Logo

Departments

  • Applied Physics
  • Biomedical Engineering
  • Center for Urban Science and Progress
  • Chemical and Biomolecular Engineering
  • Civil and Urban Engineering
  • Computer Science and Engineering
  • Electrical and Computer Engineering
  • Finance and Risk Engineering
  • Mathematics
  • Mechanical and Aerospace Engineering
  • Technology, Culture and Society
  • Technology Management and Innovation

Degrees & Programs

  • Bachelor of Science
  • Master of Science
  • Doctor of Philosophy
  • Digital Learning
  • Certificate Programs

NYU Tandon Bridge

  • Undergraduate
  • Records & Registration
  • Digital Learning Services
  • Teaching Innovation
  • Explore NYU Tandon
  • Year in Review
  • Strategic Plan
  • Diversity & Inclusion

News & Events

  • Social Media

Looking for News or Events ?

Cybersecurity, M.S.

purple lock with network nodes

ON THIS PAGE

Curriculum  |  National Centers of Academic Excellence in Cybersecurity Designation Tracks  |  Admission Information  |  Start Your Application

Request Information     Watch a Webinar

Why Cybersecurity at NYU?

We are here to help! Call us at 646.997.3623, U.S. Toll-Free at 877.503.7659, or email us at [email protected] .

  • How to Apply

Online Application

  • Tuition and Fees

Cybersecurity theory and research are critical today; your ability to get to new levels in your career and become a cybersecurity professional adept at tackling evolving threats has never been more important.

At the NYU Tandon School of Engineering, our MS in Cybersecurity program's curriculum is rooted in the belief that  an accessible path to career advancement and learning to build real-world solutions are essential. To this end, we created  NYU Cyber Fellows  to provide, a 75% scholarship for the Cybersecurity M.S. online and operate the National Science Foundation-funded Offensive Security, Incident Response, and Internet Security ( OSIRIS ) laboratory.

  • NYU Tandon has a distinguished history of research and education in the field of cybersecurity.
  • Classes are taught by internationally known experts.
  • Designated as an NSA Center of Academic Excellence in Cyber Operations and Cyber Defense Research.
  • The Application process has been streamlined to as little as 15 minutes to apply, receive a decision in 15 business days.

This section reflects the most recent program requirements. Students enrolled prior must adhere to the catalog requirements originally enrolled into.

Program Requirements

Sample Plan of Study

One goal of the MS program in Cybersecurity is to introduce students to the exciting research in the area of cybersecurity, which you can use as a stepping stone to pursue a PhD degree. To this end, we offer a semester-long advanced project (CS 9963) in the area of cybersecurity as an elective. If you choose this option you will work under the guidance of a research professor and gain invaluable research experience.

In addition to the above semester-long research experience, the program also offers research-oriented MS students to take up the master's thesis option. If you select this option, you will need to take 6 credits of CS 9973 working with a faculty advisor on some research problem in cybersecurity in lieu of 2 out of the 3 required electives.

The research need not be original, but should adequately demonstrate your proficiency in the subject material. An oral defense of the master's thesis with at least 3 professors in attendance is required. The 6 credits of master's thesis must span over a period of exactly 2 consecutive semesters. Whenever relevant, 3.00 credits of CS 9963 may be used as 3.00 credits of CS 9973, subject to the approval of your faculty adviser(s).

Cyber Ops Specialization

NOTE: Please refer to the Course Catalog to view course descriptions by course number if information is not listed above.

National Centers of Academic Excellence in Cybersecurity Designation Tracks

NYU Tandon School of Engineering is one of the select institutions recognized by the National Centers of Academic Excellence in Cybersecurity (NCAE-C) . The following courses taken within the Cybersecurity Master's Degree online program qualify for the following two designations.

Students also may elect to specialize by taking specific courses in an area of concentration. Two tracks are available:

  • Cyber Defense
  • Cyber Operations

Admission Information

You need a superior undergraduate record from an accredited institution in order to be considered for entrance into the program. Preferably, you should have an undergraduate degree in computer science, mathematics, science, or engineering. However, applicants with a minor in CS, relevant technical experience, or with degrees in other fields are considered individually for admission.

  • Find out more about  Cybersecurity Admission Requirements .
  • Find out more about  General Admission Requirements .

Prerequisites

Students must show equivalency of all of the following in previous academic work.

  • Introduction to Programming and Problem Solving, CS-GY 5303
  • Data Structures and Algorithms, CS-GY 5403

If you come from a non-engineering background you can prepare to apply for the Cybersecurity Master’s Degree by taking the NYU Tandon Bridge Program .

NYU Tandon's NYU Cyber Fellows program is an affordable part-time and full-time online M.S. in Cybersecurity with a curriculum designed in cooperation with elite corporate partners. Now offering scholarships of as much as 75% off tuition to both U.S. and non-U.S. residents.

If you come from a non-engineering background you can prepare to apply for the Cybersecurity Master’s Degree through out Tandon Bridge program.

The 100% online NYU Tandon Bridge course prepares students without a Cybersecurity degree or other related experience to apply for select NYU Tandon Master’s Degree programs . In the course, students will learn computer science fundamentals and programming with C++. Students’ performance in the Bridge will count toward their Master’s degree application decisions. The Bridge is a non-credit certificate course, and those who complete the Bridge with a final grade of C or above will earn a Certificate of Completion, and those who earn a B+ or above will receive a Certificate of Completion with Distinction. Note: regardless of performance, successful completion of the Bridge course does not guarantee admission to any academic program.

The NYU Tandon Bridge course is taught by faculty members of the Computer Science department at the NYU Tandon School of Engineering, aided by NYU Tandon Graduate student teaching assistants. Students will participate in interactive online modules, live webinars, assignments, and tests.

Applications for transfer credits must be submitted for consideration before the end of the first semester of matriculation. Courses with grades below B are not eligible for transfer. Transfer credits for courses taken after matriculation at the NYU Tandon School of Engineering are rarely accepted and must be approved by the student’s academic department and by the Office of Graduate Academics before the course is taken. Grades for transferred credits or courses are not recorded and are not included in GPA calculations.

Start Your Application

We are here to help! Call us at 646.997.3623, U.S. Toll-Free at 877.503.7659, or email us at [email protected] .

Quick Links

  • Explore Cybersecurity @ NYU

Ariel Weintraub

Ariel Weintraub

Google Custom Search

Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.

Hinweise zum Einsatz der Google Suche

Technical University of Munich

  • Professorship of Cyber Trust
  • TUM School of Computation, Information and Technology
  • Technical University of Munich

Technical University of Munich

Teaching at the Professorship of Cyber Trust

Theses and student projects.

We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.

Application

Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.

Open Student Projects

This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.

Assigned Student Projects

Completed student projects.

Cybersecurity Dissertation Topics

Cybersecurity is an incredibly interesting topic area to complete your dissertation in, with it becoming increasingly prominent as technology is so heavily integrated into our daily lifestyles. Cybersecurity is always around us, from simple security systems that protect our mobile devices to complex strategies to secure personal data for big corporations. This helps to provide an array of different opportunities for completing an engaging and innovative cyber security dissertation. Some of the most important topic areas that exist within the field of cybersecurity include cybersecurity and cryptocurrencies, cybersecurity’s impact on business and economics, the role of cybersecurity in world affairs, cybersecurity and cybercrime, and how cybersecurity connects with big data and the Internet of Things (IoT).

Cryptocurrencies

Business & economics, world affairs, big data & iot.

Cryptocurrencies are very much the trendy topic in the world of cyber right now, with there being numerous studies exploring various aspects of cryptocurrencies and blockchain technology. However, few of these aims to contextualise the link between these technologies and cybersecurity, both for how blockchain technology can enhance cybersecurity, and what cybersecurity strategies can be used to protect cryptocurrencies. The following topic titles provide engaging research reviews into these key areas.

  • A historical overview on the development of cyber security to enhance cryptographic security of blockchain technologies.
  • A critical analysis of cyber-attacks and cryptocurrencies.
  • How can blockchain applications be used to support cyber security strategies to reduce the global threat of cybercrime?
  • How can cryptocurrencies be regulated in the European Union: What is the mediating role of cyber security?
  • Can blockchain technologies be used to front the new domain of cyber forensics?
  • An analysis of the future of cryptocurrencies and the mediating influence this may have on the state of cyber security strategies.

Organisations are having to invest more and more of their financial resources into cybersecurity to protect both their systems and their customers’ data. This lends itself to many new study areas that aim to explore how cybersecurity can be managed in the organisational setting, and what the potential return on investment for these strategies is.

  • An analysis of the mediating role of risk management on the implementation of a comprehensive cybersecurity strategy.
  • The use of Virtual Private Networks to enable remote working: A review of critical cyber security implications for developing successful VPN systems.
  • A critical analysis of the role of cybersecurity throughout the supply chain for enhancing supply chain performance and collaboration.
  • What cyber security measures can Small and Medium Sized Enterprises use to enhance their data protection protocols and build customer confidence?
  • A review of effective cyber security strategies for mitigating cybercrime risk to business operations and continuity.
  • What costing and investment models can be applied to effectively analyse whether the implementation of cyber security measures provides a positive return on investment?

It is evident that cybersecurity forms a significant role in day-to-day lives, with this instantly highlighting the significance of it in world affairs. From managing Covid-19 vaccination plans to GDPR, it is vital to understand the mechanisms in which cybersecurity is used to supplement ongoing world affairs and global projects.

  • The impact of Covid-19 on cybersecurity in an organisational context due to increased levels of remote working.
  • How should global legislation be created to help improve cybersecurity and reduce growing levels of cybercrime across the developed world?
  • Have the recently enacted General Data Protection Regulations had a significant improvement on the protection of personal data and helped to reduce cybercrime or identity theft?
  • Cyber security in the developing world: A critical analysis of opportunities and current barriers to implementation.
  • How can cyber security be used to enhance data protection through vaccination distribution programs to tackle the spread of Covid-19?
  • Cyber security and International Relations: How do the USA, China, and Russia manage cyber security when interacting with one another?

One of the most commonly aligned topics with cybersecurity is cybercrime, with this becoming an even greater threat as more people work from home and live their lives through technology. However, just as technology evolves so does the nature of cybercrime, with this always presenting the opportunity to research new and innovative ways in which cybercrime can be halted with innovative cyber security strategies.

  • The influence of cybersecurity of the elimination of cybercrimes: A case study of the Equifax cyber-attack.
  • A historical review of cybercrimes between 1980 and 2020: A critical analysis on the evolution of cybercrime and what future threats may be.
  • Novice strategies to protect against cybercrime: An analysis of how cybersecurity can be used by low-level knowledge computer users.
  • The influence of cyber forensics in combating cybercrime and as a fundamental strategy within the scope of a cybersecurity system.
  • What are the positive and negative impacts on the use of simulated phishing scams to build awareness of corporate cybercrime?
  • New methods of cybercrime: How can cybersecurity strategies be used to protect mobile devices from the threat of cybercrime?

Finally, big data and IoT form an imperative role in both organisational and social lives, with cybersecurity being fundamental to protect these systems. As both of these concepts are relatively new, there is a broad scope to potentially evaluate and conduct a research study on.

  • Determining effective cybersecurity strategies to support an integrated IoT system.
  • How to utilise cybersecurity when managing big data: A critical analysis of the use of detection algorithms.
  • An analysis of the mediating role of artificial intelligence in the development of comprehensive and autonomous cybersecurity systems.
  • What is the influence of machine learning on the creation of effective cybersecurity systems: A critical analysis of the banking industry?
  • A critical evaluation of the importance of integrating cyber security systems into big data analytics.
  • An evaluation on the use of cyber security across multiple Internet of Things devices: What are best practice techniques?

You may also like

Fun Essay Topics

masters dissertation cyber security

Cyber Security Hub

  • Research projects
  • PhD research

Euroopa Regionaalarengu Fond

MSc thesis on Cyber Security related topics defended at the University of Tartu :

  • Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System"
  • Mammadzada. K., "Blockchain Oracles"
  • Matsalu. M., "The Development of Digital Forensics Workforce Competency on the Example of Estonian Defence League"
  • Padur. K., "Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution"
  • Puniani. R., "Conceptualization of a Blockchain Based Voting Ecosystem in Estonia"
  • Pure. I., "An Automated Methodology for Validating Web Related Cyber Threat Intelligence by Implementing a Honeyclient"
  • Produit. B.D., "Optimization of the ROCA (CVE-2017-15361) Attack"
  • Sarapuu. D., "Penetration Testing of Glia’s Web Application"
  • Seeba. M., "A Specification of Layer-Based Information Security Management System for the Issue Tracking System"
  • Simisker. M., "Security of Health Information Databases"
  • Tõnisson. R., "Tighter Post-quantum Secure Encryption Schemes Using Semi-classical Oracles"
  • Yerokhin. M., "Multi-level Policy-aware Privacy Analysis"

See more at the thesis database .

  • Abbasi A., GDPR Implementation in an Airline’s Contact Center
  • Akande A., Disruptive Power of Blockchain on the Insurance Industry
  • Avramenko V., Cost-Benefit Analysis of a Hybrid Terrorist Attack on a Power Plant

  • Affia A-A. O., Security Risk Management of E-commerce Systems
  • Çelebi I., 
Privacy Enhanced Secure Tropos:
 A Privacy Modeling Language for GDPR Compliance
  • Cherednychenko O., Designing Visually Effective and Intuitive Modelling Notations for Security Risk Management
  • Elazazy A. A. A. A., HoneyProxy Implementation in Cloud Environment with Docker Container HoneyFarm
  • Filipczak K. M., Testing the Security Awareness using Open-Source Tools: Spear Phishing
  • Islami L., Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations
  • Jüristo K., How to Conduct Email Phishing Experiments
  • Kaasik M., A Tool for Supporting Multi-perspective System Development Through Security Risk Management
  • Kopylash V., An Ethereum-Based Real Estate Application with Tampering-Resilient Document Storage
  • Luomala M., Evaluation of Efficiency of Cybersecurity
  • Mendelman K., Fingerprint Organization Using Metadata of Public Documents
  • Mitt S., Blockchain Application - Case Study on Hyperledger Fabric
  • Mohamed G. Z. A. R., Detecting Social Spamming on Facebook Platform
  • Nugis R., Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
  • Orange A., Blockchain-based Provenance Solution for Handcrafted Jewellery
  • Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists’ Cyber Incident Reporting Skills
  • Rebane R.-M., Post-Quantum Secure Time-Stamping
  • Ristikivi A., Ensuring the Integrity of Electronic Health Records
  • Räni E., Prediction Model for tendencies in Cybercesurity
  • Sing E., A Meta-Model Driven Method for Establishing Business Process Compliance to GDPR
  • Shapaval R., Security Risk Management for the IoT systems
  • Soonberg M., The Employee-Based Information Security Risks on the Example of the Estonian Literary Museum
  • Sõgel K., Distributed Ledger Technology and External Mandatory Reporting in Banking Industry
  • Velázquez J. A. S., ''Securing openHAB Smart Home Through User Authentication and Authorization'
  • Värva I., Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application
  • Zaitsev A., Comparison of STS and ArchiMate Risk and Security Overlay
  • AbuSeada W. M. F. A., Alternative Approach to Automate Detection of DOM-XSS Vulnerabilities
  • Bascuñana G. F., Method for Effective PDF Files Manipulation Detection
  • Brodar G., Analysis of Exploit-kit Incidents and Campaigns Through a Graph Database Framework
  • Djagilev V., Android Chat Application Forensic Process Improvement & XRY Support
  • Ellervee A., A Reference Model for Blockchain-Based Distributed Ledger Technology
  • Jõgi M., Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance
  • Kinger M., Enterprise Cloud Security Guidance and Strategies for Enterprises
  • Kuldmaa A., On Secure Bulletin Boards for E-Voting
  • Lahesoo P., The Electronic Evidence Examination Reporting System by the Example of West Prefecture
  • Lashkarara S., Managing Security Risks Using Attack-Defense Trees
  • Maennel K., Improving and Measuring Learning Effectiveness at Cyber Defence Exercises
  • Nafies A., A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver
  • Sivalingapandi D., Comparison and Alignment of Access Control Models
  • Oksvort R., A Prototype for Learning Privacy-Preserving Data Publishing
  • Pappas S., Investigation of JTAG and ISP Techniques for Forensic Procedures
  • Proskurin A., Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application
  • Treier D., Research and Proof of Concept of Selected ISKE Highest Level Integrity Requirements
  • Tschida C., The Way to the Specialist and Management Level of Cyber Hygiene Initiative
  • Tsintsabadze L., A Prototype to Analyze Role- and Attribute-Based Access Control Models
  • Vallaots A., Federation of Cyber Ranges
  • Vunk M., A Framework for Assessing Organisational IT Governance Risk and Compliance
  • Allyson I. H., Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises
  • Duran S. A. U., Organizational Interaction Mechanisms Affecting Strategic Decision-Making During Cybercrime Investigations
  • Herrera V. L. C., A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
  • Martínez F. C. A., Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding and Development
  • Pantoja V. C. A., Analysis of the Cyber Attacks against ADS-B Perspective of Aviation Experts
  • Pinto R. Y. A., Development of National Cyber Security Strategies (NCSSs), and an Application of Perspective to the Colombian Case
  • Rozario V. I. D. J., Model-based Role Based Access Control for RESTful Spring applications
  • Samarütel S., Revision of Security Risk-oriented Patterns for Distributed Systems
  • Sarmiento B. S. A., Detection Solution Analysis for Simplistic Spoofing Attacks in Commercial Mini and Micro UAVs
  • Sergeev A., Role Based Access Control as SecureUML Model in Web Applications Development with Spring Security
  • Siim J., Secure and Efficient Mix-Nets
  • Siim S., A Comprehensive Protocol Suite for Secure Two-Party Computation
  • Sokk V., An Improved Type System for a Privacy-aware Programming Language and its Practical Applications
  • Suarez M. D. D., Assessment of Web-based Information Security Awareness Courses
  • Velasquez H. L. A., Colombia and the Intelligence Cycle in the 21st Century, the Digital Age
  • Guler S., Secure Bitcoin Wallet
  • Kiiver J., NFC Security Solution for Web Applications
  • Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation
  • Rao S. P. Analysis and Mitigation of Recent Attacks on Mobile Communication Backend
  • Rrenja A., Pattern Based Security Requirements Derivation with Security Risk-aware Secure Tropos
  • Tursunova S., Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks
  • Vaht M., The Analysis and Design of a Privacy-Preserving Survey System
  • AbuLamddi M., Safety and Security Dependability Analysis
  • Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes
  • Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools
  • Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis
  • Okugbeni J., Security Implementation of Mission Control System for ESTCube-1 Satellite
  • Pikma T., Auditing of Secure Multiparty Computations
  • Preobrazenskaja A., Development of Security Risk Measurement Model within Misuse Cases and BPMN
  • Teder T. Extracting Bole-based Access Control Models from Business Process Event Logs
  • Tovstukha I., Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities
  • Turban T., A Secure Multi-Party Computation Protocol Suite Inspired by Shamir’s Secret Sharing Scheme
  • Altuhhova O., Developing System Security through Business Process Modelling
  • Onchukova A., Transformation rules between MUC and MAD
  • Pankova A., Insecurity of Transformation-Based Privacy-Preserving Linear Programming
  • Pullonen P., Actively Secure Two-Party Computation: Efficient Beaver Triple Generation
  • Rebane R., A Feasibility Analysis of Secure Multiparty Computation Deployments
  • Tark K., Role Based Access Model in XML based Documents
  • Cakabey O., Role-based Access Control Using Knowledge Acquisition in Automated Specification
  • Khan N. H., A Pattern-based Development of Secure Business Processes
  • Lakk H., Model-driven Role-based Access Control for Databases
  • Soomro I. U., Alignment of Misuse Cases to ISSRM
  • Turan Y., Extension and Application of Event-driven Process Chain for Information System Security Risk Management
  • Chowdhury M. J. M., Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
  • Seeba I., Adding a transformation language to the Cryptoanalyser
  • Talviste R., Deploying secure multiparty computation for joint data analysis - a case study
  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Dissertations / Theses on the topic 'Computer security ; cybersecurity'

Create a spot-on reference in apa, mla, chicago, harvard, and other styles.

Consult the top 47 dissertations / theses for your research on the topic 'Computer security ; cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Choi, Min Suk. "Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/119.

Locke, Ronald Taylor. "Anomaly detection with applications in environmental and cyber security." Thesis, Boston University, 2012. https://hdl.handle.net/2144/33260.

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Gcaza, Noluxolo. "A national strategy towards cultivating a cybersecurity culture in South Africa." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.

Loughry, Joe. "Security test and evaluation of cross domain systems." Thesis, University of Oxford, 2014. https://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352.

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Johnson, William. "Development of Peer Instruction Material for a Cybersecurity Curriculum." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2367.

Deshpande, Pranita. "Assessment Of Two Pedagogical Tools For Cybersecurity Education." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2557.

Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.

Goode, Jodi. "Comparing Training Methodologies on Employee’s Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical Programs." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1045.

Cardarelli, Anthony. "Automated Deployment of a Security Operations Center." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592133599167901.

Selinger, David Emanuel. "Designing a Security Education Curriculum Using Gamification Principles." Kent State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1574424122762057.

Sengelmann, Michael. "An Overview of Reverse Engineering and A Security Analysis of TikTok." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613748245334672.

Friman, Nelly. "Security Analysis of Smart Buildings." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279423.

Amir-Mohammadian, Sepehr. "A Formal Approach to Combining Prospective and Retrospective Security." ScholarWorks @ UVM, 2017. http://scholarworks.uvm.edu/graddis/802.

Horcher, Ann-Marie. "Conservation of Limited Resources: Design Principles for Security and Usability on Mobile Devices." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1028.

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Muedas, Higginson Ana Cristina, and Velásquez Renato Germán Rojas. "Modelo de madurez de seguridad de aplicaciones web ante ciberataques para clínicas de nivel 2." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/628108.

Rodriguez, Ricardo J. "An Electroencephalogram (EEG) Based Biometrics Investigation for Authentication| A Human-Computer Interaction (HCI) Approach." Thesis, Nova Southeastern University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3723216.

Encephalogram (EEG) devices are one of the active research areas in human-computer interaction (HCI). They provide a unique brain-machine interface (BMI) for interacting with a growing number of applications. EEG devices interface with computational systems, including traditional desktop computers and more recently mobile devices. These computational systems can be targeted by malicious users. There is clearly an opportunity to leverage EEG capabilities for increasing the efficiency of access control mechanisms, which are the first line of defense in any computational system.

Access control mechanisms rely on a number of authenticators, including “what you know”, “what you have”, and “what you are”. The “what you are” authenticator, formally known as a biometrics authenticator, is increasingly gaining acceptance. It uses an individual’s unique features such as fingerprints and facial images to properly authenticate users. An emerging approach in physiological biometrics is cognitive biometrics, which measures brain’s response to stimuli. These stimuli can be measured by a number of devices, including EEG systems.

This work shows an approach to authenticate users interacting with their computational devices through the use of EEG devices. The results demonstrate the feasibility of using a unique hard-to-forge trait as an absolute biometrics authenticator by exploiting the signals generated by different areas of the brain when exposed to visual stimuli. The outcome of this research highlights the importance of the prefrontal cortex and temporal lobes to capture unique responses to images that trigger emotional responses.

Additionally, the utilization of logarithmic band power processing combined with LDA as the machine learning algorithm provides higher accuracy when compared against common spatial patterns or windowed means processing in combination with GMM and SVM machine learning algorithms. These results continue to validate the value of logarithmic band power processing and LDA when applied to oscillatory processes.

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Curran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.

Gaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.

Habeeb, Richard. "Improving the Security of Building Automation Systems Through an seL4-based Communication Framework." Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7161.

Doyle, Marc. "Comprehending the Safety Paradox and Privacy Concerns with Medical Device Remote Patient Monitoring." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1090.

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Hedlund, Filip, and Emma Loots. "Information Security Risk Assessment : An Analysis of a Medical Aid Service." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284151.

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Persson, Sebastian. "Who Watches The Privileged Users." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414648.

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Shirley, Brandon L. "Developing and Securing Software for Small Space Systems." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7544.

Lindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.

(5929946), James E. Lerums. "Measuring the State of Indiana's Cybersecurity." Thesis, 2019.

This dissertation introduces a scorecard to enable the State of Indiana to measure the cybersecurity of its public and private critical infrastructure and key resource sector organizations. The scorecard was designed to be non-threatening and understandable so that even small organizations without cybersecurity expertise can voluntarily self-asses their cybersecurity strength and weaknesses. The scorecard was also intended to enable organizations to learn, so that they may identify and self-correct their cybersecurity vulnerabilities. The scorecard provided quantifiable feedback to enable organizations to benchmark their initial status and measure their future progress.

Using the scorecard, the Indiana Executive Council for Cybersecurity launched a Pilot to measure cybersecurity of large, medium, and small organizations across eleven critical infrastructure and key resources sectors. This dissertation presents the analysis and results from scorecard data provided by the Pilot group of 56 organizations. The cybersecurity scorecard developed as part of this dissertation has been included in the Indiana Cybersecurity Strategy Plan published September 21, 2018.

Patala, Najiyabanu Noormohmed. "Cybersecurity framework for cloud computing adoption in rural based tertiary institutions." Diss., 2018. http://hdl.handle.net/11602/1362.

Van, Vuuren Johanna Christina Jansen. "Methodology and Model to Establish Cybersecurity for National Security in Africa using South Africa as a Case Study." Thesis, 2016. http://hdl.handle.net/11602/744.

(8072417), Braiden M. Frantz. "CISTAR Cybersecurity Scorecard." Thesis, 2019.

Highly intelligent and technically savvy people are employed to hack data systems throughout the world for prominence or monetary gain. Organizations must combat these criminals with people of equal or greater ability. There have been reports of heightened threats from cyber criminals focusing upon the energy sector, with recent attacks upon natural gas pipelines and payment centers. The Center for Innovative and Strategic Transformation of Alkane Resources (CISTAR) working collaboratively with the Purdue Process Safety and Assurance Center (P2SAC) reached out to the Computer and Information Technology Department to assist with analysis of the current cybersecurity posture of the companies involved with the CISTAR initiative. This cybersecurity research project identifies the overall defensive cyber posture of CISTAR companies and provides recommendations on how to bolster internal cyberspace defenses through the identification of gaps and shortfalls, which aided the compilation of suggestions for improvement. Key findings include the correlation of reduced cybersecurity readiness to companies founded less than 10 years ago, cybersecurity professionals employed by all CISTAR companies and all CISTAR companies implementing basic NIST cybersecurity procedures.

(6613439), Siddharth Chowdhury. "PERCEPTIONS OF PURPLE TEAMS AMONG CYBERSECURITY PROFESSIONALS." Thesis, 2019.

Gwala, Sizwe. "Barriers to implementation of the (SA) National Cybersecurity Policy Framework." Thesis, 2016. https://hdl.handle.net/10539/23802.

"CacheLight: A Lightweight Approach for Preventing Malicious Use of Cache Locking Mechanisms." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.50522.

(11173323), Hanlin Chen. "Adaptive Safety and Cyber Security for Connected and Automated Vehicle System." Thesis, 2021.

This dissertation discussed the potential benefits that CAV systems can bring to the general well-being, and how the threat lies within the CAV system can affect its performance and functionality.

Particularly, this dissertation discovered how CAV technology can benefit homeland security and crime investigations involving child abduction crimes. By proposing the initial design network, this dissertation proposed a solution that enhances the current AMBER Alert system using CAV technology. This dissertation also discussed how CAV technology can help perception in corner-case driving scenarios and reduce the risk of traffic accidents, by proposing a dataset that covers various corner cases including different weather and lighting conditions targeting the work zone. Evaluation is made on the collected data and several impact factors have been figured out.

This dissertation also discussed an attack scenario that a ROS-based CAV platform was attacked by DoS attacks. We analized the system response after we attacked the system. Discussion and analysis was made on the functionality and stability of the system.

Overall, we determined that CAV technology can greatly benefit in general well-being, and threats within the CAV system can cast potential negative benefits once the CAV system is being attacked.

(8810120), Naif S. Almakhdhub. "INTERNET OF THINGS SYSTEMS SECURITY: BENCHMARKING AND PROTECTION." Thesis, 2020.

Internet of Things (IoT) systems running on Microcontrollers (MCUS) have become a prominent target of remote attacks. Although deployed in security and safety critical domains, such systems lack basic mitigations against control-flow hijacking attacks. Attacks against IoT systems already enabled malicious takeover of smartphones, vehicles, unmanned aerial vehicles, and industrial control systems.

The thesis introduces a systemic analysis of previous defense mitigations to secure IoT systems. Building off this systematization, we identify two main issues in IoT systems security. First, efforts to protect IoT systems are hindered by the lack of realistic benchmarks and evaluation frameworks. Second, existing solutions to protect from control-flow hijacking on the return edge are either impractical or have limited security guarantees. This thesis addresses these issues using two approaches.

First, we present BenchIoT, a benchmark suite of five realistic IoT applications and an evaluation framework that enables automated and extensible evaluation of 14 metrics covering security, performance, memory usage, and energy. BenchIoT enables evaluating and comparing security mechanisms. Using BenchIoT, we show that even if two security mechanisms have similarly modest runtime overhead, one can have undesired consequences on security such as a large portion of privileged user execution.

Second, we introduce Return Address Integrity (RAI), a novel security mechanism to prevent all control-flow hijacking attacks targeting return edges, without requiring special hardware. We design and implement μRAI to enforce the RAI property. Our results show μRAI has a low runtime overhead of 0.1% on average, and therefore is a

practical solution for IoT systems.

This thesis enables measuring the security IoT systems through standardized benchmarks and metrics. Using static analysis and runtime monitors, it prevents control-flow hijacking attacks on return edges with low runtime overhead. Combined, this thesis advances the state-of-the-art of protecting IoT systems and benchmarking its security.

"SDN-based Proactive Defense Mechanism in a Cloud System." Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.34850.

(6623090), Gregory Walkup. "Investigating Attacks on Industrial Control Systems Using Deterministic Replay Simulation." Thesis, 2019.

(8119418), Hafiz Muhammad Junaid Khan. "A MACHINE LEARNING BASED WEB SERVICE FOR MALICIOUS URL DETECTION IN A BROWSER." Thesis, 2019.

Svensson, Elina, and Annika Rydén. "JamaicaEye : What does cyber security look like in one of the most recently developed CCTV networks?" Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22266.

"Blurring Safety Between Online and Offline Worlds: Archival, Correlational, and Experimental Evidence of Generalized Threat in the Digital Age." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.44025.

(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.

  •   Hjem
  • Faculty of Engineering and Science
  • Department of Information and Communication Technology

Master's theses in Cyber Security

Utgivelsesdato Forfattere Titler Emneord Dokumenttyper Tidsskrifter

Søk i denne samlingen:

Nye registreringer

Navigating the phishing landscape: a novel stage model unveiling the journey of individuals exposed to phishing attempts , tapping network traffic in kubernetes , designing a framework for data populating alarms based on mitre techniques , designing a framework for data populating alarms based on mitre techniques , rosi calculation tool proposal for the norwegian healthcare sector , vulnerability assessment framework for offshore industrial control system , unveiling the potential of open-source intelligence (osint) for enhanced cybersecurity posture , ransomware simulator for in-depth analysis and detection: leveraging centralized logging and sysmon for improved cybersecurity , the impact of gender equality in the cybersecurity sector , examining the security and privacy barriers of third-party public cloud services a case study of diverse norwegian municipalities , multi-cloud information security policy development , information security culture: an investigation into the impact of a large-scale cyberattack , an analysis of phishing susceptibility through the lens of protection motivation theory , to deceive or not deceive: unveiling the adoption determinants of defensive cyber deception in norwegian organizations , "not my responsibility" - a comparative case study of organizational cybersecurity subcultures .

feed

Cybersecurity Guide

From scholar to expert: Cybersecurity PhD options

In this guide

  • Industry demand
  • 2024 rankings
  • Preparation
  • Considerations
  • School listings

The cybersecurity landscape is not just growing—it’s evolving at a breakneck pace. And what better way to stay ahead of the curve than by pursuing a PhD in cybersecurity?

This advanced degree is no longer confined to the realm of computer science. Today, it branches into diverse fields like law, policy, management, and strategy, reflecting the multifaceted nature of modern cyber threats.

If you’re looking to become a thought leader in this dynamic industry, a PhD in cybersecurity offers an unparalleled opportunity to deepen your expertise and broaden your horizons.

This guide is designed to give prospective cybersecurity PhD students a general overview of available cybersecurity PhD programs. It will also outline some of the factors to consider when trying to find the right PhD program fit, such as course requirements and tuition costs. 

Industry demand for PhDs in cybersecurity

Like other cutting-edge technology fields, until recently, cybersecurity PhD programs were often training grounds for niche positions and specialized research, often for government agencies (like the CIA, NSA, and FBI),  or closely adjacent research organizations or institutions. 

Today, however, as the cybersecurity field grows to become more pervasive and consumer-oriented, there are opportunities for cybersecurity PhDs to work at public-facing companies like startups and name-brand financial, software, infrastructure, and digital service firms.

One trend that is emerging in the cybersecurity field is that cybersecurity experts need to be well-versed in a variety of growing threats. If recent headlines about cybersecurity breaches are any indication, there are a number of new attack vectors and opportunities for cybercrime and related issues. Historically, committing cybercrime took resources and a level of sophistication that required specialized training or skill.

But now, because of the pervasiveness of the internet, committing cybercrime is becoming more commonplace. So training in a cybersecurity PhD program allows students to become an experts in one part of a growing and multi-layered field.

In fact, this trend of needing well-trained, but adaptable cybersecurity professionals is reflected by the move by cybersecurity graduate schools to offer specialized master’s degrees , and many companies and professional organizations offer certifications in cybersecurity that focus on particular issues related to cybersecurity technology, cybersecurity law , digital forensics , policy, or related topics.

That said, traditional research-oriented cybersecurity positions continue to be in demand in academia and elsewhere — a trend that will likely continue. 

One interesting facet of the cybersecurity field is trying to predict what future cybersecurity threats might look like and then develop tools and systems to protect against those threats.

As new technologies and services are developed and as more of the global population begins using Internet services for everything from healthcare to banking — new ways of protecting those services will be required. Often, it’s up to academic researchers to think ahead and examine various threats and opportunities to insulate against those threats.

Another key trend coming out of academic circles is that cybersecurity students are becoming increasingly multidisciplinary.

As cybersecurity hacks impact more parts of people’s everyday lives, so too do the academic programs that are designed to prepare the next generation of cybersecurity professionals. This emerging trend creates an enormous amount of opportunity for students who have a variety of interests and who are looking to create a non-traditional career path.

The best cybersecurity PhD programs for 2024

Capella university, georgia institute of technology, northeastern university, marymount university, school of technology and innovation, nova southeastern university, college of computing & engineering, purdue university, stevens institute of technology, worcester polytechnic institute, university of illinois at urbana-champaign, mississippi state university, new york institute of technology.

These rankings were compiled from data accessed in November 2023 from the Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

What is required to get a PhD in cybersecurity?

Good news first: Obtaining a PhD in a field related to cybersecurity will likely create tremendous employment opportunities and lead to interesting and dynamic career options.

Bad news: Getting a PhD requires a lot of investment of time and energy, and comes with a big opportunity cost (meaning you have to invest four to five years, or longer, or pursue other opportunities to obtain a doctoral degree. 

Here’s a quick breakdown of what is required to get a PhD in cybersecurity. Of course, specific degree requirements will vary by program. One growing trend in the field is that students can now obtain degrees in a variety of formats, including traditional on-campus programs, online degree programs , and hybrid graduate degree programs that combine both on-campus learning with online learning. 

Related resources

  • Online PhD in cybersecurity – A guide to finding the right program
  • Cybersecurity degree programs
  • Podcast episodes and expert interviews

Preparing for a cybersecurity doctorate program

Cybersecurity is a relatively new formalized technology field, nonetheless, there are several ways that students or prospective PhD candidates can get involved or explore the field before and during a graduate school program. A few examples of ways to start networking and finding opportunities include: 

Join cybersecurity organizations with professional networks

Specialized professional organizations are a good place to find the latest in career advice and guidance. Often they publish newsletters or other kinds of information that provide insights into the emerging trends and issues facing cybersecurity professionals. A couple of examples include:

The Center for Internet Security  (CIS) is a non-profit dedicated to training cybersecurity professionals and fostering a sense of collaboration. The organization also publishes information and analysis of the latest cybersecurity threats and issues facing the professional community.

The SANS Institute runs several different kinds of courses for students (including certification programs) as well as ongoing professional cybersecurity education and training for people working in the field. The organization has several options including webinars, online training, and live in-person seminars. Additionally, SANS also publishes newsletters and maintains forums for cybersecurity professionals to interact and share information.

Leverage your social network

Places like LinkedIn and Twitter are good places to start to find news and information about what is happening in the field, who the main leaders and influencers are, and what kinds of jobs and opportunities are available.

Starting a professional network early is also a great opportunity. Often professionals and members of the industry are willing to provide guidance and help to students who are genuinely interested in the field and looking for career opportunities. 

Cybersecurity competitions 

Cybersecurity competitions are a great way to get hands-on experience working on real cybersecurity problems and issues. As a PhD student or prospective student, cybersecurity competitions that are sponsored by industry groups are a great way to meet other cybersecurity professionals while getting working on projects that will help flesh out a resume or become talking points in later job interviews.

The US Cyber Challenge , for example, is a series of competitions and hackathon-style events hosted by the Department of Homeland Security Science and Technology Directorate and the Center for Internet Security to prepare the next generation of cybersecurity professionals.

Internships

Internships also continue to be a tried and true way to gain professional experience. Internships in technical fields like cybersecurity can also pay well. Like the industry itself, cybersecurity internships are available across a wide range of industries and can range from academic research-oriented to more corporate kinds of work. 

Things to consider when choosing a cybersecurity PhD program

There are many considerations to evaluate when considering any kind of graduate degree, but proper planning is essential to be able to obtain a doctoral degree. It’s also important to note that these are just guidelines and that each graduate program will have specific requirements, so be sure to double-check.

What you will need before applying to a cybersecurity PhD program:

  • All undergraduate and graduate transcripts
  • A statement of intent, which is like a cover letter outlining interest
  • Letters of reference
  • Application fee
  • Online application
  • A resume or CV outlining professional and academic accomplishments

What does a cybersecurity PhD program cost?

Obtaining a PhD is a massive investment, both in terms of time and money. Cybersecurity PhD students are weighing the cost of becoming an expert in the field with the payoff of having interesting and potentially lucrative career opportunities on the other side.

Degree requirements are usually satisfied in 60-75 hours, so the cost of a doctoral degree can be well into the six-figure range. Here’s a more specific breakdown:

Tuition rates

The Cybersecurity Guide research team looked at 26 programs that offer a cybersecurity-related PhD degree. Here’s a breakdown of tuition rates (all figures are based on out-of-state tuition).

$17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology.

$86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.

$197,820 is the most expensive cybersecurity PhD program and is available at Indiana University Bloomington.

The good news is that by the time students get to the PhD level there are a lot of funding options — including some graduate programs that are completely funded by the university or academic departments themselves.

Additionally, funding in the form of research grants and other kinds of scholarships is available for students interested in pursuing cybersecurity studies. 

One example is the CyberCorps: Scholarships for Service program. Administered by the National Science Foundation, PhD students studying cybersecurity are eligible for a $34,000 a year scholarship, along with a professional stipend of $6,000 to attend conferences in exchange for agreeing to work for a government agency in the cybersecurity space after the PhD program. 

Frequently asked questions about cybersecurity PhD programs

Most traditional and online cybersecurity graduate programs require a minimum number of credits that need to be completed to obtain a degree. On average, it takes 71 credits to graduate with a PhD in cybersecurity — far longer (almost double) than traditional master’s degree programs. In addition to coursework, most PhD students also have research and teaching responsibilities that can be simultaneously demanding and great career preparation.

At the core of a cybersecurity doctoral program is a data science doctoral program, you’ll be expected to learn many skills and also how to apply them across domains and disciplines. Core curriculums will vary from program to program, but almost all will have a core foundation of statistics.  

All PhD candidates will have to take a series of exams that act as checkpoints during the lengthy PhD process. The actual exam process and timing can vary depending on the university and the program, but the basic idea is that cybersecurity PhD candidates generally have to sit for a qualifying exam, which comes earlier in the program (usually the winter or spring of the second year of study), a preliminary exam, which a candidate takes to show they are ready to start the dissertation or research portion of the PhD program, and a final exam where PhD students present and defend their research and complete their degree requirements. 

A cybersecurity PhD dissertation is the capstone of a doctoral program. The dissertation is the name of a formal paper that presents the findings of original research that the PhD candidate conducted during the program under the guidance of faculty advisors. Some example cybersecurity research topics that could potentially be turned into dissertation ideas include: * Policies and best practices around passwords * Ways to defend against the rise of bots * Policies around encryption and privacy * Corporate responsibility for employee security * Internet advertising targeting and privacy * The new frontier of social engineering attacks * Operation security (OpSec) strategy and policy * Network infrastructure and defense * Cybersecurity law and policy * The vulnerabilities of biometrics * The role of ethical hacking * Cybersecurity forensics and enforcement

A complete listing of cybersecurity PhD programs

The following is a list of cybersecurity PhD programs. The listing is intended to work as a high-level index that provides enough basic information to make quick side-by-side comparisons easy. 

You should find basic data about what each school requires (such as a GRE score or prior academic work) as well as the number of credits required, estimated costs, and a link to the program.

Arizona State University

  • Aim: Equip students with in-depth expertise in cybersecurity.
  • Study Modules: Delve into advanced computer science subjects and specific cybersecurity courses.
  • Research Component: Students undertake groundbreaking research in the cybersecurity domain.

Carnegie Mellon University

  • CNBC Collaboration: A joint effort between Carnegie Mellon and the University of Pittsburgh to train students in understanding the brain's role in cognition.
  • Training Program: Students take four main neuroscience courses and participate in seminars and ethics training.
  • Course Integration: Whether students have a B.S. or M.S. degree, they can combine the CNBC and ECE Ph.D. courses without extra workload.

Colorado School of Mines

  • Research Focus: Cybersecurity: Studying online security and privacy.
  • Cost and Financial Aid: Provides details on program costs and available financial support.
  • Current Mines Community: Offers specific information for those already affiliated with Mines.

Indiana University Bloomington

  • Focus Areas: Options include Animal Informatics, Bioinformatics, Computer Design, and more.
  • Information Sessions: The university holds events to guide potential students about admissions and study options.
  • Minor Requirement: All Ph.D. students must complete a minor, which can be from within the Luddy School of Informatics or from another approved school at IU Bloomington.

Iowa State University

  • Details: The program is open to both domestic and international students.
  • Time to Complete: Ph.D.: About 5.2 years
  • Goals: Students should gain deep knowledge, follow ethics, share their findings, and do advanced research if they're writing a thesis.
  • Learning Goals: Master core areas of Computer Science, achieve in-depth knowledge in a chosen subfield, obtain expertise to perform original research, and demonstrate the ability to communicate technical concepts and research results.
  • Duration: Median time to earn the doctorate is 5.8 years.
  • Application Information: The program is open to both domestic and international students.
  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.
  • Emphasis on Research: The college showcases its strength in research through sections dedicated to Research Areas, affiliated Institutes & Centers, ongoing Research Projects, and specialized Labs & Groups.
  • Holistic Student Growth: The college promotes a comprehensive student experience, spotlighting Clubs & Organizations, campus Facilities, and tech Systems.
  • Guidance for Future Students: Provides tailored insights for students considering joining at various academic levels, from Undergraduate to PhD.
  • Broad Learning: The program covers many areas, from software and policy to psychology and ethics, reflecting the wide scope of cybersecurity.
  • Course Design: Students learn foundational security topics first and then dive into specialized areas, like cyber forensics.
  • Successful Alumni: Past students now work in places like NASA, Amazon, and Google.
  • Feature: Students can apply to up to three different campuses and/or majors using a single application and fee payment.
  • Preparing for a Globalized World: Courses such as Global Supply Chain Management equip students for international careers.
  • Tech-Forward Curriculum: Purdue's commitment to advanced technology is evident.

Rochester Institute of Technology

  • Cyberinfrastructure Focus: The program dives deep into how hardware, data, and networks work together to create secure and efficient digital tools.
  • Broad Applications: The program uses computing to solve problems in fields like science, arts, and business.
  • Success Rate: All RIT graduates from this program have found relevant roles, especially in the Internet and Software sectors.

Sam Houston State University

  • Program's Objective: The course aims to nurture students to be technically adept and also to take on leadership roles in the digital and cyber forensic domain across various industries.
  • Assessments: Students undergo comprehensive tests to evaluate their understanding.
  • Research Paper (Dissertation): Once students reach the doctoral candidacy phase, they must produce and defend a significant research paper or dissertation.
  • Funding: All Ph.D. students get financial help, so they can start their research right away.
  • Teachers: The program has top experts, including those who've made big discoveries in computer science.
  • Research Areas: Students can study the latest topics like AI, computer vision, and online security.

The University of Tennessee

  • Study Areas: Options include Cybersecurity, Data Analytics, Computer Vision, and more.
  • Tests: You'll have to pass a few exams, including one when you start, one before your final project, and then present your final project.
  • Courses: Some specific courses are needed, and your main professor will help decide which ones.
  • Big Exam: Before moving forward, you'll take a detailed exam about your research topic.
  • Final Step: You'll present and defend your research project to experts.
  • Overview: This program is for those with a degree in Computer Science or similar fields. It has special focus areas like Cybersecurity and Machine Learning.

University of Arizona

  • Study Plan: Students start with learning research basics and then dive into modern tech topics.
  • Support for Students: All PhD students get funding that covers their studies, a stipend, and health insurance. Money for travel to conferences is also available.
  • After Graduation: Alumni work at top universities and big companies like Google and Microsoft.

University of California-Davis

  • About the Program: Students engage in deep research, ending with a dissertation.
  • Jobs After Graduation: Roles in companies or academic positions.
  • Vibrant Community: Beyond academics, students join a supportive community, enriching their Ph.D. experience.

University of Colorado - Colorado Springs

  • Recognition: UCCS is recognized by the National Security Agency (NSA) and the Department of Homeland Security for excellence in Information Assurance Education.
  • Course Approval: The NSA has approved UCCS's courses as meeting national security training standards.
  • Overview: This program focuses on vital areas like cyber security, physical security, and homeland security.

University of Idaho

  • Partnership with NSA and DHS: The university is part of a program to boost cyber defense education.
  • Recognition: The University of Idaho is among the institutions recognized as Centers of Academic Excellence in Cyber Defense.
  • Objective: To minimize vulnerabilities in the national information infrastructure.
  • Overview: This program is meticulously crafted to deliver premier legal education to its students.
  • Courses: Encompasses a balanced mix of traditional legal doctrines, theoretical viewpoints, and hands-on practical experiences.
  • Aim: The primary objective is to equip students with top-notch legal education.

University of Missouri-Columbia

  • Seminars: PhD students should attend 20 seminars. If they were previously Master's students, their past attendance counts.
  • Timeline Requirements: Comprehensive Exam must be completed within five years of starting the program.
  • Dissertation and Publication: At least one journal paper must be submitted, accepted, or published.

University of North Carolina at Charlotte

  • Faculty: The faculty members are renowned for their impactful research contributions on a global scale.
  • Curriculum: The curriculum is versatile, catering to individuals aiming for academia as well as those targeting roles in the corporate, commerce, or public sectors.
  • Program: A blend of theoretical and hands-on research is emphasized, offering a well-rounded educational experience.

Virginia Tech

  • Seminars and Ethics: Students attend special seminars and complete training on scholarly ethics and diversity.
  • Guidance: Each student gets a faculty advisor. A group of faculty members, called a committee, also guides them.
  • Major Exams: Students go through four main stages: a qualifying process, a preliminary proposal, a research presentation, and a final defense.
  • Strong Research: WPI's PhD program is recognized for its excellent research contributions.
  • Practical Focus: The program teaches students to tackle real tech challenges.
  • Modern Labs: Students use the latest labs like the Human-Robot Interaction Lab.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

New Jersey City University, College of Professional Studies

  • About: Focuses on best practices in areas like national security, cyber defense, and crisis communication.
  • Recognitions: The program has been honored by the National Security Agency since 2009 and was recognized for excellence in intelligence studies.
  • Jobs: Graduates are prepared for top roles in sectors like government and education.
  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.
  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

New York University Tandon School of Engineering

  • Scholarships: Many students get scholarships that pay for tuition and give a monthly allowance.
  • Research Interest: Research areas include cybersecurity, computer games, web search, graphics, and more.
  • Experience: Students can also research in NYU's campuses in Shanghai or Abu Dhabi.
  • One Degree for All: Every student gets the same Ph.D., regardless of their specific area of study.
  • Research Focus: The program emphasizes deep research and prepares students for advanced roles.
  • Major Project: Students work on a big research project, adding new knowledge to the computing world.
  • Program: Prepares students for leadership roles in different sectors.
  • Opportunities: Qualified students might get opportunities as Research or Teaching Assistants.
  • Overview: Focuses on advanced research and modern technologies.

Augusta University

  • Goal: The program prepares students for research roles and to make new discoveries in tech.
  • Benefits: A Ph.D. opens up leadership opportunities in tech sectors.
  • Overview: It focuses on new discoveries in areas like security, artificial intelligence, and virtual reality.

University of Texas at San Antonio

  • Financial Support: Full-time students can get funding, which covers tuition and offers roles like teaching assistants.
  • Job Prospects: UTSA trains students for jobs that are in high demand, using data from official sources.
  • Overview: The program focuses on in-depth research and teaching.

University of Central Florida

  • Mix of Subjects: Students can take courses from different areas, giving them a broad view of security topics.
  • Many Job Options: Graduates can work in government, big companies, or teach in universities.
  • Hands-on Learning: The program offers research, study projects, and internships for real-world experience.

For enquiries call:

+1-469-442-0620

banner-in1

60+ Latest Cyber Security Research Topics in 2024

Home Blog Security 60+ Latest Cyber Security Research Topics in 2024

Play icon

The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cybersecurity thesis topics helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security. 

This article aims to demonstrate the most current Cyber Security Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security topics for the project, latest research titles about cyber security.

Cyber Security Research Topics

List of Trending Cyber Security Research Topics in 2024

Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends.

A. Exciting Mobile Cyber Security Research Paper Topics

  • The significance of continuous user authentication on mobile gadgets. 
  • The efficacy of different mobile security approaches. 
  • Detecting mobile phone hacking. 
  • Assessing the threat of using portable devices to access banking services. 
  • Cybersecurity and mobile applications. 
  • The vulnerabilities in wireless mobile data exchange. 
  • The rise of mobile malware. 
  • The evolution of Android malware.
  • How to know you’ve been hacked on mobile. 
  • The impact of mobile gadgets on cybersecurity. 

B. Top Computer and Software Security Topics to Research

  • Learn algorithms for data encryption 
  • Concept of risk management security 
  • How to develop the best Internet security software 
  • What are Encrypting Viruses- How does it work? 
  • How does a Ransomware attack work? 
  • Scanning of malware on your PC 
  • Infiltrating a Mac OS X operating system 
  • What are the effects of RSA on network security ? 
  • How do encrypting viruses work?
  • DDoS attacks on IoT devices 

C. Trending Information Security Research Topics

  • Why should people avoid sharing their details on Facebook? 
  • What is the importance of unified user profiles? 
  • Discuss Cookies and Privacy  
  • White hat and black hat hackers 
  • What are the most secure methods for ensuring data integrity? 
  • Talk about the implications of Wi-Fi hacking apps on mobile phones 
  • Analyze the data breaches in 2024
  • Discuss digital piracy in 2024
  • critical cyber-attack concepts 
  • Social engineering and its importance 

D. Current Network Security Research Topics

  • Data storage centralization
  • Identify Malicious activity on a computer system. 
  • Firewall 
  • Importance of keeping updated Software  
  • wireless sensor network 
  • What are the effects of ad-hoc networks  
  • How can a company network be safe? 
  • What are Network segmentation and its applications? 
  • Discuss Data Loss Prevention systems  
  • Discuss various methods for establishing secure algorithms in a network. 
  • Talk about two-factor authentication

E. Best Data Security Research Topics

  • Importance of backup and recovery 
  • Benefits of logging for applications 
  • Understand physical data security 
  • Importance of Cloud Security 
  • In computing, the relationship between privacy and data security 
  • Talk about data leaks in mobile apps 
  • Discuss the effects of a black hole on a network system. 

F. Important Application Security Research Topics

  • Detect Malicious Activity on Google Play Apps 
  • Dangers of XSS attacks on apps 
  • Discuss SQL injection attacks. 
  • Insecure Deserialization Effect 
  • Check Security protocols 

G. Cybersecurity Law & Ethics Research Topics

  • Strict cybersecurity laws in China 
  • Importance of the Cybersecurity Information Sharing Act. 
  • USA, UK, and other countries' cybersecurity laws  
  • Discuss The Pipeline Security Act in the United States 

H. Recent Cyberbullying Topics

  • Protecting your Online Identity and Reputation 
  • Online Safety 
  • Sexual Harassment and Sexual Bullying 
  • Dealing with Bullying 
  • Stress Center for Teens 

I. Operational Security Topics

  • Identify sensitive data 
  • Identify possible threats 
  • Analyze security threats and vulnerabilities 
  • Appraise the threat level and vulnerability risk 
  • Devise a plan to mitigate the threats 

J. Cybercrime Topics for a Research Paper

  • Crime Prevention. 
  • Criminal Specialization. 
  • Drug Courts. 
  • Criminal Courts. 
  • Criminal Justice Ethics. 
  • Capital Punishment.
  • Community Corrections. 
  • Criminal Law. 

Cyber Security Future Research Topics

  • Developing more effective methods for detecting and responding to cyber attacks
  • Investigating the role of social media in cyber security
  • Examining the impact of cloud computing on cyber security
  • Investigating the security implications of the Internet of Things
  • Studying the effectiveness of current cyber security measures
  • Identifying new cyber security threats and vulnerabilities
  • Developing more effective cyber security policies
  • Examining the ethical implications of cyber security

Cyber Security Topics For Research Paper

  • Cyber security threats and vulnerabilities
  • Cyber security incident response and management
  • Cyber security risk management
  • Cyber security awareness and training
  • Cyber security controls and countermeasures
  • Cyber security governance
  • Cyber security standards
  • Cyber security insurance
  • Cyber security and the law
  • The future of cyber security

5 Current Research Topics in Cybersecurity

Below are the latest 5 cybersecurity research topics. They are:

  • Artificial Intelligence
  • Digital Supply Chains
  • Internet of Things
  • State-Sponsored Attacks
  • Working From Home

Research Area in Cyber Security

The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including: 

  • Quantum & Space  
  • Data Privacy  
  • Criminology & Law 
  • AI & IoT Security
  • RFID Security
  • Authorisation Infrastructure
  • Digital Forensics
  • Autonomous Security
  • Social Influence on Social Networks

How to Choose the Best Research Topics in Cyber Security

A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics. 

1. Brainstorm

In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible. 

2. Understanding the Background

In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it. 

3. Write a Single Topic

Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about. 

4. Be Flexible

There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out. 

The Layout of Cybersecurity Research Guidance

It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.  

In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness. 

Writing Tips from Expert

Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security Research Topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.

  • Before you begin writing your research paper, make sure you understand the assignment. 
  • Your Research Paper Should Have an Engaging Topic 
  • Find reputable sources by doing a little research 
  • Precisely state your thesis on cybersecurity 
  • A rough outline should be developed 
  • Finish your paper by writing a draft 
  • Make sure that your bibliography is formatted correctly and cites your sources. 
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!

Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.

The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.

Frequently Asked Questions (FAQs)

Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices. 

Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others. 

The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security. 

Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses? 

Profile

Mrinal Prakash

I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cyber Security Batches & Dates

Course advisor icon

  • Current Students
  • U.S. Locations
  • UMGC Europe
  • Learn Online
  • Find Answers
  • 855-655-8682

Online Bachelor's Degree: Cyber Operations

Cyber operations, degree at a glance.

  • 120 credits
  • Transfer up to 90 credits
  • All courses available online
  • Select hybrid courses available

TUITION RATES

  • $324 per credit (in-state)
  • $499 per credit (out-of-state)
  • $250 per credit (military)
  • Other fees may apply

Next Session Starts

Advance in your career with an online bachelor’s degree in cyber operations from University of Maryland Global Campus. Increase your marketability by learning and developing career-relevant skills including software development and cloud programming. Expand your knowledge base under the direction of experienced faculty members who bring their practical expertise to the classroom. Earn your degree on your own time with our convenient online courses and save time and money with our generous transfer credit policy . Why wait? Take the first step and apply today!

Gain Knowledge in Cybersecurity, Programming, Information Technology, & More

UMGC’s online cyber operations program is designed to help you build career-relevant skills in network security, cybersecurity, information technology, and computer programming. You’ll leverage hacking tools, customize computer scripts and applications, and employ techniques to conduct offensive and defensive cyberspace operations. The program will help enable you to detect and triage security alerts, assess risks, automate threat detection, and respond to adversary attacks while helping our country gain an advantage in cyberspace across all domains. The conceptual, clinical, and theoretical skills you acquire in this program may help you stand out in the market and become an effective problem-solver at your organization.

  • You can join one of our cyber-focused student organizations such as computer club or Upsilon Pi Epsilon (the international honor society for computing and IT).
  • Try out for the award-winning Cybersecurity Competition Team to gain hands-on experience and develop your skills in the Virtual Security Lab and nationwide competitions.
  • We offer competitive tuition rates for Maryland residents, as well as discounts for military servicemembers and their spouses and dependents.

See Courses & Program Info

View a complete list of program courses, program-specific and degree-level requirements, and more.

View Cyber Operations Program Courses

This program requires a total of 120 credits .

  • 33 Required Major Credits: Review the required major courses outlined below or view the recommended course sequence to progress through this program.
  • 41 General Education Credits: Review the options available to fulfill the 41 credits of general education coursework requirements for bachelor's degrees.
  • 46 Minor & Elective Credits: Review a list of available academic minors or see the course catalog or Schedule of Classes to help you select elective courses.

Required Major Courses

  • Foundations of Cyberspace Operations (3 Credits, CYOP 200)
  • Reverse Engineering and Malware Analysis (3 Credits, CYOP 310)
  • Fundamentals of Networking (3 Credits, CMIT 265)
  • Building Secure Python Applications (3 Credits, CYOP 300)
  • Detecting Software Vulnerabilities (3 Credits, CYOP 325)
  • Database Security (3 Credits, CYOP 350)
  • Secure Software Engineering (3 Credits, CYOP 360)
  • Secure Programming in the Cloud (3 Credits, CYOP 400)
  • Mitigating Software Vulnerabilities (3 Credits, CYOP 425)
  • Software Security Testing (3 Credits, CYOP 460)
  • Cyber Operations Capstone (3 Credits, CYOP 495)

Review Technology Requirements

For some of the upper-level cybersecurity and IT courses in this program, you will need equipment that meets the following specifications. Courses in graphics- or computing-intensive disciplines may require a higher processing speed, more RAM, and/or better screen resolution.

Hardware Requirements

  • 64-bit processor, Intel Core i5 (7th generation or higher), or equivalent (e.g., AMD, M1) 
  • Processor speed: 1.5 GHz or higher (2 GHz recommended) 
  • Storage: At least 250 GB (SSD [preferred] or HD), with at least 30 percent free space 
  • RAM: At least 4 GB (8 GB recommended) 
  • Display/monitor: Minimum 13” 
  • Screen resolution: Minimum 1280 px x 1024 px 
  • Keyboard and mouse/trackpad 
  • High-speed Internet connection (Ethernet or Wi-Fi) 
  • 32-bit video card

Operating System

Choose one of the following:

  • Windows 10 (recommended; version 1909 or higher required for any course using Adobe Creative Cloud) 
  • Mac OS X 10.15 or higher 
  • Ubuntu 18.04+ (or other Linux LTS) 
  • Microsoft Office 2019 or later (Office 365 Education is available for free with your student email address.) 
  • Most recent version/update of a web browser (Firefox, Safari, or Chrome) 
  • Antivirus software 
  • Adobe Acrobat PDF Reader 

Additional Recommendations

  • Built-in camera (or USB port for a webcam)
  • Built-in microphone and speakers (or USB ports for external audio devices)

Explore a Minor in Cybersecurity

Not ready to get started on this bachelor’s degree? You can pair a 15-credit minor in cybersecurity or computer science with another major at UMGC.

Search Course Catalog

These requirements are for students who enroll in the 2024–2025 academic year . For prior year requirements, visit our catalog archive.

Bachelor’s Degree Requirements

In addition to the specific course requirements outlined on each bachelor’s degree webpage, UMGC maintains certain requirements for all bachelor’s degrees.

Develop Career-Ready Skills in Cyber Operations

Employers highly value the knowledge and skills that you cultivate in this program and can easily translate to almost any modern industry in a cyber role such as software developer or security software engineer. Program graduates develop crucial skills in project management, communication, teamwork, software development, software engineering, and cybersecurity. Our program directors refresh and update the curriculum regularly, with a focus on helping students achieve the following: 

Unlock Your Career Potential

This program is designed to help prepare you for technical and leadership roles in diverse application development and security settings, including high-demand areas such as coding, security analysis, security management, application and software architecture, information security, intrusion analysis, penetration testing, programming languages, software development, software engineering, security and code auditing, intelligence, and system architecture.

UMGC 2021

Practice Real-World Skills in Your Cyber Courses

Throughout your curriculum, your instructors will assign coursework that may help you prioritize real-world skills and experience. You will learn real-world skills in your classes at UMGC through our hands-on, project-based labs using our state-of-the-art virtual laboratory environment. Examples of specific projects for this program include:

  • Use cyber industry standard tools to identify web application vulnerabilities.
  • Use threat intelligence feeds and appropriate data sources to prepare for possible cyber attacks by state-sponsored cyber espionage groups.
  • Use NSA-developed reverse engineering and malware analysis tools to identify indicators of compromise and malware infections in intelligence scenarios.
  • Analyze and correlate log events to detect and mitigate cyber attacks.
  • Configure and monitor a honeypot to identify sources of intrusion and other anomalous computer network activities.

You might be interested in similar programs

Compare All Programs

Get answers to questions that current and prospective students are asking about program admission, credibility, student organizations, and more.

What is an online bachelor’s degree in cyber operations?

An online bachelor's degree in cyber operations is a 120-credit that students can earn online to help them prepare for a career in cyber operations, software development, and cybersecurity. UMGC’s online bachelor's degree in cyber operations covers topics like programming languages, coding, cloud programming, software development, software engineering, communication, networks, and more. The program can help students prepare for a career path in a wide range of industries, including government; military; intelligence, counterintelligence, and homeland security; software and technology; and more. Possible roles include programmer, software developer, cybersecurity engineer, software engineer, and more.

How long does it take to get an online bachelor’s degree in cyber operations?

UMGC's cyber operations degree is a 120-credit program with courses offered year-round. The time it will take you to complete your degree will depend on several factors, including your goals, how many transfer credits you have, your course load each term, and whether you are able to benefit from one or more of our fast paths to credit , including credit for prior learning and credit for military education and training .

How much does an online bachelor’s degree in cyber operations cost?

Tuition rates for this online bachelor’s degree are very competitive and appear at the top of this page. We offer a low in-state rate for Maryland residents and a reduced tuition rate for military service members and their spouses and dependent children. We also offer scholarships for those who qualify , an interest-free monthly payment plan , and no-cost digital materials in place of most textbooks to help make online bachelor's degrees even more affordable.

What background do I need to get an online bachelor’s degree in cyber operations?

You do not need any background or experience in cyber operations, software development, or other cyber or computer software fields to apply for and graduate with this online bachelor’s degree. As long as you meet our undergraduate admission requirements , you can enroll in this program.

Are any certifications available for those with an online bachelor’s degree in cyber operations?

You do not need any previous cyber, software development, or software engineering certifications to enroll in or complete this program.

What student organizations are available to cyber operations majors?

Computing club.

The Computing Club provides a dynamic environment where members can work collaboratively, share innovative ideas, enhance their career-readiness, and gain marketable experience in their respective fields. It is available to graduate or undergraduate students, alumni, faculty, and staff members. Students and alumni can join the Computing Club group on CareerQuest .

Upsilon Pi Epsilon (Computing & Technology Disciplines)

Upsilon Pi Epsilon, the international honor society for the computing and IT disciplines, is designed to promote the computing and information sciences and to encourage the enhancement of knowledge in the field. Upsilon Pi Epsilon is open to both undergraduate and graduate students who are pursuing a degree in the computing and information science disciplines. Membership is by invitation only.

Undergraduate membership is open to students majoring in one of the computing disciplines who have completed at least 45 credit hours towards their degree, including 30 or more credits at UMGC (in graded coursework) and at least 15 credits from information technology and computer science courses. Undergraduate students need to have a cumulative GPA of a 3.5 or higher and a GPA of 3.5 or higher in all coursework taken from the information technology and computer science courses.

Graduate student membership is open to students pursuing a master's degree in cloud computing systems, cyber operations, cybersecurity management and policy, cybersecurity technology, data analytics, or digital forensics and cyber investigation; a master's degree in information technology with a concentration in database systems technology, informatics, information assurance, software engineering, or systems engineering; or a legacy master's degree in cybersecurity. Graduate students must have completed at least 18 resident credits towards their degree at UMGC, with a cumulative GPA of a 3.5 or higher.

For more information, please email upe@umgc.edu .

Our helpful admissions advisors can help you choose an academic program to fit your career goals, estimate your transfer credits, and develop a plan for your education costs that fits your budget. If you’re a current UMGC student, please visit the Help Center .

Personal Information

Contact information, additional information.

By submitting this form, you acknowledge that you intend to sign this form electronically and that your electronic signature is the equivalent of a handwritten signature, with all the same legal and binding effect. You are giving your express written consent without obligation for UMGC to contact you regarding our educational programs and services using e-mail, phone, or text, including automated technology for calls and/or texts to the mobile number(s) provided. For more details, including how to opt out, read our privacy policy or contact an admissions advisor .

Please wait, your form is being submitted.

By using our website you agree to our use of cookies. Learn more about how we use cookies by reading our  Privacy Policy .

A man in his graduation cap and gown.

No Application Fee

Apply by May 31, and we'll waive your application fee.

  • Skip to search
  • Skip to main navigation
  • Skip to content

Welcome to Brock University

Information for.

  • Future students
  • Current students
  • International
  • Professional and Continuing Studies
  • Community partners
  • Alumni and donors
  • Faculties & Departments
  • Graduate Studies
  • Teaching & Learning
  • Academic Integrity
  • Research @ Brock
  • Institutes and Centres
  • Research services
  • Brock innovation
  • Transdisciplinarity at Brock
  • Funding opportunities
  • About Brock
  • Visitor information
  • Careers @ Brock
  • A–Z directory

Quick links

  • Student Email / 365
  • my.brocku.ca
  • Brightspace
  • Office of the Registrar
  • Campus Store
  • Brock Sports
  • Important Dates
  • Students’ Union (BUSU)
  • Graduate Students’ Union (GSA)

The Brock News

  • Events around campus
  • Faculty and Staff directory
  • Campus Safety
  • Faculty and Staff Login
  • Faculty and Staff Email
  • ITS Help Desk - Password Resets
  • Brock U Home

masters dissertation cyber security

The Brock News Logo

The brock news menu.

  • More categories

Thesis defences — May 13 to May 17

Friday, May 10, 2024 | by The Brock News

The following is a list of thesis defences taking place between Monday, May 13 and Friday, May 17.

Master of Arts in Applied Disability Studies thesis defence 

Micaela Totino, a Master of Arts in Applied Disability Studies candidate, will defend the thesis “Using Multiple Exemplar Training to Increase Fitness to Stand Trial” on Thursday, May 16 from 10 a.m. to noon in virtual format.

The examination committee includes Dawn Zinga, Chair; Valdeep Saini, Supervisor; Marc Woodbury-Smit, External Examiner (Hospital for Sick Children); Rosemary Condillac, Graduate Program Director; and Laura Mullins and Kendra Thomson, Committee Members.

Master of Science in Applied Health Sciences (Health Sciences) thesis defence

Zachary Bellows, a Master of Science in Applied Health Sciences candidate, will defend the thesis “Disparities in Mental Health, Physical Health, and Substance Use Across Sexual Orientations in Adults” on Monday, May 13 from 1 to 4 p.m. in STH 361.

The examination committee includes Terrance Wade, Chair; Karen Patte and Anthony Chum, Supervisors; Patricia O’Campo, External Examiner (Unity Health Toronto); and Asif Khowaja and Will Pickett, Committee Members.

Master of Science in Biological Sciences thesis defences

Diana Tosato, a Master of Science in Biological Sciences candidate, will defend the thesis “Diversity of cover crops in two organic vineyards in the Niagara Region, Canada, as adaptation measure to climate change ” on Tuesday, May 14 at 11:30 a.m. in virtual format.

The examination committee includes Yifeng Li, Chair; Liette Vasseur, Supervisor; Sean Smukler, External Examiner, UBC; and Debbie Inglis and Jim Willwerth, Committee Members.

Elyse Aubry, a Master of Science in Biological Sciences candidate, will defend the thesis “Determining the effect of different cover crops on nematode communities in vegetable production” on Tuesday, May 14 at 1 p.m. in GSB 305.

The examination committee includes Ian Patterson, Chair; Ping Liang and Tahera Sultana, Co-Supervisors; Vaughn Mangal, External Examiner; and Oualid Ellouz, Committee Member.

Georgina Louise Gardner, a Master of Science in Biological Sciences candidate, will defend the thesis “Investigating the Importance of Physiological Cell Culture Conditions in Modeling Cancer Metabolism and Metabolic Reprogramming” on Thursday, May 16 at 9:30 a.m. in GSB 405 in hybrid format.

The examination committee includes Melanie Pilkington, Chair; Jeff Stuart, Supervisor; Newman Siu Kwan Sze, External Examiner; and Gaynor Spencer and Rebecca MacPherson, Committee Members.

Master of Science in Computer Science thesis defence

Jessica Graham, a Master of Science in Computer Science candidate, will defend the thesis “Edge Communication Efficiency with GNNs in Internet of Vehicles” on Wednesday, May 15 at 9:30 a.m. in GSB 308.

The examination committee includes Ke Qiu, Chair; Robson De Grande, Supervisor; Ali Emami, External Examiner; and Yifeng Li and Renata Queiroz Dividino, Committee Members.

Read more stories in: Applied Health Sciences , Briefs , Graduate Students , Graduate Studies , Mathematics and Science , Social Sciences Tagged with: Department of Biological Sciences , department of computer science , department of health sciences , Faculty of Applied Health Sciences , Faculty of Graduate Studies and Postdoctoral Affairs , faculty of mathematics and science , faculty of social sciences

Latest News

An indoor spotlit basketball arena full of spectators.

Investment, leadership will be key to success of Toronto’s WNBA franchise, say Brock experts

May 13, 2024

A woman with a hearing aid uses a smartphone.

Brock to celebrate Global Accessibility Awareness Day

masters dissertation cyber security

New CCOVI lecture series focused on industry knowledge mobilization

Times Higher Education logo

OPINION: Tara Mahoney, Scott Neufeld discuss community-engaged research

A young woman dressed in a white laboratory coat wipes off a scientific instrument with a paper towel. To the right, two high school girls wearing name tags for Brock University’s Scientifically Yours conference look down at the instrument.

Teens build STEM skills at annual Brock conference

May 10, 2024

A wide shot of an event space lit with natural light with grey floors and high ceilings with white paper flower decorations show a group of elementary school students looking at colourful poster boards as they walk down the aisles of the event.

Brock grad’s passion for history inspires next generation of learners

A woman leads a group of adults through a yoga session outside of Brock University.

GALLERY: Brock employees embrace yoga in nature for Mental Health Week

A hockey player hits a puck toward the viewer.

IN THE NEWS: Sports broadcasting, Red Dress Day and union negotiations

An aerial view of Brock's Schmon Tower with light pink cherry blossoms lining a green space in the foreground.

Deadline nearing to provide feedback on Provost candidates

May 09, 2024

Browse the archives

  • Seen & Heard
  • Seen & Heard Submissions

© 2024 Brock University / Niagara Region / 1812 Sir Isaac Brock Way / St. Catharines, ON, L2S 3A1 Canada / +1 905-688-5550

IMAGES

  1. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    masters dissertation cyber security

  2. Dissertation Cyber Security Research Topics [Professional Writers]

    masters dissertation cyber security

  3. How to Write a Dissertation on Cybersecurity

    masters dissertation cyber security

  4. Dissertation

    masters dissertation cyber security

  5. Essay On Cyber Safety And Security

    masters dissertation cyber security

  6. Master of Cyber Security by DTUdk

    masters dissertation cyber security

VIDEO

  1. DAY 1: writing my masters dissertation in a month! 🤍💻📖 #masters #dissertation #shorts

  2. How to write a Masters Dissertation in the most simplest way| PhD thesis|Synopsis| Research Papers

  3. DAY 3: writing my masters dissertation in 1 month!🤍💻📖 #uni #masters #dissertation #shorts

  4. DAY 4: writing my masters dissertation in 1 month!🤍💻📖 #masters #dissertation #uni #shorts

  5. Master in Cyber Security

  6. University of Management and Technology -Theory in Research Part 4/4:Variables & Observation

COMMENTS

  1. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    cybersecurity, President Barack Obama declared a "national emergency to deal with this threat" (White House 2015). This thesis will highlight the need for strong cyber protections and examine proposals for safeguarding the country. I will present the hypothesis that change in our national cyber culture is needed.

  2. Exploring Industry Cybersecurity Strategy in ...

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Masthead Logo Link

  3. Good cybersecurity thesis topics for a master's degree

    Håkon Olsen, security engineer and founder of cybersecurity firm Cybehave, weighed in on cybersecurity thesis topics in a recent forum on Quora, where he suggested tackling the subject of identity management. "Investigate how to maximize security within each user's threshold for usability impact," Olsen wrote, adding that most users don't use ...

  4. Exploring Cybersecurity Awareness and Training ...

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Masthead Logo Link

  5. PDF CYBER SECURITY AS AN EMERGING

    CYBER SECURITY AS AN EMERGING CHALLENGE TO SOUTH AFRICAN NATIONAL SECURITY By Jordan Luke Griffiths Student Number 10345028 A mini-dissertation submitted in partial fulfilment of the requirements for the degree Master of Security Studies (MSS) in the Department of Political Sciences, Faculty of Humanities, University of Pretoria

  6. Master of Science Cybersecurity in Computer Science

    The Master of Science in Cybersecurity in Computer Science is designed to meet the fast-growing need for technical cybersecurity experts. ... Master's Thesis Advisor and Co-advisor(s): Every Master's thesis must be supervised by a faculty advisor who must be (1) a regular full-time faculty member of GW with a primary or secondary ...

  7. PDF Microsoft Word

    MANAGING CYBERSECURITY AS A BUSINESS RISK FOR SMALL AND MEDIUM ENTERPRISES. by Stephanie K. Chak. A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts in Government. Baltimore, Maryland May, 2015.

  8. Cybersecurity Master's Degree

    Call us at 646.997.3623, U.S. Toll-Free at 877.503.7659, or email us at [email protected]. Secure your position in a highly sought-after field with our online Cybersecurity Master's Degree. Explore our online cybersecurity masters curriculum taught by internationally known experts.

  9. Online Master's in Cybersecurity Program

    As part of this U.S News & World Report #1-ranked cybersecurity online, part-time program, you will develop the skills needed to protect the confidentiality, availability, and integrity of data, preserve and restore systems, and develop risk management skills to anticipate and avoid cyber threats.. Access to our state-of-the-art computing facilities and technologically advanced virtual ...

  10. PDF Making Cyber Security Interdisciplinary: Recommendations for a Novel

    terminology usage in cyber security journal articles, and I develop a methodology for authors or standards bodies to use when deciding whether a word or phrase is appropriately interdisciplinary, or has been accepted by the general cyber security community. Thesis Supervisor: Abel Sanchez Title: Director, MIT Geospatial Data Center (GDC)

  11. Master of Science in Cybersecurity

    Full-time master's degree candidates or those interested in pursuing a PhD are encouraged to pursue a master's thesis and based on some aspect of faculty research. Specific to the MS in Cybersecurity program, students have the option to take part in research rotations that provides insight into sub-disciplines before making a selection for ...

  12. Theses and Projects

    Master: 2022: A Serious Game for Cloud Security: Master: 2022: Methodology and Implementation of a Cyber Security Risk Management Tool: Master: 2022. On the relationships between different Android frameworks and associated security issues: Master: 2022: Nudging to Increase the SARS-CoV-2 Vaccination Rate: Bachelor: 2022

  13. PDF MastersThesis ChristofferSjöblom AI in Cybersecurity and ...

    well as increase the efficiency of cybersecurity-related tasks. 1.2 Goal of this Thesis This thesis aims to illustrate how artificial intelligence-based systems and algorithms can advance cybersecurity and network security. The field AI is vast and not every aspect is covered in this research. The number and types of attacks

  14. Master thesis

    Master thesis Dealing with uncertainty: cybersecurity risk assessment approaches A qualitative research on cyber risk assessment practices in organizations Executive MSc Program Cyber Security 2019/2020 Author Kees Mastwijk Student number S2444550 Date 30 December 2020 Supervisors Dr. James Shires, Dr. Tatiana Tropina

  15. PDF Project Master Thesis

    This master thesis is a completion of masters program (MSc) in Cybersecurity management at the University of Agder (UIA). The study was conducted by and written by two master students that had several courses about critical infrastructure system (CIS) and how the different sectors deal with cybersecurity, where they found

  16. Cybersecurity Dissertation Topics for FREE

    Cybersecurity Dissertation Topics - over 40 free, excellent Master & Bachelor dissertation topics will help you get started with your proposal or dissertation. ... This helps to provide an array of different opportunities for completing an engaging and innovative cyber security dissertation. Some of the most important topic areas that exist ...

  17. MSc thesis

    MSc thesis. MSc thesis on Cyber Security related topics defended at the University of Tartu: 2019: Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System" ... University of Tartu Narva mnt 18, 51009 Tartu, Estonia Phone: +(372) 737 5445 E-mail: ics@ut ...

  18. Cyber Security Dissertations

    Dissertations on Cyber Security. Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation. View All Dissertation Examples.

  19. PDF 2010:050 MASTER'S THESIS Internal threat to information security

    Luleå University of Technology Master Thesis, Continuation Courses Security Department of Business Administration and Social Sciences Division of Information Systems Sciences 2010:050 - ISSN: 1653-0187 - ISRN: LTU-PB-EX--10/050--SE. ABSTRACT This thesis is based on the viewpoint that no security countermeasure is perfect, each an every one

  20. Dissertations / Theses: 'Computer security ; cybersecurity ...

    Consult the top 47 dissertations / theses for your research on the topic 'Computer security ; cybersecurity.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard ...

  21. AURA: Master's theses in Cyber Security

    Tapping network traffic in Kubernetes . Ledaal, Sigbjørn Skolem (Master thesis, 2023) The rapid increase in cloud usage among organizations has led to a shift in the cybersecurity industry. Whereas before, organizations wanted traditional security monitoring using statically placed IDS sensors within their ...

  22. List of Cybersecurity PhD Programs

    A cybersecurity PhD dissertation is the capstone of a doctoral program. The dissertation is the name of a formal paper that presents the findings of original research that the PhD candidate conducted during the program under the guidance of faculty advisors. ... This program focuses on vital areas like cyber security, physical security, and ...

  23. 60+ Latest Cyber Security Research Topics for 2024

    Criminal Law. Cyber Security Future Research Topics. Developing more effective methods for detecting and responding to cyber attacks. Investigating the role of social media in cyber security. Examining the impact of cloud computing on cyber security. Investigating the security implications of the Internet of Things.

  24. Program: Cybersecurity, MS

    Non-thesis students in the MS in Cybersecurity will complete 33 semester hours, which include 21 hours of core coursework to gain a solid understanding of cybersecurity and 12 hours of electives. ... Master's Thesis. Students can choose their elective courses from the list below or choose one unrestricted, three credit hour CSCE graduate ...

  25. Online Cyber Operations Bachelor's Degree

    UMGC's online cyber operations program is designed to help you build career-relevant skills in network security, cybersecurity, information technology, and computer programming. You'll leverage hacking tools, customize computer scripts and applications, and employ techniques to conduct offensive and defensive cyberspace operations.

  26. Thesis defences

    The following is a list of thesis defences taking place between Monday, May 13 and Friday, May 17. Master of Arts in Applied Disability Studies thesis defence. Micaela Totino, a Master of Arts in Applied Disability Studies candidate, will defend the thesis "Using Multiple Exemplar Training to Increase Fitness to Stand Trial" on Thursday ...