Literature Review on Personal Data Online and Data Privacy
Example Literature Reviews
Introduction: This project aims to create and implement a solution to solve current issues surrounding privacy and the use of personal data online.... Last modified: 12th Apr 2021
Dissertations on Cyber Security
Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation.

Latest Cyber Security Dissertations
Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.
Evaluating the Impact of Interdependent Security Risks on Corporate Information Security Investment in the UK | Methodology
Dissertation Methodologies
Introduction: Research Design and Methodology for Evaluating the Impact of Interdependent Security Risks on Corporate Information Security Investment in the UK.... Last modified: 19th Mar 2021
The Rise of Fileless Malware and Attack Techniques
Dissertation Examples
Introduction:
Abstract
This is a research report into all aspects of Fileless Attack Malware. It provides the reader with concise information regarding what a Fileless Malware Threat is, how it infiltrates a machi... Last modified: 16th Dec 2019
Behavioural Clustering Models to Develop an Enhancement into Online Privacy Concerns
Dissertation Examples
Introduction:
An Investigation into Behavioural Clustering Models to develop an enhancement into online privacy concerns
Abstract
The following report explores the world of internet privacy and aims to ra... Last modified: 16th Dec 2019
Security Strategies for the Internet
Dissertation Examples
Introduction:
Table of Contents
1. The World Wide Web………………………………………
1.1. URL, URI and URN…………... Last modified: 16th Dec 2019
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
Dissertation Examples
Introduction:
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
Abstract— Cognitive radio technology aims at solving the problem of the spectrum scarcity by enabling secondary use... Last modified: 16th Dec 2019
Relationship Between Privacy, Security and Trust in E-vendors
Dissertation Examples
Introduction:
Abstract
The development of online retailing has been hampered by a number of factors, the most noticeable being consumers’ lack of trust in the electric commerce environment. Examining two of t... Last modified: 16th Dec 2019
Cyber Terrorism Trends and Impact on Technology
Dissertation Examples
Introduction:
Cyber Terrorism
Contents
Abstract
Introduction
Terrorism
Cyber Terrorism
Cyber Terrorist Events
The Challenges for Terrorist using Cyber
The Hyperbole around Cyber Terrorism
The Legal Dilemma
Risk As... Last modified: 16th Dec 2019
Cybersecurity Infrastructure in the NHS and UK Businesses
Dissertation Examples
Introduction:
Electronic devices with networking capabilities make up the critical network infrastructure for governments, businesses, academic agencies and human social interaction on a daily basis. The rapid adv... Last modified: 16th Dec 2019
Vulnerabilities and Threats for IoT and Security Mechanisms Available
Dissertation Examples
Introduction: IoT/WSN Security
Table of Contents
CHAPTER 1
Introduction and Report Outline
1.1 Aims and Objectives:
1.2 Literature Survey:
CHAPTER 2
Literature Survey
2.1 What is an iot?
2.2 What is a WSN?
2.3 Comp... Last modified: 16th Dec 2019
Types of Denial of Service Attacks
Dissertation Examples
Introduction:
Chapter One DoS and DDoS attacks
Denial of Service attacks
Availability, confidentiality and integrity are the main aims of computer security [1]. Availability is defined as the capability of using t... Last modified: 16th Dec 2019
Fundamentals of Cyber Security
Dissertation Examples
Introduction:
Fundamentals of Cyber Security
Table of Contents
INTRODUCTION
LITERATURE REVIEW
RESEARCH METHODOLOGY
Main Body
Explain the core information assurance (IA) principles
1) Identify the critical compone... Last modified: 16th Dec 2019
VLSI Implementation of a Key Distribution Server based Data Security Scheme for RFID
Dissertation Examples
Introduction:
VLSI Implementation of a Key Distribution Server based Data Security Scheme for RFID
Framework
RFID Technology is now ... Last modified: 13th Dec 2019
iOS Security Hacks and Government Issues
Dissertation Examples
Introduction:
iOS
Security: Rebelling against Hacks and the Government
Abstract
Apple’s mobile iOS
technology was introduced in 2007 and in eleven years, it has quickly grown to
be one of the top smartphon... Last modified: 13th Dec 2019
Is Cyber Warfare the Future of War?
Dissertation Examples
Introduction:
Introduction
Undoubtedly, the twentieth century could be counted as the
bloodiest in human history; man has been at war for much longer than he has
been at peace. The death tolls are incalculable ... Last modified: 13th Dec 2019
Cryptography Process for Secure Storage System
Dissertation Examples
Introduction:
INTRODUCTION
1.1 Purpose of the System
Defence organization operates with huge amount of data where the files or documents contain information which is very confidential and privileged. This pri... Last modified: 13th Dec 2019
Penetration Testing & Ethical Hacking
Dissertation Examples
Introduction:
Penetration Testing Vs. Ethical Hacking
Contents
Introduction
Penetration Testing & Ethical Hacking
Methodology
Define
Discovery
Exploitation and Reporting
Legal Issues
Conclusion
References
In... Last modified: 13th Dec 2019
Biometric Applications for Information Security
Dissertation Examples
Introduction: Chapter 1
1 .0 Introduction
In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the ... Last modified: 12th Dec 2019
Importance of Smartphone Security in Business Environment
Dissertation Examples
Introduction:
1.0 Introduction
The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject ... Last modified: 12th Dec 2019
Sniffing Attacks Prevention and Detection Techniques
Dissertation Examples
Introduction: Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN)
ABSTRACT
During the past era, Information Technology made a r... Last modified: 12th Dec 2019
Internet Threats and Security for Protection
Dissertation Examples
Introduction: Introduction
Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major is... Last modified: 12th Dec 2019
Impact of Spyware on Computers and Mobile Devices
Dissertation Examples
Introduction: 1.0 INTRODUCTION
1.1 PROJECT OUTLINE
The title of the project chosen by the author is “Study on the impact of spyware on computers and mobile devices” which simply means that the author analyzes t... Last modified: 12th Dec 2019
Analysis of Honeynets and Honeypots for Security
Dissertation Examples
Introduction: Chapter 1 Introduction
Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of ... Last modified: 12th Dec 2019
Security for Insider Attacks in Mobile Ad Hoc Networks
Dissertation Examples
Introduction: Abstract
Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networ... Last modified: 12th Dec 2019
Technology for Network Security
Dissertation Examples
Introduction: 2.0 CHAPTER TWO
2.1 INTRODUCTION
The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system.
It ... Last modified: 12th Dec 2019
Popular Tags
- Browse All Tags
- Accounting
- Banking
- Biology
- Biomedical Science
- Business
- Business Analysis
- Business Strategy
- Cancer
- Chemistry
- Computer Science
- Construction
- Consumer Decisions
- Criminology
- Cultural Studies
- Cyber Security
- Economics
- Education
- Electronics
- Employment
- Energy
- Engineering
- Environmental Science
- Environmental Studies
- Equality
- Finance
- Food And Nutrition
- Health
- Health And Social Care
- History
- Human Resources
- Information Systems
- Information Technology
- International Business
- International Relations
- International Studies
- Law
- Leadership
- Management
- Marketing
- Mechanics
- Media
- Medical
- Medicine
- Mental Health
- Neurology
- Nursing
- Pharmacology
- Physiology
- Politics
- Psychology
- Sciences
- Social Policy
- Sociology
- Sustainability
- Teaching
- Technology
- Tourism
- Young People