Dissertations on Cyber Security

Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation.

View All Dissertation Examples

Cyber Security

Latest Cyber Security Dissertations

Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.

Internet Privacy and User Awareness of Vulnerabilities
Dissertation Examples
Introduction: The following report explores the world of internet privacy and aims to raise awareness to the vulnerability that users face when browsing online. Abstract The following report explores the world of internet privacy and aims to ra... Last modified: 23rd Jun 2021

An Analysis of Information Security ­Trends
Dissertation Examples
Introduction: This document details about and highlights the trends about various analysis and researches done in the domain of Information Security, since the year 2000 to the present.... Last modified: 7th Jun 2021

Literature review on Dynamic Firewall Policy for VoIP Security
Example Literature Reviews
Introduction: In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities.... Last modified: 3rd Jun 2021

Dissertation on Cognitive Radio System Security
Dissertation Examples
Introduction: In the first place, fixed spectrum assignment policies of the wireless applications significantly lead to wasting spectrum resources which are valuable as a result, there is will be spectrum scarcity.... Last modified: 28th May 2021

Research Proposal on Cloud Computing Security Risk Assessment
Example Research Proposals
Introduction: This research investigates the current state of formalised security risk assessment for Cloud and how these methods could be modified for migrating legacy systems into Cloud.... Last modified: 20th Apr 2021

The Rise of Fileless Malware and Attack Techniques
Dissertation Examples
Introduction: Abstract This is a research report into all aspects of Fileless Attack Malware. It provides the reader with concise information regarding what a Fileless Malware Threat is, how it infiltrates a machi... Last modified: 16th Dec 2019

Security Strategies for the Internet
Dissertation Examples
Introduction: Table of Contents 1. The World Wide Web……………………………………… 1.1. URL, URI and URN…………... Last modified: 16th Dec 2019

Relationship Between Privacy, Security and Trust in E-vendors
Dissertation Examples
Introduction: Abstract The development of online retailing has been hampered by a number of factors, the most noticeable being  consumers’ lack of trust in the electric commerce environment. Examining two of t... Last modified: 16th Dec 2019

Cyber Terrorism Trends and Impact on Technology
Dissertation Examples
Introduction: Cyber Terrorism Contents Abstract Introduction Terrorism Cyber Terrorism Cyber Terrorist Events The Challenges for Terrorist using Cyber The Hyperbole around Cyber Terrorism The Legal Dilemma Risk As... Last modified: 16th Dec 2019

Cybersecurity Infrastructure in the NHS and UK Businesses
Dissertation Examples
Introduction: Electronic devices with networking capabilities make up the critical network infrastructure for governments, businesses, academic agencies and human social interaction on a daily basis. The rapid adv... Last modified: 16th Dec 2019

Types of Denial of Service Attacks
Dissertation Examples
Introduction: Chapter One DoS and DDoS attacks Denial of Service attacks Availability, confidentiality and integrity are the main aims of computer security [1]. Availability is defined as the capability of using t... Last modified: 16th Dec 2019

Fundamentals of Cyber Security
Dissertation Examples
Introduction: Fundamentals of Cyber Security Table of Contents INTRODUCTION LITERATURE REVIEW RESEARCH METHODOLOGY Main Body Explain the core information assurance (IA) principles 1) Identify the critical compone... Last modified: 16th Dec 2019

iOS Security Hacks and Government Issues
Dissertation Examples
Introduction: iOS Security: Rebelling against Hacks and the Government Abstract Apple’s mobile iOS technology was introduced in 2007 and in eleven years, it has quickly grown to be one of the top smartphon... Last modified: 13th Dec 2019

Is Cyber Warfare the Future of War?
Dissertation Examples
Introduction: Introduction Undoubtedly, the twentieth century could be counted as the bloodiest in human history; man has been at war for much longer than he has been at peace. The death tolls are incalculable ... Last modified: 13th Dec 2019

Cryptography Process for Secure Storage System
Dissertation Examples
Introduction: INTRODUCTION   1.1 Purpose of the System Defence organization operates with huge amount of data where the files or documents contain information which is very confidential and privileged. This pri... Last modified: 13th Dec 2019

Penetration Testing & Ethical Hacking
Dissertation Examples
Introduction: Penetration Testing Vs. Ethical Hacking Contents Introduction Penetration Testing & Ethical Hacking Methodology Define Discovery Exploitation and Reporting Legal Issues Conclusion References In... Last modified: 13th Dec 2019

Biometric Applications for Information Security
Dissertation Examples
Introduction: Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the ... Last modified: 12th Dec 2019

Importance of Smartphone Security in Business Environment
Dissertation Examples
Introduction: 1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject ... Last modified: 12th Dec 2019

Sniffing Attacks Prevention and Detection Techniques
Dissertation Examples
Introduction: Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN) ABSTRACT During the past era, Information Technology made a r... Last modified: 12th Dec 2019