Dissertations on Cyber Security

Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation.

View All Dissertation Examples

Cyber Security

Latest Cyber Security Dissertations

Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.

Information Security Issues Faced by Healthcare in New Zealand

Dissertation Examples

[Information security issues faced by the Healthcare in New Zealand-Possible Solutions] Table of Contents I. Abstract II. Introduction III. Literature Review a) Information Security b) Informatio...

Last modified: 9th Dec 2019

Development of New Steganography Algorithm

Dissertation Examples

4.1 Introduction This chapter provided the system activity for the image steganography, this includes the hiding/embedding of the secret message the unveiling of the message as well as the systematic...

Last modified: 9th Dec 2019

A Survey of Person Re-identification Using Deep Learning Approach

Dissertation Examples

A survey of person re-identification using deep learning approach Abstract: From the past few years’ person re-identification plays an active role in the automated video surveillance and has been...

Last modified: 9th Dec 2019

How Can Security Issues in an Online Voting System Be Addressed?

Dissertation Examples

How can security issues in an online voting system be addressed? Abstract This report consist of the tools and techniques that can be utilized to minimize electronic online voting from gaining unauth...

Last modified: 9th Dec 2019

Approaches to Applying Defence in Depth to Web Applications

Dissertation Examples

The premise for this report is to provide the client with a deeper understanding of the security landscape, by delivering a more comprehensive overview of Defence in Depth, security vulnerabilities in the server and application layers and finally, security recommendations for the client's website....

Last modified: 9th Dec 2019

Relationship between Authentic Leadership of Information/Cyber Security Professionals and Program Outcomes

Dissertation Examples

Exploring the relationship between Authentic Leadership of Information Security/Cyber Security Professionals through Job Satisfaction of Information/Cyber Security Program Outcomes Abstract The pur...

Last modified: 9th Dec 2019

Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack

Dissertation Examples

Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack Abstract In the current day and age, were computing and the internet is crucial for many services, such as bank...

Last modified: 9th Dec 2019

Intrusion Detection in the Cloud Computing Using Neural Network and Artificial Bee Colony Optimization Algorithm

Dissertation Examples

Intrusion detection in the cloud computing using neural network and artificial bee colony optimization algorithm Abstract Recently, cloud computing is employed to solve many problems and fulfill user...

Last modified: 9th Dec 2019

Computer Intrusion and Intrusion Detection Systems

Dissertation Examples

CHAPTER ONE LITERATURE REVIEW   Computer Intrusion and Intrusion Detection Systems Computer intrusion which is a process of illegitimately obtaining unauthorized access to a computer system is a ...

Last modified: 9th Dec 2019

Email Security Strategy

Dissertation Examples

Email Security Strategy The most pervasive means of communication today for businesses and private citizens, Electronic mail or Email, was not designed with security in mind. Today, Email application...

Last modified: 9th Dec 2019

Cryptographic Procedures to Guarantee Data Security

Dissertation Examples

CHAPTER-1 Introduction With the developing prevalence of system and the improvement data handling, a high rate of computerized picture data transmission in the system are identified with individua...

Last modified: 9th Dec 2019

Role of Cloud Computing in Cyber Resilience

Dissertation Examples

Table of Contents Introduction Review of literature Research Problem and Discussion Introduction Cloud computing is being acclaimed as the penultimate answer for the issues of indeterminate traffic ...

Last modified: 9th Dec 2019