Cybersecurity Guide

From scholar to expert: Cybersecurity PhD options

In this guide

  • Industry demand
  • 2024 rankings
  • Preparation
  • Considerations
  • School listings

The cybersecurity landscape is not just growing—it’s evolving at a breakneck pace. And what better way to stay ahead of the curve than by pursuing a PhD in cybersecurity?

This advanced degree is no longer confined to the realm of computer science. Today, it branches into diverse fields like law, policy, management, and strategy, reflecting the multifaceted nature of modern cyber threats.

If you’re looking to become a thought leader in this dynamic industry, a PhD in cybersecurity offers an unparalleled opportunity to deepen your expertise and broaden your horizons.

This guide is designed to give prospective cybersecurity PhD students a general overview of available cybersecurity PhD programs. It will also outline some of the factors to consider when trying to find the right PhD program fit, such as course requirements and tuition costs. 

Industry demand for PhDs in cybersecurity

Like other cutting-edge technology fields, until recently, cybersecurity PhD programs were often training grounds for niche positions and specialized research, often for government agencies (like the CIA, NSA, and FBI),  or closely adjacent research organizations or institutions. 

Today, however, as the cybersecurity field grows to become more pervasive and consumer-oriented, there are opportunities for cybersecurity PhDs to work at public-facing companies like startups and name-brand financial, software, infrastructure, and digital service firms.

One trend that is emerging in the cybersecurity field is that cybersecurity experts need to be well-versed in a variety of growing threats. If recent headlines about cybersecurity breaches are any indication, there are a number of new attack vectors and opportunities for cybercrime and related issues. Historically, committing cybercrime took resources and a level of sophistication that required specialized training or skill.

But now, because of the pervasiveness of the internet, committing cybercrime is becoming more commonplace. So training in a cybersecurity PhD program allows students to become an experts in one part of a growing and multi-layered field.

In fact, this trend of needing well-trained, but adaptable cybersecurity professionals is reflected by the move by cybersecurity graduate schools to offer specialized master’s degrees , and many companies and professional organizations offer certifications in cybersecurity that focus on particular issues related to cybersecurity technology, cybersecurity law , digital forensics , policy, or related topics.

That said, traditional research-oriented cybersecurity positions continue to be in demand in academia and elsewhere — a trend that will likely continue. 

One interesting facet of the cybersecurity field is trying to predict what future cybersecurity threats might look like and then develop tools and systems to protect against those threats.

As new technologies and services are developed and as more of the global population begins using Internet services for everything from healthcare to banking — new ways of protecting those services will be required. Often, it’s up to academic researchers to think ahead and examine various threats and opportunities to insulate against those threats.

Another key trend coming out of academic circles is that cybersecurity students are becoming increasingly multidisciplinary.

As cybersecurity hacks impact more parts of people’s everyday lives, so too do the academic programs that are designed to prepare the next generation of cybersecurity professionals. This emerging trend creates an enormous amount of opportunity for students who have a variety of interests and who are looking to create a non-traditional career path.

The best cybersecurity PhD programs for 2024

Capella university, georgia institute of technology, northeastern university, marymount university, school of technology and innovation, nova southeastern university, college of computing & engineering, purdue university, stevens institute of technology, worcester polytechnic institute, university of illinois at urbana-champaign, mississippi state university, new york institute of technology.

These rankings were compiled from data accessed in November 2023 from the Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

What is required to get a PhD in cybersecurity?

Good news first: Obtaining a PhD in a field related to cybersecurity will likely create tremendous employment opportunities and lead to interesting and dynamic career options.

Bad news: Getting a PhD requires a lot of investment of time and energy, and comes with a big opportunity cost (meaning you have to invest four to five years, or longer, or pursue other opportunities to obtain a doctoral degree. 

Here’s a quick breakdown of what is required to get a PhD in cybersecurity. Of course, specific degree requirements will vary by program. One growing trend in the field is that students can now obtain degrees in a variety of formats, including traditional on-campus programs, online degree programs , and hybrid graduate degree programs that combine both on-campus learning with online learning. 

Related resources

  • Online PhD in cybersecurity – A guide to finding the right program
  • Cybersecurity degree programs
  • Podcast episodes and expert interviews

Preparing for a cybersecurity doctorate program

Cybersecurity is a relatively new formalized technology field, nonetheless, there are several ways that students or prospective PhD candidates can get involved or explore the field before and during a graduate school program. A few examples of ways to start networking and finding opportunities include: 

Join cybersecurity organizations with professional networks

Specialized professional organizations are a good place to find the latest in career advice and guidance. Often they publish newsletters or other kinds of information that provide insights into the emerging trends and issues facing cybersecurity professionals. A couple of examples include:

The Center for Internet Security  (CIS) is a non-profit dedicated to training cybersecurity professionals and fostering a sense of collaboration. The organization also publishes information and analysis of the latest cybersecurity threats and issues facing the professional community.

The SANS Institute runs several different kinds of courses for students (including certification programs) as well as ongoing professional cybersecurity education and training for people working in the field. The organization has several options including webinars, online training, and live in-person seminars. Additionally, SANS also publishes newsletters and maintains forums for cybersecurity professionals to interact and share information.

Leverage your social network

Places like LinkedIn and Twitter are good places to start to find news and information about what is happening in the field, who the main leaders and influencers are, and what kinds of jobs and opportunities are available.

Starting a professional network early is also a great opportunity. Often professionals and members of the industry are willing to provide guidance and help to students who are genuinely interested in the field and looking for career opportunities. 

Cybersecurity competitions 

Cybersecurity competitions are a great way to get hands-on experience working on real cybersecurity problems and issues. As a PhD student or prospective student, cybersecurity competitions that are sponsored by industry groups are a great way to meet other cybersecurity professionals while getting working on projects that will help flesh out a resume or become talking points in later job interviews.

The US Cyber Challenge , for example, is a series of competitions and hackathon-style events hosted by the Department of Homeland Security Science and Technology Directorate and the Center for Internet Security to prepare the next generation of cybersecurity professionals.

Internships

Internships also continue to be a tried and true way to gain professional experience. Internships in technical fields like cybersecurity can also pay well. Like the industry itself, cybersecurity internships are available across a wide range of industries and can range from academic research-oriented to more corporate kinds of work. 

Things to consider when choosing a cybersecurity PhD program

There are many considerations to evaluate when considering any kind of graduate degree, but proper planning is essential to be able to obtain a doctoral degree. It’s also important to note that these are just guidelines and that each graduate program will have specific requirements, so be sure to double-check.

What you will need before applying to a cybersecurity PhD program:

  • All undergraduate and graduate transcripts
  • A statement of intent, which is like a cover letter outlining interest
  • Letters of reference
  • Application fee
  • Online application
  • A resume or CV outlining professional and academic accomplishments

What does a cybersecurity PhD program cost?

Obtaining a PhD is a massive investment, both in terms of time and money. Cybersecurity PhD students are weighing the cost of becoming an expert in the field with the payoff of having interesting and potentially lucrative career opportunities on the other side.

Degree requirements are usually satisfied in 60-75 hours, so the cost of a doctoral degree can be well into the six-figure range. Here’s a more specific breakdown:

Tuition rates

The Cybersecurity Guide research team looked at 26 programs that offer a cybersecurity-related PhD degree. Here’s a breakdown of tuition rates (all figures are based on out-of-state tuition).

$17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology.

$86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.

$197,820 is the most expensive cybersecurity PhD program and is available at Indiana University Bloomington.

The good news is that by the time students get to the PhD level there are a lot of funding options — including some graduate programs that are completely funded by the university or academic departments themselves.

Additionally, funding in the form of research grants and other kinds of scholarships is available for students interested in pursuing cybersecurity studies. 

One example is the CyberCorps: Scholarships for Service program. Administered by the National Science Foundation, PhD students studying cybersecurity are eligible for a $34,000 a year scholarship, along with a professional stipend of $6,000 to attend conferences in exchange for agreeing to work for a government agency in the cybersecurity space after the PhD program. 

Frequently asked questions about cybersecurity PhD programs

Most traditional and online cybersecurity graduate programs require a minimum number of credits that need to be completed to obtain a degree. On average, it takes 71 credits to graduate with a PhD in cybersecurity — far longer (almost double) than traditional master’s degree programs. In addition to coursework, most PhD students also have research and teaching responsibilities that can be simultaneously demanding and great career preparation.

At the core of a cybersecurity doctoral program is a data science doctoral program, you’ll be expected to learn many skills and also how to apply them across domains and disciplines. Core curriculums will vary from program to program, but almost all will have a core foundation of statistics.  

All PhD candidates will have to take a series of exams that act as checkpoints during the lengthy PhD process. The actual exam process and timing can vary depending on the university and the program, but the basic idea is that cybersecurity PhD candidates generally have to sit for a qualifying exam, which comes earlier in the program (usually the winter or spring of the second year of study), a preliminary exam, which a candidate takes to show they are ready to start the dissertation or research portion of the PhD program, and a final exam where PhD students present and defend their research and complete their degree requirements. 

A cybersecurity PhD dissertation is the capstone of a doctoral program. The dissertation is the name of a formal paper that presents the findings of original research that the PhD candidate conducted during the program under the guidance of faculty advisors. Some example cybersecurity research topics that could potentially be turned into dissertation ideas include: * Policies and best practices around passwords * Ways to defend against the rise of bots * Policies around encryption and privacy * Corporate responsibility for employee security * Internet advertising targeting and privacy * The new frontier of social engineering attacks * Operation security (OpSec) strategy and policy * Network infrastructure and defense * Cybersecurity law and policy * The vulnerabilities of biometrics * The role of ethical hacking * Cybersecurity forensics and enforcement

A complete listing of cybersecurity PhD programs

The following is a list of cybersecurity PhD programs. The listing is intended to work as a high-level index that provides enough basic information to make quick side-by-side comparisons easy. 

You should find basic data about what each school requires (such as a GRE score or prior academic work) as well as the number of credits required, estimated costs, and a link to the program.

Arizona State University

  • Aim: Equip students with in-depth expertise in cybersecurity.
  • Study Modules: Delve into advanced computer science subjects and specific cybersecurity courses.
  • Research Component: Students undertake groundbreaking research in the cybersecurity domain.

Carnegie Mellon University

  • CNBC Collaboration: A joint effort between Carnegie Mellon and the University of Pittsburgh to train students in understanding the brain's role in cognition.
  • Training Program: Students take four main neuroscience courses and participate in seminars and ethics training.
  • Course Integration: Whether students have a B.S. or M.S. degree, they can combine the CNBC and ECE Ph.D. courses without extra workload.

Colorado School of Mines

  • Research Focus: Cybersecurity: Studying online security and privacy.
  • Cost and Financial Aid: Provides details on program costs and available financial support.
  • Current Mines Community: Offers specific information for those already affiliated with Mines.

Indiana University Bloomington

  • Focus Areas: Options include Animal Informatics, Bioinformatics, Computer Design, and more.
  • Information Sessions: The university holds events to guide potential students about admissions and study options.
  • Minor Requirement: All Ph.D. students must complete a minor, which can be from within the Luddy School of Informatics or from another approved school at IU Bloomington.

Iowa State University

  • Details: The program is open to both domestic and international students.
  • Time to Complete: Ph.D.: About 5.2 years
  • Goals: Students should gain deep knowledge, follow ethics, share their findings, and do advanced research if they're writing a thesis.
  • Learning Goals: Master core areas of Computer Science, achieve in-depth knowledge in a chosen subfield, obtain expertise to perform original research, and demonstrate the ability to communicate technical concepts and research results.
  • Duration: Median time to earn the doctorate is 5.8 years.
  • Application Information: The program is open to both domestic and international students.
  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.
  • Emphasis on Research: The college showcases its strength in research through sections dedicated to Research Areas, affiliated Institutes & Centers, ongoing Research Projects, and specialized Labs & Groups.
  • Holistic Student Growth: The college promotes a comprehensive student experience, spotlighting Clubs & Organizations, campus Facilities, and tech Systems.
  • Guidance for Future Students: Provides tailored insights for students considering joining at various academic levels, from Undergraduate to PhD.
  • Broad Learning: The program covers many areas, from software and policy to psychology and ethics, reflecting the wide scope of cybersecurity.
  • Course Design: Students learn foundational security topics first and then dive into specialized areas, like cyber forensics.
  • Successful Alumni: Past students now work in places like NASA, Amazon, and Google.
  • Feature: Students can apply to up to three different campuses and/or majors using a single application and fee payment.
  • Preparing for a Globalized World: Courses such as Global Supply Chain Management equip students for international careers.
  • Tech-Forward Curriculum: Purdue's commitment to advanced technology is evident.

Rochester Institute of Technology

  • Cyberinfrastructure Focus: The program dives deep into how hardware, data, and networks work together to create secure and efficient digital tools.
  • Broad Applications: The program uses computing to solve problems in fields like science, arts, and business.
  • Success Rate: All RIT graduates from this program have found relevant roles, especially in the Internet and Software sectors.

Sam Houston State University

  • Program's Objective: The course aims to nurture students to be technically adept and also to take on leadership roles in the digital and cyber forensic domain across various industries.
  • Assessments: Students undergo comprehensive tests to evaluate their understanding.
  • Research Paper (Dissertation): Once students reach the doctoral candidacy phase, they must produce and defend a significant research paper or dissertation.
  • Funding: All Ph.D. students get financial help, so they can start their research right away.
  • Teachers: The program has top experts, including those who've made big discoveries in computer science.
  • Research Areas: Students can study the latest topics like AI, computer vision, and online security.

The University of Tennessee

  • Study Areas: Options include Cybersecurity, Data Analytics, Computer Vision, and more.
  • Tests: You'll have to pass a few exams, including one when you start, one before your final project, and then present your final project.
  • Courses: Some specific courses are needed, and your main professor will help decide which ones.
  • Big Exam: Before moving forward, you'll take a detailed exam about your research topic.
  • Final Step: You'll present and defend your research project to experts.
  • Overview: This program is for those with a degree in Computer Science or similar fields. It has special focus areas like Cybersecurity and Machine Learning.

University of Arizona

  • Study Plan: Students start with learning research basics and then dive into modern tech topics.
  • Support for Students: All PhD students get funding that covers their studies, a stipend, and health insurance. Money for travel to conferences is also available.
  • After Graduation: Alumni work at top universities and big companies like Google and Microsoft.

University of California-Davis

  • About the Program: Students engage in deep research, ending with a dissertation.
  • Jobs After Graduation: Roles in companies or academic positions.
  • Vibrant Community: Beyond academics, students join a supportive community, enriching their Ph.D. experience.

University of Colorado - Colorado Springs

  • Recognition: UCCS is recognized by the National Security Agency (NSA) and the Department of Homeland Security for excellence in Information Assurance Education.
  • Course Approval: The NSA has approved UCCS's courses as meeting national security training standards.
  • Overview: This program focuses on vital areas like cyber security, physical security, and homeland security.

University of Idaho

  • Partnership with NSA and DHS: The university is part of a program to boost cyber defense education.
  • Recognition: The University of Idaho is among the institutions recognized as Centers of Academic Excellence in Cyber Defense.
  • Objective: To minimize vulnerabilities in the national information infrastructure.
  • Overview: This program is meticulously crafted to deliver premier legal education to its students.
  • Courses: Encompasses a balanced mix of traditional legal doctrines, theoretical viewpoints, and hands-on practical experiences.
  • Aim: The primary objective is to equip students with top-notch legal education.

University of Missouri-Columbia

  • Seminars: PhD students should attend 20 seminars. If they were previously Master's students, their past attendance counts.
  • Timeline Requirements: Comprehensive Exam must be completed within five years of starting the program.
  • Dissertation and Publication: At least one journal paper must be submitted, accepted, or published.

University of North Carolina at Charlotte

  • Faculty: The faculty members are renowned for their impactful research contributions on a global scale.
  • Curriculum: The curriculum is versatile, catering to individuals aiming for academia as well as those targeting roles in the corporate, commerce, or public sectors.
  • Program: A blend of theoretical and hands-on research is emphasized, offering a well-rounded educational experience.

Virginia Tech

  • Seminars and Ethics: Students attend special seminars and complete training on scholarly ethics and diversity.
  • Guidance: Each student gets a faculty advisor. A group of faculty members, called a committee, also guides them.
  • Major Exams: Students go through four main stages: a qualifying process, a preliminary proposal, a research presentation, and a final defense.
  • Strong Research: WPI's PhD program is recognized for its excellent research contributions.
  • Practical Focus: The program teaches students to tackle real tech challenges.
  • Modern Labs: Students use the latest labs like the Human-Robot Interaction Lab.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

New Jersey City University, College of Professional Studies

  • About: Focuses on best practices in areas like national security, cyber defense, and crisis communication.
  • Recognitions: The program has been honored by the National Security Agency since 2009 and was recognized for excellence in intelligence studies.
  • Jobs: Graduates are prepared for top roles in sectors like government and education.
  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.
  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

New York University Tandon School of Engineering

  • Scholarships: Many students get scholarships that pay for tuition and give a monthly allowance.
  • Research Interest: Research areas include cybersecurity, computer games, web search, graphics, and more.
  • Experience: Students can also research in NYU's campuses in Shanghai or Abu Dhabi.
  • One Degree for All: Every student gets the same Ph.D., regardless of their specific area of study.
  • Research Focus: The program emphasizes deep research and prepares students for advanced roles.
  • Major Project: Students work on a big research project, adding new knowledge to the computing world.
  • Program: Prepares students for leadership roles in different sectors.
  • Opportunities: Qualified students might get opportunities as Research or Teaching Assistants.
  • Overview: Focuses on advanced research and modern technologies.

Augusta University

  • Goal: The program prepares students for research roles and to make new discoveries in tech.
  • Benefits: A Ph.D. opens up leadership opportunities in tech sectors.
  • Overview: It focuses on new discoveries in areas like security, artificial intelligence, and virtual reality.

University of Texas at San Antonio

  • Financial Support: Full-time students can get funding, which covers tuition and offers roles like teaching assistants.
  • Job Prospects: UTSA trains students for jobs that are in high demand, using data from official sources.
  • Overview: The program focuses on in-depth research and teaching.

University of Central Florida

  • Mix of Subjects: Students can take courses from different areas, giving them a broad view of security topics.
  • Many Job Options: Graduates can work in government, big companies, or teach in universities.
  • Hands-on Learning: The program offers research, study projects, and internships for real-world experience.
  • Request Information
  • Find Faculty & Staff
  • Info For Toggle Info Return to Menu Menu
  • Search Open Search Close Search
  • Message from the Chair
  • Department Directory
  • Undergraduate Studies
  • Graduate Studies
  • Co-op & Experiential Learning
  • Research Areas
  • Research Centers and Institutes
  • Faculty and Staff Directory
  • Part-Time Faculty
  • Annual Reports
  • Honors & Distinctions
  • Faculty Hiring
  • Student Groups
  • ECE Diversity, Equity and Inclusion
  • Industrial Advisory Board
  • Resources for Current Students
  • In the Media
  • ECE Student Stories

student touching computer screen

PhD in Cybersecurity

A research-based, interdisciplinary Doctor of Philosophy (PhD) in  Cybersecurity  combines a strong security technical foundation with a security policy and social sciences perspective.   It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.   The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Innovative Curriculum - Cybersecurity PhD

Students who choose the PhD in  Cybersecurity  program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society.   The PhD program is a natural path for students in the  Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers.   Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science
  • A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a   National Center of Academic Excellence   in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations
  • The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern’s  Khoury College of Computer Sciences , the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities
  • The   Institute of Information Assurance (IIA) , an interdisciplinary research center overseen by both the  Khoury  College of Computer  Sciences  and the department of Electrical and Computer Engineering in the College of Engineering and the recipient of a National Science Foundation grant to train the country’s next generation of cybercorps
  • The   International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues
  • The   ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives
  • Learn more.

Experiential Learning

Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .

two women working at computer

Academic Advising

The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.

  • Graduate Student Services

Admissions & Aid

Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.

  • Degree Requirements
  • Degree Requirements - Advanced Entry
  • Tuition & Financial Aid
  • Admissions Information

The Gradcafe

  • Majors & Careers
  • Online Grad School
  • Preparing For Grad School
  • Student Life

Top 10 Best Programs for a PhD in Cyber Security

Lisa Marlin

Technology is becoming more and more integrated with our daily lives — with it comes threats from hackers that make your information vulnerable. Indeed, cybersecurity threats  are expected to grow even more in the next few years, making cybersecurity professionals sought-after in the hiring market. Already have an extensive computer science  background? Why not take it to the next level with a PhD in cyber security?

A doctorate degree in cyber security gives you a valuable qualification and in-depth knowledge of cybersecurity challenges. Not only will you be equipped to help organizations protect their crucial information, but you’ll also be qualified to develop strategies for better data security and even teach the subject in university.

Ready to unlock unlimited career potential in the cybersecurity space? Let’s jump into our top programs for cybersecurity PhD programs, including common requirements and costs and future career potential.

Table of Contents

Best Programs for a PhD in Cyber Security

Arizona state university, ira a. fulton schools of engineering.

Ph.D. Computer Science (Cybersecurity)

Arizona State University logo

Arizona State University is certified as a National Center of Academic Excellence for Information Assurance Research and Education (CAEIAE). Its doctorate of cyber security program helps students master key theories and algorithms to apply to a modern computer science realm.

  • Courses:  Data and information systems , information assurance and security, applied Cryptography, and advanced computer network security.
  • Credits:  84
  • Delivery: On-campus
  • Tuition :  $11,720 per year
  • Financial aid:  Scholarships, grants, and loans.
  • Acceptance rate: 88.4%
  • Location:  Phoenix, Arizona

Capitol Technology University

Doctorate (DSc) in Cybersecurity

Capitol University logo

Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense. The school’s doctorate in cybersecurity program is a low-residency online program and was the first of its kind  in the USA.

  • Courses : Situation awareness analysis & action plan processes, information assurance strategic management, information assurance implementation
  • Credits : 54-66
  • Duration : 3 years (8 semesters)
  • Delivery : Online (low residency)
  • Tuition : $933 per credit
  • Financial aid: Loans, Grants, scholarships, work-study
  • Acceptance rate:  84.4%
  • Location : Laurel, MD

Northcentral University, School of Technology

Doctor of Philosophy in Cybersecurity (PhD-CY)

Northcentral University logo

Northcentral University is a regionally accredited university that offers many educational programs for students all over the world with one-on-one mentorship. Its PhD cybersecurity degree has a special emphasis on global security issues and covers international laws and multicultural elements.

  • Courses : Global cybersecurity demand, securing globally distributed infrastructure & support, and governance, audit, compliance & risk
  • Credits : 60
  • Duration : 40-44 months
  • Delivery : Online
  • Tuition : $1,094 per credit
  • Financial aid : Grants, loans, veteran benefits, and third-party scholarships.
  • Acceptance rate : 93%
  • Location : San Diego, CA & Scottsdale, Arizona

University of Colorado – Colorado Springs, College of Engineering and Applied Science

Ph.D. in Security

University of Colorado Springs logo

University of Colorado, Colorado Springs has partnerships with several defense departments, semiconductor manufacturers, and other prominent institutions, thanks to its strategic location. Though students must conduct the majority of the coursework for this doctorate degree in cyber security on-campus, a provision permits some online courses.

  • Courses : System administration & security, applied cryptography, and advanced system security design.
  • Delivery : On-campus
  • Tuition : $918.83 per credit
  • Financial aid : Scholarships, student employment, and loans.
  • Acceptance rate:  89.6%
  • Location : Colorado Springs, Colorado

Northeastern University

Cybersecurity, Ph.D.

Northeastern University logo

Northeastern University promotes a co-operative education philosophy with a blend of classroom learning and professional experience. This cybersecurity PhD program offers the opportunity to conduct research in specialized facilities and labs, including the Cybersecurity & Privacy Institute and International Secure Systems Lab.

  • Courses : Software vulnerabilities & security, computer hardware security, and machine learning in cybersecurity & privacy.
  • Credits : 48
  • Tuition : $1,532 per credit hour
  • Financial aid:  Scholarships, fellowships, assistantships, and company sponsorships.
  • Acceptance rate : 20.5%
  • Location : Boston, Massachusetts

Dakota State University

Cybersecurity, DSc

Dakota State University logo

Dakota State University is known for its specialization in computer education-related programs. Its doctorate in cyber security is delivered through a combination of various distance education methods and a handful of on-campus seminars. You can apply for the program even if you don’t have a master’s degree, but you’ll need to complete an additional 27 credits.

  • Courses : Full scope security testing, cyber security research, and security software engineering.
  • Credits : 61
  • Duration : 3 years
  • Delivery : Online (plus on-campus seminars)
  • Tuition : $210.80 per credit hour
  • Financial aid:  Grants, work-study, and loans.
  • Acceptance rate: 83%
  • Location:  Madison, SD

Purdue University, The Center for Education and Research in Information Assurance and Security (CERIAS)

Interdisciplinary Ph.D. Program in Information Security

Purdue University logo

Purdue University was ranked in the top 10  most innovative universities in 2022 by the US News & World Report. This interdisciplinary cybersecurity PhD program covers ethical, political, and philosophical courses, to provide insight into technology policy issues and information ethics.

  • Courses include:  Information security, advanced network security, and modern ethical theories.
  • Credits: 60
  • Delivery:  On-campus
  • Tuition:  Refer tuition calculator
  • Financial aid:  Fellowships, teaching assistantships, and research assistantships.
  • Acceptance rate: 67.2%
  • Location:  West Lafayette, IN

Nova Southeastern University, College of Computing and Engineering

Ph.D. in Cybersecurity Management

Nova Southeastern University

NSU is considered one of the National Centers of Academic Excellence (NCAE) in cybersecurity. To qualify for this school’s PhD program in cybersecurity, you’ll need to have either a bachelor’s or master’s degree in the field. The school also offers a direct BS to PhD pathway.

  • Courses : Fundamentals of cybersecurity, information security governance, and human-computer interaction.
  • Credits : 51 minimum
  • Delivery : Hybrid
  • Tuition : $1,282 per credit hour
  • Financial aid:  Fellowships, scholarships
  • Acceptance rate:  76.2%
  • Location : Fort Lauderdale, Florida

St Thomas University

Doctor of Business Administration in Cyber Security Management

St, Thomas University logo

St. Thomas University is a non-profit Catholic university that emphasizes global and cultural diversity. Its doctorate of cybersecurity program lets you choose one of three research options: traditional dissertation, action research, and article dissertation.

  • Courses : Cyberlaw, policy & security, cyber security risk management, and information ethics.
  • Duration : 1.5 years plus dissertation
  • Delivery : On-campus, online, and hybrid options
  • Tuition : $1,029 per credit hour
  • Financial aid:  Scholarships, grants, loans, and work-study.
  • Acceptance rate: 59.6%
  • Location : Miami Gardens, FL

George Mason University, Volgenau School of Engineering

Information Technology Ph.D. (Information Security and Assurance (ISA) Concentration)

George Mason University logo

George Mason University is a public research university with an emphasis on sustainability that was ranked the most diverse university  in Virginia by the US News & World Report 2018. Its PhD program in Information Technology offers a concentration in Information Security Assurance (ISA) covering cybersecurity subjects.

  • Courses : Secure software development, security protocol analysis, and security experimentation.
  • Credits : 72 minimum
  • Tuition : $663 per credit
  • Financial aid : Grants, work-study, and loans.
  • Acceptance rate:  89.2%
  • Location : Fairfax, Virginia

What are the Prerequisites for a PhD in Cybersecurity?

Most PhD programs in cybersecurity require a master’s in computer science or a related field. Other specific requirements vary depending on the program, but you’ll typically need to submit the following in your application:

  • Personal Statement  and/or research proposal
  • Academic resume
  • Letters of recommendation

Check individual requirements for each school you’re considering well in advance of the application cut-off date. These programs can be competitive, so give yourself plenty of time to put together the strongest application you can!

Preparing for a Cybersecurity Doctorate Program

The best cybersecurity doctorate programs can be intensive and competitive. Therefore, it’s a good idea to prepare before the program even starts – this can give you the edge you need to excel in the program!

Of course, your previous studies provide the foundation for your doctorate. An internship in the field can also help you to build useful skills and knowledge, especially when it comes to the latest trends  Likewise, participating in cybersecurity competitions or getting a cybersecurity certification can be highly advantageous.

However, the best thing you can do to prepare for a cybersecurity doctoral program is to build your network  in the sector. Join professional organizations and mingle with industry folks to gain insights into the field. You can also use social media platforms like LinkedIn and Twitter to enhance your networks.

Related Reading:  Best Master’s in Cybersecurity Programs

Why Get a Doctorate in Cybersecurity?

A doctorate in cybersecurity allows you to develop high-level skills and knowledge on preventing and analyzing security breaches, as well as formulating strategies to manage them. It is a valuable qualification that will qualify you for top jobs at some of the best organizations, with attractive remuneration.

When choosing the best cybersecurity PhD program for you, consider the school’s reputation and its accreditation. Also, look at the courses offered, as cybersecurity involves various specializations. You should also consider your budget in the context of each program’s tuition, fees, and financial aid offered.

Finally, where is the program located? Is it offered on-campus, offline, or in a hybrid program? These factors will affect your ability to balance your study with work and personal commitments.

Jobs and Salary Prospects for Doctors of Cybersecurity

Some of the common roles and median annual salaries  for graduates with a PhD in cybersecurity include:

  • Cybersecurity Engineer – $125,816
  • Information Security Manager – $96,406
  • Chief Information Security Officer (CISO) –  $124,405
  • Security Architect –  $111,433
  • Security Director  – $105,907

Key Takeaways

You may not find as many options for a PhD in cyber security as other fields. After all, it’s a specialized program. However, you’ll find a few solid top cybersecurity PhD programs that give you the opportunity to learn from top research institutions and faculty.

If you’ve found this round-up of the best PhDs in cybersecurity helpful, take a look at our guides to the best online Master’s in Computer Science  and online PhD Computer Science programs .

PhDs in Cybersecurity FAQs

What is the average cost of a phd in cybersecurity.

Costs vary depending on the school, program length, and delivery (on-campus or online). Usually, a PhD in cybersecurity can be anywhere between $30,000 to $100,000.

Is a PhD in Cybersecurity Worth it?

A PhD in cybersecurity is valuable because it will qualify you for some of the most in-demand and well-paid jobs available today. According to the BLS , jobs for information security professionals are estimated to grow by 33% over the next decade, significantly more than the national average.

Can You Get a PhD in Cybersecurity?

A PhD in cybersecurity is a specialized degree, but today, many universities offer it. Several programs are delivered on-campus, online, or in hybrid formats.

How Long is a PhD in Cybersecurity?

A PhD in cybersecurity can take from 3-7 years to complete. This will depend on the program, as well as individual factors such as whether you choose to study part-time or full-time.

What Can You Do with a PhD in Cybersecurity?

A PhD in cybersecurity will equip you to work for leading organizations as a CISO (Chief Information Security Officer), information security manager, or security architect. You’ll also be qualified to conduct research or work as a professor in cybersecurity or a related field.

How Many Credits are Required for a PhD in Cybersecurity?

You’ll typically need 60 credits to complete a cybersecurity PhD. However, this varies depending on the specific program or university.

What Kinds of Exams are Required During a PhD Program?

Unlike most undergraduate programs, a PhD degree relies heavily on coursework and, in particular, a main dissertation or thesis. However, you’ll still have to complete some exams.

Usually, there are three kinds of exams:

  • A qualifying exam  that occurs earlier in the program.
  • A preliminary exam  that proves the candidate’s readiness to start the dissertation/research.
  • The  final exam  for the candidate to defend their dissertation/research work.

How Do You Choose a PhD in Cyber Security Program?

You should consider faculty experience, networking opportunities, available funding, accreditation, and alumni statistics before choosing a PhD in cyber security program.

Lisa Marlin

Lisa Marlin

Lisa is a full-time writer specializing in career advice, further education, and personal development. She works from all over the world, and when not writing you'll find her hiking, practicing yoga, or enjoying a glass of Malbec.

  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 12 Best Laptops for Computer Science Students
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ ACBSP Vs AACSB: Which Business Program Accreditations is Better?
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ BA vs BS: What You Need to Know [2024 Guide]
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ The 19 Best MBA Scholarships to Apply for [2024-2025]

Best Master’s in Cybersecurity Programs in 2024

Thegradcafe and jobbio join forces to connect top talent with great companies, related posts.

Grad school application rates have more than doubled for artificial intelligence programs.

  • Grad Trends: Interest in Artificial Intelligence Surges

Here's how to earn consideration from the big tech players as a new grad.

  • Applying to Big Tech This Year? Here’s How to Ace It.

Fewer employers list education requirements in job postings.

73% of job seekers believe a degree is needed for a well-paying role–but is it?

There are more jobs than talent in these cities.

Tech Talent Crunch: Cities with More Jobs Than Workers

The Most Under-Rated Career Advancement Tip for 2024

The Most Under-Rated Career Advancement Tip for 2024

Top 5 Best Psychology PhD Programs in 2024

Top 5 Best Psychology PhD Programs in 2024

TheGradCafe and Jobbio join forces to connect top talent with great companies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Recent Posts

  • Breaking Records: Yale Sees Most Selective Grad Admissions Season Yet
  • 12 Best Laptops for Computer Science Students
  • Is a Master’s Degree Worth It? [2024 Guide]

The Gradcafe

© 2023 TheGradCafe.com All rights reserved

  • Partner With Us
  • Results Search
  • Submit Your Results
  • Write For Us

Northeastern University

Academic Catalog 2023-2024

Cybersecurity, phd.

A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Students who choose the PhD in Cybersecurity program have a strong desire to pursue academic research solving critical cybersecurity challenges facing today’s society. The PhD program is a natural path for students in the college’s  Master of Science in Cybersecurity  program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers. Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to  gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science

A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a National Center of Academic Excellence in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations

The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern University’s Khoury College of Computer Sciences, the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities

Access to research projects at Northeastern’s research centers focused on security:

The Cybersecurity and Privacy Institute :  The mission of Northeastern's Cybersecurity and Privacy Institute is to safeguard critical technology. Forging partnerships with experts in industry, government, and academia worldwide, the Institute’s faculty and students develop, protect, and enhance technologies on which the world relies—from mobile devices and “smart” IoT applications to tomorrow’s self-driving cars and delivery drones. Their expertise spans algorithm auditing; cloud security; cryptography; differential privacy; embedded device security; internet-scale security measurements; machine learning; big data; security, malware, and advanced threats; network protocols and security; web and mobile security; and wireless network security.

The International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware, and vulnerability analysis; intrusion detection; and other computer security issues.

The ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives.

The benefits of the Boston area:

  • World-renowned for academic and research excellence, the Boston area is also home to some of the nation’s largest Department of Defense contractors and government and independent labs such as MIT Lincoln Lab, MITRE, and Draper Lab.

Degree Requirements

The PhD in Cybersecurity degree requires completion of at least 48 semester credit hours beyond a bachelor’s degree. Students who enter with an undergraduate degree will typically need four to five years to complete the program, and they will be awarded a master’s degree en route to the PhD.

Doctoral Degree Candidacy

A student is considered a PhD degree candidate after  completing the core courses with at least a 3.500 GPA, with no grades lower than a B in the core courses, and either publishing a paper in a strong conference or journal or passing an oral exam that is conducted by a committee of three cybersecurity faculty members and based on paper(s) written by the student.

One year of continuous full-time study is required after admission to the PhD candidacy. During this period, the student will be expected to make substantial progress in preparing for the comprehensive examination.

Teaching Requirement

All cybersecurity PhD students must satisfy the teaching requirement in order to graduate. This requirement is fulfilled when the student works as a teaching assistant or instructor of record for one semester and during this semester:

  • Teaches at least three hours of classes
  • Prepares at least one assignment or quiz or equivalent

PhD students are expected to satisfy the teaching requirement some time after completing their first year and at least one semester prior to scheduling their PhD defense. 

Dissertation Advising

The doctoral dissertation advising team for each student consists of two cybersecurity faculty members, one in a technical area. When appropriate, the second faculty advisor will be from the policy/social science area.

Dissertation Committee

With the help of the advisor, a student selects the committee, consisting of at least four members, to be approved by the PhD cybersecurity curriculum committee. The four members must include the advisor, two internal members, and an external member.

Comprehensive Examination

A PhD student must submit a written dissertation proposal and present it to the dissertation committee. The proposal should identify the research problem, the research plan, and the potential impact of the research on the field. The presentation of the proposal will be made in an open forum, and the student must successfully defend it before the dissertation committee after the public presentation.

Dissertation Defense

A PhD student must complete and defend a dissertation that involves original research in cybersecurity.

Awarding of Master’s Degrees

Students who enter the PhD in Cybersecurity program with a bachelor’s degree have the option of obtaining a master's degree from one of the departments participating in the program. To do so, they must meet all of the department’s degree requirements.

Bachelor’s Degree Entrance

Complete all courses and requirements listed below unless otherwise indicated.

Teaching Qualifying exam and area exam Annual review Dissertation proposal Dissertation committee Dissertation defense

Core Requirements

A grade of B or higher is required in each core course. A cumulative 3.500 grade-point average is required for the core requirement.

Electives and Tracks

Dissertation, program credit/gpa requirements.

48 total semester hours required Minimum 3.000 GPA required

Incoming PhD in cybersecurity students who have already completed a Master of Science in an adjacent field may petition to the graduate program administration for advanced entry. Advanced entry petitions are reviewed by the program administration on a case-by-case basis. Please note that advanced entry does not waive by itself any part of the PhD coursework requirements. As a degree conferral requirement, a minimum of 16 semester hours of coursework beyond the 32 semester hours of the master’s degree is required of advanced entry PhD students (48 semester hours is required of standard entry PhD students). A grade of B or higher is required in each course. A cumulative 3.500 GPA is required for the core requirement.

Refer to the PhD Cybersecurity overview for admission to candidacy requirements.

Refer to the PhD Cybersecurity  overview  for residency requirements.

Refer to the PhD Cybersecurity  overview for teaching requirements.

Refer to the PhD Cybersecurity  overview for dissertation advising requirements.

Refer to the PhD Cybersecurity  overview for dissertation committee requirements.

Refer to the PhD Cybersecurity  overview  for comprehensive examination requirements.

Refer to the PhD Cybersecurity  overview  for dissertation defense and completion requirements.

Core Requirement

Students  are  required to  take all  core courses  unless otherwise  determined by  the program.  Students must maintain a minimum GPA of 3.500 as well as earn a grade of B or better in each core course.

Students  are  required to  take all  courses  unless otherwise  determined by  the program.

Minimum 16 semester hours required Minimum 3.000 GPA required

Print Options

Send Page to Printer

Print this page.

Download Page (PDF)

The PDF will include all information unique to this page.

2023-24 Undergraduate Day PDF

2023-24 CPS Undergraduate PDF

2023-24 Graduate/Law PDF

2023-24 Course Descriptions PDF

phd topics for cyber security

  • Doing a PhD in Cyber Security

What Does a PhD in Cyber Security Focus On?

A PhD in Cyber Security equips students with expert knowledge in computing, cybercrime and digital technology policy. A PhD involves original research into a specific field of cybersecurity and can allow cyber security graduate students to work with emerging technologies and tools to tackle issues society faces as technology rapidly advances.

According to the UK National Cyber Security Strategy 2016-2021 , there will be an estimated shortage of 350,000 cybersecurity professionals by 2022. There is therefore a high demand for cyber security graduates and doctorates. A PhD in Cyber Security could lead to a career in an emerging industry.

A list of Cybersecurity topics at doctorate level is provided below:

  • Cryptography
  • Artificial Intelligence and Robotics
  • Systems Security and Testing
  • Cryptocurrency and Blockchains
  • Privacy, Confidentiality and Ethics
  • Software Security
  • Digital Forensics
  • Security Risk Management
  • Network Security
  • Digital Technology Policy
  • Quantum Computing

Minimum Entry Requirements for A PhD in Cyber Security

UK Doctoral Cyber Security programmes usually require graduate students to possess, or expect to achieve, as a minimum a 2:1 upper second class bachelor’s degree in computer science, or related subject such as Mathematics. It should be noted that due to the interdisciplinary challenges in cyber security, related subjects can vary depending on the focus of research and may include areas such as Electrical Engineering , Civil Engineering, Social Sciences, Psychology and Law. A lower second class (2:2) bachelor’s degree may be accepted if the graduate student has a master’s degree or graduate cyber security work experience. Applicants with international equivalent qualifications are also considered.

Another requirement for research projects is proof of English Language ability. Universities will expect international students to provide English Level Qualifications, for example IELTS, TOEFL (iBT) or Pearson PTE scores.

Browse PhDs in Cyber Security

Application of artificial intelligence to multiphysics problems in materials design, from text to tech: shaping the future of physics-based simulations with ai-driven generative models, study of the human-vehicle interactions by a high-end dynamic driving simulator, coventry university postgraduate research studentships, discovery of solid state electrolytes using deep learning, how long does it take to get a phd in cyber security.

In the UK, a full time cybersecurity research project lasts around 3 to 4 years. The first year is usually probationary and will be used to develop a thesis proposal that outlines your research degree. The remaining time will be used to carry out your research, produce and submit your thesis and undertake the Viva . Part-time cybersecurity projects may take 6 to 7 years to complete. A full-time cyber security MPhil usually lasts for 1 to 2 years.

In addition to developing your thesis proposal, the first year is also used to allow your supervisor to identify additional cybersecurity training that would assist in your research project. This may come in the form of online PhD cybersecurity training modules, online doctorate lectures, or placement opportunities to give you an insight into the cyber security industry and real world applications in your chosen field.

Costs and Funding

A UK doctoral student can expect to pay around £5,500 per year in tuition fees for a 2021/22 PhD programme in Cyber Security. Typical tuition fees for EU and overseas students are around £25,000 per academic year. Part-time tuition fees are normally proportioned according to the research programme length.

Most institutions have Centres for Doctoral Training in Cyber Security, which offer a number of Engineering and Physical Sciences Research Council (EPSRC) studentships to eligible applicants. These studentships and grants cover tuition fees, and can provide a maintenance stipend and research travel expenses.

You may also be eligible for a Postgraduate Doctoral Loan which helps with course fees and living costs associated with a cyber-security research project.

PhD in Cyber Security Salary and Career Paths

As companies become more reliant on technology, the risk of cyber-attacks and other compromises in security becomes more pressing. In fact, according to The Annual Crime Survey in 2017 , two thirds of UK businesses were hit by cyber-attacks. Because of this, and the recognised shortage of cybersecurity professionals and graduates/doctorates, companies, both public and private, are investing large amounts of money into developing their cyber security. These companies look to a PhD student with a cyber security degree as someone who can help develop this. A PhD in Cyber Security reflects the demand for security specialists.

Typical employers for cybersecurity doctorates include Intel, NASA, Microsoft, Google and Lloyds TSB, though the full list of employers is extensive due to the increasing reliance on technology in almost all industries, and the overlap with other disciplines such as computer science and information science. The doctoral degree also allows for international reach, as it is a highly applicable field of knowledge for any country. Many of the employers are based in the US, for example, NASA and Google. Common jobs for Cyber Security PhD students include:

  • Cyber Security Analyst – Perhaps the most logical career path for cybersecurity doctorates is to become a cyber-security analyst. Doctorates in this role are responsible for detecting, managing and preventing cyber-attacks, and developing cyber defences to protect a company’s IT infrastructure. Senior cyber security analysts in the UK can earn around £50,000. Those with managerial duties or expert knowledge can earn over £80,000. As such, the PhD in cyber security salary tends to be higher than counterparts with similar levels of experience.
  • Penetration Testing – In this role, cybersecurity PhD students carry out controlled cyber-attacks on a company’s IT infrastructure to find weak points in security. This will then be used to advise the company on how to manage cyber risk and prevent such attacks from real cyber criminals in the future. One of the advantages of penetration testing is that it lends itself to freelance work. With experience, freelance penetration testers can earn over £500 a day. Again, a cybersecurity doctoral degree is a valuable qualification to hold as it demonstrates your credibility and expertise.
  • Teaching – Some doctoral students use their cybersecurity degree to stay in Higher Education. Here they can continue their study as a researcher working in a University School or Faculty alongside other researchers, or transition into a teaching role as a professor or lecturer. As a lecturer, you can tailor your study content and also supervise a doctorate in cybersecurity in your field of interest.

Browse PhDs Now

Join thousands of students.

Join thousands of other students and stay up to date with the latest PhD programmes, funding opportunities and advice.

Grad Coach

Research Topics & Ideas: Cybersecurity

50 Topic Ideas To Kickstart Your Research

Research topics and ideas about cybersecurity

If you’re just starting out exploring cybersecurity-related topics for your dissertation, thesis or research project, you’ve come to the right place. In this post, we’ll help kickstart your research by providing a hearty list of cybersecurity-related research topics and ideas , including examples from recent studies.

PS – This is just the start…

We know it’s exciting to run through a list of research topics, but please keep in mind that this list is just a starting point . These topic ideas provided here are intentionally broad and generic , so keep in mind that you will need to develop them further. Nevertheless, they should inspire some ideas for your project.

To develop a suitable research topic, you’ll need to identify a clear and convincing research gap , and a viable plan to fill that gap. If this sounds foreign to you, check out our free research topic webinar that explores how to find and refine a high-quality research topic, from scratch. Alternatively, consider our 1-on-1 coaching service .

Research topic idea mega list

Cybersecurity-Related Research Topics

  • Developing machine learning algorithms for early detection of cybersecurity threats.
  • The use of artificial intelligence in optimizing network traffic for telecommunication companies.
  • Investigating the impact of quantum computing on existing encryption methods.
  • The application of blockchain technology in securing Internet of Things (IoT) devices.
  • Developing efficient data mining techniques for large-scale social media analytics.
  • The role of virtual reality in enhancing online education platforms.
  • Investigating the effectiveness of various algorithms in reducing energy consumption in data centers.
  • The impact of edge computing on the performance of mobile applications in remote areas.
  • The application of computer vision techniques in automated medical diagnostics.
  • Developing natural language processing tools for sentiment analysis in customer service.
  • The use of augmented reality for training in high-risk industries like oil and gas.
  • Investigating the challenges of integrating AI into legacy enterprise systems.
  • The role of IT in managing supply chain disruptions during global crises.
  • Developing adaptive cybersecurity strategies for small and medium-sized enterprises.
  • The impact of 5G technology on the development of smart city solutions.
  • The application of machine learning in personalized e-commerce recommendations.
  • Investigating the use of cloud computing in improving government service delivery.
  • The role of IT in enhancing sustainability in the manufacturing sector.
  • Developing advanced algorithms for autonomous vehicle navigation.
  • The application of biometrics in enhancing banking security systems.
  • Investigating the ethical implications of facial recognition technology.
  • The role of data analytics in optimizing healthcare delivery systems.
  • Developing IoT solutions for efficient energy management in smart homes.
  • The impact of mobile computing on the evolution of e-health services.
  • The application of IT in disaster response and management.

Research topic evaluator

Cybersecurity Research Ideas (Continued)

  • Assessing the security implications of quantum computing on modern encryption methods.
  • The role of artificial intelligence in detecting and preventing phishing attacks.
  • Blockchain technology in secure voting systems: opportunities and challenges.
  • Cybersecurity strategies for protecting smart grids from targeted attacks.
  • Developing a cyber incident response framework for small to medium-sized enterprises.
  • The effectiveness of behavioural biometrics in preventing identity theft.
  • Securing Internet of Things (IoT) devices in healthcare: risks and solutions.
  • Analysis of cyber warfare tactics and their implications on national security.
  • Exploring the ethical boundaries of offensive cybersecurity measures.
  • Machine learning algorithms for predicting and mitigating DDoS attacks.
  • Study of cryptocurrency-related cybercrimes: patterns and prevention strategies.
  • Evaluating the impact of GDPR on data breach response strategies in the EU.
  • Developing enhanced security protocols for mobile banking applications.
  • An examination of cyber espionage tactics and countermeasures.
  • The role of human error in cybersecurity breaches: a behavioural analysis.
  • Investigating the use of deep fakes in cyber fraud: detection and prevention.
  • Cloud computing security: managing risks in multi-tenant environments.
  • Next-generation firewalls: evaluating performance and security features.
  • The impact of 5G technology on cybersecurity strategies and policies.
  • Secure coding practices: reducing vulnerabilities in software development.
  • Assessing the role of cyber insurance in mitigating financial losses from cyber attacks.
  • Implementing zero trust architecture in corporate networks: challenges and benefits.
  • Ransomware attacks on critical infrastructure: case studies and defence strategies.
  • Using big data analytics for proactive cyber threat intelligence.
  • Evaluating the effectiveness of cybersecurity awareness training in organisations.

Recent Cybersecurity-Related Studies

While the ideas we’ve presented above are a decent starting point for finding a research topic, they are fairly generic and non-specific. So, it helps to look at actual studies in the cybersecurity space to see how this all comes together in practice.

Below, we’ve included a selection of recent studies to help refine your thinking. These are actual studies,  so they can provide some useful insight as to what a research topic looks like in practice.

  • Cyber Security Vulnerability Detection Using Natural Language Processing (Singh et al., 2022)
  • Security for Cloud-Native Systems with an AI-Ops Engine (Ck et al., 2022)
  • Overview of Cyber Security (Yadav, 2022)
  • Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview (Mijwil et al., 2023)
  • Cyber Security: Strategy to Security Challenges A Review (Nistane & Sharma, 2022)
  • A Review Paper on Cyber Security (K & Venkatesh, 2022)
  • The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review (Mijwil, 2023)
  • Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime (Mijwil et al., 2023)
  • ESTABLISHING CYBERSECURITY AWARENESS OF TECHNICAL SECURITY MEASURES THROUGH A SERIOUS GAME (Harding et al., 2022)
  • Efficiency Evaluation of Cyber Security Based on EBM-DEA Model (Nguyen et al., 2022)
  • An Overview of the Present and Future of User Authentication (Al Kabir & Elmedany, 2022)
  • Cybersecurity Enterprises Policies: A Comparative Study (Mishra et al., 2022)
  • The Rise of Ransomware: A Review of Attacks, Detection Techniques, and Future Challenges (Kamil et al., 2022)
  • On the scale of Cyberspace and Cybersecurity (Pathan, 2022)
  • Analysis of techniques and attacking pattern in cyber security approach (Sharma et al., 2022)
  • Impact of Artificial Intelligence on Information Security in Business (Alawadhi et al., 2022)
  • Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security (Sasikala & Sharma, 2022)
  • Optimization of Secure Coding Practices in SDLC as Part of Cybersecurity Framework (Jakimoski et al., 2022)
  • CySSS ’22: 1st International Workshop on Cybersecurity and Social Sciences (Chan-Tin & Kennison, 2022)

As you can see, these research topics are a lot more focused than the generic topic ideas we presented earlier. So, for you to develop a high-quality research topic, you’ll need to get specific and laser-focused on a specific context with specific variables of interest.  In the video below, we explore some other important things you’ll need to consider when crafting your research topic.

Get 1-On-1 Help

If you’re still unsure about how to find a quality research topic, check out our Research Topic Kickstarter service, which is the perfect starting point for developing a unique, well-justified research topic.

Research Topic Kickstarter - Need Help Finding A Research Topic?

You Might Also Like:

Topic Kickstarter: Research topics in education

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • Print Friendly
  • Visits and Open Days
  • Jobs and vacancies
  • Undergraduate
  • Postgraduate
  • Accommodation
  • Student Guide
  • Student email
  • Library and IT services
  • Staff Guide
  • Staff email
  • Timetabling

Cyber Security Research Group

Featured story.

hand behind a padlock

Suggested PhD Projects

This page lists indicative research areas/topics for prospective PhD applicants to identify supervisors and research topics for their PhD project. Potential research students are encouraged and welcome to produce their own suggestions in cyber security that broadly meet the general interests of the Group’s Core Members. If you are interested in pursuing a PhD degree under the supervision of a Core Member of our Group but need any help, please feel free to contact Professor Shujun Li , the Group Head, for advice.

From time to time, we offer funded PhD scholarships. Such scholarships are normally funded via the Institute of Cyber Security for Society (iCSS) , School of Computing , Division of Computing, Engineering and Mathematical Sciences (CEMS) , the University of Kent or external funders. Since our Group is part of iCSS, information of all such PhD scholarships can be found on the dedicated page on the iCSS website , which will not be repeated on this page. Please note that some PhD scholarships for the 2024 September start have been open for applications.

Our Group’s Core Members can supervise PhD students under two different programmes:

  • PhD Computer Science :  Budi Arief , Sanjay Bhattacherjee ,  Virginia Franqueira ,  Özgür Kafalı ,  Rogério de Lemos ,  Shujun Li ,  Jason Nurse ,  Carlos Perez-Delgado ,  Vineet Rajani ,  Frank Wang
  • PhD Electronic Engineering :  Sanaul Hoque

Indicative research areas and topics of eligible PhD supervisors of iCSS can be found on the dedicated web page of the iCSS website , and are not repeated on this page.

Interdisciplinary PhD projects are encouraged so PhD applicants are welcome to consider defining interdisciplinary topics with an interface with subjects such as Psychology, Sociology, Business, Law, and Arts. See the same dedicated page on the iCSS website for information about supervisors from other disciplines, whom can be secondary supervisors of PhD students pursuing a doctoral degree in Computer Science or Electronic Engineering.

For enquiries call:

+1-469-442-0620

banner-in1

60+ Latest Cyber Security Research Topics in 2024

Home Blog Security 60+ Latest Cyber Security Research Topics in 2024

Play icon

The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cybersecurity thesis topics helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security. 

This article aims to demonstrate the most current Cyber Security Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security topics for the project, latest research titles about cyber security.

Cyber Security Research Topics

List of Trending Cyber Security Research Topics in 2024

Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends.

A. Exciting Mobile Cyber Security Research Paper Topics

  • The significance of continuous user authentication on mobile gadgets. 
  • The efficacy of different mobile security approaches. 
  • Detecting mobile phone hacking. 
  • Assessing the threat of using portable devices to access banking services. 
  • Cybersecurity and mobile applications. 
  • The vulnerabilities in wireless mobile data exchange. 
  • The rise of mobile malware. 
  • The evolution of Android malware.
  • How to know you’ve been hacked on mobile. 
  • The impact of mobile gadgets on cybersecurity. 

B. Top Computer and Software Security Topics to Research

  • Learn algorithms for data encryption 
  • Concept of risk management security 
  • How to develop the best Internet security software 
  • What are Encrypting Viruses- How does it work? 
  • How does a Ransomware attack work? 
  • Scanning of malware on your PC 
  • Infiltrating a Mac OS X operating system 
  • What are the effects of RSA on network security ? 
  • How do encrypting viruses work?
  • DDoS attacks on IoT devices 

C. Trending Information Security Research Topics

  • Why should people avoid sharing their details on Facebook? 
  • What is the importance of unified user profiles? 
  • Discuss Cookies and Privacy  
  • White hat and black hat hackers 
  • What are the most secure methods for ensuring data integrity? 
  • Talk about the implications of Wi-Fi hacking apps on mobile phones 
  • Analyze the data breaches in 2024
  • Discuss digital piracy in 2024
  • critical cyber-attack concepts 
  • Social engineering and its importance 

D. Current Network Security Research Topics

  • Data storage centralization
  • Identify Malicious activity on a computer system. 
  • Firewall 
  • Importance of keeping updated Software  
  • wireless sensor network 
  • What are the effects of ad-hoc networks  
  • How can a company network be safe? 
  • What are Network segmentation and its applications? 
  • Discuss Data Loss Prevention systems  
  • Discuss various methods for establishing secure algorithms in a network. 
  • Talk about two-factor authentication

E. Best Data Security Research Topics

  • Importance of backup and recovery 
  • Benefits of logging for applications 
  • Understand physical data security 
  • Importance of Cloud Security 
  • In computing, the relationship between privacy and data security 
  • Talk about data leaks in mobile apps 
  • Discuss the effects of a black hole on a network system. 

F. Important Application Security Research Topics

  • Detect Malicious Activity on Google Play Apps 
  • Dangers of XSS attacks on apps 
  • Discuss SQL injection attacks. 
  • Insecure Deserialization Effect 
  • Check Security protocols 

G. Cybersecurity Law & Ethics Research Topics

  • Strict cybersecurity laws in China 
  • Importance of the Cybersecurity Information Sharing Act. 
  • USA, UK, and other countries' cybersecurity laws  
  • Discuss The Pipeline Security Act in the United States 

H. Recent Cyberbullying Topics

  • Protecting your Online Identity and Reputation 
  • Online Safety 
  • Sexual Harassment and Sexual Bullying 
  • Dealing with Bullying 
  • Stress Center for Teens 

I. Operational Security Topics

  • Identify sensitive data 
  • Identify possible threats 
  • Analyze security threats and vulnerabilities 
  • Appraise the threat level and vulnerability risk 
  • Devise a plan to mitigate the threats 

J. Cybercrime Topics for a Research Paper

  • Crime Prevention. 
  • Criminal Specialization. 
  • Drug Courts. 
  • Criminal Courts. 
  • Criminal Justice Ethics. 
  • Capital Punishment.
  • Community Corrections. 
  • Criminal Law. 

Cyber Security Future Research Topics

  • Developing more effective methods for detecting and responding to cyber attacks
  • Investigating the role of social media in cyber security
  • Examining the impact of cloud computing on cyber security
  • Investigating the security implications of the Internet of Things
  • Studying the effectiveness of current cyber security measures
  • Identifying new cyber security threats and vulnerabilities
  • Developing more effective cyber security policies
  • Examining the ethical implications of cyber security

Cyber Security Topics For Research Paper

  • Cyber security threats and vulnerabilities
  • Cyber security incident response and management
  • Cyber security risk management
  • Cyber security awareness and training
  • Cyber security controls and countermeasures
  • Cyber security governance
  • Cyber security standards
  • Cyber security insurance
  • Cyber security and the law
  • The future of cyber security

5 Current Research Topics in Cybersecurity

Below are the latest 5 cybersecurity research topics. They are:

  • Artificial Intelligence
  • Digital Supply Chains
  • Internet of Things
  • State-Sponsored Attacks
  • Working From Home

Research Area in Cyber Security

The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including: 

  • Quantum & Space  
  • Data Privacy  
  • Criminology & Law 
  • AI & IoT Security
  • RFID Security
  • Authorisation Infrastructure
  • Digital Forensics
  • Autonomous Security
  • Social Influence on Social Networks

How to Choose the Best Research Topics in Cyber Security

A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics. 

1. Brainstorm

In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible. 

2. Understanding the Background

In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it. 

3. Write a Single Topic

Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about. 

4. Be Flexible

There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out. 

The Layout of Cybersecurity Research Guidance

It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.  

In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness. 

Writing Tips from Expert

Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security Research Topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.

  • Before you begin writing your research paper, make sure you understand the assignment. 
  • Your Research Paper Should Have an Engaging Topic 
  • Find reputable sources by doing a little research 
  • Precisely state your thesis on cybersecurity 
  • A rough outline should be developed 
  • Finish your paper by writing a draft 
  • Make sure that your bibliography is formatted correctly and cites your sources. 
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!

Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.

The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.

Frequently Asked Questions (FAQs)

Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices. 

Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others. 

The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security. 

Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses? 

Profile

Mrinal Prakash

I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cyber Security Batches & Dates

Course advisor icon

  • Current Students
  • Faculty + Staff
  • Alumni + Friends
  • Parents + Family
  • Community + Visitors
  • Bachelor's Degrees
  • Master's Degrees
  • Doctorate Degrees
  • Certificates
  • Arts & Design
  • Business & Industry
  • Communications & Media
  • Data Analytics & Information
  • Health & Wellness
  • Humanities & Social Sciences
  • Music & Performing Arts
  • Public Service
  • Multidisciplinary
  • Still Exploring & Undetermined
  • International
  • Bienvenidos
  • Featured Videos
  • College Tour
  • Tuition & Aid
  • Student Life
  • Search Type Search Search
  • Quicklinks:
  • STUDENT EMAIL
  • UNT DIRECTORY
  • INFO FOR CURRENT STUDENTS
  • INFO FOR FACULTY + STAFF
  • INFO FOR ALUMNI + FRIENDS
  • INFO FOR PARENTS + FAMILY
  • INFO FOR COMMUNITY + VISITORS
  • UNT LIBRARIES
  • UNT CALENDAR
  • JOBS AT UNT

phd topics for cyber security

Information Science Ph.D. With a Concentration in Cybersecurity

Want more info.

We're so glad you're interested in UNT! Let us know if you'd like more information and we'll get you everything you need.

Why Earn an Information Science Ph.D. With a Concentration in Cybersecurity?

The UNT Information Science Ph.D. program with a concentration in Cybersecurity responds to the varied and changing needs of an information age, increasing recognition of the central role of information and information technologies in individual, social, economic and cultural affairs.

The mission of UNT's Information Science Ph.D. program is to provide a center of excellence in graduate education and research. Its primary goals are to:

  • Nurture critical and reflective thinking on the fundamental issues and elements of problems of utilization of information
  • Foster an environment of substantive and productive mentoring and apprenticeship
  • Prepare scholars passionate about the role of information in human affairs
  • Foster cross-disciplinary thinking and research.

Students are recruited to the program from a wide range of disciplines and encouraged to expand and refocus their expertise and skills in cutting-edge areas of information science that cross disciplinary boundaries. The multifaceted nature of information science warrants the focusing of resources, courses, and faculties from a broad range of academic units.

  • Research and publication
  • Pedagogical practices
  • Critical thinking
  • Leadership ability
  • Data analysis

Cybersecurity Information Science Ph.D. Highlights

What can you do with an information science ph.d. with a concentration in cybersecurity.

Graduates of the program are prepared to contribute to the advancement and evolution of the information society in a variety of roles and settings as administrators, researchers, and educators.

Cybersecurity Information Science Ph.D. Courses You Could Take

Learn More About UNT

Explore more options.

Information Data Science Ph.D.

Consumer Behavior and Experience Management Information Science Ph.D.

It’s easy to apply online. Join us and discover why we’re the choice of nearly 47,000 students.

UCL logo

Cybersecurity MPhil/PhD

London, Bloomsbury

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

UK tuition fees (2024/25)

Overseas tuition fees (2024/25), programme starts, applications accepted.

Applications open

  • Entry requirements

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

The English language level for this programme is: Level 2

UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.

Further information can be found on our English language requirements page.

If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.

Equivalent qualifications

Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .

International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.

About this degree

This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.

We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).

You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.

Who this course is for

This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

What this course will give you

UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.

UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).

Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.

Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.

The foundation of your career

Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Employability

Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .

Teaching and learning

You are   assigned a first and second supervisor who  you  will meet regularly.  You  will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.

In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.

You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.

During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.

Research areas and structure

Supervision within this programme is available in an extensive range or research areas including:

  • artificial intelligence (AI)
  • applied cryptography
  • on-line propaganda / hate speech / fake news
  • authentication and verification
  • financial technology and cryptocurrencies
  • blockchains
  • global politics of cybersecurity, cyberwar, cyber norms
  • national cyber security strategies
  • systems modelling
  • security economics
  • smart contracts
  • distributed systems security
  • network security
  • the Internet of Things
  • security testing
  • secure software engineering methodologies
  • malware and binary analysis
  • watermarking and copyright protection
  • cybercrime, child protection, and dark marketplaces
  • cyber risk and cyber security policy
  • standards and regulation of digital and telecommunications
  • connected autonomous vehicles
  • gender issues and tech abuse
  • hacking and hacktivism
  • privacy, censorship, surveillance
  • applications to secure communications
  • quantum computing, quantum information theory

Research environment

The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.

The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.

This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.

Find out more on our CDT website.

This programme is not currently running a part-time option.

Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.

All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.

Accessibility

Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing team .

Fees and funding

Fees for this course.

The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .

Additional costs

Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.

For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .

Funding your studies

The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .

CSC-UCL Joint Research Scholarship

Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas

All applicants are asked to identify and contact potential supervisors before making an application.

Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.

Choose your programme

Please read the Application Guidance before proceeding with your application.

Year of entry: 2024-2025

Got questions get in touch.

Computer Science

Computer Science

[email protected]

UCL is regulated by the Office for Students .

Prospective Students Graduate

  • Graduate degrees
  • Taught degrees
  • Taught Degrees
  • Applying for Graduate Taught Study at UCL
  • Research degrees
  • Research Degrees
  • Funded Research Opportunities
  • Doctoral School
  • Funded Doctoral Training Programmes
  • Applying for Graduate Research Study at UCL
  • Teacher training
  • Teacher Training
  • Early Years PGCE programmes
  • Primary PGCE programmes
  • Secondary PGCE programmes
  • Further Education PGCE programme
  • How to apply
  • The IOE approach
  • Teacher training in the heart of London
  • Why choose UCL?
  • Entrepreneurship
  • Inspiring facilities and resources
  • Careers and employability
  • Your global alumni community
  • Your wellbeing
  • Postgraduate Students' Association
  • Your life in London
  • Accommodation
  • Funding your Master's

The University of Edinburgh home

  • Schools & departments

Postgraduate study

Cyber Security, Privacy and Trust PhD

Awards: PhD

Study modes: Full-time

Funding opportunities

Placements/internships

Programme website: Cyber Security, Privacy and Trust

Upcoming Introduction to Postgraduate Study and Research events

Join us online on the 19th June or 26th June to learn more about studying and researching at Edinburgh.

Choose your event and register

Research profile

The increasing reliance of systems and services on information technology in the public, private and third sector has significantly raised the impact of cyber attacks in the last two decades.

This PhD programme in Cyber Security, Privacy and Trust is a response to the growing need for highly specialized research and training in these topics. Cyber security and resiliency is a complex problem that requires designing and understanding underlying technologies but also how business processes, cost, usability, trust and the law play a role for effective technology deployment.

The aim of this PhD programme is to provide students with research training in specialised topics of security, privacy and trust, helping produce the next generation of world-leading experts of the field.

Programme structure

The PhD in Cyber Security, Privacy and Trust trains you as a researcher and allows you to develop advanced techniques and in-depth knowledge in a specialist area. You will develop an all-round knowledge of your discipline, and a broad range of transferable skills.

You will carry out independent research, resulting in an original contribution to knowledge in your chosen area, working under the guidance of your supervisors.

The prescribed period of study is 36 months if studying full-time, or between 48 and 72 months if studying part-time.

Year 1 of PhD studies is probationary. Your supervisor will identify your training needs, if any, and invite you to attend lectures relevant to your research topic. These lectures may be selected from those offered to MSc students or may be specialist courses and seminars organised by the School's various research groupings.

Towards the end of Year 1, you will be expected to submit a thesis proposal which identifies a specific research topic, reviews the relevant literature, outlines a plan of research to address the topic, and describes progress made so far.

Progress during your PhD is assessed by annual reviews, which formally determine whether you can progress with your PhD. You will be required to complete and pass a PhD annual review at the end of each year of study and thesis is expected to be submitted at the end of Year 3. Following thesis submission, you will be required to attend an oral examination (or viva) which will be conducted by an external and internal examiner.

Find out more about compulsory and optional courses

We link to the latest information available. Please note that this may be for a previous academic year and should be considered indicative.

Work placements/internships

Many postgraduate research students in the School of Informatics undertake at least one optional internship during their PhD, gaining important transferable skills whilst working with companies, public or third sector organisations.

The School of Informatics maintains a range of connections to potential employers in the cyber security and other sectors. Work placements or internships are considered a valuable aspect of research training as they expose students to an applied research culture, and can provide valuable contacts for future job searches.

Training and support

As a research student in the School of Informatics, you will have access to a highly respected academic staff community, including staff who have won prizes for their research and who are Fellows of learned societies.

The University of Edinburgh has been recognised as a UK Academic Centre of Excellence in Cyber Security Research. This is based on the amount and quality of its research output, as well as its level of PhD training.

Within the School of Informatics, the Security, Privacy and Trust Group includes academic staff who lead research in a range of technical and socio-technical areas of cyber security. Staff also supervise PhD students on this programme.

  • Security, Privacy and Trust Group

You will carry out your research under the guidance of a primary supervisor and at least one other secondary or co-supervisor. You will be expected to attend seminars and meetings of relevant research groups and may also attend lectures that are relevant to your research topic. Periodic reviews of your progress will be conducted to assist with research planning.

A programme of transferable skills courses will be offered, which facilitates broader professional development in a wide range of topics, from writing and presentation skills to entrepreneurship and career strategies.

The award-winning Informatics Forum is an international research facility for computing and related areas. It houses more than 400 research staff and students, providing office, meeting and social spaces.

The Forum also contains several robotics labs, an instrumented multimedia room, eye-tracking and motion capture systems, and a full recording studio amongst other research facilities. Its spectacular atrium plays host to many events, from industry showcases and student hackathons to major research conferences.

Nearby teaching facilities include computer and teaching labs with more than 250 machines, 24-hour access to IT facilities for students, and comprehensive support provided by dedicated computing staff.

There are further specific facilities to support aspects of cyber security research, including an Internet of Things Lab and a Network Security Lab. The Blockchain Technology Lab is a research lab supporting investigations into distributed ledger technology.

Among our wider entrepreneurial initiatives is Informatics Ventures, set up to support globally ambitious software companies in Scotland and nurture a technology cluster to rival Boston, Pittsburgh, Kyoto and Silicon Valley.

Career opportunities

There is high demand for security and privacy experts in industry, academia, and the public sector. Commercially, there is also a large variety of opportunities in both small and large companies.

Previous PhD graduates associated with the Security and Privacy Group have gone on to employment in industry with companies including:

  • ION Geophysical
  • Disney Research
  • Deutsche Bank.

Students have also gone on to be employed within academia, at institutions, to name a few, including:

  • University of Oxford
  • University of Bristol
  • University of Oldenburg
  • University of Auckland
  • University of Birmingham
  • University of Surrey
  • University of Munich
  • Cambridge University
  • Queen’s University Belfast
  • Tsinghua University
  • Lancaster University

Entry requirements

These entry requirements are for the 2024/25 academic year and requirements for future academic years may differ. Entry requirements for the 2025/26 academic year will be published on 1 Oct 2024.

A UK 2:1 honours degree, or its international equivalent, in computer science, mathematics, linguistics, or a related discipline. A Masters degree or equivalent, in information security, cyber security or a closely related discipline is recommended.

International qualifications

Check whether your international qualifications meet our general entry requirements:

  • Entry requirements by country
  • English language requirements

Regardless of your nationality or country of residence, you must demonstrate a level of English language competency at a level that will enable you to succeed in your studies.

English language tests

We accept the following English language qualifications at the grades specified:

  • IELTS Academic: total 7.0 with at least 6.0 in each component. We do not accept IELTS One Skill Retake to meet our English language requirements.
  • TOEFL-iBT (including Home Edition): total 100 with at least 20 in each component. We do not accept TOEFL MyBest Score to meet our English language requirements.
  • C1 Advanced ( CAE ) / C2 Proficiency ( CPE ): total 185 with at least 169 in each component.
  • Trinity ISE : ISE III with passes in all four components.
  • PTE Academic: total 70 with at least 59 in each component.

Your English language qualification must be no more than three and a half years old from the start date of the programme you are applying to study, unless you are using IELTS , TOEFL, Trinity ISE or PTE , in which case it must be no more than two years old.

Degrees taught and assessed in English

We also accept an undergraduate or postgraduate degree that has been taught and assessed in English in a majority English speaking country, as defined by UK Visas and Immigration:

  • UKVI list of majority English speaking countries

We also accept a degree that has been taught and assessed in English from a university on our list of approved universities in non-majority English speaking countries (non-MESC).

  • Approved universities in non-MESC

If you are not a national of a majority English speaking country, then your degree must be no more than five years old* at the beginning of your programme of study. (*Revised 05 March 2024 to extend degree validity to five years.)

Find out more about our language requirements:

  • Academic Technology Approval Scheme

If you are not an EU , EEA or Swiss national, you may need an Academic Technology Approval Scheme clearance certificate in order to study this programme.

Fees and costs

Scholarships and funding, featured funding.

  • Security, Privacy and Trust Group PhD topics (some with scholarships)
  • School of Informatics scholarships for research students
  • Research scholarships for international students

Please note that some University and School scholarships require separate applications via the Scholarships portal.

UK government postgraduate loans

If you live in the UK, you may be able to apply for a postgraduate loan from one of the UK’s governments.

The type and amount of financial support you are eligible for will depend on:

  • your programme
  • the duration of your studies
  • your tuition fee status

Programmes studied on a part-time intermittent basis are not eligible.

  • UK government and other external funding

Search for scholarships and funding opportunities:

  • Search for funding

Further information

  • IGS Admissions Administrator
  • Phone: +44 (0)131 650 3091
  • Contact: [email protected]
  • School of Informatics Graduate School
  • Office 3.42
  • Informatics Forum
  • Central Campus
  • Programme: Cyber Security, Privacy and Trust
  • School: Informatics
  • College: Science & Engineering

Select your programme and preferred start date to begin your application.

PhD Cyber Security, Privacy and Trust - 3 Years (Full-time)

Application deadlines.

Applications for 2024/25 entry are now open and can be submitted all year round.

Please submit your completed application at least three months prior to desired entry date.

If you want to be considered for School funded PhD scholarships you must apply by one of two rounds:

(Revised 25 October 2023 to update application deadlines)

(Revised 15 February 2024 to extend the round 2 application deadline)

  • How to apply

You must submit two references with your application.

You must submit an application via the EUCLID application portal and provide the required information and documentation. This will include submission of:

  • a Curriculum Vitae (CV)
  • research proposal (2-5 pages long)
  • degree certificates and official transcripts of all completed and in-progress degrees (plus certified translations if academic documents are not issued in English)
  • two academic references

Only complete applications will progress forward to the academic selection stage.

Read through detailed guidance on how to apply for a PGR programme in the School of Informatics:

  • School of Informatics PGR Application Guidance

Find out more about the general application process for postgraduate programmes:

75 Cyber Security Research Topics in 2024

75 Cyber Security Research Topics in 2024

Introduction to Cybersecurity Research

Cybersecurity research aims to protect computer systems, networks, and data from unauthorised access, theft, or damage. It involves studying and developing methods and techniques to identify, understand, and mitigate cyber threats and vulnerabilities. 

The field can be divided into theoretical and applied research and faces challenges such as

  • Increasing complexity 
  • New forms of malware 
  • The growing sophistication of cyber attacks

On a daily basis, approximately 2,200 cyber attacks occur, with an average of one cyber attack happening every 39 seconds. This is the reason why researchers must stay up-to-date and collaborate with others in the field. 

In this article, let’s discuss the different cybersecurity research topics and how they will help you become an expert in the field.

Ads of upGrad blog

Check out our  free technology courses  to get an edge over the competition.

Here are some of the latest research topics in cyber security – 

Emerging Cyber Threats and Vulnerabilities in 2024

Continual technological advancements lead to changes in cybersecurity trends, with data breaches, ransomware, and hacks becoming more prevalent. 

  • Cyber Attacks and Their Countermeasures – Discuss – This research paper will discuss various cyber attacks and their corresponding countermeasures. It aims to provide insights on how organisations can better protect themselves from cyber threats.
  • Is Cryptography Necessary for Cybersecurity Applications? – Explore the role of cryptography in ensuring the confidentiality, integrity, and availability of data and information in cybersecurity. It would examine the various cryptographic techniques used in cybersecurity and their effectiveness in protecting against cyber threats.

Here are some other cyber security topics that you may consider – 

  • Discuss the Application of Cyber Security for Cloud-based Applications 
  • Data Analytics Tools in Cybersecurity
  • Malware Analysis
  • What Are the Behavioural Aspects of Cyber Security? 
  • Role of Cyber Security on Intelligent Transporation Systems
  • How to Stop and Spot Different Types of Malware?

Check Out upGrad’s  Software Development Courses  to upskill yourself.

Machine Learning and AI in Cybersecurity Research

Machine learning and AI are research topics in cybersecurity, aiming to develop algorithms for threat detection, enhance intelligence and automate risk mitigation. However, security risks like adversarial attacks require attention.

trending cyber security research topcs

  • Using AI/ML to Analyse Cyber Threats – This cyber security research paper analyses cyber threats and could include an overview of the current state of cyber threats and how AI/ML can help with threat detection and response. The paper could also discuss the challenges and limitations of using AI/ML in cybersecurity and potential areas for further research.

Here are some other topics to consider – 

  • Developing Cognitive Systems for Cyber Threat Detection and Response
  • Developing Distributed Ai Systems to Enhance Cybersecurity
  • Developing Deep Learning Architectures for Cyber Defence
  • Exploring the Use of Computational Intelligence and Neuroscience in Enhancing Security and Privacy
  • How is Cyber Security Relevant for Everyone? Discuss
  • Discuss the Importance of Network Traffic Analysis
  • How to Build an App to Break Ceasar Cipher

You can check out the Advanced Certificate Programme in Cyber Security course by upGrad, which will help students become experts in cyber security. 

IoT Security and Privacy

IoT security and privacy research aim to develop secure and privacy-preserving architectures, protocols, and algorithms for IoT devices, including encryption, access control, and secure communication. The challenge is to balance security with usability while addressing the risk of cyber-attacks and compromised privacy.

  • Service Orchestration and Routing for IoT – It may focus on developing efficient and secure methods for managing and routing traffic between IoT devices and services. The paper may explore different approaches for optimising service orchestration. 
  • Efficient Resource Management, Energy Harvesting, and Power Consumption in IoT – This paper may focus on developing strategies to improve energy use efficiency in IoT devices. This may involve investigating the use of energy harvesting technologies, optimising resource allocation and management, and exploring methods to reduce power consumption.

Here are some other cyber security project topics to consider – 

  • Computation and Communication Gateways for IoT
  • The Miniaturisation of Sensors, Cpus, and Networks in IoT
  • Big Data Analytics in IoT
  • Semantic Technologies in IoT
  • Virtualisation in IoT
  • Privacy, Security, Trust, Identity, and Anonymity in IoT
  • Heterogeneity, Dynamics, and Scale in IoT
  • Consequences of Leaving Unlocked Devices Unattended

Explore our Popular Software Engineering Courses

Blockchain security: research challenges and opportunities.

Blockchain security research aims to develop secure and decentralised architectures, consensus algorithms, and privacy-preserving techniques while addressing challenges such as smart contract security and consensus manipulation. Opportunities include transparent supply chain management and decentralised identity management.

  • Advanced Cryptographic Technologies in the Blockchain – Explore the latest advancements and emerging trends in cryptographic techniques used in blockchain-based systems. It could also analyse the security and privacy implications of these technologies and discuss their potential impact. 
  • Applications of Smart Contracts in Blockchain – Explore the various use cases and potential benefits of using smart contracts to automate and secure business processes. It could also examine the challenges and limitations of smart contracts and propose potential solutions for these issues.

Here are some other topics – 

  • Ensuring Data Consistency, Transparency, and Privacy in the Blockchain
  • Emerging Blockchain Models for Digital Currencies
  • Blockchain for Advanced Information Governance Models
  • The Role of Blockchain in Future Wireless Mobile Networks
  • Law and Regulation Issues in the Blockchain
  • Transaction Processing and Modification in the Blockchain
  • Collaboration of Big Data With Blockchain Networks

Cloud Security: Trends and Innovations in Research

Cloud security research aims to develop innovative techniques and technologies for securing cloud computing environments, including threat detection with AI, SECaaS, encryption and access control, secure backup and disaster recovery, container security, and blockchain-based solutions. The goal is to ensure the security, privacy, and integrity of cloud-based data and applications for organisations.

  • Posture Management in Cloud Security – Discuss the importance of identifying and addressing vulnerabilities in cloud-based systems and strategies for maintaining a secure posture over time. This could include topics such as threat modelling, risk assessment, access control, and continuous monitoring.
  • Are Cloud Services 100% Secure?
  • What is the Importance of Cloud Security?
  • Cloud Security Service to Identify Unauthorised User Behaviour
  • Preventing Theft-of-service Attacks and Ensuring Cloud Security on Virtual Machines
  • Security Requirements for Cloud Computing
  • Privacy and Security of Cloud Computing

Explore Our Software Development Free Courses

Cybercrime investigations and forensics.

Cybercrime investigations and forensics involve analysing digital evidence to identify and prosecute cybercriminals, including developing new data recovery, analysis, and preservation techniques. Research also focuses on identifying cybercriminals and improving legal and regulatory frameworks for prosecuting cybercrime.

  • Black Hat and White Hat Hacking: Comparison and Contrast – Explore the similarities and differences between these two approaches to hacking. It would examine the motivations and methods of both types of hackers and their impact on cybersecurity.
  • Legal Requirements for Computer Forensics Laboratories
  • Wireless Hacking Techniques: Emerging Technologies and Mitigation Strategies
  • Cyber Crime: Current Issues and Threats
  • Computer Forensics in Law Enforcement: Importance and Challenges
  • Basic Procedures for Computer Forensics and Investigations
  • Digital Forensic Examination of Counterfeit Documents: Techniques and Tools
  • Cybersecurity and Cybercrime: Understanding the Nature and Scope

An integral part of cybercrime investigation is to learn software development. Become experts in this field with the help of upGrad’s Executive Post Graduate Programme in Software Development – Specialisation in Full Stack Development . 

Cybersecurity Policy and Regulations

Cybersecurity policy and regulations research aims to develop laws, regulations, and guidelines to ensure the security and privacy of digital systems and data, including addressing gaps in existing policies, promoting international cooperation, and developing standards and best practices for cybersecurity. The goal is to protect digital systems and data while promoting innovation and growth in the digital economy.

  • The Ethicality of Government Access to Citizens’ Data – Explore the ethical considerations surrounding government access to citizens’ data for surveillance and security purposes, analysing the potential risks and benefits and the legal and social implications of such access. 
  • The Moral Permissibility of Using Music Streaming Services – Explore the ethical implications of using music streaming services, examining issues such as intellectual property rights, artist compensation, and the environmental impact of streaming. 
  • Real Name Requirements on Internet Forums
  • Restrictions to Prevent Domain Speculation
  • Regulating Adult Content Visibility on the Internet
  • Justification for Illegal Downloading
  • Adapting Law Enforcement to Online Technologies
  • Balancing Data Privacy With Convenience and Centralisation
  • Understanding the Nature and Dangers of Cyber Terrorism

Human Factors in Cybersecurity

Human factors in cybersecurity research study how human behaviour impacts cybersecurity, including designing interfaces, developing security training, addressing user error and negligence, and examining cybersecurity’s social and cultural aspects. The goal is to improve security by mitigating human-related security risks.

  • Review the Human Factors in Cybersecurity –  It explores various human factors such as awareness, behaviour, training, and culture and their influence on cybersecurity, offering insights and recommendations for improving cybersecurity outcomes.
  • Integrating Human Factors in Cybersecurity for Better Risk Management
  • Address the Human Factors in Cybersecurity Leadership
  • Human Factors in IoT Security
  • Internal Vulnerabilities: the Human Factor in It Security
  • Cyber Security Human Factors – the Ultimate List of Statistics and Data

In-Demand Software Development Skills

Cybersecurity education and awareness.

Cybersecurity education and awareness aims to educate individuals and organisations about potential cybersecurity threats and best practices to prevent cyber attacks. It involves promoting safe online behaviour, training on cybersecurity protocols, and raising awareness about emerging cyber threats.

  • Identifying Phishing Attacks – This research paper explores various techniques and tools to identify and prevent phishing attacks, which are common types of cyber attacks that rely on social engineering tactics to trick victims into divulging sensitive information or installing malware on their devices.
  • Risks of Password Reuse for Personal and Professional Accounts – Investigate the risks associated with reusing the same password across different personal and professional accounts, such as the possibility of credential stuffing attacks and the impact of compromised accounts on organisational security. 
  • Effective Defence Against Ransomware
  • Information Access Management: Privilege and Need-to-know Access
  • Protecting Sensitive Data on Removable Media
  • Recognising Social Engineering Attacks
  • Preventing Unauthorised Access to Secure Areas: Detecting Piggybacking and Tailgating
  • E-mail Attack and Its Characteristics
  • Safe Wifi Practice: Understanding VPN

With the increasing use of digital systems and networks, avoiding potential cyber-attacks is more important than ever. The 75 research topics outlined in this list offer a glimpse into the different dimensions of this important field. By focusing on these areas, researchers can make significant contributions to enhancing the security and safety of individuals, organisations, and society as a whole.

upGrad’s Master of Science in Computer Science program is one of the top courses students can complete to become experts in the field of tech and cyber security. The program covers topics such as Java Programming and other forms of software engineering which will help students understand the latest technologies and techniques used in cyber security. 

The program also includes hands-on projects and case studies to ensure students have practical experience in applying these concepts. Graduates will be well-equipped to take on challenging roles in the rapidly growing field of cyber security.

Profile

Pavan Vadapalli

Something went wrong

Our Popular Software Engineering Courses

Full Stack Development

Our Trending Software Engineering Courses

  • Master of Science in Computer Science from LJMU
  • Executive PG Program in Software Development Specialisation in Full Stack Development from IIIT-B
  • Advanced Certificate Programme in Cyber Security from IIITB
  • Full Stack Software Development Bootcamp
  • Software Engineering Bootcamp from upGrad

Popular Software Development Skills

  • React Courses
  • Javascript Courses
  • Core Java Courses
  • Data Structures Courses
  • ReactJS Courses
  • NodeJS Courses
  • Blockchain Courses
  • SQL Courses
  • Full Stack Development Courses
  • Big Data Courses
  • Devops Courses
  • NFT Courses
  • Cyber Security Courses
  • Cloud Computing Courses
  • Database Design Courses
  • Crypto Courses
  • Python Courses

Frequently Asked Questions (FAQs)

Artificial intelligence (AI) has proved to be an effective tool in cyber defence. AI is anticipated to gain even more prominence in 2024, mainly in monitoring, resource and threat analysis, and quick response capabilities.

One area of focus is the development of secure quantum and space communications to address the increasing use of quantum technologies and space travel. Another area of research is improving data privacy.

The approach to cybersecurity is expected to change from defending against attacks to acknowledging and managing ongoing cyber risks. The focus will be on improving resilience and recovering from potential cyber incidents.

Related Programs View All

Certification

40 Hrs Live, Expert-Led Sessions

2 High-Quality Practice Exams

View Program

phd topics for cyber security

Master's Degree

40000+ Enrolled Learners

phd topics for cyber security

Executive PG Program

IIIT-B Alumni Status

phd topics for cyber security

2 Unique Specialisations

phd topics for cyber security

Job Assistance

300+ Hiring Partners

159+ Hours of Live Sessions

phd topics for cyber security

126+ Hours of Live Sessions

Fully Online

20+ Hrs Instructor-Led Sessions

Live Doubt-Solving Sessions

13+ Hrs Instructor-Led Sessions

17+ Hrs Instructor-Led Training

3 Real-World Capstone Projects

32-Hr Training by Dustin Brimberry

Question Bank with 300+ Practice Qs

16 Hrs Live Expert-Led Training

CLF-C02 Exam Prep Support

phd topics for cyber security

Microsoft-Approved Curriculum

24 Hrs Live Expert-Led Training

4 Real-World Capstone Projects

45 Hrs Live Expert-Led Training

289 Hours of Self-Paced Learning

10+ Capstone Projects

288 Hours Self-Paced Learning

9 Capstone Projects

490+ Hours Self-Paced Learning

4 Real-World Projects

690+ Hours Self-Paced Learning

Cloud Labs-Enabled Learning

40 Hrs Live Expert-Led Sessions

2 Mock Exams, 9 Assessments

phd topics for cyber security

Executive PG Certification

GenAI integrated curriculum

phd topics for cyber security

Job Prep Support

Instructor-Led Sessions

Hands-on UI/UX

16 Hrs Live Expert-Led Sessions

12 Hrs Hand-On Practice

30+ Hrs Live Expert-Led Sessions

24+ Hrs Hands-On with Open Stack

2 Days Live, Expert-Led Sessions

34+ Hrs Instructor-Led Sessions

10 Real-World Live Projects

24 Hrs Live Expert-Led Sessions

16 Hrs Hand-On Practice

8 Hrs Instructor-Led Training

Case-Study Based Discussions

40 Hrs Instructor-Led Sessions

Hands-On Practice, Exam Support

24-Hrs Live Expert-Led Sessions

Regular Doubt-Clearing Sessions

Extensive Exam Prep Support

6 Hrs Live Expert-Led Sessions

440+ Hours Self-Paced Learning

400 Hours of Cloud Labs

15-Hrs Live Expert-Led Sessions

32 Hrs Live Expert-Led Sessions

28 Hrs Hand-On Practice

Mentorship by Industry Experts

24 Hrs Live Trainer-Led Sessions

Mentorship by Certified Trainers

GenAI Integrated Curriculum

Full Access to Digital Resources

16 Hrs Live Instructor-Led Sessions

80+ Hrs Hands-On with Cloud Labs

160+ Hours Live Instructor-Led Sessions

Hackathons and Mock Interviews

31+ Hrs Instructor-Led Sessions

120+ Hrs of Cloud Labs Access

35+ Hrs Instructor-Led Sessions

6 Real-World Live Projects

24+ Hrs Instructor-Led Training

Self-Paced Course by Nikolai Schuler

Access Digital Resources Library

300+ Hrs Live Expert-Led Training

90 Hrs Doubt Clearing Sessions

56 Hours Instructor-Led Sessions

82 Hrs Live Expert-Led Sessions

22 Hrs Live, Expert-Led Sessions

CISA Job Practice Exams

Explore Free Courses

Study Abroad Free Course

Learn more about the education system, top universities, entrance tests, course information, and employment opportunities in Canada through this course.

Marketing

Advance your career in the field of marketing with Industry relevant free courses

Data Science & Machine Learning

Build your foundation in one of the hottest industry of the 21st century

Management

Master industry-relevant skills that are required to become a leader and drive organizational success

Technology

Build essential technical skills to move forward in your career in these evolving times

Career Planning

Get insights from industry leaders and career counselors and learn how to stay ahead in your career

Law

Kickstart your career in law by building a solid foundation with these relevant free courses.

Chat GPT + Gen AI

Stay ahead of the curve and upskill yourself on Generative AI and ChatGPT

Soft Skills

Build your confidence by learning essential soft skills to help you become an Industry ready professional.

Study Abroad Free Course

Learn more about the education system, top universities, entrance tests, course information, and employment opportunities in USA through this course.

Suggested Tutorials

Python Tutorial

Explore Python programming with this concise tutorial, covering basics to advanced concepts for beginners and enthusiasts alike.

C Tutorial

Introduction to C Programming, Learn all the C programming language concepts in this tutorial.

Suggested Blogs

Best Jobs in IT without coding

12 Apr 2024

Scrum Master Salary in India: For Freshers & Experienced [2023]

by Rohan Vats

05 Mar 2024

SDE Developer Salary in India: For Freshers & Experienced [2024]

by Prateek Singh

29 Feb 2024

Marquee Tag & Attributes in HTML: Features, Uses, Examples

by venkatesh Rajanala

What is Coding? Uses of Coding for Software Engineer in 2024

by Harish K

Functions of Operating System: Features, Uses, Types

by Geetika Mathur

What is Information Technology? Definition and Examples

by spandita hati

50 Networking Interview Questions & Answers (Freshers & Experienced)

Capitol Technology University

  • Aviation and Astronautical Sciences
  • Computer Science, Artificial Intelligence and Data Science
  • Construction and Facilities
  • Critical Infrastructure
  • Cyber & Information Security
  • Cyberpsychology
  • Engineering
  • Engineering Technologies
  • Intelligence and Global Security Studies
  • Management of Technology
  • Occupational Safety and Health
  • Uncrewed Systems
  • Doctoral Degrees
  • Master's Degrees
  • Bachelor's Degrees
  • Online Programs
  • Associate Degrees
  • Certificates
  • Minor Degrees
  • STEM Events
  • Webinars and Podcasts
  • Master's
  • Undergraduate
  • Transfer Students
  • Military and Veterans
  • International Students
  • Admissions Counselor
  • Capitol Connections
  • Accepted Students
  • Project Lead the Way
  • Builder Culture
  • Campus Life
  • Clubs and Organizations
  • Centers and Labs
  • Online Classes
  • The Capitol Commitment
  • Top Employers
  • Co-ops and Internships
  • Professional Education
  • Find a Mentor
  • Career Services
  • Capitol Online Job Board
  • Recruiters and Employers
  • Why Capitol Tech
  • At a Glance
  • Mission, Vision and Goals
  • Diversity, Equity and Inclusion
  • Washington, D.C.
  • Capitol History
  • Capitol Partners
  • News and Events
  • Visitors/Campus
  • Accreditation
  • Recognitions & Awards
  • Current Students
  • Faculty & Staff
  • Alumni & Giving
  • News & Events
  • Capitology Blog
  • Maps / Directions

phd topics for cyber security

  • Degrees and Programs

Doctor of Philosophy (PhD) in Space Cybersecurity

  • Request Information

Degree options bar image

Earn a doctoral degree in space cybersecurity, defend this new cyber battleground

Space has become the latest cyber battleground. Many satellites in orbit were not designed with cybersecurity protection. In October 2020, the Wilson Center held an event, "Seeking Strategic Advantage: How Geopolitical Competition and Cooperation are Playing Out in Space," to highlight growing threat and the need for advancement in Space Cybersecurity. 

Much of the world's critical infrastructure is heavily dependent on space, specifically space-based assets, for its daily functioning. Essential systems—such as communications, air transport, maritime trade, financial services, weather monitoring and defense—all rely heavily on space infrastructure, including satellites, ground stations and data links at the national, regional and international level. This dependence poses a serious, and yet frequently under-recognized, security dilemma—especially cyber threats—for critical infrastructure providers and policymakers alike. 

The Doctor of Philosophy (PhD) in Space Cybersecurity degree is a unique program designed to meet the evolving needs of today's Space Cybersecurity in an ever-changing world of conflict. This program provides students with the opportunity to conduct extensive and sustained, original research at the highest level in this field of Space Cybersecurity. It is designed to meet the demands of the highest-skilled professionals to assist them in becoming leaders who will be involved in the advancement, expansion, and support of Space Cybersecurity on a national and international level. The PhD in Space Cybersecurity is for current professionals in the field who desire to elevate their skills to the highest level and to contribute to the body of knowledge in Space Cybersecurity. 

Graduates with the Ph.D. in Space Cybersecurity degree will be expected to fill technical executive and senior-level positions in commercial companies as well as local, state, and federal government with a variety of titles such as: 

  • Chief Executive Officer, Commercial Space Cybersecurity Company
  • Chief Space Cybersecurity Operations Officer
  • Chief Cybersecurity Officer, Space Vehicles
  • Senior Director, Space Cybersecurity
  • Cybersecurity Officer, U.S. Space Force
  • Senior Scientist, Space Cybersecurity
  • Senior Vice President, Space Cybersecurity
  • Senior Penetration Chief, Space Cybersecurity Division
  • Senior Director, Red Team, Space Cybersecurity

Graduates from the Ph.D. in Space Cybersecurity will possess the highest knowledge in Space Cybersecurity with the ability to serve as top leaders in their field. Graduates will also possess the required knowledge in Space Cybersecurity to serve as a subject matter expert and form their own private company. 

Why Capitol?

ccra opportunity

Our comprehensive cybersecurity center

The  Center for Cybersecurity Research and Analysis  serves as the university hub for training, research, analysis, and programming in all things cybersecurity. Learn to defeat simulated cyberattacks, land an internship where you can put your skills to work and prepare for the workforce, publish a scholarly article addressing an existing challenge in the field, and much more. Students–both on-ground and online–faculty, alumni, and community partners alike are welcome.

trophy

1st in the Nation

Capitol Technology University was awarded the 2020 title of the Best Cybersecurity Program in the nation and was selected by the NSA as the National Center of Academic Excellence (CAE) Northeast Regional Hub.

clock stopwatch

Learn around your busy schedule

Our low residency requirement takes in consideration the time commitment of your established career.

professional faculty

Our classes are taught by working professionals

The Baltimore/Washington D.C. area has one of the largest concentrations of high-tech companies, defense contractors, and government agencies in the United States, making it easier to find internships and high-paying jobs.

Key Faculty

phd topics for cyber security

Vice President

phd topics for cyber security

Dissertation Chair

Career Opportunities

market

Market demand for cybersecurity

Get the necessary credentials to become a senior leader, program developer or policy maker in federal agencies and the private sector.

ideas

A degree that is relevant to any and every organization

Graduates will contribute significantly to their fields in cybersecurity through the creation of new knowledge and ideas.

Degree Details

This program may be completed with a minimum of 60 credit hours, but may require additional credit hours, depending on the time required to complete the dissertation/publication research. Students who are not prepared to defend after completion of the 60 credits will be required to enroll in RSC-899, a one-credit, eight-week continuation course. Students are required to be continuously enrolled/registered in the RSC-899 course until they successfully complete their dissertation defense/exegesis.

The Doctorate degree in Cybersecurity is a total of 60 credits, which covers a literature review, professional research and theory, professional ethics and leadership, dissertation preparation, and other topics. Students can select from several electives based on their personal focus.

The PhD program offers 2-degree completion requirement options:  

  • Dissertation Option : the student will produce, present, and defend a doctoral dissertation (thesis) after receiving the required approvals from the student’s Committee and the PhD Review Boards.
  • Publication Option: the student will produce, present, and defend doctoral research that is published as articles (3 required) in peer reviewed journals identified by the university and the student’s Committee. Students must receive the required approvals from the student’s Committee and the PhD Review Board prior to publication.

Prior achieved credits may be accepted, pending approval

Doctor of Philosophy - 60 credits

Program Objectives:

  • Students will evaluate the need for robust protection of space cybersecurity within the field of military and commercial Space Cybersecurity.
  • Students will demonstrate advanced knowledge and competencies needed for the future in Space Cybersecurity.
  • Students will analyze theories, tools, and frameworks used in Space systems.
  • Students will execute a plan to complete a significant piece of scholarly work in Space Cybersecurity.
  • Students will develop skill to implement Space Cybersecurity plans needed for advanced global protection of national assets.

Learning Outcomes:

Upon graduation, graduates will:

  • incorporate the theoretical basis and practical applications of Space Cybersecurity into their professional work;
  • demonstrate the highest mastery the needs of Space Cybersecurity;
  • evaluate complex problems, synthesize divergent/alternative/contradictory perspectives and ideas fully, and develop advanced solutions to Space Cybersecurity challenges; and
  • contribute to the body of knowledge in the study of Space Cybersecurity in commercial applications and military if appropriate.

Tuition & Fees

Tuition rates are subject to change.

The following rates are in effect for the 2024-2025 academic year, beginning in Fall 2024 and continuing through Summer 2025:

  • The application fee is $100
  • The per-credit charge for doctorate courses is $950. This is the same for in-state and out-of-state students.
  • Retired military receive a $50 per credit hour tuition discount
  • Active duty military receive a $100 per credit hour tuition discount for doctorate level coursework.
  • Information technology fee $40 per credit hour.
  • High School and Community College full-time faculty and full-time staff receive a 20% discount on tuition for doctoral programs.

Find additional information for 2024-2025 doctorate tuition and fees.

The National Security Agency and Department of Defense have designated Capitol Technology University as a National Center of Academic Excellence in Cyber Defense. We were honored to have a communications team from the NSA come to campus and produce this video explaining the benefits of our award-winning program.

Capitol Tech's PhD in Space Cybersecurity seemed to have the perfect blend of flexibility in how I can conduct research and study that aligns with my current job as a Principal Cybersecurity Engineer for an Aerospace Company.

-Sean Adair PhD in Space Cybersecurity

Need more info, or ready to apply?

The University of Edinburgh home

  • Schools & departments

Suggested PhD topics in Cyber Security, Privacy and Trust.

If you are interested in one of these topics, please read the application guidance first and then contact the named supervisor to discuss.

Privacy-preserving interactive technologies.  Interactive technologies in smart homes, augmented and virtual reality (AR/VR) automate our daily routines and create an immersive reality. The new experiences, however, accompany unprecedented risks to consumers as these advanced Interactive technologies expose numerous attributes of their users that must be kept private. This project will advance the understanding of user perceptions, operational and regulatory requirements for the privacy of these technologies and develop practical privacy control and enforcement systems for them. Contact: Jingjie Li .

Safety of interactive artificial intelligence (AI) agents. With rapidly developing AI technologies, we live in a world with more embodied and human-like AI agents. These agents are more than our next human-computer interface but companions for productivity, entertainment, and mental support. Given the agents’ capabilities to make decisions and take action, their safety, security, and privacy issues raise increasing concerns. This project will establish a framework to evaluate the safety issues of interactive AI agents and develop mechanisms to address these gaps. Contact: Jingjie Li .

Internet culture of privacy and security. Privacy and security are products of human culture and have become cultural phenomena on the Internet. Online communities, where people exchange massive amounts of information, incubate such cultures of privacy and security. These Internet cultures can influence people’s privacy, security, and even adversarial behaviors. By measuring and understanding online communities, this project will study the interplay between cultural factors and people’s privacy and security behaviors. Contact: Jingjie Li .

Logical specification and analysis of web applications for safety and security. Existing web application interface testing tools (such as Selenium) are limited to hand-crafted test cases. Our Quickstrom tool allows for automatic property-based testing against a specification written in temporal logic. PhD topics in this area could extend to handle epistemic security properties, incorporating model checking techniques for a more rigorous analysis, or add probabilistic confidence bounds about coverage. Contact: Liam O'Connor

Integration of algorithmic verification into interactive proof assistants.   Algorithmic verification tools (e.g., model checkers and static analysers) are currently separate from proof assistants used to produce full functional correctness and security proofs of software (such as the seL4 Microkernel). This topic would integrate verified algorithmic verification techniques into a proof assistant, aiming to reduce the cost of end-to-end verification. Contact: Liam O'Connor

  • Deep Threats in Autonomous Vehicles . From self-driving cars to delivery drones, autonomous vehicles are becoming everyday.  But the blackbox or greybox nature of deep learning potentially undermines the required safety criticality and in the wrong hands could pose severe cyber security threats. Using vehicle perception and navigation as case studies, this project will systematically study threats arising from deep learning to autonomous vehciles and look at effective and generic mitigations. Contact: Chris Xiaoxuan Lu
  • Internet of Safe Things . With billions of connected devices deployed, Internet of Things (IoT) based cyber-physical systems (CPS) bring unprecedented risks due to the unexpected interaction between systems and the larger number of attack vectors. These arise in medical devices, smart home appliance control, digital twin development or conflicts in policy execution at a societal scale. PhD topics will focus on the security, privacy and safety issues and investigate solutions that integrate hardware and software components, particularly those that have humans in the loop. Contact: Chris Xiaoxuan Lu

Cyber risk analysis and modelling of  uncertainties related to potential data/privacy breaches and the economic costs . Optimal decision models among the costs of managing cyber security, users satisfaction and cyber risks faced by organisations. Contact: Tiejun Ma

Human factors modelling related to cyber risk taking and decision making.  Particularly in relation to fintech applications (e.g. mobile, transactions, fraud and AML).  Contact: Tiejun Ma

Design and analysis of electronic voting protocols . Many countries have or plan to conduct legally binding elections using electronic voting systems. Such systems need to provide security guarantees, e.g., fairness, privacy, and verifiability. These are tricky to establish and can be in conflict with one another. Several proposed electronic voting systems have been found to fail to achieve their intended security goals, demonstrating the need for formally verified electronic voting systems. Contact: Myrto Arapinis

Verification of Security of the mbed OS uVisor (with ARM). The mbed OS uVisor is a core security component for ARM's mbed IoT platform. It creates isolated security domains M7 microcontrollers with a Memory Protection Unit (MPU). On top of these the uVisor provides a flexible compartmentalisation using separate security domains ("Secure Boxes"), configured with ACLs. This project will apply theorem proving methods to help define and then verify correctness and security properties of the uVisor implementation, building on previous work on instruction set models and decompilation techniques. Contact: Ian Stark .

Formal Specifications and Proofs for TrustZone (with ARM). Increasing complexity and connectivity in microcontroller devices motivates new protection mechanisms to improve reliability and security. ARM's TrustZone for ARMv8-M provides a separate "secure world" execution mode to enable features such as secure firmware updates, safe integration of code from multiple suppliers and controlled access to privileged peripherals. This project will study the low-level instruction set design of TrustZone for ARMv8-M, devising formal specifications describing the security properties that hold at the instruction level and proofs that these provide the intended protection against low-level attacks. Contact: Ian Stark

Quantum-enhanced Cloud . The security of the cloud could be obtained through Fully Homomorphic Encryption schemes. However these schemes are potentially breakable in a post-quantum regime and require huge overhead and hence despite intensive efforts from all the major players in the information industry, they remain mainly infeasible. The primary goal of this project is to develop quantum enhanced protocols where both efficiency and security are boosted. Implementations of plug and play solutions for these new protocols will be also pursued in realistic scenarios. Contact: Elham Kashefi .

Mobile Crowdsensing with Location Privacy . Using sensor data from mobile phones for better understanding of users and fine-grained monitoring of the environment is a major current research topic. From point of view of privacy, the challenge is to infer important features from collective data, without compromising location and other sensitive information of any individual. Contact: Rik Sarkar .

Security of Blockchain protocols. Study the underpinnings of blockchain based distributed protocols, including the mechanisms behind Bitcoin, Ethereum and other cryptocurrency systems. Contact: Aggelos Kiayias or Tariq Elahi .

Privacy in communication systems. Study the concept of privacy in communications and data sharing and design and analyze systems that facilitate it using suitable cryptographic and statistical methods. Contact: Aggelos Kiayias .

Applied and Theoretical Cryptography. Study cryptography from both applied and theoretical angles and apply it to solve problems such as secure channels, identification systems, cloud storage, secure digital content distribution and others. Contact: Aggelos Kiayias , Michele Ciampi or Markulf Kohlweiss .

Secure Remote Authentication via Game Playing . This project investigates a new approach to secure remote authentication which frames the problem as an interactive game between client and server, in which the server has to reason about the complex behaviour of the client based on observed game moves.  Contact: Stefano Albrecht.

Consensus in a world with quantum technologies.  The goal is to explore consensus protocols, such as Blockchain and Byzantine Agreement, in the presence of quantum technologies. Quantum technologies can be used either by adversaries in order to break existing classical protocols, or by honest parties to achieve better performance as far as efficiency or level of security provided.  In this project both directions will be considered. In the first direction (quantum adversaries) full security analysis of classical consensus protocols against quantum adversaries will be carried out, including: (i) ensuring that for all subroutines if hard problems are used to guarantee security, then these problems remain hard when the adversary has a quantum computer (e.g. base security on lattice crypto), (ii) the security definitions and the proof techniques are compatible with quantum adversaries. As far as the second direction is concerned, it is known that (simple) quantum technologies can be used to achieve enhanced Byzantine Agreement protocols.  The investigation will take into account (i) realistic constraints and (ii) proper security analysis that includes hybrid quantum-classical subroutines by addressing the issue of composability of quantum and classical protocols.  Contact: Petros Wallden or Elham Kashefi .

Tactics for Attacks; Safety and Security models.   One idea is to extend of attack trees with ways to reason about, and generate, traces of actual attacks, using "tactics" (a notion from interactive theorem proving).  Another idea is to study combined structural models for capturing safety and security together.   Contact: David Aspinall .

Automatic Vulnerability Predicition and Discovery . Software vulnerabilities continue to plague the industry. Tools help find problems, but current technology is limited. Future systems will be proactive, searching for possible problems and deploying work-arounds or repairs automatically.  PhD topics may investigate AI methods such as program synthesis, critics and abstraction-refinement, or reinforcement learning.   You need a background in software security, ideally also program analysis, logic and reasoning, AI methods.  Contact: David Aspinall

Economics of Security and Privacy.   Many security and privacy outcomes are driven by the economic incentives surrounding firms and individuals. These problems can be studied with a mixture of economic theory and technical measurement. Potential PhD topics include risk quantification, security control selection, cyber insurance, crisis response, exploit broking and many other topics in security and privacy.   These topics are also open to students without computer science training.  Contact: Daniel Woods .

  • Foundations for composable security . Study how to formally reason about the composition of cryptographic systems, both on paper and using proof assistants. The focus is on laying foundations, e.g. by finding a category theory based language for cross discipline communication and investigating programming paradigms for modeling protocols as pseudocode.  Contact: Markulf Kohlweiss .
  • ZKML and ZKAI . Study how to make machine learning and artificial intelligence verifiable in an as trust-less as possible manner. This allows answering questions such as: Was the query result really derived from the claimed model using the claimed prompts? How does the model change over time? Is ChatGPT getting worse? What data is being used to train the model?  Contact: Markulf Kohlweiss .  

Staff listed here may also be interested in other PhD research proposals on other topics, contact them to discuss.

[ Note for staff: please contact David Aspinall with updates/additions to this list. ]

PhD Research Topics in Cybersecurity

PhD Research Topics in Cybersecurity will infuse whiz factors in all the research works for you.  “In general, cybersecurity is the act of protecting digital records from attacks. It has its outlets in the wireless networks to defend against any threats.”

In reality, we will be with you till you hold your degree high. Our experts will support you in all the ways for your work. Our team has listed out precise research topics in this field for you.

Latest PhD Research Topics in Cybersecurity

Decentralized cybersecurity using Blockchain technology

  • Smart contract and distributed ledger
  • Blockchain and Bitcoin security
  • Security for 5G
  • Data structures and also in IoT solutions
  • Collection of data provenance and evidence in cloud

Software defined cybersecurity

  • Digital forensic architecture
  • SD firewall and also in industry 4.0 security
  • Cyber-physical system
  • Trust management for e-healthcare
  • SDN and NFV based secure cloud environment
  • Virtualized cybersecurity for cloud and also fog computing

Cryptography techniques

  • Optical cryptography techniques
  • ML and DL for IDS
  • Quantum schemes
  • Hybrid cryptography and steganography schemes

PhD Research Topics in Cybersecurity  will work in so many areas to give full support for you. Thus, it helps us to stay updated in diverse research fields. Up to the present time, many vital journals show the worth of cybersecurity. Moreover, we have given some of those journals for your view.

REPUTED RESEARCH JOURNALS

  • Taylor & Francis

PhD Research Topics in Cybersecurity will look deep into your area to find what you expect. Because of research progress, we will allot a distinct team to mentor your works. In fact, this team will tell you the updates in the field of your work. If you want to be on track, then approach us. We will also hold you back and inspire you as well.

In the final analysis, we have a set of new ideas for you to know,

An effectual method for Wideband Antennas and Phased Arrays for Enhancing Cybersecurity in 5G Mobile Wireless

Novel mechanism for Test and Evaluation System designed for Automotive Cybersecurity scheme

An effectual framework for Exploratory Analysis based on Cybersecurity Ecosystem Utilizing via NICE system

The new-fangled method for Cybersecurity assurance control baselining designed for smart grid communication systems

The new method for Data-Driven Cybersecurity Incident Prediction system

The new mechanism for Flow Context and Host Behavior Based on Shadowsocks’s Traffic Identification system

A novel function of Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in HWNs

An effectual mechanism for Structured Policy-Based on Design Method for Cybersecurity of Automotive E/E System

The new method for VANET/ITS cybersecurity threats based on Analysis, categorization and forecasting scheme

A novel function for Cybersecurity Metrics designed for Enhanced Protection of Healthcare IT Systems

An effective mechanism for Analysis of Protection Mechanisms in a Cloud-centered Environment

The novel mechanism for Blockchain intended for Supply Chain Cybersecurity, Optimization and Compliance practice

The firsthand function of Moving Target Defense Against based on Advanced Persistent Threats intended for Cybersecurity Enhancement

Design an effective function of Combine method for forecasting VANET cybersecurity used for application of high priority way

The new system for Enhancing Cloud-Based on IoT Security Through Trustworthy Cloud Service and Integration Approach

The novel mechanism for Ontology based on Cybersecurity Operations Centre Analysis Process

A novel research mechanism intended for Anomaly and Automation from a Cybersecurity Perspective method

An innovative method for Smart Grid based on Cybersecurity Countermeasures scheme

An innovative method for Measuring and Assessing Cybersecurity Risk of Support Equipment to Complex Systems

An inventive  Systems for Engineering Approach To Appraise Cybersecurity Risks Of CNS/ATM and Avionics Systems

PhD Research Topics in Cybersecurity

Why Work With Us ?

Senior research member, research experience, journal member, book publisher, research ethics, business ethics, valid references, explanations, paper publication, 9 big reasons to select us.

Our Editor-in-Chief has Website Ownership who control and deliver all aspects of PhD Direction to scholars and students and also keep the look to fully manage all our clients.

Our world-class certified experts have 18+years of experience in Research & Development programs (Industrial Research) who absolutely immersed as many scholars as possible in developing strong PhD research projects.

We associated with 200+reputed SCI and SCOPUS indexed journals (SJR ranking) for getting research work to be published in standard journals (Your first-choice journal).

PhDdirection.com is world’s largest book publishing platform that predominantly work subject-wise categories for scholars/students to assist their books writing and takes out into the University Library.

Our researchers provide required research ethics such as Confidentiality & Privacy, Novelty (valuable research), Plagiarism-Free, and Timely Delivery. Our customers have freedom to examine their current specific research activities.

Our organization take into consideration of customer satisfaction, online, offline support and professional works deliver since these are the actual inspiring business factors.

Solid works delivering by young qualified global research team. "References" is the key to evaluating works easier because we carefully assess scholars findings.

Detailed Videos, Readme files, Screenshots are provided for all research projects. We provide Teamviewer support and other online channels for project explanation.

Worthy journal publication is our main thing like IEEE, ACM, Springer, IET, Elsevier, etc. We substantially reduces scholars burden in publication side. We carry scholars from initial submission to final acceptance.

Related Pages

Phd Research Topics In Cse

Phd Research Topics In Security

Phd Research Topics In Cryptography

Phd Research Topics In Web Mining

Phd Research Topics In Computer Graphics

Phd Research Topics In Internet Computing

Phd Research Topics In Webservice

Phd Research Topics In Information Security

Phd Research Topics In Service Computing

Phd Research Topics In Web Technology

Phd Research Topics In System Cybernetics

Phd Research Topics In Information Technology

Phd Research Topics In Visual Cryptography

Phd Research Topics In Systems And Cybernetics

Phd Research Topics In Information Forensics Security

Our Benefits

Throughout reference, confidential agreement, research no way resale, plagiarism-free, publication guarantee, customize support, fair revisions, business professionalism, domains & tools, we generally use, wireless communication (4g lte, and 5g), ad hoc networks (vanet, manet, etc.), wireless sensor networks, software defined networks, network security, internet of things (mqtt, coap), internet of vehicles, cloud computing, fog computing, edge computing, mobile computing, mobile cloud computing, ubiquitous computing, digital image processing, medical image processing, pattern analysis and machine intelligence, geoscience and remote sensing, big data analytics, data mining, power electronics, web of things, digital forensics, natural language processing, automation systems, artificial intelligence, mininet 2.1.0, matlab (r2018b/r2019a), matlab and simulink, apache hadoop, apache spark mlib, apache mahout, apache flink, apache storm, apache cassandra, pig and hive, rapid miner, support 24/7, call us @ any time, +91 9444829042, [email protected].

Questions ?

Click here to chat with us

  • Our Promise
  • Our Achievements
  • Our Mission
  • Proposal Writing
  • System Development
  • Paper Writing
  • Paper Publish
  • Synopsis Writing
  • Thesis Writing
  • Assignments
  • Survey Paper
  • Conference Paper
  • Journal Paper
  • Empirical Paper
  • Journal Support
  • PhD Projects in Cybersecurity

PhD projects in cybersecurity aim to break all the walls in the PhD/MS scholars’ study trip. We have got  18+ years  of skills and did  1500+ superb projects  in this broad field. “ Cybersecurity is a vital part to shield the intern internet-based from cyber threats.”  By and large, you can learn a lot when you work with us.

SOME OF THE CYBER THREATS IN PRESENT DAY

  • Social Engineering (Password Hacking)

Do you want to know about cyber security attacks topics ? Then, visit our online page fast. Indeed, our research work will lure you into doing your project in this field. To pledge with the cybersecurity projects, look at the following research areas.

RESEARCH TOPICS IN CYBERSECURITY

  • Cyber issues & solutions for fog-edge computing
  • Trust and reputation systems for cloud-based applications
  • Anti-forensics techniques
  • Network security (Adhoc networks, CRN, underwater acoustic network)
  • Attack resilience for heterogeneous clouds
  • Cybersecurity for mobile-based applications
  • Web security & cyber monitoring approaches
  • Privacy-preserving public auditing systems
  • Access control & authorization for cloud services
  • Secure internet of things

Besides, you can also access us to craft your project with your own concepts. Despite the issues in your project, we will get the best results for you.  PhD projects in cybersecurity  will devise your projects in other valid areas as well. We have a list of areas that get along with this field.

OTHER IMPLEMENT AREAS

PhD Projects in cybersecurity

If you need further reviews, then call us for a fast reply. You can only survive on the shore of the study ocean on your own. In order to swim across, you will certainly need help from the PhD projects in cybersecurity . If you face any hurdles in your research, then just bond with us.

An effective method for Cybersecurity of healthcare IoT-based systems

An inventive mechanism for Identifying Core Concepts of Cybersecurity based on Two Delphi Processes

An inventive method for Measuring Stakeholders’ Perceptions of Cybersecurity in Renewable Energy Systems

A Novel approach designed for cybersecurity workforce development system

A Design Framework function of Application based on  Rank-Weight Methods into Blockchain Cybersecurity Vulnerability Assessment

The fresh method for Developing collaborative and cohesive cybersecurity in legal principles scheme

An effective method for Evaluating and Ensuring for Cybersecurity of Power Line Remote Monitoring Systems

An innovative method for University and Government Uniting to Address Homeland CyberSecurity Issues system

The new-fangled method for Computer Simulation of Discrete Human-Machine Interaction to Providing Reliability and Cybersecurity of Critical Systems

On the use of Primitive Cognitive Network Process Towards on Cybersecurity Investment Assessment method

The novel approach for Advancing Cybersecurity for Cyber-Resiliency Workforce system

An innovative function of Contactless Smart Card Experiments in a Cybersecurity  scheme

A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World

On the use of Cybersecurity intended for fiscal devices with GPRS terminals system

An inventive method for Implementation of Cybersecurity Procedures in Remote Calibration for PNT Services

An innovative method for Intelligent System aimed at Risk Identification of Cybersecurity Violations in Energy Facility system

The new method for Cognitive Cybersecurity used for CPS-IoT Enabled Healthcare Ecosystems

An innovative method for Determining Viability of Deep Learning based  on Cybersecurity Log Analytics system

An inventive approach for Cybersecurity of Connected Autonomous Vehicles practice

An inventive mechanism for Fuzzy Probability Bayesian Network Approach intended for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

Phd Projects In Dependable Secure Computing

Phd Projects Help

Phd Projects In Information Forensics Security

Phd Projects Guidance Help

Phd Projects In Security

Phd Projects In Parallel Distributed Systems

Phd Projects For Information Technology Students

Phd Projects In Information Security

Phd Projects In Parallel And Distributed Systems

Phd Projects In System Cybernetics

Phd Projects Guidance

Phd Projects In Information Technology

Phd Projects In Wireless Network

Phd Projects For Sale

Phd Projects For Computer Science Students

Karen Nershi Joins Middlebury Institute as Part of Cybersecurity Expansion

May 20, 2024 | by Sierra Abukins

News Stories

Nershi, Karen

Dr. Karen Nershi will join the faculty in Middlebury Institute’s  nonproliferation and terrorism program this fall. Dr. Nershi holds a PhD in political science from the University of Pennsylvania and was a postdoctoral fellow at the Stanford Internet Observatory at Stanford University. Her research focuses on international security questions emerging from the adoption of new technologies, with a particular focus on ransomware, state-backed cybercrime, and cryptocurrency.

“I’m thrilled that she’s joining us as part of a broader institutional investment in cybersecurity,” said Professor  Philipp Bleek , who directs the  Cyber Collaborative , mentors its student club, the Cyber Security Working Group, and chaired the search committee that hired Dr. Nershi for this new role. “Her expertise at the intersections of cybersecurity, financial crime, and data analytics is a fabulous fit for us, complementing existing activity in the  financial crime management program and the  META Lab .”

Bleek said their goal is to ensure all students studying global security get exposure to this topic.

“A terrorism-focused student needs to understand how the internet enables radicalization or helps terrorist groups to hide financial assets. A weapons-of-mass-destruction nonproliferation-focused student needs to grapple with cyber vulnerabilities of nuclear weapons plants or nuclear weapons or how the internet affects efforts to monitor and control the spread of dual-use technologies,” said Bleek.

Middlebury Institute is also launching a new online MS in cybersecurity for spring 2025.

We spoke with Dr. Nershi to hear more about her research and her journey to the Institute.

Tell me about your path. What first sparked your interest in this area, and how did you come to be doing the work and research you do now?

I’m originally from Louisiana. I did my undergrad at the University of Alabama in international studies, and then I completed my PhD in political science at the University of Pennsylvania in Philadelphia. I’ve always been interested in international relations. I studied abroad several times as an undergrad, so that’s always been an area of interest for me. I was also interested in the dynamics around conflict, things like the funding of rebel groups and organized crime.

For my dissertation, I was focused on anti-money-laundering enforcement and the dynamics of international cooperation around enforcing anti-money-laundering laws. It’s really hard to get reliable data to study money laundering, as banks are very secretive about the data. 

At the time, they were introducing anti-money-laundering laws in this new sector of cryptocurrency, where a lot of information is publicly available from the blockchain. I collected transaction data from cryptocurrency exchanges that let me look at how well countries were enforcing these new laws for the sector. I saw huge variations between countries.

I just became really interested in cryptocurrency, and that led me to study ransomware, which led me to my current research, which is especially focused on cyber crime, its connection to states, and also cybersecurity more broadly.

Karen Nershi RSA Conference

What attracted you to the Middlebury Institute?

I’m super excited to be joining Middlebury. The Middlebury Institute is such a special place. I can’t wait to be on campus again in the fall. There are a few main things that really attracted me. First of all, I’d say just the areas of research and study are really interesting to me. Another thing that I really like is that it’s a graduate institute with master’s students, so there’s a big emphasis on providing students with skills and expertise to go out and work in companies or in government on these cutting-edge topics. That’s really interesting to me, as well as this multidisciplinary approach. Another really unique and exciting part of the Institute is that they value translating insights from your research into these policy outputs in a way that can have a real impact.

The last main factor that’s really attracted me is just the people at the Institute. And this is true of the faculty whom I’ve gotten to know who are working on these really interesting topics, and also who are just wonderful people. To be around great colleagues and then also the students, who just seem to be a really passionate group about their interests. I met students who are doing different kinds of cyber investigations online already. It seems like they come from a wide variety of backgrounds with a lot of different insights, and they are just really interested in these topics, so I think that’s gonna be really rewarding both teaching and working with students on research projects.

What kinds of courses or other programs do you hope to develop and offer for our students?

This fall, I’ll be teaching Introduction to Cybersecurity, taking something of a broad perspective on the way cybersecurity is affecting international relations. I’ll also be teaching a weekend workshop about investigations on the dark web and exploring what sources of data are available to go out and collect information about criminal activity. We’ll be learning about research that’s already been done on the dark web. What are the sorts of questions you can explore? What is the connection to the social impacts? We’ll be visiting some of these sites ourselves and learning about what’s a safe and ethical way to do this. That’s going to be exciting, as well as sort of a hands-on exploration of data on the dark web.

In addition to these specific courses, I’m also really interested to get engaged with the Cyber Collaborative, this fantastic student-led club that’s been focused on cyber and building connections to companies. I’ll also be continuing to develop my research with support from research assistants and graduate students. 

You’ve spent time in Jordan and Morocco studying Arabic as a  Foreign Language and Area Studies Fellow and a  Critical Language Scholarship recipient . You’ve also lived and worked in Germany. Why is studying language important for students who want to forge careers in global security?

It is really so valuable to learn another language and, if you can, also to have the experience of living somewhere else for some period of time. It’s great to travel the world, but there’s definitely something different about living in a country and getting embedded in the culture. It’s a really valuable experience, because you learn so much about another culture and other ways things can be done. You also learn a lot about your own culture. It’s like how a fish swimming in water doesn’t really realize that they’re in water. You notice what’s so unique and interesting about your culture because you have this point of comparison.

I think for anyone who’s interested in working in politics or the policy world it’s just very valuable to have this type of experience to broaden your viewpoint on things. Especially in the policy world, you start to understand points of comparison with policies in your own country and other approaches you could try. It’s just a really enriching experience, and great for anyone in the field of international relations.

You led research about Russian ransomware attacks that was highlighted in  Wired magazine and also won you the  Perry World House 2023 Emerging Scholars Policy Prize . How did you decide to focus on this topic, and what did you find?

I became interested in this topic stemming from my dissertation work around cryptocurrency and money-laundering risks, which led me to become interested in ransomware. Ransomware is a type of cyber crime in which the attackers will release malware on a computer system that encrypts the user’s files. To get access to your files, you need to send the attackers a ransom, typically the cryptocurrency Bitcoin. After you send them the ransom, they send you a decryption key that will allow you to get access to all of your files. That’s the traditional 1.0 ransomware attack. 

More recently, we’ve seen developments around double extortion ransomware attacks, which is what I focus on in my research. That’s where the attackers not only encrypt a company’s files, but they also steal or exfiltrate the company’s data, which can be sensitive financial documents or personal information about their employees or their customers. They’ll steal this data and then threaten to leak it or sell it on the dark web if the company doesn’t pay an additional ransom or larger ransom to stop them.

There are some really interesting international dynamics around this. In this context of ransomware in particular, a lot of the attacks and the groups carrying out these attacks have been located in Eastern Europe, broadly speaking, and there are a number of reasons for this. Many of the attacks have been directed against companies and government offices within Western countries.

As we enter a big election year, what’s on your mind?

It’s definitely a huge challenge. We have these changes happening on the technological side that governments have been really struggling to try to keep up with, which include information security and propaganda campaigns on social media. That’s really a big area of concern, especially with new technological developments like deep fakes, such as faking people’s voices. There’s all kinds of mischief and really dangerous things that can happen in that space. Based on my own research around ransomware, there are concerns that different types of attacks could really disrupt an election, the ability to hold an election, or even just people’s faith in the election results. If there’s some sort of major hack on Election Day or close to elections, even if it doesn’t actually change the results, the knowledge that there’s been some sort of big hack could lead people to question the results.

What makes you excited to be working in the field of cybersecurity right now? What would you say to convince a prospective student that this is where the action is?

The field of cybersecurity is a new area with lots happening and there’s a big need for better understanding from the social science perspective of the area of cybersecurity.

Right now, I’m really interested in exploring the ways that different states have engaged with cyber crime to further their political agendas and foreign policy. Russia, China, North Korea, Iran are all countries that have engaged with cyber crime to varying degrees to accomplish different types of goals.

A lot of the focus in the cybersecurity research has been on the uses of cyber and conflict, which is an interesting and important area, but I think when we look more broadly, we see that a lot of the activity has been more low-level, not rising to the level of inspiring decisive military response. However, in aggregate, all these cyber intrusions can have a really important impact on a country’s national security.

This area of cybersecurity is such a dynamic area with so many new developments and technological changes. As social scientists, we need to try to understand these phenomena better so we can better understand what is the societal impact and how to design policies, either nationally or or coordinating at the international level, that can help address some of these really real threats and harms emerging from the cyber realm. 

  • Financial Crime Management ,
  • Nonproliferation and Terrorism Studies

For More Information

Financial Crime Management Nonproliferation and Terrorism Studies META Lab Cyber Collaborative

Related Stories

Silhouette

Students Reach Semifinals of Cybersecurity Strategy Challenge for Second Year

June 22, 2023 | by Mark Anderson

Students had to think quick in a scenario-based competition responding to an airport security hack involving a Russian oligarch.  

Middlebury Institute students at the finals of Invent2Prevent in Washington D.C (1) 2024.jpg

Middlebury Team Makes Finals of National Anti-Extremism Competition

February 20, 2024 | by Mark C. Anderson

A multidisciplinary group of Institute students traveled to D.C. to present the AI tool they developed in the national finals of Invent2Prevent. 

Ruehsen, Moyara

How New Technologies Are Changing Global Security

January 5, 2024 | by Moyara Ruehsen

Professor Moyara Ruehsen recently shared some insights into how AI, blockchain and other technologies are shifting financial crime and the skills that new professionals will need.

  • Share on Facebook
  • Share this on X
  • Share on LinkedIn
  • Print this page
  • Email this page

Feature Stories 2024: Jessica Kittel PhD '24: Diving into discovery

PhD student and 100-ton captain Jessica Kittel is using climate data to better understand fish stocks

"I got scuba certified at 15 years old. I was hooked as soon as I got underwater, and I've been in love with the ocean ever since." 

Jessica Kittel PhD '24 has sailed catamarans, tagged whales and sandbar sharks, and earned her 100-ton captain's license. Now, she's working on her PhD at UMass Dartmouth's School for Marine Science and Technology (SMAST) studying yellowtail flounder.  

Kittel grew up in Oregon when Keiko, the orca who starred in "Free Willy" and captured the attention of people worldwide, was housed at the Oregon Coast Aquarium.  After graduating from Oregon State University, Kittel moved to Maui where she worked in ecotourism sailing catamarans and leading snorkeling trips. She earned her master's degree in applied marine and fisheries ecology at the University of Aberdeen in Scotland before returning to Maui to study whales. Her goal of obtaining a PhD led her to SMAST.  

Why SMAST? 

"After spending a year in the UK getting my master's degree in Scotland, I moved back to Maui and started working for the Hawaiian Islands Humpback Whale National Marine Sanctuary. It was an incredible experience. We tagged whales with a device that's like a Fitbit to track their movement patterns, energy expenditure, and other behaviors.  

"I also got my 100-ton captain's license, which required me to work 720 days at sea.  

"It was my life's goal to get a PhD, so I started in the Intercampus Marine Science (IMS) program at UMass Boston and worked at the New England Aquarium. One of the great things about the IMS program is that you can take classes at different UMass campuses. I signed up to take a few classes on stock assessment at the SMAST campus and fell in love with SMAST and stock assessment.  I switched advisors and joined Professor Steve Cadrin's lab researching yellowtail flounder." 

"I love SMAST. We have a great community here, and it's a very collegial environment." Jessica Kittel PhD '24

Tell us about your research. What's the question you're trying to answer? 

"Using data from Northeast Fisheries Science Center surveys, we're looking to incorporate climate and environmental data into stock assessment models to get more accurate projections for better management decisions. 

"Yellowtail flounder populations have dropped despite limitations on fishing. Fishing pressure is usually one of the main factors affecting the size of a fish stock, but that's not the case here. Previous assessments weren't accurately capturing the changes that were occurring. It was assumed that if fishing was limited or stopped, the yellowtail flounder population would bounce back. But that's not what we're seeing. 

"Yellowtail flounder are affected by temperature, and their habitat is experiencing temperature fluctuations due to climate change. We want to see if incorporating climate data into our assessments can give us a more accurate model for determining how many fish are in the stocks.  

"I enjoy this research topic because it's very actionable. I loved studying whales, but that work felt somewhat abstract. It was hard to see how our data would be used to make a difference in the present. The research we're producing now goes straight to decisionmakers and will have a direct influence on fishing communities."  

What's your favorite thing about SMAST? 

"I love SMAST. We have a great community here, and it's a very collegial environment. We often get together to talk about our work, or we'll all go out after a research seminar. And everyone here is obsessed with marine science so it's easy to make friends.  

"The faculty are truly amazing, too. I have a ton of support from my professors, Dean Kevin Stokesbury, Gavin Fay, and Alex Hanzel at the Northeast Fisheries Science Center. Students here are so fortunate to benefit from SMAST's connections with other scientists and institutions in the field.  

"I couldn't ask for a better advisor than Steve Cadrin. He is extremely supportive but offers just the right amount of autonomy. He is always there to help when we need it and truly does whatever he can to set us up for success. 

What advice would you give to someone considering graduate school for marine science? 

"Take advantage of all opportunities that come your way.  Ultimately, your level of experience will be more important than your GPA, because each opportunity will lead to something else. So, volunteer to help with other people's projects, seek out new experiences, and get out of your comfort zone. And get good at coding. It's becoming a requisite skill for the field, so try to learn at least one coding language. It will be a very useful skill and an attractive quality for grad school applications. 

"I would also add: the best advisor is going to be the one who shares your research interests and is generous with their time. Find someone who cares about your success and is invested in the work." 

  • Major(s): Intercampus Marine Science PhD
  • Hometown: Sherwood, OR
  • Student Organizations: Society of Women in Marine Science

The multidisciplinary program focuses on the aquatic ecosystem and its contribution to humanity and provides a unique learning experience for students and professors alike who engage with local, regional, and worldwide partners.

Related features

May 20, 2024 William Tuttle '24: Mentor, football player, and future nurse

May 20, 2024 Jessica Kittel PhD '24: Diving into discovery

May 13, 2024 Jacqueline Ramirez '24: On the fast track

May 8, 2024 Clivens Joseph '24, '25: Charged with creativity, grounded in excellence

Apr 24, 2024 Olivia Munyambu '24: Researching the mental health of UMassD students of the African diaspora

Categorized as

In the simplest sense, a cybersecurity threat, or cyberthreat, is an indication that a hacker or malicious actor is attempting to gain unauthorized access to a network for launching a cyberattack.

Cyberthreats can range from the obvious, such as an email from a foreign potentate offering a small fortune if you’ll provide your bank account number, to the deviously stealthy, such as a line of malicious code that sneaks past cyberdefenses and lives on the network for months or years before triggering a costly data breach. The more security teams and employees know about the different types of cybersecurity threats, the more effectively they can prevent, prepare for and respond to cyberattacks.

Malware —short for “malicious software”—is software code that is written intentionally to harm a computer system or its users.

Almost every modern  cyberattack  involves some type of malware. Threat actors use malware attacks to gain unauthorized access and render infected systems inoperable, destroying data, stealing sensitive information and even wiping files critical to the operating system.

Common types of malware include:

  • Ransomware  locks a victim’s data or device and threatens to keep it locked, or leak it publicly, unless the victim pays a ransom to the attacker. According to the  IBM Security X-Force Threat Intelligence Index 2023 , ransomware attacks represented 17 percent of all cyberattacks in 2022.
  • A Trojan horse is malicious code that tricks people into downloading it by appearing to be a useful program or hiding within legitimate software. Examples include remote access Trojans (RATs), which create a secret backdoor on the victim’s device, or dropper Trojans, which install additional malware once they gain a foothold on the target system or network.
  • Spyware is a highly secretive malware that gathers sensitive information, like usernames, passwords, credit card numbers and other personal data, and transmits it back to the attacker without the victim knowing.
  • Worms are self-replicating programs that automatically spread to apps and devices without human interaction.

Frequently referred to as “human hacking,”  social engineering  manipulates targets into taking actions that expose confidential information, threaten their own or their organization’s financial well-being or otherwise compromise personal or organizational security.

Phishing  is the best-known and most pervasive form of social engineering. Phishing uses fraudulent emails, email attachments, text messages or phone calls to trick people into sharing personal data or login credentials, downloading malware, sending money to cybercriminals or taking other actions that might expose them to cybercrimes.

Common types of phishing include:

  • Spear phishing : highly targeted phishing attacks that manipulate a specific individual, often using details from the victim’s public social media profiles to make the scam more convincing.
  • Whale phishing : spear phishing that targets corporate executives or wealthy individuals.
  • Business email compromise (BEC) : scams in which cybercriminals pose as executives, vendors or trusted business associates to trick victims into wiring money or sharing sensitive data.

Another common social engineering scam is  domain name spoofing  (also called DNS spoofing), in which cybercriminals use a fake website or domain name that impersonates a real one—for example, ‘‘applesupport.com’’ for support.apple.com—to trick people into entering sensitive information. Phishing emails often use spoofed sender domain names to make the email seem more credible and legitimate.

In a man-in-the-middle (MITM) attack, a cybercriminal eavesdrops on a network connection to intercept and relay messages between two parties and steal data. Unsecured wifi networks are often happy hunting grounds for hackers looking to launch MITM attacks.

A denial-of-service (DoS) attack is a cyberattack that overwhelms a website, application or system with volumes of fraudulent traffic, making it too slow to use or entirely unavailable to legitimate users. A distributed denial-of-service attack, or DDoS attack, is similar except it uses a network of internet-connected, malware-infected devices or bots, which are known as a botnet, to cripple or crash the target system. 

A  zero-day exploit  is a type of cyberattack that takes advantage of a zero-day vulnerability—an unknown or as-yet-unaddressed or unpatched security flaw in computer software, hardware, or firmware. “Zero day” refers to the fact that a software or device vendor has “zero days”—or no time—to fix the vulnerabilities because malicious actors can already use them to gain access to vulnerable systems.

One of the best-known zero-day vulnerabilities is  Log4Shell , a flaw in the widely used Apache  Log4j  logging library. At the time of its discovery in November 2021, the Log4Shell vulnerability existed on 10 percent of global digital assets, including many web applications, cloud services and physical endpoints like servers.

As the name suggests, these attacks involve cybercriminals trying to guess or steal the password or login credentials to a user’s account. Many password attacks use social engineering to trick victims into unwittingly sharing this sensitive data. However, hackers can also use brute force attacks to steal passwords, repeatedly trying different password combinations until one is successful.

In an Internet of Things (IoT) attack, cybercriminals exploit vulnerabilities in IoT devices, like smart home devices and industrial control systems, to take over the device, steal data or use the device as a part of a botnet for other malicious ends.

In these attacks, hackers inject malicious code into a program or download malware to execute remote commands, enabling them to read or modify a database or change website data.

There are several types of injection attacks. Two of the most common include:

  • SQL injection attacks: when hackers exploit the SQL syntax to spoof identity; expose, tamper, destroy or make existing data unavailable; or become the database server administrator.
  • Cross-site scripting (XSS): these types of attacks are similar to SQL injection attacks, except instead of extracting data from a database, they typically infect users who visit a website.

Get the latest tech insights and expert thought leadership in your inbox.

Learn more about Malware

Learn more about detecting and patching a Log4j vulnerability

Learn more about IBM QRadar SIEM

These individuals or groups commit cybercrimes, mostly for financial gain. Common crimes that are committed by cybercriminals include ransomware attacks and phishing scams that trick people into making money transfers or divulging credit card information, login credentials, intellectual property or other private or sensitive information. 

A hacker is someone with the technical skills to compromise a computer network or system.

Keep in mind that not all hackers are threat actors or cybercriminals. For example, some hackers—called ethical hackers—essentially impersonate cybercriminals to help organizations and government agencies test their computer systems for vulnerabilities to cyberattacks.

Nation states and governments frequently fund threat actors with the goal of stealing sensitive data, gathering confidential information or disrupting another government’s critical infrastructure. These malicious activities often include espionage or cyberwarfare and tend to be highly funded, making the threats complex and challenging to detect. 

Unlike most other cybercriminals, insider threats do not always result from malicious actors. Many insiders hurt their companies through human error, like unwittingly installing malware or losing a company-issued device that a cybercriminal finds and uses to access the network.

That said, malicious insiders do exist. For example, a disgruntled employee may abuse access privileges for monetary gain (for example, payment from a cybercriminal or nation state), or simply for spite or revenge.

Strong passwords  (link resides outside of ibm.com), email security tools and antivirus software are all critical first lines of defense against cyberthreats.

Organizations also rely on firewalls, VPNs,  multi-factor authentication , security awareness training and other advanced  endpoint security  and  network security  solutions to protect against cyberattacks.

However, no security system is complete without state-of-the-art threat detection and incident response capabilities to identify cybersecurity threats in real-time, and help rapidly isolate and remediate threats to minimize or prevent the damage that they can do.

IBM Security® QRadar® SIEM applies machine learning and user behavior analytics (UBA) to network traffic alongside traditional logs for smarter threat detection and faster remediation. In a recent Forrester study, QRadar SIEM helped security analysts save more than 14,000 hours over three years by identifying false positives, reduce time spent investigating incidents by 90% and reduce their risk of experiencing a serious security breach by 60%.* With QRadar SIEM, resource-strained security teams have the visibility and analytics they need to detect threats rapidly and take immediate, informed action to minimize the effects of an attack.

*The  Total Economic Impact™ of IBM Security QRadar SIEM  is a commissioned study that is conducted by Forrester Consulting on behalf of IBM, April 2023. Based on projected results of a composite organization modeled from 4 interviewed IBM customers. Actual results will vary based on client configurations and conditions and, therefore, generally expected results cannot be provided.

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.

  • UB Directory
  • Office of the Provost >
  • Resources >

UBIT partners with Cybersecurity Club on Wi-Fi hacking exercise

Students participating in the Cybersecurity exercise.

Students taking part in the “Intro to Wi-Fi Hacking” event that was held on March 6, 2024. Photo by Dikshit Khandelwal 

Published May 20, 2024

When Dikshit Khandelwal helped found the newly established Cybersecurity Club (UBSEC) at UB, he wanted to give students a deeper understanding of cybersecurity, while promoting safe and ethical practices. When the club wanted to host an exercise simulating Wi-Fi hacking scenarios, they needed equipment. Enter UBIT.

UBIT helps out

Khandelwal, UBSEC president and a senior Computer Science major with a minor in Cybersecurity, reached out to UBIT for support. UBIT staff members Peter Fay and Adam Zangerle responded.   

This was the first time that UBIT provided equipment for students to configure themselves, Zangerle said, noting that he and Fay provided five wireless access points, a network switch, and guidance on how to set things up.  

“We were happy to help them with their event,” Zangerle said.  

Why specialized equipment

The “Intro to Wi-Fi Hacking” event was held on March 6, 2024 with over 150 students participating. The club performed the exercise on an isolated network, which was not a part of the university-wide network. 

“Working with UBIT was crucial for accessing specialized equipment like the Aruba access points, which are essential for a realistic and technical understanding of Wi-Fi security,” Khandelwal said. “The support made it possible for us to deliver a high-quality, practical learning experience.”

The club made sure the exercise was responsible, safe, and conducted in a managed area. Legal and ethical compliance, supervision and safety, and safeguards for responsible use were all part of the planning process

“We used the Aruba access points provided by UBIT to simulate Wi-Fi hacking scenarios,” Khandelwal said. “These access points were very useful as they gave us a platform to set up the Wi-Fi network. This setup allowed us to demonstrate various hacking techniques and provide hands-on experience in a safe and controlled environment.”

The goal of the exercise, Khandelwal said, was to “expose” students to the types of cybersecurity challenges they’re likely to encounter in the real world. 

“We aimed to develop their skills in detecting and responding to security breaches effectively,” he said. 

Ready to collaborate

Khandelwal said that watching the students enthusiastically engage in the exercise was “rewarding.” It also reaffirmed his commitment to pursuing a career in cybersecurity. Khandelwal would like to explore further collaborations with UBIT.

“Cybersecurity is a crucial field that touches nearly every aspect of our digital lives, even within our university community,” he said. “Collaborating with UBIT not only allows our students to gain real-world experience, but also prepares them for the demands of the cybersecurity workforce.”

Khanwelwal continued, “We are eager to continue this partnership, as it provides invaluable opportunities for our members to apply their learning in practical scenarios, further bridging the gap between academic theories and practical application. This ongoing collaboration is essential for keeping our curriculum current and relevant.”

Providing the equipment for UBSEC’s exercise is just one example of how UBIT supports student clubs on campus. Through providing equipment set-up, instruction, and feedback, UBIT works hard to accommodate requests from student organizations.

And while the collaborations with UBIT are helpful for students, there’s also a benefit to UBIT, Zangerle said.  “As a higher education institution, we should always be looking for ways to help students learn,” he added. 

“[Working with students] also helps UBIT with its day-to-day functions,” Zangerle added. “Often, devising innovative solutions for student events enables us to explore new techniques and functionalities of our equipment, which are then integrated into our campus setup.”

Students and student organizations in need of assistance should contact the UBIT Help Center .

Do you have questions or comments for the Office of the Provost? Let us know your thoughts and we’ll be happy to get back to you.

PhD Excellence Initiative

A campus-wide, student-centric effort to ensure that UB’s PhD programs remain among the strongest in the world.

Recent University News

  • 5/21/24 Helping dance majors get back on their feet
  • 5/21/24 Drug Discovery, Development and Evaluation Hub Welcomes New Faculty to Fuel Innovation
  • 5/21/24 Six with UB ties receive Fulbright student awards
  • 5/21/24 Materials Design and Innovation graduates first undergraduates
  • 5/21/24 Study enhancing learning methods for AI and machine learning systems wins IEEE award

Cookies on GOV.UK

We use some essential cookies to make this website work.

We’d like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services.

We also use cookies set by other sites to help us deliver content from their services.

You have accepted additional cookies. You can change your cookie settings at any time.

You have rejected additional cookies. You can change your cookie settings at any time.

phd topics for cyber security

  • Cyber security

Cyber security codes of practice

This page brings together the various codes of practice for cyber security. It explains who they are aimed at and how they link together.

On 15 May 2024, the government published two new voluntary codes of practice for consultation. The government has been working in these areas as part of our commitment under the National Cyber Strategy to increase software resilience and help secure Artificial Intelligence ( AI ) systems.  

AI Cyber Security Code of Practice and International Standard 

The AI Cyber Security Code of Practice advocates a secure-by-design approach to the cyber security of AI . The exploitation of vulnerabilities in AI could result in the loss of data and increased breaches within organisations, and therefore it is essential that cyber security and resilience is built into the design of AI throughout the technology’s lifecycle. The Government is proposing a two-part intervention in the form of a voluntary code of practice which is intended to form the basis of a future global standard.   

The Code of Practice for Software Vendors 

The Code of Practice for Software Vendors is the cornerstone component of an ambitious package of policy measures which take a secure by design approach to the development and maintenance of software. It ensures that organisations selling software, or products containing software, prioritise security and resilience in the design of their products. This can then be communicated effectively with business customers to facilitate risk management throughout supply chains.  

Our consultations 

The government is now seeking views from industry and the public on each of these codes of practice through two public consultations, each running between 15 May and 10 July 2024. Stakeholders are encouraged to submit feedback to help inform our future policy.   

Call for views on the cyber security of AI

Call for views on the code of practice for software vendors

The modular approach: A new approach to cyber security voluntary codes of practice 

To date and including the two new proposals, DSIT has published five codes of practice on cyber security*. The codes range from the provision of baseline cyber security measures for all organisations, to codes with scopes which address specific risks, such as AI .  

We recognise the introduction of these codes, and the potential for further codes to be published, will create a layered landscape. DSIT has therefore developed a modular approach to implementing current and future codes.  

Not only will it make accessing and understanding how the various codes fit together, but it will also help organisations easily identify which codes are relevant to them. This will mean that the complexity of the products or services provided by an organisation will determine the number of codes that they should consider. 

DSIT ’s codes of practice would be implemented by organisations using the following pathway: 

This pathway for implementation of our codes of practice will be updated regularly. We would encourage organisations to follow this to ensure they are taking the steps necessary to safeguard themselves from cyber risk.  

Background 

What is a cyber security code of practice .

Codes of Practice have been developed by the Department for Science, Innovation and Technology ( DSIT ) to set clear expectations for cyber security and resilience and should be considered voluntary. Codes outline what should be the baseline response to a given set of risks. They may act as stepping stones towards either further tailored guidance, or towards firmer interventions such as international standards or domestic regulation, if necessary.  

Our codes of practice are a part of a broader approach taken by government to ensure that citizens and businesses in the UK can use digital technologies safely.  

Setting minimum cyber security expectations and incorporating them into the development of digital technologies from the start, is a crucial step towards safeguarding evolving cyber threats. This also provides consumers with confidence in the technologies that they depend on, and the UK government is committed to providing that certainty. Most notably, the UK produced the world’s first mandatory and enforceable security requirements for consumer technologies, the Product Security and Telecommunications Infrastructure ( PSTI ) Act, which came into force in April 2024. The two codes are underpinned by those same principles. 

A secure-by-design approach is only one of many steps required to achieve UK-wide cyber resilience. The UK government has also taken concrete steps to ensure that organisations across our economy are provided with the support and guidance that they require to protect themselves from cyber risks, including those affecting complex digital supply chains. This approach has been anchored around Cyber Essentials, a government scheme which certifies those organisations which implement the basic cyber security controls sufficient to protect against the most common cyber attacks. Our codes are complementary with these technical controls and seek to build on them, whether by seeking to address specific additional risks beyond these baseline controls, or by identifying broader, non-technical measures that support organisational resilience.

* DSIT ’s other Codes are the ‘Cyber Governance Code of Practice’ which outlines the baseline responsibilities for senior leadership to promote strong organisational cyber security; and the ‘App Store Privacy and Security Code of Practice’, which is being implemented by all major app store operators across the world. The PSTI Act originated from a Code of Practice published in 2018.

Cyber security codes of practice currently in use or in development.

  • 15 May 2024
  • Open call for evidence
  • 16 May 2024
  • 23 January 2024
  • Closed call for evidence
  • 24 October 2023
  • Policy paper
  • 14 October 2018

Is this page useful?

  • Yes this page is useful
  • No this page is not useful

Help us improve GOV.UK

Don’t include personal or financial information like your National Insurance number or credit card details.

To help us improve GOV.UK, we’d like to know more about your visit today. Please fill in this survey (opens in a new tab) .

  • Sustainability
  • Small Business
  • University of New Brunswick Mastercard Cybersecurity Scholarship winners announced

The University of New Brunswick (UNB) is thrilled to announce the recipients of this year's prestigious Mastercard Cybersecurity Scholarship: Vaishnavi Shanmugam and Erika Thea Ajes.

The Mastercard Cybersecurity Scholarship, generously funded by Mastercard, provides each recipient $25,000 to support their academic journey in the Master of Applied Cybersecurity (MACSec) program and Research-Intensive Cyber Knowledge Studies (RICKS) program. This funding will help offset the costs associated with tuition, materials and other educational expenses.

“At Mastercard, our commitment to cybersecurity extends through all aspects of our business operations, including our partnerships and educational initiatives. By collaborating with the University of New Brunswick, we're advancing essential research and supporting the next generation of cybersecurity talent,” said Sasha Krstic, President, Mastercard, Canada. "Through scholarships for students like Vaishnavi and Erika, we are not just enhancing digital security but also nurturing the future leaders who will safeguard our digital world."

Shanmugam and Thea Ajes are enrolled in the MACSec program at UNB and are slated to graduate in August 2024. After graduation, they will join the RICKS cohort in September 2024 for hands-on cybersecurity training at the Canadian Institute for Cybersecurity (CIC).

“I'm pleased to acknowledge the remarkable achievements of Vaishnavi and Erika," said Dr. Paul J. Mazerolle, UNB President and Vice-Chancellor. "Their dedication, alongside the Mastercard Cybersecurity Scholarship, underscores education's crucial role in advancing cybersecurity. Congratulations to both recipients and thank you, Mastercard, for your generous support.”

Shanmugam has a keen interest in network security and architecture. She aims to leverage machine learning techniques to fortify digital ecosystems against emerging threats and vulnerabilities.

"Being a mom to a one-year-old daughter while navigating my studies is a challenging journey,” said Shanmugam. “UNB, CIC and Mastercard have recognized my hard work and awarded me this scholarship. This support extends beyond financial assistance; it has significantly reduced the burden of my education loan and given me the time to focus more on my studies.”

Thea Ajes is passionate about software security from a cyber perspective. Her goal is to develop software that is resilient against cyber-attacks, contributing to a safer digital landscape.

“I was amazed when I got the news, especially since it was my first time applying for a scholarship,” said Thea Ajes. “The news lifted a weight off my shoulders and  brought immense relief to my family back in the Philippines. I’m looking forward to the RICKS training program with CIC and Mastercard, and  I can’t fully express my gratitude and excitement for this opportunity.”

Media Contacts

University of New Brunswick

The University of New Brunswick (UNB) is Canada's oldest English-language university, and New Brunswick’s only national comprehensive university. Founded in 1785, the multi-campus institution has a rich history as well as a dynamic focus on research, innovation, experiential learning and entrepreneurship. UNB welcomes more than 10,000 students from 100 countries to its campuses.  With over 100 programs in 14 faculties, UNB helps students acquire the abilities needed to make an impact in their communities.

About Mastercard (NYSE: MA)

Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments and businesses realize their greatest potential. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all.

www.mastercard.com

  • Investor Relations

Mastercard Sites

  • Mastercard.com
  • Mastercard Brand Center
  • Mastercard Data & Services
  • Priceless.com

IMAGES

  1. 215 Best Cybersecurity Research Topics for Students

    phd topics for cyber security

  2. 215 Best Cybersecurity Research Topics for Students

    phd topics for cyber security

  3. 🔐 Cyber Security Research Topics

    phd topics for cyber security

  4. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    phd topics for cyber security

  5. Research Cyber Security Topics for Projects With Source Code [Help]

    phd topics for cyber security

  6. Trending Top 15+ Cybersecurity Thesis Topics [Research Domain] (2022)

    phd topics for cyber security

VIDEO

  1. NIST Cybersecurity Framework 2024: Boost Your InfoSec Program

  2. Drop Your Answer in Comments

  3. Foram Suthar, PhD in Computer Engg & Cyber Security, shared her experience from student to PhD

  4. Topics : Cyber Security & Digitalization in Nepal Government-प्रा. डा. सुबर्ण शाक्यज्यूको प्रस्तुति

  5. MEng Cyber Security, University of Limerick #StayCurious

  6. cyber security expert jagdesh's warning about hackers

COMMENTS

  1. List of Cybersecurity PhD Programs

    $197,820 is the most expensive cybersecurity PhD program and is available at Indiana University Bloomington. ... Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas. Location Benefits: The university is near many cybersecurity companies and government ...

  2. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    A Ph.D. in cybersecurity prepares graduates for advanced, high-level job opportunities, including roles in research, education and management. Cybersecurity Ph.D. programs allow students and ...

  3. Doctor of Philosophy in Cybersecurity (PhD-CY)

    National University's online Doctor of Philosophy of Cybersecurity (PhD-CY) degree program takes an applied approach to cybersecurity theory and research. NU's curriculum challenges you to explore advanced topics, learn the very latest concepts, and prepare for anticipated risks in the field of cybersecurity.

  4. Cybersecurity, PhD Degree

    Overview. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.

  5. 33 PhD programmes in Cyber Security

    Computer Science (Cybersecurity) 12,521 EUR / year. 10 years. The PhD program in Computer Science (Cybersecurity) at Arizona State University is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance. Ph.D. / Full-time / On Campus.

  6. Doctoral Degrees in Cybersecurity

    Cybersecurity doctorates offer two programs — the Ph.D. (doctor of philosophy degree) or the D.Sc. (doctor of science degree). The Ph.D. focuses on research and theory while the D.Sc. emphasizes application and action. Students who earn a Ph.D. generally want to add to the body of research or teach at the postsecondary level.

  7. Top 10 Best Programs for a PhD in Cyber Security

    Jobs and Salary Prospects for Doctors of Cybersecurity. Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include: Cybersecurity Engineer - $125,816. Information Security Manager - $96,406. Chief Information Security Officer (CISO) - $124,405. Security Architect - $111,433.

  8. Ph.D. in Cybersecurity Management

    With a focus on both technical and management skills, you'll develop the expertise needed to solve complex cybersecurity challenges and lead organizations in the fight against cyber threats. Working with world-renowned faculty, you'll have the opportunity to conduct research on a wide range of topics, including: Cybersecurity policy and governance

  9. Cybersecurity, PhD

    Cybersecurity, PhD. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and ...

  10. PhD in Cyber Security Programs 2024+

    Cyber Security Courses May Include. Students completing a PhD program in cyber security may complete a number of programs and courses. There may be some focus on courses that are related to topics of interest to the student. Keep in mind that there is a lot of focus on the latest insights into this field.

  11. Doing a PhD in Cyber Security

    A UK doctoral student can expect to pay around £5,500 per year in tuition fees for a 2021/22 PhD programme in Cyber Security. Typical tuition fees for EU and overseas students are around £25,000 per academic year. Part-time tuition fees are normally proportioned according to the research programme length. Most institutions have Centres for ...

  12. Cybersecurity Research Topics (+ Free Webinar)

    If you're still unsure about how to find a quality research topic, check out our Research Topic Kickstarter service, which is the perfect starting point for developing a unique, well-justified research topic. A comprehensive list of cybersecurity-related research topics. Includes 100% free access to a webinar and research topic evaluator.

  13. Suggested PhD Projects

    Suggested PhD Projects. This page lists indicative research areas/topics for prospective PhD applicants to identify supervisors and research topics for their PhD project. Potential research students are encouraged and welcome to produce their own suggestions in cyber security that broadly meet the general interests of the Group's Core Members.

  14. 60+ Latest Cyber Security Research Topics for 2024

    Criminal Law. Cyber Security Future Research Topics. Developing more effective methods for detecting and responding to cyber attacks. Investigating the role of social media in cyber security. Examining the impact of cloud computing on cyber security. Investigating the security implications of the Internet of Things.

  15. Information Science Ph.D. With a Concentration in Cybersecurity

    The UNT Information Science Ph.D. program responds to the varied and changing needs of the information age by offering the Cybersecurity concentration, offered jointly with UNT Department of Computer Science and Engineering, and UNT Department of Information Technology and Decision Sciences with the ultimate goal of providing interdisciplinary training, research and professional services in ...

  16. Cybersecurity MPhil/PhD

    This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today's societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

  17. Cyber Security, Privacy and Trust PhD

    The aim of this PhD programme is to provide students with research training in specialised topics of security, privacy and trust, helping produce the next generation of world-leading experts of the field.

  18. 75 Cyber Security Research Topics in 2024

    Cybersecurity research aims to protect computer systems, networks, and data from unauthorised access, theft, or damage. It involves studying and developing methods and techniques to identify, understand, and mitigate cyber threats and vulnerabilities. The field can be divided into theoretical and applied research and faces challenges such as.

  19. Doctor of Philosophy (PhD) in Space Cybersecurity

    The Doctor of Philosophy (PhD) in Space Cybersecurity degree is a unique program designed to meet the evolving needs of today's Space Cybersecurity in an ever-changing world of conflict. This program provides students with the opportunity to conduct extensive and sustained, original research at the highest level in this field of Space ...

  20. PhD topics

    Potential PhD topics include risk quantification, security control selection, cyber insurance, crisis response, exploit broking and many other topics in security and privacy. These topics are also open to students without computer science training. Contact: Daniel Woods. Foundations for composable security.

  21. PhD Research Topics in Cybersecurity

    SCI. Taylor & Francis. PhD Research Topics in Cybersecurity will look deep into your area to find what you expect. Because of research progress, we will allot a distinct team to mentor your works. In fact, this team will tell you the updates in the field of your work. If you want to be on track, then approach us.

  22. PhD Projects in Cybersecurity

    PhD projects in cybersecurity aim to break all the walls in the PhD/MS scholars' study trip. We have got 18+ years of skills and did 1500+ superb projects in this broad field. " Cybersecurity is a vital part to shield the intern internet-based from cyber threats.". By and large, you can learn a lot when you work with us.

  23. Karen Nershi Joins Middlebury Institute as Part of Cybersecurity

    Dr. Karen Nershi will join the faculty in Middlebury Institute's nonproliferation and terrorism program this fall. Dr. Nershi holds a PhD in political science from the University of Pennsylvania and was a postdoctoral fellow at the Stanford Internet Observatory at Stanford University. Her research focuses on international security questions emerging from the adoption of new technologies ...

  24. 2024: Jessica Kittel PhD '24: Diving into discovery

    Jessica Kittel PhD '24 has sailed catamarans, tagged whales and sandbar sharks, and earned her 100-ton captain's license. Now, she's working on her PhD at UMass Dartmouth's School for Marine Science and Technology (SMAST) studying yellowtail flounder. Kittel grew up in Oregon when Keiko, the orca who starred in "Free Willy" and captured the ...

  25. Types of Cyberthreats

    A zero-day exploit is a type of cyberattack that takes advantage of a zero-day vulnerability—an unknown or as-yet-unaddressed or unpatched security flaw in computer software, hardware, or firmware. "Zero day" refers to the fact that a software or device vendor has "zero days"—or no time—to fix the vulnerabilities because malicious actors can already use them to gain access to ...

  26. UBIT partners with Cybersecurity Club on Wi-Fi hacking exercise

    When Dikshit Khandelwal helped found the newly established Cybersecurity Club (UBSEC) at UB, he wanted to give students a deeper understanding of cybersecurity, while promoting safe and ethical practices. When the club wanted to host an exercise simulating Wi-Fi hacking scenarios, they needed equipment. Enter UBIT.

  27. Cyber security codes of practice

    The AI Cyber Security Code of Practice advocates a secure-by-design approach to the cyber security of AI. The exploitation of vulnerabilities in AI could result in the loss of data and increased ...

  28. University of New Brunswick Mastercard Cybersecurity Scholarship

    The Mastercard Cybersecurity Scholarship, generously funded by Mastercard, provides each recipient $25,000 to support their academic journey in the Master of Applied Cybersecurity (MACSec) program and Research-Intensive Cyber Knowledge Studies (RICKS) program.

  29. Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations?

    In today's global economy, the increasingly fragmented state of global cyber regulation undermines cybersecurity and the growth potential of digital trade. Trade negotiators should leverage the ...