Dissertations on Cyber Security
Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation.
Latest Cyber Security Dissertations
Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.
Information Security Issues Faced by Healthcare in New Zealand
Dissertation Examples
[Information security issues faced by the Healthcare in New Zealand-Possible Solutions] Table of Contents I. Abstract II. Introduction III. Literature Review a) Information Security b) Informatio...
Last modified: 9th Dec 2019
Development of New Steganography Algorithm
Dissertation Examples
4.1 Introduction This chapter provided the system activity for the image steganography, this includes the hiding/embedding of the secret message the unveiling of the message as well as the systematic...
Last modified: 9th Dec 2019
A Survey of Person Re-identification Using Deep Learning Approach
Dissertation Examples
A survey of person re-identification using deep learning approach Abstract: From the past few years’ person re-identification plays an active role in the automated video surveillance and has been...
Last modified: 9th Dec 2019
How Can Security Issues in an Online Voting System Be Addressed?
Dissertation Examples
How can security issues in an online voting system be addressed? Abstract This report consist of the tools and techniques that can be utilized to minimize electronic online voting from gaining unauth...
Last modified: 9th Dec 2019
Approaches to Applying Defence in Depth to Web Applications
Dissertation Examples
The premise for this report is to provide the client with a deeper understanding of the security landscape, by delivering a more comprehensive overview of Defence in Depth, security vulnerabilities in the server and application layers and finally, security recommendations for the client's website....
Last modified: 9th Dec 2019
Relationship between Authentic Leadership of Information/Cyber Security Professionals and Program Outcomes
Dissertation Examples
Exploring the relationship between Authentic Leadership of Information Security/Cyber Security Professionals through Job Satisfaction of Information/Cyber Security Program Outcomes Abstract The pur...
Last modified: 9th Dec 2019
Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack
Dissertation Examples
Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack Abstract In the current day and age, were computing and the internet is crucial for many services, such as bank...
Last modified: 9th Dec 2019
Intrusion Detection in the Cloud Computing Using Neural Network and Artificial Bee Colony Optimization Algorithm
Dissertation Examples
Intrusion detection in the cloud computing using neural network and artificial bee colony optimization algorithm Abstract Recently, cloud computing is employed to solve many problems and fulfill user...
Last modified: 9th Dec 2019
Computer Intrusion and Intrusion Detection Systems
Dissertation Examples
CHAPTER ONE LITERATURE REVIEW Computer Intrusion and Intrusion Detection Systems Computer intrusion which is a process of illegitimately obtaining unauthorized access to a computer system is a ...
Last modified: 9th Dec 2019
Email Security Strategy
Dissertation Examples
Email Security Strategy The most pervasive means of communication today for businesses and private citizens, Electronic mail or Email, was not designed with security in mind. Today, Email application...
Last modified: 9th Dec 2019
Cryptographic Procedures to Guarantee Data Security
Dissertation Examples
CHAPTER-1 Introduction With the developing prevalence of system and the improvement data handling, a high rate of computerized picture data transmission in the system are identified with individua...
Last modified: 9th Dec 2019
Role of Cloud Computing in Cyber Resilience
Dissertation Examples
Table of Contents Introduction Review of literature Research Problem and Discussion Introduction Cloud computing is being acclaimed as the penultimate answer for the issues of indeterminate traffic ...
Last modified: 9th Dec 2019
Popular Tags
- Browse All Tags
- Accounting
- Banking
- Biology
- Biomedical Science
- Business
- Business Analysis
- Business Strategy
- Cancer
- Chemistry
- Computer Science
- Construction
- Consumer Decisions
- Criminology
- Cultural Studies
- Cyber Security
- Economics
- Education
- Electronics
- Employment
- Energy
- Engineering
- Environmental Science
- Environmental Studies
- Equality
- Finance
- Food And Nutrition
- Health
- Health And Social Care
- History
- Human Resources
- Information Systems
- Information Technology
- International Business
- International Relations
- International Studies
- Law
- Leadership
- Management
- Marketing
- Mechanics
- Media
- Medical
- Medicine
- Mental Health
- Neurology
- Nursing
- Pharmacology
- Physiology
- Politics
- Psychology
- Sciences
- Social Policy
- Sociology
- Sustainability
- Teaching
- Technology
- Tourism
- Young People