Cyber Security
These cyber security dissertation examples are student-contributed and focus on how organisations and users prevent, detect, and respond to digital threats in real environments. Students often examine the gap between written security policies and what actually happens under time pressure, budget constraints, legacy systems, and human behaviour.
Common dissertation directions include phishing and social engineering, identity and access management, authentication and password practices, vulnerability management and patching, secure configuration, and incident response readiness. Many projects explore ransomware and business continuity: decision-making during crises, backup and recovery reliability, third-party dependencies, and the role of cyber insurance. Sector-focused topics often cover healthcare, education, local government, finance, retail, and manufacturing, where the constraints (safety, uptime, staffing, and procurement) shape what security controls are realistic. Students also research security culture and training effectiveness, human factors, reporting behaviour, and how teams prioritise risk when the threat landscape moves faster than governance. Technical dissertations may involve network monitoring, threat detection, malware analysis, secure software development, and privacy-by-design, while policy-focused work can examine compliance, regulation, and the practical challenges of proving “reasonable security”.
These examples can help you pick a workable problem area (for example, phishing resilience, ransomware recovery, access control, or third-party risk) and connect it to real organisational decisions and measurable outcomes.
Cyber security in New Space: Analysis of threats, key enabling technologies and challenges
This article analyses past satellite security threats and incidents to assess the motivations and characteristics of adversarial threats to satellites.
Data Mining Algorithm Techniques
Introduction to a study which aims to compare and contrast various classification data mining algorithm techniques, as well as different feature selection scenarios.
Web Application Security Threats
This project will focus on researching web security threats, exploring them, and try to find new strategies to protect against them.
Malware Detection Using Machine Learning
The aim is to utilize the concept of machine learning and to build a model using ensemble algorithm which can be trained efficiently to detect malwares in a system.
Literature review on Dynamic Firewall Policy for VoIP Security
In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities.
Cyber Terrorism Trends and Impact on Technology
In this paper, the definition and act of cyber terrorism is explored along with other disruptions related to cyber, such as espionage, war and sabotage and then review the distinctiveness of cyber terrorism when compared to the other elements.
Relationship Between Privacy, Security and Trust in E-vendors
Abstract
The development of online retailing has been hampered by a number of factors, the most noticeable being consumers’ lack of trust in the electric commerce environment. Examining two of t
Successful Application of Deterrence in Cyberspace: A Case Study
This paper seeks to study the policy conditions for successful application of deterrence in cyberspace.
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
Abstract— Cognitive radio technology aims at solving the problem of the spectrum scarcity by enabling secondary use
Cybersecurity: Analysis of Issues and Threats
Cybersecurity has gained considerable attention in last decade due to its ability to secure government’s data against expanding cyber threats. However, as Information Technology is advancing, so are the issues and threats to cybersecurity.
Literature Review on Personal Data Online and Data Privacy
This project aims to create and implement a solution to solve current issues surrounding privacy and the use of personal data online.
Role of Cloud Computing in Cyber Resilience
Table of Contents
Introduction
Review of literature
Research Problem and Discussion
Introduction
Cloud computing is being acclaimed as the penultimate answer for the issues of indeterminate traffic
Security Strategies for the Internet
Table of Contents
1. The World Wide Web………………………………………
1.1. URL, URI and URN…………
Phishing Techniques and Detection Approaches
As phishing evolves, stakeholders will always find new ways of mitigating the risk associated with phishing, therefore the battle will be ongoing.
Fundamentals of Cyber Security
Cybersecurity is continuously innovating at the same phase as cyber-attacks to match their technology since that is the only way it will effectively stop the risks posed by such attacks to digital data users.
Survey of Data Breaches
Data breaches are a significant part of our everyday lives and understanding their legal and financial impact is important.
Business Continuity Planning: Cyber Security Management
This paper describes business continuity planning strategies and processes and elaborates on how to develop, write and execute an effective business continuity plan.
