Dissertations on Cyber Security

Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation.

View All Dissertation Examples

Cyber Security

Latest Cyber Security Dissertations

Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.

Digital Forensic Techniques Used By Police and Investigation Authorities in Solving Cybercrimes

Dissertation Examples

Digital Forensic Techniques Used By Police and Investigation Authorities in Solving Cybercrimes First Section The tremendous scientific progress in information technology and its flow in the last thr...

Last modified: 10th Dec 2019

Utilization of the Lean Six Sigma Methodology to Cyber Security Threats

Dissertation Examples

Contents Abstract Acknowledgements 1. Introduction 1.1 Motivation 2. Literature Review 2.1 Lean manufacturing 2.1.1 Background 2.1.2 Lean Manufacturing Methodology 2.1.3 Plan, Do, Check, Act (...

Last modified: 10th Dec 2019

An Investigation of Emotion Induced Phishing Susceptibility

Dissertation Examples

Happy or Fear? An Investigation of Emotion Induced Phishing Susceptibility   Abstract Phishing has arisen to become the most hazardous threat to data breach and malware propagation with the profess...

Last modified: 10th Dec 2019

Malware and Social Engineering Attacks

Dissertation Examples

SOCIAL ENGINEERING ATTACKS While social engineering is closely related with cybersecurity today, it is not restricted to vulnerabilities of computer and network systems. Several established practices...

Last modified: 10th Dec 2019

Information Security Issues Faced by Healthcare in New Zealand

Dissertation Examples

[Information security issues faced by the Healthcare in New Zealand-Possible Solutions] Table of Contents I. Abstract II. Introduction III. Literature Review a) Information Security b) Informatio...

Last modified: 9th Dec 2019

Development of New Steganography Algorithm

Dissertation Examples

4.1 Introduction This chapter provided the system activity for the image steganography, this includes the hiding/embedding of the secret message the unveiling of the message as well as the systematic...

Last modified: 9th Dec 2019

A Survey of Person Re-identification Using Deep Learning Approach

Dissertation Examples

A survey of person re-identification using deep learning approach Abstract: From the past few years’ person re-identification plays an active role in the automated video surveillance and has been...

Last modified: 9th Dec 2019

How Can Security Issues in an Online Voting System Be Addressed?

Dissertation Examples

How can security issues in an online voting system be addressed? Abstract This report consist of the tools and techniques that can be utilized to minimize electronic online voting from gaining unauth...

Last modified: 9th Dec 2019

Approaches to Applying Defence in Depth to Web Applications

Dissertation Examples

The premise for this report is to provide the client with a deeper understanding of the security landscape, by delivering a more comprehensive overview of Defence in Depth, security vulnerabilities in the server and application layers and finally, security recommendations for the client's website....

Last modified: 9th Dec 2019

Relationship between Authentic Leadership of Information/Cyber Security Professionals and Program Outcomes

Dissertation Examples

Exploring the relationship between Authentic Leadership of Information Security/Cyber Security Professionals through Job Satisfaction of Information/Cyber Security Program Outcomes Abstract The pur...

Last modified: 9th Dec 2019

Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack

Dissertation Examples

Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack Abstract In the current day and age, were computing and the internet is crucial for many services, such as bank...

Last modified: 9th Dec 2019

Android Malware: Dynamic, Static and Hybrid Analysis Approaches On Mobile Phones

Dissertation Examples

Executive Summary: With the increase of abundance of mobile phones and mobile operating systems, attackers have a larger platform to deploy malicious software. This paper focused on the Android opera...

Last modified: 9th Dec 2019

Intrusion Detection in the Cloud Computing Using Neural Network and Artificial Bee Colony Optimization Algorithm

Dissertation Examples

Intrusion detection in the cloud computing using neural network and artificial bee colony optimization algorithm Abstract Recently, cloud computing is employed to solve many problems and fulfill user...

Last modified: 9th Dec 2019

Computer Intrusion and Intrusion Detection Systems

Dissertation Examples

CHAPTER ONE LITERATURE REVIEW   Computer Intrusion and Intrusion Detection Systems Computer intrusion which is a process of illegitimately obtaining unauthorized access to a computer system is a ...

Last modified: 9th Dec 2019

Email Security Strategy

Dissertation Examples

Email Security Strategy The most pervasive means of communication today for businesses and private citizens, Electronic mail or Email, was not designed with security in mind. Today, Email application...

Last modified: 9th Dec 2019

Phishing Attack in Healthcare Insurance Provider

Dissertation Examples

Phishing Attack in Healthcare Insurance Provider (Sermelles Limited) Table of Contents Title Page Abstract Introduction Literature Review Information Security issues/Threats/Vulnerabilities Securit...

Last modified: 9th Dec 2019

Cryptographic Procedures to Guarantee Data Security

Dissertation Examples

CHAPTER-1 Introduction With the developing prevalence of system and the improvement data handling, a high rate of computerized picture data transmission in the system are identified with individua...

Last modified: 9th Dec 2019

Role of Cloud Computing in Cyber Resilience

Dissertation Examples

Table of Contents Introduction Review of literature Research Problem and Discussion Introduction Cloud computing is being acclaimed as the penultimate answer for the issues of indeterminate traffic ...

Last modified: 9th Dec 2019