Dissertations on Cyber Security

Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation.

Cyber Security

Latest Cyber Security Dissertations

Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.

The Rise of Fileless Malware and Attack Techniques
Dissertation Examples
Introduction: Abstract This is a research report into all aspects of Fileless Attack Malware. It provides the reader with concise information regarding what a Fileless Malware Threat is, how it infiltrates a machi... Last modified: 16th Dec 2019

Security Strategies for the Internet
Dissertation Examples
Introduction: Table of Contents 1. The World Wide Web……………………………………… 1.1. URL, URI and URN…………... Last modified: 16th Dec 2019

Relationship Between Privacy, Security and Trust in E-vendors
Dissertation Examples
Introduction: Abstract The development of online retailing has been hampered by a number of factors, the most noticeable being  consumers’ lack of trust in the electric commerce environment. Examining two of t... Last modified: 16th Dec 2019

Cyber Terrorism Trends and Impact on Technology
Dissertation Examples
Introduction: Cyber Terrorism Contents Abstract Introduction Terrorism Cyber Terrorism Cyber Terrorist Events The Challenges for Terrorist using Cyber The Hyperbole around Cyber Terrorism The Legal Dilemma Risk As... Last modified: 16th Dec 2019

Cybersecurity Infrastructure in the NHS and UK Businesses
Dissertation Examples
Introduction: Electronic devices with networking capabilities make up the critical network infrastructure for governments, businesses, academic agencies and human social interaction on a daily basis. The rapid adv... Last modified: 16th Dec 2019

Types of Denial of Service Attacks
Dissertation Examples
Introduction: Chapter One DoS and DDoS attacks Denial of Service attacks Availability, confidentiality and integrity are the main aims of computer security [1]. Availability is defined as the capability of using t... Last modified: 16th Dec 2019

Fundamentals of Cyber Security
Dissertation Examples
Introduction: Fundamentals of Cyber Security Table of Contents INTRODUCTION LITERATURE REVIEW RESEARCH METHODOLOGY Main Body Explain the core information assurance (IA) principles 1) Identify the critical compone... Last modified: 16th Dec 2019

iOS Security Hacks and Government Issues
Dissertation Examples
Introduction: iOS Security: Rebelling against Hacks and the Government Abstract Apple’s mobile iOS technology was introduced in 2007 and in eleven years, it has quickly grown to be one of the top smartphon... Last modified: 13th Dec 2019

Is Cyber Warfare the Future of War?
Dissertation Examples
Introduction: Introduction Undoubtedly, the twentieth century could be counted as the bloodiest in human history; man has been at war for much longer than he has been at peace. The death tolls are incalculable ... Last modified: 13th Dec 2019

Cryptography Process for Secure Storage System
Dissertation Examples
Introduction: INTRODUCTION   1.1 Purpose of the System Defence organization operates with huge amount of data where the files or documents contain information which is very confidential and privileged. This pri... Last modified: 13th Dec 2019

Penetration Testing & Ethical Hacking
Dissertation Examples
Introduction: Penetration Testing Vs. Ethical Hacking Contents Introduction Penetration Testing & Ethical Hacking Methodology Define Discovery Exploitation and Reporting Legal Issues Conclusion References In... Last modified: 13th Dec 2019

Biometric Applications for Information Security
Dissertation Examples
Introduction: Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the ... Last modified: 12th Dec 2019

Importance of Smartphone Security in Business Environment
Dissertation Examples
Introduction: 1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject ... Last modified: 12th Dec 2019

Sniffing Attacks Prevention and Detection Techniques
Dissertation Examples
Introduction: Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN) ABSTRACT During the past era, Information Technology made a r... Last modified: 12th Dec 2019

Internet Threats and Security for Protection
Dissertation Examples
Introduction: Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major is... Last modified: 12th Dec 2019

Impact of Spyware on Computers and Mobile Devices
Dissertation Examples
Introduction: 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is “Study on the impact of spyware on computers and mobile devices” which simply means that the author analyzes t... Last modified: 12th Dec 2019

Analysis of Honeynets and Honeypots for Security
Dissertation Examples
Introduction: Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of ... Last modified: 12th Dec 2019

Security for Insider Attacks in Mobile Ad Hoc Networks
Dissertation Examples
Introduction: Abstract Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networ... Last modified: 12th Dec 2019

Technology for Network Security
Dissertation Examples
Introduction: 2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It ... Last modified: 12th Dec 2019