Grad Coach

Research Topics & Ideas: Cybersecurity

50 Topic Ideas To Kickstart Your Research

Research topics and ideas about cybersecurity

If you’re just starting out exploring cybersecurity-related topics for your dissertation, thesis or research project, you’ve come to the right place. In this post, we’ll help kickstart your research by providing a hearty list of cybersecurity-related research topics and ideas , including examples from recent studies.

PS – This is just the start…

We know it’s exciting to run through a list of research topics, but please keep in mind that this list is just a starting point . These topic ideas provided here are intentionally broad and generic , so keep in mind that you will need to develop them further. Nevertheless, they should inspire some ideas for your project.

To develop a suitable research topic, you’ll need to identify a clear and convincing research gap , and a viable plan to fill that gap. If this sounds foreign to you, check out our free research topic webinar that explores how to find and refine a high-quality research topic, from scratch. Alternatively, consider our 1-on-1 coaching service .

Research topic idea mega list

Cybersecurity-Related Research Topics

  • Developing machine learning algorithms for early detection of cybersecurity threats.
  • The use of artificial intelligence in optimizing network traffic for telecommunication companies.
  • Investigating the impact of quantum computing on existing encryption methods.
  • The application of blockchain technology in securing Internet of Things (IoT) devices.
  • Developing efficient data mining techniques for large-scale social media analytics.
  • The role of virtual reality in enhancing online education platforms.
  • Investigating the effectiveness of various algorithms in reducing energy consumption in data centers.
  • The impact of edge computing on the performance of mobile applications in remote areas.
  • The application of computer vision techniques in automated medical diagnostics.
  • Developing natural language processing tools for sentiment analysis in customer service.
  • The use of augmented reality for training in high-risk industries like oil and gas.
  • Investigating the challenges of integrating AI into legacy enterprise systems.
  • The role of IT in managing supply chain disruptions during global crises.
  • Developing adaptive cybersecurity strategies for small and medium-sized enterprises.
  • The impact of 5G technology on the development of smart city solutions.
  • The application of machine learning in personalized e-commerce recommendations.
  • Investigating the use of cloud computing in improving government service delivery.
  • The role of IT in enhancing sustainability in the manufacturing sector.
  • Developing advanced algorithms for autonomous vehicle navigation.
  • The application of biometrics in enhancing banking security systems.
  • Investigating the ethical implications of facial recognition technology.
  • The role of data analytics in optimizing healthcare delivery systems.
  • Developing IoT solutions for efficient energy management in smart homes.
  • The impact of mobile computing on the evolution of e-health services.
  • The application of IT in disaster response and management.

Research topic evaluator

Cybersecurity Research Ideas (Continued)

  • Assessing the security implications of quantum computing on modern encryption methods.
  • The role of artificial intelligence in detecting and preventing phishing attacks.
  • Blockchain technology in secure voting systems: opportunities and challenges.
  • Cybersecurity strategies for protecting smart grids from targeted attacks.
  • Developing a cyber incident response framework for small to medium-sized enterprises.
  • The effectiveness of behavioural biometrics in preventing identity theft.
  • Securing Internet of Things (IoT) devices in healthcare: risks and solutions.
  • Analysis of cyber warfare tactics and their implications on national security.
  • Exploring the ethical boundaries of offensive cybersecurity measures.
  • Machine learning algorithms for predicting and mitigating DDoS attacks.
  • Study of cryptocurrency-related cybercrimes: patterns and prevention strategies.
  • Evaluating the impact of GDPR on data breach response strategies in the EU.
  • Developing enhanced security protocols for mobile banking applications.
  • An examination of cyber espionage tactics and countermeasures.
  • The role of human error in cybersecurity breaches: a behavioural analysis.
  • Investigating the use of deep fakes in cyber fraud: detection and prevention.
  • Cloud computing security: managing risks in multi-tenant environments.
  • Next-generation firewalls: evaluating performance and security features.
  • The impact of 5G technology on cybersecurity strategies and policies.
  • Secure coding practices: reducing vulnerabilities in software development.
  • Assessing the role of cyber insurance in mitigating financial losses from cyber attacks.
  • Implementing zero trust architecture in corporate networks: challenges and benefits.
  • Ransomware attacks on critical infrastructure: case studies and defence strategies.
  • Using big data analytics for proactive cyber threat intelligence.
  • Evaluating the effectiveness of cybersecurity awareness training in organisations.

Recent Cybersecurity-Related Studies

While the ideas we’ve presented above are a decent starting point for finding a research topic, they are fairly generic and non-specific. So, it helps to look at actual studies in the cybersecurity space to see how this all comes together in practice.

Below, we’ve included a selection of recent studies to help refine your thinking. These are actual studies,  so they can provide some useful insight as to what a research topic looks like in practice.

  • Cyber Security Vulnerability Detection Using Natural Language Processing (Singh et al., 2022)
  • Security for Cloud-Native Systems with an AI-Ops Engine (Ck et al., 2022)
  • Overview of Cyber Security (Yadav, 2022)
  • Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview (Mijwil et al., 2023)
  • Cyber Security: Strategy to Security Challenges A Review (Nistane & Sharma, 2022)
  • A Review Paper on Cyber Security (K & Venkatesh, 2022)
  • The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review (Mijwil, 2023)
  • Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime (Mijwil et al., 2023)
  • ESTABLISHING CYBERSECURITY AWARENESS OF TECHNICAL SECURITY MEASURES THROUGH A SERIOUS GAME (Harding et al., 2022)
  • Efficiency Evaluation of Cyber Security Based on EBM-DEA Model (Nguyen et al., 2022)
  • An Overview of the Present and Future of User Authentication (Al Kabir & Elmedany, 2022)
  • Cybersecurity Enterprises Policies: A Comparative Study (Mishra et al., 2022)
  • The Rise of Ransomware: A Review of Attacks, Detection Techniques, and Future Challenges (Kamil et al., 2022)
  • On the scale of Cyberspace and Cybersecurity (Pathan, 2022)
  • Analysis of techniques and attacking pattern in cyber security approach (Sharma et al., 2022)
  • Impact of Artificial Intelligence on Information Security in Business (Alawadhi et al., 2022)
  • Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security (Sasikala & Sharma, 2022)
  • Optimization of Secure Coding Practices in SDLC as Part of Cybersecurity Framework (Jakimoski et al., 2022)
  • CySSS ’22: 1st International Workshop on Cybersecurity and Social Sciences (Chan-Tin & Kennison, 2022)

As you can see, these research topics are a lot more focused than the generic topic ideas we presented earlier. So, for you to develop a high-quality research topic, you’ll need to get specific and laser-focused on a specific context with specific variables of interest.  In the video below, we explore some other important things you’ll need to consider when crafting your research topic.

Get 1-On-1 Help

If you’re still unsure about how to find a quality research topic, check out our Research Topic Kickstarter service, which is the perfect starting point for developing a unique, well-justified research topic.

Research Topic Kickstarter - Need Help Finding A Research Topic?

You Might Also Like:

Topic Kickstarter: Research topics in education

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • Print Friendly

Cybersecurity Guide

From scholar to expert: Cybersecurity PhD options

In this guide

  • Industry demand
  • 2024 rankings
  • Preparation
  • Considerations
  • School listings

The cybersecurity landscape is not just growing—it’s evolving at a breakneck pace. And what better way to stay ahead of the curve than by pursuing a PhD in cybersecurity?

This advanced degree is no longer confined to the realm of computer science. Today, it branches into diverse fields like law, policy, management, and strategy, reflecting the multifaceted nature of modern cyber threats.

If you’re looking to become a thought leader in this dynamic industry, a PhD in cybersecurity offers an unparalleled opportunity to deepen your expertise and broaden your horizons.

This guide is designed to give prospective cybersecurity PhD students a general overview of available cybersecurity PhD programs. It will also outline some of the factors to consider when trying to find the right PhD program fit, such as course requirements and tuition costs. 

Industry demand for PhDs in cybersecurity

Like other cutting-edge technology fields, until recently, cybersecurity PhD programs were often training grounds for niche positions and specialized research, often for government agencies (like the CIA, NSA, and FBI),  or closely adjacent research organizations or institutions. 

Today, however, as the cybersecurity field grows to become more pervasive and consumer-oriented, there are opportunities for cybersecurity PhDs to work at public-facing companies like startups and name-brand financial, software, infrastructure, and digital service firms.

One trend that is emerging in the cybersecurity field is that cybersecurity experts need to be well-versed in a variety of growing threats. If recent headlines about cybersecurity breaches are any indication, there are a number of new attack vectors and opportunities for cybercrime and related issues. Historically, committing cybercrime took resources and a level of sophistication that required specialized training or skill.

But now, because of the pervasiveness of the internet, committing cybercrime is becoming more commonplace. So training in a cybersecurity PhD program allows students to become an experts in one part of a growing and multi-layered field.

In fact, this trend of needing well-trained, but adaptable cybersecurity professionals is reflected by the move by cybersecurity graduate schools to offer specialized master’s degrees , and many companies and professional organizations offer certifications in cybersecurity that focus on particular issues related to cybersecurity technology, cybersecurity law , digital forensics , policy, or related topics.

That said, traditional research-oriented cybersecurity positions continue to be in demand in academia and elsewhere — a trend that will likely continue. 

One interesting facet of the cybersecurity field is trying to predict what future cybersecurity threats might look like and then develop tools and systems to protect against those threats.

As new technologies and services are developed and as more of the global population begins using Internet services for everything from healthcare to banking — new ways of protecting those services will be required. Often, it’s up to academic researchers to think ahead and examine various threats and opportunities to insulate against those threats.

Another key trend coming out of academic circles is that cybersecurity students are becoming increasingly multidisciplinary.

As cybersecurity hacks impact more parts of people’s everyday lives, so too do the academic programs that are designed to prepare the next generation of cybersecurity professionals. This emerging trend creates an enormous amount of opportunity for students who have a variety of interests and who are looking to create a non-traditional career path.

The best cybersecurity PhD programs for 2024

Capella university, georgia institute of technology, northeastern university, marymount university, school of technology and innovation, nova southeastern university, college of computing & engineering, purdue university, stevens institute of technology, worcester polytechnic institute, university of illinois at urbana-champaign, mississippi state university, new york institute of technology.

These rankings were compiled from data accessed in November 2023 from the Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

What is required to get a PhD in cybersecurity?

Good news first: Obtaining a PhD in a field related to cybersecurity will likely create tremendous employment opportunities and lead to interesting and dynamic career options.

Bad news: Getting a PhD requires a lot of investment of time and energy, and comes with a big opportunity cost (meaning you have to invest four to five years, or longer, or pursue other opportunities to obtain a doctoral degree. 

Here’s a quick breakdown of what is required to get a PhD in cybersecurity. Of course, specific degree requirements will vary by program. One growing trend in the field is that students can now obtain degrees in a variety of formats, including traditional on-campus programs, online degree programs , and hybrid graduate degree programs that combine both on-campus learning with online learning. 

Related resources

  • Online PhD in cybersecurity – A guide to finding the right program
  • Cybersecurity degree programs
  • Podcast episodes and expert interviews

Preparing for a cybersecurity doctorate program

Cybersecurity is a relatively new formalized technology field, nonetheless, there are several ways that students or prospective PhD candidates can get involved or explore the field before and during a graduate school program. A few examples of ways to start networking and finding opportunities include: 

Join cybersecurity organizations with professional networks

Specialized professional organizations are a good place to find the latest in career advice and guidance. Often they publish newsletters or other kinds of information that provide insights into the emerging trends and issues facing cybersecurity professionals. A couple of examples include:

The Center for Internet Security  (CIS) is a non-profit dedicated to training cybersecurity professionals and fostering a sense of collaboration. The organization also publishes information and analysis of the latest cybersecurity threats and issues facing the professional community.

The SANS Institute runs several different kinds of courses for students (including certification programs) as well as ongoing professional cybersecurity education and training for people working in the field. The organization has several options including webinars, online training, and live in-person seminars. Additionally, SANS also publishes newsletters and maintains forums for cybersecurity professionals to interact and share information.

Leverage your social network

Places like LinkedIn and Twitter are good places to start to find news and information about what is happening in the field, who the main leaders and influencers are, and what kinds of jobs and opportunities are available.

Starting a professional network early is also a great opportunity. Often professionals and members of the industry are willing to provide guidance and help to students who are genuinely interested in the field and looking for career opportunities. 

Cybersecurity competitions 

Cybersecurity competitions are a great way to get hands-on experience working on real cybersecurity problems and issues. As a PhD student or prospective student, cybersecurity competitions that are sponsored by industry groups are a great way to meet other cybersecurity professionals while getting working on projects that will help flesh out a resume or become talking points in later job interviews.

The US Cyber Challenge , for example, is a series of competitions and hackathon-style events hosted by the Department of Homeland Security Science and Technology Directorate and the Center for Internet Security to prepare the next generation of cybersecurity professionals.

Internships

Internships also continue to be a tried and true way to gain professional experience. Internships in technical fields like cybersecurity can also pay well. Like the industry itself, cybersecurity internships are available across a wide range of industries and can range from academic research-oriented to more corporate kinds of work. 

Things to consider when choosing a cybersecurity PhD program

There are many considerations to evaluate when considering any kind of graduate degree, but proper planning is essential to be able to obtain a doctoral degree. It’s also important to note that these are just guidelines and that each graduate program will have specific requirements, so be sure to double-check.

What you will need before applying to a cybersecurity PhD program:

  • All undergraduate and graduate transcripts
  • A statement of intent, which is like a cover letter outlining interest
  • Letters of reference
  • Application fee
  • Online application
  • A resume or CV outlining professional and academic accomplishments

What does a cybersecurity PhD program cost?

Obtaining a PhD is a massive investment, both in terms of time and money. Cybersecurity PhD students are weighing the cost of becoming an expert in the field with the payoff of having interesting and potentially lucrative career opportunities on the other side.

Degree requirements are usually satisfied in 60-75 hours, so the cost of a doctoral degree can be well into the six-figure range. Here’s a more specific breakdown:

Tuition rates

The Cybersecurity Guide research team looked at 26 programs that offer a cybersecurity-related PhD degree. Here’s a breakdown of tuition rates (all figures are based on out-of-state tuition).

$17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology.

$86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.

$197,820 is the most expensive cybersecurity PhD program and is available at Indiana University Bloomington.

The good news is that by the time students get to the PhD level there are a lot of funding options — including some graduate programs that are completely funded by the university or academic departments themselves.

Additionally, funding in the form of research grants and other kinds of scholarships is available for students interested in pursuing cybersecurity studies. 

One example is the CyberCorps: Scholarships for Service program. Administered by the National Science Foundation, PhD students studying cybersecurity are eligible for a $34,000 a year scholarship, along with a professional stipend of $6,000 to attend conferences in exchange for agreeing to work for a government agency in the cybersecurity space after the PhD program. 

Frequently asked questions about cybersecurity PhD programs

Most traditional and online cybersecurity graduate programs require a minimum number of credits that need to be completed to obtain a degree. On average, it takes 71 credits to graduate with a PhD in cybersecurity — far longer (almost double) than traditional master’s degree programs. In addition to coursework, most PhD students also have research and teaching responsibilities that can be simultaneously demanding and great career preparation.

At the core of a cybersecurity doctoral program is a data science doctoral program, you’ll be expected to learn many skills and also how to apply them across domains and disciplines. Core curriculums will vary from program to program, but almost all will have a core foundation of statistics.  

All PhD candidates will have to take a series of exams that act as checkpoints during the lengthy PhD process. The actual exam process and timing can vary depending on the university and the program, but the basic idea is that cybersecurity PhD candidates generally have to sit for a qualifying exam, which comes earlier in the program (usually the winter or spring of the second year of study), a preliminary exam, which a candidate takes to show they are ready to start the dissertation or research portion of the PhD program, and a final exam where PhD students present and defend their research and complete their degree requirements. 

A cybersecurity PhD dissertation is the capstone of a doctoral program. The dissertation is the name of a formal paper that presents the findings of original research that the PhD candidate conducted during the program under the guidance of faculty advisors. Some example cybersecurity research topics that could potentially be turned into dissertation ideas include: * Policies and best practices around passwords * Ways to defend against the rise of bots * Policies around encryption and privacy * Corporate responsibility for employee security * Internet advertising targeting and privacy * The new frontier of social engineering attacks * Operation security (OpSec) strategy and policy * Network infrastructure and defense * Cybersecurity law and policy * The vulnerabilities of biometrics * The role of ethical hacking * Cybersecurity forensics and enforcement

A complete listing of cybersecurity PhD programs

The following is a list of cybersecurity PhD programs. The listing is intended to work as a high-level index that provides enough basic information to make quick side-by-side comparisons easy. 

You should find basic data about what each school requires (such as a GRE score or prior academic work) as well as the number of credits required, estimated costs, and a link to the program.

Arizona State University

  • Aim: Equip students with in-depth expertise in cybersecurity.
  • Study Modules: Delve into advanced computer science subjects and specific cybersecurity courses.
  • Research Component: Students undertake groundbreaking research in the cybersecurity domain.

Carnegie Mellon University

  • CNBC Collaboration: A joint effort between Carnegie Mellon and the University of Pittsburgh to train students in understanding the brain's role in cognition.
  • Training Program: Students take four main neuroscience courses and participate in seminars and ethics training.
  • Course Integration: Whether students have a B.S. or M.S. degree, they can combine the CNBC and ECE Ph.D. courses without extra workload.

Colorado School of Mines

  • Research Focus: Cybersecurity: Studying online security and privacy.
  • Cost and Financial Aid: Provides details on program costs and available financial support.
  • Current Mines Community: Offers specific information for those already affiliated with Mines.

Indiana University Bloomington

  • Focus Areas: Options include Animal Informatics, Bioinformatics, Computer Design, and more.
  • Information Sessions: The university holds events to guide potential students about admissions and study options.
  • Minor Requirement: All Ph.D. students must complete a minor, which can be from within the Luddy School of Informatics or from another approved school at IU Bloomington.

Iowa State University

  • Details: The program is open to both domestic and international students.
  • Time to Complete: Ph.D.: About 5.2 years
  • Goals: Students should gain deep knowledge, follow ethics, share their findings, and do advanced research if they're writing a thesis.
  • Learning Goals: Master core areas of Computer Science, achieve in-depth knowledge in a chosen subfield, obtain expertise to perform original research, and demonstrate the ability to communicate technical concepts and research results.
  • Duration: Median time to earn the doctorate is 5.8 years.
  • Application Information: The program is open to both domestic and international students.
  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.
  • Emphasis on Research: The college showcases its strength in research through sections dedicated to Research Areas, affiliated Institutes & Centers, ongoing Research Projects, and specialized Labs & Groups.
  • Holistic Student Growth: The college promotes a comprehensive student experience, spotlighting Clubs & Organizations, campus Facilities, and tech Systems.
  • Guidance for Future Students: Provides tailored insights for students considering joining at various academic levels, from Undergraduate to PhD.
  • Broad Learning: The program covers many areas, from software and policy to psychology and ethics, reflecting the wide scope of cybersecurity.
  • Course Design: Students learn foundational security topics first and then dive into specialized areas, like cyber forensics.
  • Successful Alumni: Past students now work in places like NASA, Amazon, and Google.
  • Feature: Students can apply to up to three different campuses and/or majors using a single application and fee payment.
  • Preparing for a Globalized World: Courses such as Global Supply Chain Management equip students for international careers.
  • Tech-Forward Curriculum: Purdue's commitment to advanced technology is evident.

Rochester Institute of Technology

  • Cyberinfrastructure Focus: The program dives deep into how hardware, data, and networks work together to create secure and efficient digital tools.
  • Broad Applications: The program uses computing to solve problems in fields like science, arts, and business.
  • Success Rate: All RIT graduates from this program have found relevant roles, especially in the Internet and Software sectors.

Sam Houston State University

  • Program's Objective: The course aims to nurture students to be technically adept and also to take on leadership roles in the digital and cyber forensic domain across various industries.
  • Assessments: Students undergo comprehensive tests to evaluate their understanding.
  • Research Paper (Dissertation): Once students reach the doctoral candidacy phase, they must produce and defend a significant research paper or dissertation.
  • Funding: All Ph.D. students get financial help, so they can start their research right away.
  • Teachers: The program has top experts, including those who've made big discoveries in computer science.
  • Research Areas: Students can study the latest topics like AI, computer vision, and online security.

The University of Tennessee

  • Study Areas: Options include Cybersecurity, Data Analytics, Computer Vision, and more.
  • Tests: You'll have to pass a few exams, including one when you start, one before your final project, and then present your final project.
  • Courses: Some specific courses are needed, and your main professor will help decide which ones.
  • Big Exam: Before moving forward, you'll take a detailed exam about your research topic.
  • Final Step: You'll present and defend your research project to experts.
  • Overview: This program is for those with a degree in Computer Science or similar fields. It has special focus areas like Cybersecurity and Machine Learning.

University of Arizona

  • Study Plan: Students start with learning research basics and then dive into modern tech topics.
  • Support for Students: All PhD students get funding that covers their studies, a stipend, and health insurance. Money for travel to conferences is also available.
  • After Graduation: Alumni work at top universities and big companies like Google and Microsoft.

University of California-Davis

  • About the Program: Students engage in deep research, ending with a dissertation.
  • Jobs After Graduation: Roles in companies or academic positions.
  • Vibrant Community: Beyond academics, students join a supportive community, enriching their Ph.D. experience.

University of Colorado - Colorado Springs

  • Recognition: UCCS is recognized by the National Security Agency (NSA) and the Department of Homeland Security for excellence in Information Assurance Education.
  • Course Approval: The NSA has approved UCCS's courses as meeting national security training standards.
  • Overview: This program focuses on vital areas like cyber security, physical security, and homeland security.

University of Idaho

  • Partnership with NSA and DHS: The university is part of a program to boost cyber defense education.
  • Recognition: The University of Idaho is among the institutions recognized as Centers of Academic Excellence in Cyber Defense.
  • Objective: To minimize vulnerabilities in the national information infrastructure.
  • Overview: This program is meticulously crafted to deliver premier legal education to its students.
  • Courses: Encompasses a balanced mix of traditional legal doctrines, theoretical viewpoints, and hands-on practical experiences.
  • Aim: The primary objective is to equip students with top-notch legal education.

University of Missouri-Columbia

  • Seminars: PhD students should attend 20 seminars. If they were previously Master's students, their past attendance counts.
  • Timeline Requirements: Comprehensive Exam must be completed within five years of starting the program.
  • Dissertation and Publication: At least one journal paper must be submitted, accepted, or published.

University of North Carolina at Charlotte

  • Faculty: The faculty members are renowned for their impactful research contributions on a global scale.
  • Curriculum: The curriculum is versatile, catering to individuals aiming for academia as well as those targeting roles in the corporate, commerce, or public sectors.
  • Program: A blend of theoretical and hands-on research is emphasized, offering a well-rounded educational experience.

Virginia Tech

  • Seminars and Ethics: Students attend special seminars and complete training on scholarly ethics and diversity.
  • Guidance: Each student gets a faculty advisor. A group of faculty members, called a committee, also guides them.
  • Major Exams: Students go through four main stages: a qualifying process, a preliminary proposal, a research presentation, and a final defense.
  • Strong Research: WPI's PhD program is recognized for its excellent research contributions.
  • Practical Focus: The program teaches students to tackle real tech challenges.
  • Modern Labs: Students use the latest labs like the Human-Robot Interaction Lab.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

New Jersey City University, College of Professional Studies

  • About: Focuses on best practices in areas like national security, cyber defense, and crisis communication.
  • Recognitions: The program has been honored by the National Security Agency since 2009 and was recognized for excellence in intelligence studies.
  • Jobs: Graduates are prepared for top roles in sectors like government and education.
  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.
  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

New York University Tandon School of Engineering

  • Scholarships: Many students get scholarships that pay for tuition and give a monthly allowance.
  • Research Interest: Research areas include cybersecurity, computer games, web search, graphics, and more.
  • Experience: Students can also research in NYU's campuses in Shanghai or Abu Dhabi.
  • One Degree for All: Every student gets the same Ph.D., regardless of their specific area of study.
  • Research Focus: The program emphasizes deep research and prepares students for advanced roles.
  • Major Project: Students work on a big research project, adding new knowledge to the computing world.
  • Program: Prepares students for leadership roles in different sectors.
  • Opportunities: Qualified students might get opportunities as Research or Teaching Assistants.
  • Overview: Focuses on advanced research and modern technologies.

Augusta University

  • Goal: The program prepares students for research roles and to make new discoveries in tech.
  • Benefits: A Ph.D. opens up leadership opportunities in tech sectors.
  • Overview: It focuses on new discoveries in areas like security, artificial intelligence, and virtual reality.

University of Texas at San Antonio

  • Financial Support: Full-time students can get funding, which covers tuition and offers roles like teaching assistants.
  • Job Prospects: UTSA trains students for jobs that are in high demand, using data from official sources.
  • Overview: The program focuses on in-depth research and teaching.

University of Central Florida

  • Mix of Subjects: Students can take courses from different areas, giving them a broad view of security topics.
  • Many Job Options: Graduates can work in government, big companies, or teach in universities.
  • Hands-on Learning: The program offers research, study projects, and internships for real-world experience.

Cybersecurity Dissertation Topics

Cybersecurity is an incredibly interesting topic area to complete your dissertation in, with it becoming increasingly prominent as technology is so heavily integrated into our daily lifestyles. Cybersecurity is always around us, from simple security systems that protect our mobile devices to complex strategies to secure personal data for big corporations. This helps to provide an array of different opportunities for completing an engaging and innovative cyber security dissertation. Some of the most important topic areas that exist within the field of cybersecurity include cybersecurity and cryptocurrencies, cybersecurity’s impact on business and economics, the role of cybersecurity in world affairs, cybersecurity and cybercrime, and how cybersecurity connects with big data and the Internet of Things (IoT).

Cryptocurrencies

Business & economics, world affairs, big data & iot.

Cryptocurrencies are very much the trendy topic in the world of cyber right now, with there being numerous studies exploring various aspects of cryptocurrencies and blockchain technology. However, few of these aims to contextualise the link between these technologies and cybersecurity, both for how blockchain technology can enhance cybersecurity, and what cybersecurity strategies can be used to protect cryptocurrencies. The following topic titles provide engaging research reviews into these key areas.

  • A historical overview on the development of cyber security to enhance cryptographic security of blockchain technologies.
  • A critical analysis of cyber-attacks and cryptocurrencies.
  • How can blockchain applications be used to support cyber security strategies to reduce the global threat of cybercrime?
  • How can cryptocurrencies be regulated in the European Union: What is the mediating role of cyber security?
  • Can blockchain technologies be used to front the new domain of cyber forensics?
  • An analysis of the future of cryptocurrencies and the mediating influence this may have on the state of cyber security strategies.

Organisations are having to invest more and more of their financial resources into cybersecurity to protect both their systems and their customers’ data. This lends itself to many new study areas that aim to explore how cybersecurity can be managed in the organisational setting, and what the potential return on investment for these strategies is.

  • An analysis of the mediating role of risk management on the implementation of a comprehensive cybersecurity strategy.
  • The use of Virtual Private Networks to enable remote working: A review of critical cyber security implications for developing successful VPN systems.
  • A critical analysis of the role of cybersecurity throughout the supply chain for enhancing supply chain performance and collaboration.
  • What cyber security measures can Small and Medium Sized Enterprises use to enhance their data protection protocols and build customer confidence?
  • A review of effective cyber security strategies for mitigating cybercrime risk to business operations and continuity.
  • What costing and investment models can be applied to effectively analyse whether the implementation of cyber security measures provides a positive return on investment?

It is evident that cybersecurity forms a significant role in day-to-day lives, with this instantly highlighting the significance of it in world affairs. From managing Covid-19 vaccination plans to GDPR, it is vital to understand the mechanisms in which cybersecurity is used to supplement ongoing world affairs and global projects.

  • The impact of Covid-19 on cybersecurity in an organisational context due to increased levels of remote working.
  • How should global legislation be created to help improve cybersecurity and reduce growing levels of cybercrime across the developed world?
  • Have the recently enacted General Data Protection Regulations had a significant improvement on the protection of personal data and helped to reduce cybercrime or identity theft?
  • Cyber security in the developing world: A critical analysis of opportunities and current barriers to implementation.
  • How can cyber security be used to enhance data protection through vaccination distribution programs to tackle the spread of Covid-19?
  • Cyber security and International Relations: How do the USA, China, and Russia manage cyber security when interacting with one another?

One of the most commonly aligned topics with cybersecurity is cybercrime, with this becoming an even greater threat as more people work from home and live their lives through technology. However, just as technology evolves so does the nature of cybercrime, with this always presenting the opportunity to research new and innovative ways in which cybercrime can be halted with innovative cyber security strategies.

  • The influence of cybersecurity of the elimination of cybercrimes: A case study of the Equifax cyber-attack.
  • A historical review of cybercrimes between 1980 and 2020: A critical analysis on the evolution of cybercrime and what future threats may be.
  • Novice strategies to protect against cybercrime: An analysis of how cybersecurity can be used by low-level knowledge computer users.
  • The influence of cyber forensics in combating cybercrime and as a fundamental strategy within the scope of a cybersecurity system.
  • What are the positive and negative impacts on the use of simulated phishing scams to build awareness of corporate cybercrime?
  • New methods of cybercrime: How can cybersecurity strategies be used to protect mobile devices from the threat of cybercrime?

Finally, big data and IoT form an imperative role in both organisational and social lives, with cybersecurity being fundamental to protect these systems. As both of these concepts are relatively new, there is a broad scope to potentially evaluate and conduct a research study on.

  • Determining effective cybersecurity strategies to support an integrated IoT system.
  • How to utilise cybersecurity when managing big data: A critical analysis of the use of detection algorithms.
  • An analysis of the mediating role of artificial intelligence in the development of comprehensive and autonomous cybersecurity systems.
  • What is the influence of machine learning on the creation of effective cybersecurity systems: A critical analysis of the banking industry?
  • A critical evaluation of the importance of integrating cyber security systems into big data analytics.
  • An evaluation on the use of cyber security across multiple Internet of Things devices: What are best practice techniques?

You may also like

Fun Essay Topics

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Dissertations / Theses on the topic 'Computer security ; cybersecurity'

Create a spot-on reference in apa, mla, chicago, harvard, and other styles.

Consult the top 47 dissertations / theses for your research on the topic 'Computer security ; cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Choi, Min Suk. "Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/119.

Locke, Ronald Taylor. "Anomaly detection with applications in environmental and cyber security." Thesis, Boston University, 2012. https://hdl.handle.net/2144/33260.

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Gcaza, Noluxolo. "A national strategy towards cultivating a cybersecurity culture in South Africa." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.

Loughry, Joe. "Security test and evaluation of cross domain systems." Thesis, University of Oxford, 2014. https://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352.

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Johnson, William. "Development of Peer Instruction Material for a Cybersecurity Curriculum." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2367.

Deshpande, Pranita. "Assessment Of Two Pedagogical Tools For Cybersecurity Education." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2557.

Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.

Goode, Jodi. "Comparing Training Methodologies on Employee’s Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical Programs." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1045.

Cardarelli, Anthony. "Automated Deployment of a Security Operations Center." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592133599167901.

Selinger, David Emanuel. "Designing a Security Education Curriculum Using Gamification Principles." Kent State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1574424122762057.

Sengelmann, Michael. "An Overview of Reverse Engineering and A Security Analysis of TikTok." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613748245334672.

Friman, Nelly. "Security Analysis of Smart Buildings." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279423.

Amir-Mohammadian, Sepehr. "A Formal Approach to Combining Prospective and Retrospective Security." ScholarWorks @ UVM, 2017. http://scholarworks.uvm.edu/graddis/802.

Horcher, Ann-Marie. "Conservation of Limited Resources: Design Principles for Security and Usability on Mobile Devices." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1028.

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Muedas, Higginson Ana Cristina, and Velásquez Renato Germán Rojas. "Modelo de madurez de seguridad de aplicaciones web ante ciberataques para clínicas de nivel 2." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/628108.

Rodriguez, Ricardo J. "An Electroencephalogram (EEG) Based Biometrics Investigation for Authentication| A Human-Computer Interaction (HCI) Approach." Thesis, Nova Southeastern University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3723216.

Encephalogram (EEG) devices are one of the active research areas in human-computer interaction (HCI). They provide a unique brain-machine interface (BMI) for interacting with a growing number of applications. EEG devices interface with computational systems, including traditional desktop computers and more recently mobile devices. These computational systems can be targeted by malicious users. There is clearly an opportunity to leverage EEG capabilities for increasing the efficiency of access control mechanisms, which are the first line of defense in any computational system.

Access control mechanisms rely on a number of authenticators, including “what you know”, “what you have”, and “what you are”. The “what you are” authenticator, formally known as a biometrics authenticator, is increasingly gaining acceptance. It uses an individual’s unique features such as fingerprints and facial images to properly authenticate users. An emerging approach in physiological biometrics is cognitive biometrics, which measures brain’s response to stimuli. These stimuli can be measured by a number of devices, including EEG systems.

This work shows an approach to authenticate users interacting with their computational devices through the use of EEG devices. The results demonstrate the feasibility of using a unique hard-to-forge trait as an absolute biometrics authenticator by exploiting the signals generated by different areas of the brain when exposed to visual stimuli. The outcome of this research highlights the importance of the prefrontal cortex and temporal lobes to capture unique responses to images that trigger emotional responses.

Additionally, the utilization of logarithmic band power processing combined with LDA as the machine learning algorithm provides higher accuracy when compared against common spatial patterns or windowed means processing in combination with GMM and SVM machine learning algorithms. These results continue to validate the value of logarithmic band power processing and LDA when applied to oscillatory processes.

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Curran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.

Gaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.

Habeeb, Richard. "Improving the Security of Building Automation Systems Through an seL4-based Communication Framework." Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7161.

Doyle, Marc. "Comprehending the Safety Paradox and Privacy Concerns with Medical Device Remote Patient Monitoring." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1090.

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Hedlund, Filip, and Emma Loots. "Information Security Risk Assessment : An Analysis of a Medical Aid Service." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284151.

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Persson, Sebastian. "Who Watches The Privileged Users." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414648.

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Shirley, Brandon L. "Developing and Securing Software for Small Space Systems." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7544.

Lindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.

(5929946), James E. Lerums. "Measuring the State of Indiana's Cybersecurity." Thesis, 2019.

This dissertation introduces a scorecard to enable the State of Indiana to measure the cybersecurity of its public and private critical infrastructure and key resource sector organizations. The scorecard was designed to be non-threatening and understandable so that even small organizations without cybersecurity expertise can voluntarily self-asses their cybersecurity strength and weaknesses. The scorecard was also intended to enable organizations to learn, so that they may identify and self-correct their cybersecurity vulnerabilities. The scorecard provided quantifiable feedback to enable organizations to benchmark their initial status and measure their future progress.

Using the scorecard, the Indiana Executive Council for Cybersecurity launched a Pilot to measure cybersecurity of large, medium, and small organizations across eleven critical infrastructure and key resources sectors. This dissertation presents the analysis and results from scorecard data provided by the Pilot group of 56 organizations. The cybersecurity scorecard developed as part of this dissertation has been included in the Indiana Cybersecurity Strategy Plan published September 21, 2018.

Patala, Najiyabanu Noormohmed. "Cybersecurity framework for cloud computing adoption in rural based tertiary institutions." Diss., 2018. http://hdl.handle.net/11602/1362.

Van, Vuuren Johanna Christina Jansen. "Methodology and Model to Establish Cybersecurity for National Security in Africa using South Africa as a Case Study." Thesis, 2016. http://hdl.handle.net/11602/744.

(8072417), Braiden M. Frantz. "CISTAR Cybersecurity Scorecard." Thesis, 2019.

Highly intelligent and technically savvy people are employed to hack data systems throughout the world for prominence or monetary gain. Organizations must combat these criminals with people of equal or greater ability. There have been reports of heightened threats from cyber criminals focusing upon the energy sector, with recent attacks upon natural gas pipelines and payment centers. The Center for Innovative and Strategic Transformation of Alkane Resources (CISTAR) working collaboratively with the Purdue Process Safety and Assurance Center (P2SAC) reached out to the Computer and Information Technology Department to assist with analysis of the current cybersecurity posture of the companies involved with the CISTAR initiative. This cybersecurity research project identifies the overall defensive cyber posture of CISTAR companies and provides recommendations on how to bolster internal cyberspace defenses through the identification of gaps and shortfalls, which aided the compilation of suggestions for improvement. Key findings include the correlation of reduced cybersecurity readiness to companies founded less than 10 years ago, cybersecurity professionals employed by all CISTAR companies and all CISTAR companies implementing basic NIST cybersecurity procedures.

(6613439), Siddharth Chowdhury. "PERCEPTIONS OF PURPLE TEAMS AMONG CYBERSECURITY PROFESSIONALS." Thesis, 2019.

Gwala, Sizwe. "Barriers to implementation of the (SA) National Cybersecurity Policy Framework." Thesis, 2016. https://hdl.handle.net/10539/23802.

"CacheLight: A Lightweight Approach for Preventing Malicious Use of Cache Locking Mechanisms." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.50522.

(11173323), Hanlin Chen. "Adaptive Safety and Cyber Security for Connected and Automated Vehicle System." Thesis, 2021.

This dissertation discussed the potential benefits that CAV systems can bring to the general well-being, and how the threat lies within the CAV system can affect its performance and functionality.

Particularly, this dissertation discovered how CAV technology can benefit homeland security and crime investigations involving child abduction crimes. By proposing the initial design network, this dissertation proposed a solution that enhances the current AMBER Alert system using CAV technology. This dissertation also discussed how CAV technology can help perception in corner-case driving scenarios and reduce the risk of traffic accidents, by proposing a dataset that covers various corner cases including different weather and lighting conditions targeting the work zone. Evaluation is made on the collected data and several impact factors have been figured out.

This dissertation also discussed an attack scenario that a ROS-based CAV platform was attacked by DoS attacks. We analized the system response after we attacked the system. Discussion and analysis was made on the functionality and stability of the system.

Overall, we determined that CAV technology can greatly benefit in general well-being, and threats within the CAV system can cast potential negative benefits once the CAV system is being attacked.

(8810120), Naif S. Almakhdhub. "INTERNET OF THINGS SYSTEMS SECURITY: BENCHMARKING AND PROTECTION." Thesis, 2020.

Internet of Things (IoT) systems running on Microcontrollers (MCUS) have become a prominent target of remote attacks. Although deployed in security and safety critical domains, such systems lack basic mitigations against control-flow hijacking attacks. Attacks against IoT systems already enabled malicious takeover of smartphones, vehicles, unmanned aerial vehicles, and industrial control systems.

The thesis introduces a systemic analysis of previous defense mitigations to secure IoT systems. Building off this systematization, we identify two main issues in IoT systems security. First, efforts to protect IoT systems are hindered by the lack of realistic benchmarks and evaluation frameworks. Second, existing solutions to protect from control-flow hijacking on the return edge are either impractical or have limited security guarantees. This thesis addresses these issues using two approaches.

First, we present BenchIoT, a benchmark suite of five realistic IoT applications and an evaluation framework that enables automated and extensible evaluation of 14 metrics covering security, performance, memory usage, and energy. BenchIoT enables evaluating and comparing security mechanisms. Using BenchIoT, we show that even if two security mechanisms have similarly modest runtime overhead, one can have undesired consequences on security such as a large portion of privileged user execution.

Second, we introduce Return Address Integrity (RAI), a novel security mechanism to prevent all control-flow hijacking attacks targeting return edges, without requiring special hardware. We design and implement μRAI to enforce the RAI property. Our results show μRAI has a low runtime overhead of 0.1% on average, and therefore is a

practical solution for IoT systems.

This thesis enables measuring the security IoT systems through standardized benchmarks and metrics. Using static analysis and runtime monitors, it prevents control-flow hijacking attacks on return edges with low runtime overhead. Combined, this thesis advances the state-of-the-art of protecting IoT systems and benchmarking its security.

"SDN-based Proactive Defense Mechanism in a Cloud System." Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.34850.

(6623090), Gregory Walkup. "Investigating Attacks on Industrial Control Systems Using Deterministic Replay Simulation." Thesis, 2019.

(8119418), Hafiz Muhammad Junaid Khan. "A MACHINE LEARNING BASED WEB SERVICE FOR MALICIOUS URL DETECTION IN A BROWSER." Thesis, 2019.

Svensson, Elina, and Annika Rydén. "JamaicaEye : What does cyber security look like in one of the most recently developed CCTV networks?" Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22266.

"Blurring Safety Between Online and Offline Worlds: Archival, Correlational, and Experimental Evidence of Generalized Threat in the Digital Age." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.44025.

(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.

edugate

  • Cyber Security Dissertation ideas

This article attempts to stimulate your choice over the relevant field and to offer you more innovative cyber security dissertation ideas . Cybersecurity involves the practices of securing a group of equipment and methodology to devices, and information prevents mutilation to the system or networks by the unverified use and re-establishing the electronic data and communication systems.

In general, the primary function of the information in a system is to confirm the device’s privacy and security. It also involves the security and re-establishment of whatever the medium of the network like wired or wireless, satellite. The system policy control solution can react to identify the network traffic and user activity. Those things are grounded on real-life threat intelligence information to secure user’s data from phishing, malware attack, intruding the botnet command and server leverage.

What is Cyber security?

The cybersecurity objectives secure computers, networks, and mobile devices from malicious access and users . It also controls the use of stolen data in cyberspace. Adversaries use the hacked network or device to spy on the individual or organization’s activity and to control them by all means. The common attacks performed by the cybercriminal to damage the network are as follows,

  • Drive-by downloads
  • Malvertising
  • Man in the Middle
  • Distributed Denial of Service
  • Password attacks

Cyber Security Dissertation Ideas for Research Scholars

Cyber Security Research Guidelines

  • Cybersecurity: Prevention, identification and controlling procedures
  • Incorporeal methods in Cybersecurity
  • Cybersecurity theories
  • Technology in cybersecurity
  • Cybersecurity strategy and management
  • Events of cybersecurity
  • Applications of Cybersecurity

The above fields are involved in Cybersecurity. So, providing cyber security dissertation ideas induces the vast chances of the scholars and students to get more knowledge about the relevant field. We provide you more about the functions of Cybersecurity, its mechanisms, and Cybersecurity in further platforms . Précising the exposed issues in the cyber security dissertation, and we highlight the research challenges in predicting Cybersecurity as follows,

What are the research challenges of cyber security?

  • What are the metrics and ways to assess or forecast cyber security model?
  • What should be forecast? Whether viewing the cybersecurity scenario globally or the new attacker in cyber security domain, or the attacker’s next step?
  • What are the uses of cyber security prediction and its effectiveness?

Our research team identifies the above questions as research gaps in Cybersecurity . If you select the project, you must answer the above questions that remained unanswered in the research domain of Cybersecurity , Or else, we provide you the latest ideas on the associated topic.

Why to use Cybersecurity Models?

  • Unverified users will be prevented by cyber security
  • Induces the post-attack recovering time
  • Cybersecurity protects networks and data
  • Provides end-user security
  • Cybersecurity gives data protection from social engineering, malware and phishing

The usage of the cybersecurity model mitigates the effects of pre-attack and post-attack scenarios , and it also provides the necessary time for data recovery. The functioning process of the cybersecurity model varies according to the threat effect. The further operations of the Cybersecurity research  model are as follows,

Working of Cybersecurity model

  • Logs on file integration
  • Logs on system incidents
  • Logs of protection
  • Messages on system health
  • Critical alerts
  • Analysis similarity to file integrity logs
  • Analysis similarity to system incident logs
  • Analysis similarity to the logs of security incidents
  • Analysis similarity to various types of control center logs
  • Analysis similarity to control center and substations logs
  • Causes of cyber attacks
  • Effects of cyber attacks
  • Suspending the untrusted users
  • Role changing on licensed users

Cybersecurity models are skilled to perform the above-mentioned actions for securing, detection, recognition, modification, and recovery . There are many sub-tasks under each function of cybersecurity models, which may vary according to their usage. Let’s have a look at the emerging methodologies in Cybersecurity.

Emerging technologies in Cybersecurity

  • Evaluating confidential threats
  • Assessing penetration
  • IPS and IDS
  • Attacks against phishing
  • Predicting events and intrusions

The above-mentioned technologies are also the processing steps that are using in the on-growing cybersecurity technology . They perform the actions to block unauthorized access, phishing attack, intrusion detection testing, etc. Cybersecurity tools can execute those technologies. This also involves some theoretical mechanisms too. For your clear reference, our technical team has particularized the theories below,

What are some Cybersecurity mechanisms?

  • Fuzzy Decision Theory
  • Evolutionary Theory
  • Evidence Theory
  • Dempster- Shafer Theory
  • Danger Theory
  • Complex Networks Theory
  • Decision Making Theory
  • Immune Theory
  • Grounded Theory
  • Grey Theory
  • Graph Theory
  • Game Theory
  • Theory Of Contextual Integrity
  • Stakeholder Theory
  • Sociomaterial Theory
  • Integrated System Theory
  • Instance- Based Learning Theory
  • Rational Decision-Making Theory

These theories can be executed in Cybersecurity on the basis of the attacker’s behavior. So, the functions of the theories also may vary according to the changes in the adversarial activities. Here we provide you our latest cyber security dissertation ideas.

Latest Cyber Security Dissertation Ideas

  • Attacks on Privacy and Data Security
  • Cyber-Resilience, Cybersecurity and Data Privacy
  • Asymmetric, Cyber and Hybrid Threats
  • Protection of Vulnerable Systems
  • Acute Data Structural Cyber Threats
  • Assessment and Analysis of Cyber Terrorism Threat
  • Security Problems and Cyber Terrorism

The ideas discussed above are our trending Cyber security dissertation ideas . Our expert research team considers the ideas as an exposed range of dissertation topics that remain unexplored. We have world-class certified engineers to help you with the dissertations ranging from the initial to the final stage. We have 200+ technical employees, including project developers, writers, engineers, research, and technical team .  Here they provide you the best tools for data collection as follows,

Cybersecurity Tools for Data Collection

  • EtherApe realistically displays the network behavior in detail
  • Dsniff is a tool to analyze both network and password
  • TCPDUMP used for transmitted packet analysis
  • MSN Sniffer 2 is considered as the first tool to sniff chats
  • Ettercap suits in the attack simulation of man in the middle

The attackers use the above-mentioned data collecting tool to perform various types of attacks. Tools may vary according to the attack. Here we offer you the extending levels of the performance of Cybersecurity . The performance relies on the major functions of the cybersecurity tool as follows.

Cybersecurity Performance Metrics

  • Analyzes the “in between time of recovery, response and intrusion”
  • Analyzes the functional level at the pre-attack and post-attack scenarios
  • Analyzes the security aims attained by the system
  • Analyzes how its best in functioning the key security
  • Analyzes hacker’s attack and similar scenarios
  • Analyzes the risk impact

The above metrics denote the fundamental function of the cybersecurity model, other than the mentioned metrics; our developer’s team suggests some evaluated metrics are as follows. Its primary function is to conduct deep analysis on time taken after each event of an attack and recovery ; some organizations also use it to measure the team’s potential.

Top 7 Cyber Security Dissertation Ideas

Cybersecurity Evaluated Metrics

  • Mean Time To Recovery (MTTR) analyses the time taken to recover from system failure by an organization
  • Mean Time To Contain (MTTC) analyses the vector attacking time
  • Mean Time To Acknowledge (MTTA) analyses the time take to resolve the issue once the alert is received.
  • Mean Time To Resolve (MTTR) analyses the time taken by the cybersecurity team to resolve threats
  • Mean Time To Detect (MTTD) analyses the time of existence by an attack. It also uses to analyze the cybersecurity team
  • Mean Time Between Failures (MTBF) analyses the time taken in between the system failure and decision making
  • No of Intrusion Trials analyses the no of intrusion

The above-assessed metrics particularized by our research team can be used only to analyze the time before or after the attack and in between times consumed by the cybersecurity teams. Getting knowledge of these metrics will be helpful for your cyber security dissertation ideas . Along with your existing knowledge, we would provide you the ways of our support and guidance in cyber security dissertations when you work on your thesis with us.

How do we support for dissertation writing?

  • Initiating research topic with essential background information
  • Develops the concentration on the research scope
  • Viewing the relevance of the research to an existing broader issue and describes the level of existing research on the topic
  • Clearly describing aims and research questions
  • Providing dissertation structure overview
  • Progresses and reinforces existing knowledge with our new data
  • Chooses a new approach to the topic either of theoretical or technical
  • Suggest solutions to unsolved issues
  • Progresses a theoretical and practical investigation
  • Conclude the dissertation by covering all ideas

We offer our extending guidance in familiarizing you with the other researching areas of Cybersecurity based on your interest. We assure you of our years of reputation to render your expected research outcomes. Working with us will afford you on-time delivery of your project begins with cyber security dissertation ideas with confidential service. Our research team also suggests your thesis’s practical implementations without letting you worry about the research scope. So we insist you grab the opportunity to work with us!!

Related Pages

Services we offer.

Mathematical proof

Pseudo code

Conference Paper

Research Proposal

System Design

Literature Survey

Data Collection

Thesis Writing

Data Analysis

Rough Draft

Paper Collection

Code and Programs

Paper Writing

Course Work

Premier-Dissertations-Logo

Get an experienced writer start working

Review our examples before placing an order, learn how to draft academic papers, cyber security dissertation topics.

Cryptocurrency-Dissertation-Topics

Cryptocurrency Dissertation Topics

Methodology

Methodology

dissertation cyber security

  • Dissertation Topics

Cyber Security Dissertation Topics

Cyber security is the field of study that deals with methods of protecting electronic systems and networks from various malicious attacks. Cybersecurity is crucial for global digital connectivity through computer networks. Thus, students in Computer Science must look for new cybersecurity dissertation topics using modern technology.

Review Our Quality Computer Science Dissertation Examples

Premier Dissertations has prepared a list of top cybersecurity research topics for 2024.

Simply drop us a WhatsApp or an Email , If you would like to choose any of the given thesis topics on cybercrime.

You may also like to review :

Computer Science Dissertation Topics | Social Media Dissertation Topics

3-Step  Dissertation Process!

dissertation cyber security

Get 3+ Topics

dissertation cyber security

Dissertation Proposal

dissertation cyber security

Get Final Dissertation

Cyber security dissertation topics for 2024, trending dissertation topics in cyber security, research-based cyber security dissertation topics.

Testimonials

Very satisfied students

This is our reason for working. We want to make all students happy, every day. Review us on Sitejabber

Best Cyber Crime Dissertation Topics

Top cybersecurity dissertation topics, how does it work .

dissertation cyber security

Fill the Form

dissertation cyber security

Writer Starts Working

dissertation cyber security

3+ Topics Emailed!

Importance of selecting the best cyber security dissertation topic.

In a highly globalized world, cyber security is essential. It protects individuals, communities, and states from cyber crimes. Cybercriminals with their expertise in hacking, spreading misinformation, and stealing sensitive data pose a significant threat to global peace. Such malicious activities can pose a threat to global peace as cybercrime is one of the leading 5 th Generation Warfare tools. Therefore, the protection of cyber activities is crucial for both public and private sectors to ensure the smooth functioning of online businesses and maintain global peace.

Review Our Quality Information Technology Dissertation Topics

Cybersecurity is crucial for safe online operations. Students must choose a quality dissertation topic in this field to achieve academic success and contribute to global security.

Discover More:

Get 3+ free   dissertation topics within 24 hours.

Your Number

Academic Level Select Academic Level Undergraduate Masters PhD

Area of Research

admin ha

Related posts

100+ Correlational Research Topics

100+ Correlational Research Topics

30 ABM Research Topics For Students | 2024

30 ABM Research Topics For Students | 2024

Top 55 STEM Research Topics

Top 55 STEM Research Topics

Comments are closed.

  • How it works

researchprospect post subheader

Useful Links

How much will your dissertation cost?

Have an expert academic write your dissertation paper!

Dissertation Services

Dissertation Services

Get unlimited topic ideas and a dissertation plan for just £45.00

Order topics and plan

Order topics and plan

Get 1 free topic in your area of study with aim and justification

Yes I want the free topic

Yes I want the free topic

5 Dissertation Topics on Cyber Crime

Published by Owen Ingram at January 9th, 2023 , Revised On August 15, 2023

Introduction

Any crime that is conducted using a computer and a network is known as cybercrime. Cybercrimes can target individuals in their personal capacity by targeting their property, the person himself, harming their mental health, and can even cause damage to governments.

Everyone using a computer and the internet can fall victim to cybercrime; however, understanding these crimes’ nature and how these are conducted can help people keep themselves safe and avoid falling victim.

Networks have weak spots, thus identifying those that can help you in determining possible attack points. This will eventually enable you to keep yourself safe from cybercrimes. Keeping your personal information safe at all times is critically important.

Never give out your passwords or any other personal information openly on any forum. This is one of the most effective ways of avoiding falling victim to cybercrime.

Being a pressing issue, cybercrime is continuously explored as to how it is conducted, what its types are, how it can be detected, how people can stay safe, etc. Here are five dissertation topics on cybercrime that will help gain an in-depth understanding of the issue.

These topics have been developed by PhD-qualified writers of our team , so you can trust to use these topics for drafting your dissertation.

You may also want to start your dissertation by requesting  a brief research proposal  from our writers on any of these topics, which includes an  introduction  to the topic,  research question , aim and objectives ,  literature review  along with the proposed  methodology  of research to be conducted.  Let us know  if you need any help in getting started.

Check our  dissertation examples to get an idea of  how to structure your dissertation .

Review the full list of dissertation topics for 2022 here.

5 Dissertation Topics on Cyber Crime 2022

Topic 1: is cybercrime a threat to banking sector in developing countries a case study of banking sector in pakistan.

Research Aim: This study aims to analyze the impact of cybercrime on the banking sector in developing countries. It will identify the possible threats faced by the banking sector due to increasing cybercrimes. These threats are related to the information security of the banks in developing countries. This research will be using Pakistan as a case study to find the threats posed by cybercrime to fragile banking. And after identifying the threats, the study will try to recommend possible solutions to ensure information security.

Topic 2: Impact of Cybercrime on E-Governance. Is cybercrime affecting the Confidentiality of Government Data?

Research Aim:  This research aims to find the impact of cybercrime on modern-day governance systems or e-governance. It will identify the possible hindrances caused by cybercrime in implementing effective e-governance. This research will also investigate the impact of cybercrime on the confidentiality of government data. And after investigating the impact of cybercrime on the confidentiality of government data, this research will recommend the modern-day practices used to maintain the security of the information.

Topic 3: Is Information Safe Today? A survey to find the impact of cybercrime on the information security of the businesses

Research Aim: This study aims to find the impact of cybercrime on the information security of modern-day businesses. It will be a survey-based study to find out the problems faced by modern-day businesses due to cybercrime. These problems include confidential information leakage, which can benefit the competitors in the market. And another major problem is data stealing. This study will identify all these problems. And it will also recommend modern-day solutions to increase the security of the information.

Topic 4: A Socio-Technological Examination of Cybercrime and Information Security in Nigeria

Research Aim: This current research intends to determine Nigerian society’s vulnerabilities to cybercrime and exploitation and the global information infrastructure in general. It also aims to determine the informal, social, and technical drivers of Nigerian cybercrime and cybersecurity. To examine Nigerian law enforcement agencies and cybersecurity stakeholders’ efforts to combat cybercrime and guarantee cybersecurity. This analysis provides an opportunity for legislators, policymakers, and law enforcement agencies can utilize the law to establish legally valid definitions of cybercrime and information security from sociological and technological points of view

Topic 5: Impact of Cyber laws on Information Security. A Cross-Country Analysis

Research Aim: This study aims to analyse the impact of cyber laws on information security. This study is a cross-country analysis that will find the effectiveness of cyber laws across countries. It will see how over time, the introduction of cyber laws has affected information security after the find out the relationship between cyber laws and information security. This research will identify the most effective cyber laws in the countries under study. And after identifying the best laws among the countries under study. This study will recommend the best laws from individual countries or a set of laws from different countries.

Covid-19 Cyber Crime Research Topics

Topic 1: cybercrimes and coronavirus pandemic.

Research Aim: This study will focus on the increased cybercrimes during the coronavirus pandemic and the effective ways to overcome them.

Topic 2: Cybersecurity and COVID-19

Research Aim: This study will focus on the role of cybersecurity in minimizing cybercrimes during the crisis of the pandemic.

Topic 3: Cyber threats can harm industries

Research Aim: This study will address the growing cyber threats during COVID-19, where remote work has been adopted to combat the pandemic. It’ll highlight the threats, their harmful effect, and their solution.

Cyber Crime Research Topics 2021

Topic 1: importance of password security.

Research Aim: This research aims to identify the importance of Password security in safe computing.

Topic 2: Phishing scams

Research Aim: This research aims to highlight phishing scams issues and suggest various tips to avoid such scams.

Topic 3: Mobile protection

Research Aim: This research aims to highlight mobile security threats and suggest possible ways to protect mobile phones from hackers.

Topic 4: How to ensure safe computing?

Research Aim: This research will focus on types of hackings, scams and suggests possible ways to ensure safe computing

Topic 5: Cybercrime Dissertation Topics – The Evolution of Cyber Crime and the Attacks that Led to the Formation of Cyber Crime Policies

Research Aim: This dissertation will focus on the history of how this crime came into existence. The thesis’s main focus will be on understanding cybercrime, how it is being conducted worldwide, and what has led to an increase in these types of attacks.

The thesis will also discuss the initial attacks due to which cybercrime policies came into place. All policies will be discussed as to how they help curb cybercrimes and the extent to which they have been successful in reducing them.

Finally, the thesis will suggest if any new policies must be developed. What aspects need to be focused on, are there any new areas that need attention, or do the existing policies need to be revised?

Topic 6: Cybercrime Dissertation Topics – Cyber Crime: How it Impacts Young Adults

Research Aim: Cybercrime can have a great impact on the younger generation. Young adults use the internet more than any other age group, which is why they are the first victims of cybercrime. This dissertation will explore how cybercrime affects the younger generation and how it causes problems for them.

Issues such as health, specifically mental health, will be discussed to understand the many problems caused by cybercrime. Many individuals from the younger generation have attempted suicide after falling victim to cybercrime.

This research study will discuss all such effects of cybercrime, including cyberbullying (a form of cybercrime). The study will also present ways as to how they can avoid falling victim to cybercrime.

How Can ResearchProspect Help?

ResearchProspect writers can send several custom topic ideas to your email address. Once you have chosen a topic that suits your needs and interests, you can order for our dissertation outline service which will include a brief introduction to the topic, research questions , literature review , methodology , expected results , and conclusion . The dissertation outline will enable you to review the quality of our work before placing the order for our full dissertation writing service !

Topic 7: Cybercrime Dissertation Topics – Investigating Various Approaches and Ways to Detect Cyber Crime

Research Aim: Cybercrime, one of the most secret crimes, is spread all over the world. The number of cybercrimes worldwide is on the rise. Thus, every individual using a computer and connected to a network must be aware of the different types of cybercrimes.

Before discussing the different ways to detect cybercrime, this dissertation study will briefly discuss the many cybercrime types. Essentially, the research will focus on various ways through which each form of cybercrime can be detected.

Different forms of cybercrimes can be detected differently. For instance, data theft can be determined by asking for a password or other sensitive information through a call or an email. The research will then conclude how people can identify different forms of cybercrime and not fall victim to any of them.

Topic 8: Cybercrime Dissertation Topics – Evaluating Existing Cyber Crime Policies: Do They Suffice in Today’s World?

Research Aim: Cybercrime, being a major cause of concern throughout the world, is controlled and curbed by different policies in place. These policies are designed to make sure that cybercrime is reduced and gradually eliminated from society. However, with the increased numbers, the need for a policy change or amendment seems inevitable.

This means that the existing policies need to be reworked or revised, or abandoned completely, and new policies should be formed. This dissertation will investigate both these options and emphasize whether policies should be revised or new policies should be formed.

If new policies should be formed, the research will explain how these should be shaped, and if they need to be revised, then which aspects need to be considered for amendments will be the main focus of the dissertation. A detailed analysis will be presented to make an informed decision.

Topic 9: Cybercrime Dissertation Topics – Understanding the Different Types of Cyber Crime

Research Aim: Cybercrime, undoubtedly, is one of the most deadly forms of crime. Without causing physical harm, the crime causes the victim to attempt suicide or suffer from mental diseases such as anxiety, depression, etc.

This research will focus on the different types of cybercrimes that impact people in today’s world. This research will highlight almost all cybercrime forms while emphasising the most common forms such as cyberbullying, hacking, data theft, child pornography, etc.

In-depth research will be conducted through surveys and by using numbers and percentages of cybercrime from credible resources such as government websites, etc.

This will help understand the various forms of cybercrime, how widespread the crime is, and how many people are impacted by cybercrime throughout the world.

Important Notes:

As a cybercrime student looking to get good grades, it is essential to develop new ideas and experiment with existing cybercrime theories – i.e., to add value and interest to your research topic.

The field of cybercrime is vast and interrelated to so many other academic disciplines like Facebook , Instagram , Cryptocurrency , Twitter , civil engineering , facial recognition , construction ,  project management , engineering management , healthcare , finance and accounting , artificial intelligence , tourism , physiotherapy , sociology , management , and project management , graphic design , and nursing . That is why it is imperative to create a project management dissertation topic that is articular, sound, and actually solves a practical problem that may be rampant in the field.

We can’t stress how important it is to develop a logical research topic based on your entire research. There are several significant downfalls to getting your topic wrong; your supervisor may not be interested in working on it, the topic has no academic creditability, the research may not make logical sense, and there is a possibility that the study is not viable.

This impacts your time and efforts in writing your dissertation as you may end up in the cycle of rejection at the initial stage of the dissertation. That is why we recommend reviewing existing research to develop a topic, taking advice from your supervisor, and even asking for help in this particular stage of your dissertation.

Keeping our advice in mind while developing a research topic will allow you to pick one of the best cyber crime dissertation topics that fulfil your requirement of writing a research paper and add to the body of knowledge.

Therefore, it is recommended that when finalizing your dissertation topic, you read recently published literature to identify gaps in the research that you may help fill.

Remember- dissertation topics need to be unique, solve an identified problem, be logical, and be practically implemented. Please look at some of our sample cybercrime dissertation topics to get an idea for your own dissertation.

How to Structure your Cyber Crime Dissertation

A well-structured dissertation can help students to achieve a high overall academic grade.

  • A Title Page
  • Acknowledgements
  • Declaration
  • Abstract: A summary of the research completed
  • Table of Contents
  • Introduction : This chapter includes the project rationale, research background, key research aims and objectives, and the research problems. An outline of the structure of a dissertation can also be added to this chapter.
  • Literature Review : This chapter presents relevant theories and frameworks by analysing published and unpublished literature available on the chosen research topic to address research questions . The purpose is to highlight and discuss the selected research area’s relative weaknesses and strengths whilst identifying any research gaps. Break down the topic, and key terms that can positively impact your dissertation and your tutor.
  • Methodology : The data collection and analysis methods and techniques employed by the researcher are presented in the Methodology chapter which usually includes research design , research philosophy, research limitations, code of conduct, ethical consideration, data collection methods, and data analysis strategy .
  • Findings and Analysis : Findings of the research are analysed in detail under the Findings and Analysis chapter. All key findings/results are outlined in this chapter without interpreting the data or drawing any conclusions. It can be useful to include graphs, charts, and tables in this chapter to identify meaningful trends and relationships.
  • Discussion and Conclusion : The researcher presents his interpretation of the results in this chapter, and states whether the research hypothesis has been verified or not. An essential aspect of this section of the paper is to draw a linkage between the results and evidence from the literature. Recommendations with regards to implications of the findings and directions for the future may also be provided. Finally, a summary of the overall research, along with final judgments, opinions, and comments, must be included in the form of suggestions for improvement.
  • References : This should be completed following your University’s requirements
  • Bibliography
  • Appendices : Any additional information, diagrams, and graphs used to complete the dissertation but not part of the dissertation should be included in the Appendices chapter. Essentially, the purpose is to expand the information/data.

About ResearchProspect Ltd

ResearchProspect is the world’s best academic writing service that provides help with Dissertation Proposal Writing , PhD Proposal Writing , Dissertation Writing , Dissertation Editing, and Improvement .

Our team of writers is highly qualified. They are experts in their respective fields. They have been working in the industry for a long, thus are aware of the issues and the trends of the industry they are working in.

Free Dissertation Topic

Phone Number

Academic Level Select Academic Level Undergraduate Graduate PHD

Academic Subject

Area of Research

Frequently Asked Questions

How to find dissertation topics on cyber crime.

To find dissertation topics on cybercrime:

  • Study recent cyber threats and attacks.
  • Analyze legal and ethical aspects.
  • Explore technological advancements.
  • Investigate prevention measures.
  • Consider international perspectives.
  • Select a focused area of interest for in-depth research.

You May Also Like

Need interesting and manageable Engineering Management dissertation topics or thesis? Here are the trending Operations Marketing dissertation titles so you can choose the most suitable one.

The talent management field is advancing rapidly when it becomes easier to find talent around the world. The management of talent is a subcategory of human resources that is not specific to any particular industry.

Need interesting and manageable Business dissertation topics or thesis? Here are the trending Business dissertation titles so you can choose the most suitable one.

USEFUL LINKS

LEARNING RESOURCES

researchprospect-reviews-trust-site

COMPANY DETAILS

Research-Prospect-Writing-Service

  • How It Works

dissertation cyber security

REMINDER! You can view the ceremony live on YouTube by click here ! Replay available shortly after as well. 

Hello there to all friends and family of the Cullen College of Engineering's Spring 2024 graduation class! In honor of that group, we're bringing back a staple from the early aughts Internet when our undergraduates were born – The Live Blog. 

Check back here for updates, pictures and other media from throughout the day! Myself, communications manager Hunter Corfield and photographer Andrew Dees will be at both of Cullen's commencement ceremonies. We're backstage as graduates lineup, in the crowd during graduation itself, and archiving after graduation. 

Want to share a picture or have your story featured? You can say 'hi!' to one of us! Or, contact us by email ( sjgreen2 [at] central.uh.edu ( sjgreen2[at]central[dot]uh[dot]edu ) ) or message us on social media, preferably Instagram .

For the day's first Commencement, click here !

- Stephen Greenwell, writer and editor 

1:33 p.m. - Our graduate students have begun checking in and lining up for our second Commencement ceremony, scheduled for 2 p.m.! In advance of that, we've gotten some great photos of their mortarboards, and talked to them about their work at UH. 

Alberto Garcia, Khiabett Flores and Catherine Rucas are all earning their graduate degrees in Human Resource Development. 

"We're super excited today," Flores said, with Rucas adding that they completed their degree "one step at a time," which made the task less daunting and more tangible. 

Alyssa Iverson and Kithmini Widanage were also part of this group earning their HRD graduate degrees. Iverson  is looking for a career in the field of organizational development.  

"I'm really excited," Iverson said. "I've been in school non-step for most of my life." 

Widanage came to UH from Sri Lanka, attracted to what she said was the school's diversity and openness to people from a wide range of cultures. 

"I'm excited about what's next to come, but there are also some nerves," she said. "I learned a lot of new things, and I'm excited to see what America has to come for me." 

Poojitha Mudiyala is the youngest person to earn a master's degree this year. The 22-year-old will be putting her Electrical Engineering degree to use in a career with Mott Macdonald, a management, engineering and development consultant group. 

"Education is the key to achieving your goals," she said of her pursuit of an advanced degree at a young age. 

2:30 p.m. - The graduate degree ceremony is now underway. As students queued for the ceremony, we were able to chat briefly with Kristen Toliver , another HRD graduate with a fantastically designed mortarboard. 

"I'm very excited to be graduating with all of the friends from my cohort," she said, before being hurried from her line and into the Feritta Center. 

Inside, Divya Pillendla was there with family to wish her niece, Rishika Elupula, congratulations. Elupula earned her master's degree in Construction Management. 

"We're so happy, and she recently bagged a job, too," Divya said. 

4 p.m. - Whew! In contrast to the undergraduate ceremony, the graduate commencement is a brisk sprint of efficiency. After about an hour-long ceremony, the new graduates poured out on to Cullen Boulevard and Holman Street to celebrate with their family and friends. 

That's where Tiffany Davis , a master's degree recipient from the Human Resource Development Department, was taking pictures with her mother, brother, second mom, sisters, boyfriend and others. She said she's going to "take a breath for now" before looking for a job in the human resources field that suits her. 

This is going to be our final live blog update for the day. However, we're still going to be posting new pictures on social media, and our photographer Andrew Dees will have an extensive gallery from both days up within the week. Keep your eyes peeled on your favorite Cullen outlet to know when it happens! 

Share This Story:

Related news stories.

  • Mission & History
  • Dean's Office
  • Faculty & Staff
  • Student Organizations
  • Executive Leadership Board
  • Faculty Advisory Board
  • Engineering Alumni Association
  • NAE Members
  • Faculty in the NAI
  • Academic Advisors
  • Faculty Awards and Achievements
  • Strategic Plan
  • Our Community
  • Bylaws and Procedures
  • Internal Resources
  • ABET Accreditation
  • Departments
  • Technology Division
  • Accreditation
  • Academic Policies
  • Admissions Contacts and Deadlines
  • Certificate Programs
  • Interdisciplinary Programs
  • Best Dissertation Award
  • Online Programs
  • Continuing & Professional Education
  • Scholarships
  • UH Engineering in Katy
  • Engineering Academies
  • International Joint Institutes
  • How to Engineer Your Future, Admissions & More
  • Contact + Request Info
  • Virtual Tour
  • Resources for Current Students
  • First-Year Experience
  • Pathway Professor
  • Engineering Career Center
  • Engineering Computing Center
  • NAE Grand Challenge Scholars Program
  • Virtual Institutes for Cyber and Electromagnetic Spectrum Research and Employ (VICEROY)
  • Centers & Institutes
  • Faculty Resources
  • Sponsored Research Office
  • Proposal Timeline
  • Funding Opportunities
  • Research Computing
  • Industrial Relations
  • Meet the Faculty
  • Student Research
  • Research News
  • Technology Division Research
  • Engineering Program for Innovation and Entrepreneurship (EPIE)
  • Women in Innovation
  • Opportunities
  • How to Give
  • Office of Advancement
  • Get Involved
  • Alumni Events
  • Alumni Stories
  • Research Experience for Undergrads
  • St. Elmo Brady STEM Academy
  • Engineering Podcast
  • Upcoming Events
  • Publications
  • Media Coverage
  • Keep in Touch!
  • Office of Communications

IMAGES

  1. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    dissertation cyber security

  2. Dissertation

    dissertation cyber security

  3. Dissertation

    dissertation cyber security

  4. Dissertation

    dissertation cyber security

  5. Top 7 Interesting Cyber Security Dissertation Ideas [Research Guidance]

    dissertation cyber security

  6. Research-Cyber-Security-Dissertation-Topics

    dissertation cyber security

VIDEO

  1. Online Network Security Assignment Writing From BookMyEssay Experts

  2. Чжан Ліцзян(Zhang Liqiang) 06 07 2023р Захист дисертації PhD

  3. Master cyber resilience: Best practices for a strong cybersecurity framework

  4. Cyber Security Course

  5. Academic Dissertation/Final thesis writing

  6. A Brief Dissertation on Security Culture

COMMENTS

  1. Exploring Industry Cybersecurity Strategy in Protecting Critical

    crucial, make infrastructure resiliency a priority, importance of security awareness, and importance of organizational leadership support and investment. This study revealed key strategies that may help improve cybersecurity strategies used by IT and compliance professionals, which can mitigate successful attacks against critical infrastructure ...

  2. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    our national security depends on a strong cyber culture. To stay ahead of the threat, cybersecurity needs to be steeped into the national consciousness through education, sustained messaging and increased cooperation among businesses and government. My research examines the vulnerabilities, and cites case studies, national policy and expert ...

  3. Cyber Security Dissertations

    Dissertations on Cyber Security. Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation. View All Dissertation Examples.

  4. Cybersecurity Research Topics (+ Free Webinar)

    If you're just starting out exploring cybersecurity-related topics for your dissertation, thesis or research project, you've come to the right place. ... Cyber Security Vulnerability Detection Using Natural Language Processing (Singh et al., 2022) Security for Cloud-Native Systems with an AI-Ops Engine (Ck et al., 2022)

  5. PDF CYBER SECURITY AS AN EMERGING

    lead to the Cyber Security and Cyber Crimes bill which was released for public comment in December 2015. However, the country's cyber position is weakened by its lack of cyber skills and capacity, as such the research also provides some recommendations on how South Africa can strengthen its overall approach to cyber security.

  6. Good cybersecurity thesis topics for a master's degree

    A graduate-level information security project should make a timely, original contribution to an ongoing problem or debate in the field. The best cybersecurity thesis topics will therefore explore issues of current importance to the broader infosec community, ideally with some degree of both academic and practical utility.

  7. List of Cybersecurity PhD Programs

    A cybersecurity PhD dissertation is the capstone of a doctoral program. The dissertation is the name of a formal paper that presents the findings of original research that the PhD candidate conducted during the program under the guidance of faculty advisors. ... Overview: This program focuses on vital areas like cyber security, physical ...

  8. PDF A Framework for Quantifying Security Effectiveness of Cyber Defenses

    This Dissertation makes a significant step towards ultimately understanding, characterizing, quantifying and managing cybersecurity from a holistic perspective, by proposing a high-fidelity simulation framework to model cyber attack-defense interactions while making weak assumptions.

  9. (PDF) A Systematic Literature Review on the Cyber Security

    A Systematic Literature Review on the Cyber Security. 1 Dr.Yusuf Perwej, 2 Prof. (Dr.) Syed Qamar Abbas, 3 Jai Pratap Dixit, 4 Dr. Nikhat Akhtar, 5Anurag. Kumar Jaiswal. 1 Professor, Department of ...

  10. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    A Ph.D. in cybersecurity provides students with a comprehensive education encompassing technology, data science, leadership, management, ethics and policy. Requirements, course loads and ...

  11. PDF Managing Cybersecurity As a Business Risk for Small and Medium

    There are endless definitions for cybercrime because there is a variety of aspects. to consider about cybercrime. The components of a cybercrime vary in three ways of 1) In some cybercrimes that computers or data are the targets. 2) Computers or digital. technologies used as tools for committing cybercrimes.

  12. Cybersecurity Dissertation Topics for FREE

    This helps to provide an array of different opportunities for completing an engaging and innovative cyber security dissertation. Some of the most important topic areas that exist within the field of cybersecurity include cybersecurity and cryptocurrencies, cybersecurity's impact on business and economics, the role of cybersecurity in world ...

  13. Dissertations / Theses: 'Cybersecurity strategy'

    Consult the top 21 dissertations / theses for your research on the topic 'Cybersecurity strategy.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago ...

  14. Dissertations / Theses: 'Computer security ; cybersecurity ...

    Consult the top 47 dissertations / theses for your research on the topic 'Computer security ; cybersecurity.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard ...

  15. Doctor of Philosophy in Cybersecurity (PhD-CY)

    The PhD in Cybersecurity requires eight foundation/core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours. *Students select one pair of research methods and directed research courses based on their own research proposal.

  16. Cyber Security Dissertation ideas

    This article attempts to stimulate your choice over the relevant field and to offer you more innovative cyber security dissertation ideas.Cybersecurity involves the practices of securing a group of equipment and methodology to devices, and information prevents mutilation to the system or networks by the unverified use and re-establishing the electronic data and communication systems.

  17. Cyber Security Dissertation Topics

    Cyber security is the field of study that deals with methods of protecting electronic systems and networks from various malicious attacks. Cybersecurity is crucial for global digital connectivity through computer networks. Thus, students in Computer Science must look for new cybersecurity dissertation topics using modern technology.. Review Our Quality Computer Science Dissertation Examples

  18. Research communities in cyber security vulnerability assessments: A

    3.Method. Scopus was selected as the data source because of its comprehensive content. Compared to other academic databases, such as IEEE Xplore and ACM Digital Library, Scopus is one of the most comprehensive [15] and includes data from IEEE and ACM publications (among others). The Web of Science has an equally comprehensive database, but Scopus offers a more flexible and powerful open-access ...

  19. User Awareness and Knowledge of Cybersecurity and the Impact of

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an ... Cybersecurity Security Awareness ..... 38 Cybersecurity Awareness Training..... 42 Cybersecurity Awareness ...

  20. 5 Dissertation Topics on Cyber Crime

    5 Dissertation Topics on Cyber Crime 2022. Table of content. 1. Introduction; 3. Cyber Crime Research Topics 2021; ... Research Aim: This study aims to analyse the impact of cyber laws on information security. This study is a cross-country analysis that will find the effectiveness of cyber laws across countries. It will see how over time, the ...

  21. 2024 Cullen Spring Commencement Live Blog

    1:33 p.m. - Our graduate students have begun checking in and lining up for our second Commencement ceremony, scheduled for 2 p.m.! In advance of that, we've gotten some great photos of their mortarboards, and talked to them about their work at UH.