, to detect, respond to, mitigate against, and recover from those events in a timely manner"1. Cybersecurity has

  9. Dissertations / Theses: 'Computer security ; cybersecurity ...

    Consult the top 47 dissertations / theses for your research on the topic 'Computer security ; cybersecurity.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard ...

  10. Theses and Projects

    Methodology and Implementation of a Cyber Security Risk Management Tool: Master: 2022. On the relationships between different Android frameworks and associated security issues ... Analysis of process mining in the context of cyber security with the example of identity and access management: Master: 2020: Social Media Behavior in the Context of ...

  11. (PDF) A Systematic Literature Review on the Cyber Security

    A Systematic Literature Review on the Cyber Security. 1 Dr.Yusuf Perwej, 2 Prof. (Dr.) Syed Qamar Abbas, 3 Jai Pratap Dixit, 4 Dr. Nikhat Akhtar, 5Anurag. Kumar Jaiswal. 1 Professor, Department of ...

  12. Good cybersecurity thesis topics for a master's degree

    A security analysis of an electronic voting application, for example, would likely generate both current and long-term interest within the IT community. Rather than trying to find the ideal subject immediately, however, avoid analysis paralysis by drafting a working list of possible cybersecurity thesis topics, which you can then explore ...

  13. Dissertations / Theses: 'Cybersecurity strategy'

    Consult the top 21 dissertations / theses for your research on the topic 'Cybersecurity strategy.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago ...

  14. Cybersecurity Dissertation Examples

    Pages: 18. List of quality Cybersecurity Dissertation Examples for writing your own work. Over 10,000 dissertation examples with references on your topic.

  15. User Awareness and Knowledge of Cybersecurity and the Impact of

    Cybersecurity breaches have been increasing over the years with frequent attacks in the last 2 years (Central Intelligence Agency, 2015; United States Securities and Exchange Commission, 2015).

  16. PDF Cyber Security As an Emerging Challenge to South African National Security

    lead to the Cyber Security and Cyber Crimes bill which was released for public comment in December 2015. However, the country's cyber position is weakened by its lack of cyber skills and capacity, as such the research also provides some recommendations on how South Africa can strengthen its overall approach to cyber security.

  17. Dissertations and Honours Projects

    For example, if you Google 'climate change statistics Scotland', you will find a report from the Scottish Government about greenhouse gas emissions. It is very important to evaluate the source of any statistics you find to judge whether they are credible and suitable for your academic assignments.

  18. 80 Cyber Security Research Topics

    A list of research topics on Cyber Security for undergraduate, master, and doctoral students to write dissertations. 44-20-8133-2020. ... Download Cyber Security Dissertation Sample For Your Perusal; Research Topic Help Service. Undergrad: £30. Masters: £45. Doctoral: £70.

  19. Cybersecurity: Analysis of Issues and Threats

    ABSTRACT. Cybersecurity has gained considerable attention in last decade due to its ability to secure government's data against expanding cyber threats. However, as Information Technology is advancing, so are the issues and threats to cybersecurity. Cybersecurity is still struggling to address multi-dimensional Cyberattacks which are gaining ...

  20. Threat Intelligence in Support of Cyber Situation Awareness

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been ... sample of 13 information security professionals were individually interviewed and the ... against cyber security threats (Gendron & Rudner, 2012; Hernandez-Ardieta, Tapiador,

  21. Cybersecurity Dissertation Topics

    Cybersecurity is the mechanism to shield the computing resources and information in the connected network. Here, it applies the set of standard rules and laws over the system to ensure the system, data, and network security, integrity, and privacy against malicious threats. This page is intended to give new Cybersecurity Dissertation Topics with the Important Information of Dissertation Writing!!!

  22. Cyber Security Dissertation Topics

    Cyber security is the field of study that deals with methods of protecting electronic systems and networks from various malicious attacks. Cybersecurity is crucial for global digital connectivity through computer networks. Thus, students in Computer Science must look for new cybersecurity dissertation topics using modern technology.. Review Our Quality Computer Science Dissertation Examples

  23. Dissertations.se: CYBER SECURITY

    Search for dissertations about: "Cyber security". Showing result 1 - 5 of 64 swedish dissertations containing the words Cyber security . 1. Security metrics and allocation of security resources for control systems. Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging.

  24. Kaspersky: Biden administration preparing to prevent Americans from

    The Biden administration is preparing to take the unusual step of issuing an order that would prevent US companies and citizens from using software made by a major Russian cybersecurity firm ...