Logo

Departments

  • Applied Physics
  • Biomedical Engineering
  • Center for Urban Science and Progress
  • Chemical and Biomolecular Engineering
  • Civil and Urban Engineering
  • Computer Science and Engineering
  • Electrical and Computer Engineering
  • Finance and Risk Engineering
  • Mathematics
  • Mechanical and Aerospace Engineering
  • Technology, Culture and Society
  • Technology Management and Innovation

Degrees & Programs

  • Bachelor of Science
  • Master of Science
  • Doctor of Philosophy
  • Digital Learning
  • Certificate Programs

NYU Tandon Bridge

  • Undergraduate
  • Records & Registration
  • Digital Learning Services
  • Teaching Innovation
  • Explore NYU Tandon
  • Year in Review
  • Strategic Plan
  • Diversity & Inclusion

News & Events

  • Social Media

Looking for News or Events ?

Cybersecurity, M.S.

purple lock with network nodes

ON THIS PAGE

Curriculum  |  National Centers of Academic Excellence in Cybersecurity Designation Tracks  |  Admission Information  |  Start Your Application

Request Information     Watch a Webinar

Why Cybersecurity at NYU?

We are here to help! Call us at 646.997.3623, U.S. Toll-Free at 877.503.7659, or email us at [email protected] .

  • How to Apply

Online Application

  • Tuition and Fees

Cybersecurity theory and research are critical today; your ability to get to new levels in your career and become a cybersecurity professional adept at tackling evolving threats has never been more important.

At the NYU Tandon School of Engineering, our MS in Cybersecurity program's curriculum is rooted in the belief that  an accessible path to career advancement and learning to build real-world solutions are essential. To this end, we created  NYU Cyber Fellows  to provide, a 75% scholarship for the Cybersecurity M.S. online and operate the National Science Foundation-funded Offensive Security, Incident Response, and Internet Security ( OSIRIS ) laboratory.

  • NYU Tandon has a distinguished history of research and education in the field of cybersecurity.
  • Classes are taught by internationally known experts.
  • Designated as an NSA Center of Academic Excellence in Cyber Operations and Cyber Defense Research.
  • The Application process has been streamlined to as little as 15 minutes to apply, receive a decision in 15 business days.

This section reflects the most recent program requirements. Students enrolled prior must adhere to the catalog requirements originally enrolled into.

Program Requirements

Sample Plan of Study

One goal of the MS program in Cybersecurity is to introduce students to the exciting research in the area of cybersecurity, which you can use as a stepping stone to pursue a PhD degree. To this end, we offer a semester-long advanced project (CS 9963) in the area of cybersecurity as an elective. If you choose this option you will work under the guidance of a research professor and gain invaluable research experience.

In addition to the above semester-long research experience, the program also offers research-oriented MS students to take up the master's thesis option. If you select this option, you will need to take 6 credits of CS 9973 working with a faculty advisor on some research problem in cybersecurity in lieu of 2 out of the 3 required electives.

The research need not be original, but should adequately demonstrate your proficiency in the subject material. An oral defense of the master's thesis with at least 3 professors in attendance is required. The 6 credits of master's thesis must span over a period of exactly 2 consecutive semesters. Whenever relevant, 3.00 credits of CS 9963 may be used as 3.00 credits of CS 9973, subject to the approval of your faculty adviser(s).

Cyber Ops Specialization

NOTE: Please refer to the Course Catalog to view course descriptions by course number if information is not listed above.

National Centers of Academic Excellence in Cybersecurity Designation Tracks

NYU Tandon School of Engineering is one of the select institutions recognized by the National Centers of Academic Excellence in Cybersecurity (NCAE-C) . The following courses taken within the Cybersecurity Master's Degree online program qualify for the following two designations.

Students also may elect to specialize by taking specific courses in an area of concentration. Two tracks are available:

  • Cyber Defense
  • Cyber Operations

Admission Information

You need a superior undergraduate record from an accredited institution in order to be considered for entrance into the program. Preferably, you should have an undergraduate degree in computer science, mathematics, science, or engineering. However, applicants with a minor in CS, relevant technical experience, or with degrees in other fields are considered individually for admission.

  • Find out more about  Cybersecurity Admission Requirements .
  • Find out more about  General Admission Requirements .

Prerequisites

Students must show equivalency of all of the following in previous academic work.

  • Introduction to Programming and Problem Solving, CS-GY 5303
  • Data Structures and Algorithms, CS-GY 5403

If you come from a non-engineering background you can prepare to apply for the Cybersecurity Master’s Degree by taking the NYU Tandon Bridge Program .

NYU Tandon's NYU Cyber Fellows program is an affordable part-time and full-time online M.S. in Cybersecurity with a curriculum designed in cooperation with elite corporate partners. Now offering scholarships of as much as 75% off tuition to both U.S. and non-U.S. residents.

If you come from a non-engineering background you can prepare to apply for the Cybersecurity Master’s Degree through out Tandon Bridge program.

The 100% online NYU Tandon Bridge course prepares students without a Cybersecurity degree or other related experience to apply for select NYU Tandon Master’s Degree programs . In the course, students will learn computer science fundamentals and programming with C++. Students’ performance in the Bridge will count toward their Master’s degree application decisions. The Bridge is a non-credit certificate course, and those who complete the Bridge with a final grade of C or above will earn a Certificate of Completion, and those who earn a B+ or above will receive a Certificate of Completion with Distinction. Note: regardless of performance, successful completion of the Bridge course does not guarantee admission to any academic program.

The NYU Tandon Bridge course is taught by faculty members of the Computer Science department at the NYU Tandon School of Engineering, aided by NYU Tandon Graduate student teaching assistants. Students will participate in interactive online modules, live webinars, assignments, and tests.

Applications for transfer credits must be submitted for consideration before the end of the first semester of matriculation. Courses with grades below B are not eligible for transfer. Transfer credits for courses taken after matriculation at the NYU Tandon School of Engineering are rarely accepted and must be approved by the student’s academic department and by the Office of Graduate Academics before the course is taken. Grades for transferred credits or courses are not recorded and are not included in GPA calculations.

Start Your Application

We are here to help! Call us at 646.997.3623, U.S. Toll-Free at 877.503.7659, or email us at [email protected] .

Quick Links

  • Explore Cybersecurity @ NYU

Ariel Weintraub

Ariel Weintraub

Google Custom Search

Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.

Hinweise zum Einsatz der Google Suche

Technical University of Munich

  • Professorship of Cyber Trust
  • TUM School of Computation, Information and Technology
  • Technical University of Munich

Technical University of Munich

Teaching at the Professorship of Cyber Trust

Theses and student projects.

We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.

Application

Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.

Open Student Projects

This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.

Assigned Student Projects

Completed student projects.

masters dissertation cyber security

Cyber Security Hub

  • Research projects
  • PhD research

Euroopa Regionaalarengu Fond

MSc thesis on Cyber Security related topics defended at the University of Tartu :

  • Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System"
  • Mammadzada. K., "Blockchain Oracles"
  • Matsalu. M., "The Development of Digital Forensics Workforce Competency on the Example of Estonian Defence League"
  • Padur. K., "Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution"
  • Puniani. R., "Conceptualization of a Blockchain Based Voting Ecosystem in Estonia"
  • Pure. I., "An Automated Methodology for Validating Web Related Cyber Threat Intelligence by Implementing a Honeyclient"
  • Produit. B.D., "Optimization of the ROCA (CVE-2017-15361) Attack"
  • Sarapuu. D., "Penetration Testing of Glia’s Web Application"
  • Seeba. M., "A Specification of Layer-Based Information Security Management System for the Issue Tracking System"
  • Simisker. M., "Security of Health Information Databases"
  • Tõnisson. R., "Tighter Post-quantum Secure Encryption Schemes Using Semi-classical Oracles"
  • Yerokhin. M., "Multi-level Policy-aware Privacy Analysis"

See more at the thesis database .

  • Abbasi A., GDPR Implementation in an Airline’s Contact Center
  • Akande A., Disruptive Power of Blockchain on the Insurance Industry
  • Avramenko V., Cost-Benefit Analysis of a Hybrid Terrorist Attack on a Power Plant

  • Affia A-A. O., Security Risk Management of E-commerce Systems
  • Çelebi I., 
Privacy Enhanced Secure Tropos:
 A Privacy Modeling Language for GDPR Compliance
  • Cherednychenko O., Designing Visually Effective and Intuitive Modelling Notations for Security Risk Management
  • Elazazy A. A. A. A., HoneyProxy Implementation in Cloud Environment with Docker Container HoneyFarm
  • Filipczak K. M., Testing the Security Awareness using Open-Source Tools: Spear Phishing
  • Islami L., Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations
  • Jüristo K., How to Conduct Email Phishing Experiments
  • Kaasik M., A Tool for Supporting Multi-perspective System Development Through Security Risk Management
  • Kopylash V., An Ethereum-Based Real Estate Application with Tampering-Resilient Document Storage
  • Luomala M., Evaluation of Efficiency of Cybersecurity
  • Mendelman K., Fingerprint Organization Using Metadata of Public Documents
  • Mitt S., Blockchain Application - Case Study on Hyperledger Fabric
  • Mohamed G. Z. A. R., Detecting Social Spamming on Facebook Platform
  • Nugis R., Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
  • Orange A., Blockchain-based Provenance Solution for Handcrafted Jewellery
  • Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists’ Cyber Incident Reporting Skills
  • Rebane R.-M., Post-Quantum Secure Time-Stamping
  • Ristikivi A., Ensuring the Integrity of Electronic Health Records
  • Räni E., Prediction Model for tendencies in Cybercesurity
  • Sing E., A Meta-Model Driven Method for Establishing Business Process Compliance to GDPR
  • Shapaval R., Security Risk Management for the IoT systems
  • Soonberg M., The Employee-Based Information Security Risks on the Example of the Estonian Literary Museum
  • Sõgel K., Distributed Ledger Technology and External Mandatory Reporting in Banking Industry
  • Velázquez J. A. S., ''Securing openHAB Smart Home Through User Authentication and Authorization'
  • Värva I., Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application
  • Zaitsev A., Comparison of STS and ArchiMate Risk and Security Overlay
  • AbuSeada W. M. F. A., Alternative Approach to Automate Detection of DOM-XSS Vulnerabilities
  • Bascuñana G. F., Method for Effective PDF Files Manipulation Detection
  • Brodar G., Analysis of Exploit-kit Incidents and Campaigns Through a Graph Database Framework
  • Djagilev V., Android Chat Application Forensic Process Improvement & XRY Support
  • Ellervee A., A Reference Model for Blockchain-Based Distributed Ledger Technology
  • Jõgi M., Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance
  • Kinger M., Enterprise Cloud Security Guidance and Strategies for Enterprises
  • Kuldmaa A., On Secure Bulletin Boards for E-Voting
  • Lahesoo P., The Electronic Evidence Examination Reporting System by the Example of West Prefecture
  • Lashkarara S., Managing Security Risks Using Attack-Defense Trees
  • Maennel K., Improving and Measuring Learning Effectiveness at Cyber Defence Exercises
  • Nafies A., A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver
  • Sivalingapandi D., Comparison and Alignment of Access Control Models
  • Oksvort R., A Prototype for Learning Privacy-Preserving Data Publishing
  • Pappas S., Investigation of JTAG and ISP Techniques for Forensic Procedures
  • Proskurin A., Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application
  • Treier D., Research and Proof of Concept of Selected ISKE Highest Level Integrity Requirements
  • Tschida C., The Way to the Specialist and Management Level of Cyber Hygiene Initiative
  • Tsintsabadze L., A Prototype to Analyze Role- and Attribute-Based Access Control Models
  • Vallaots A., Federation of Cyber Ranges
  • Vunk M., A Framework for Assessing Organisational IT Governance Risk and Compliance
  • Allyson I. H., Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises
  • Duran S. A. U., Organizational Interaction Mechanisms Affecting Strategic Decision-Making During Cybercrime Investigations
  • Herrera V. L. C., A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
  • Martínez F. C. A., Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding and Development
  • Pantoja V. C. A., Analysis of the Cyber Attacks against ADS-B Perspective of Aviation Experts
  • Pinto R. Y. A., Development of National Cyber Security Strategies (NCSSs), and an Application of Perspective to the Colombian Case
  • Rozario V. I. D. J., Model-based Role Based Access Control for RESTful Spring applications
  • Samarütel S., Revision of Security Risk-oriented Patterns for Distributed Systems
  • Sarmiento B. S. A., Detection Solution Analysis for Simplistic Spoofing Attacks in Commercial Mini and Micro UAVs
  • Sergeev A., Role Based Access Control as SecureUML Model in Web Applications Development with Spring Security
  • Siim J., Secure and Efficient Mix-Nets
  • Siim S., A Comprehensive Protocol Suite for Secure Two-Party Computation
  • Sokk V., An Improved Type System for a Privacy-aware Programming Language and its Practical Applications
  • Suarez M. D. D., Assessment of Web-based Information Security Awareness Courses
  • Velasquez H. L. A., Colombia and the Intelligence Cycle in the 21st Century, the Digital Age
  • Guler S., Secure Bitcoin Wallet
  • Kiiver J., NFC Security Solution for Web Applications
  • Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation
  • Rao S. P. Analysis and Mitigation of Recent Attacks on Mobile Communication Backend
  • Rrenja A., Pattern Based Security Requirements Derivation with Security Risk-aware Secure Tropos
  • Tursunova S., Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks
  • Vaht M., The Analysis and Design of a Privacy-Preserving Survey System
  • AbuLamddi M., Safety and Security Dependability Analysis
  • Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes
  • Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools
  • Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis
  • Okugbeni J., Security Implementation of Mission Control System for ESTCube-1 Satellite
  • Pikma T., Auditing of Secure Multiparty Computations
  • Preobrazenskaja A., Development of Security Risk Measurement Model within Misuse Cases and BPMN
  • Teder T. Extracting Bole-based Access Control Models from Business Process Event Logs
  • Tovstukha I., Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities
  • Turban T., A Secure Multi-Party Computation Protocol Suite Inspired by Shamir’s Secret Sharing Scheme
  • Altuhhova O., Developing System Security through Business Process Modelling
  • Onchukova A., Transformation rules between MUC and MAD
  • Pankova A., Insecurity of Transformation-Based Privacy-Preserving Linear Programming
  • Pullonen P., Actively Secure Two-Party Computation: Efficient Beaver Triple Generation
  • Rebane R., A Feasibility Analysis of Secure Multiparty Computation Deployments
  • Tark K., Role Based Access Model in XML based Documents
  • Cakabey O., Role-based Access Control Using Knowledge Acquisition in Automated Specification
  • Khan N. H., A Pattern-based Development of Secure Business Processes
  • Lakk H., Model-driven Role-based Access Control for Databases
  • Soomro I. U., Alignment of Misuse Cases to ISSRM
  • Turan Y., Extension and Application of Event-driven Process Chain for Information System Security Risk Management
  • Chowdhury M. J. M., Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
  • Seeba I., Adding a transformation language to the Cryptoanalyser
  • Talviste R., Deploying secure multiparty computation for joint data analysis - a case study
  •   Hjem
  • Faculty of Engineering and Science
  • Department of Information and Communication Technology

Master's theses in Cyber Security

Utgivelsesdato Forfattere Titler Emneord Dokumenttyper Tidsskrifter

Søk i denne samlingen:

Nye registreringer

Navigating the phishing landscape: a novel stage model unveiling the journey of individuals exposed to phishing attempts , tapping network traffic in kubernetes , designing a framework for data populating alarms based on mitre techniques , designing a framework for data populating alarms based on mitre techniques , rosi calculation tool proposal for the norwegian healthcare sector , vulnerability assessment framework for offshore industrial control system , unveiling the potential of open-source intelligence (osint) for enhanced cybersecurity posture , ransomware simulator for in-depth analysis and detection: leveraging centralized logging and sysmon for improved cybersecurity , the impact of gender equality in the cybersecurity sector , examining the security and privacy barriers of third-party public cloud services a case study of diverse norwegian municipalities , multi-cloud information security policy development , information security culture: an investigation into the impact of a large-scale cyberattack , an analysis of phishing susceptibility through the lens of protection motivation theory , to deceive or not deceive: unveiling the adoption determinants of defensive cyber deception in norwegian organizations , "not my responsibility" - a comparative case study of organizational cybersecurity subcultures .

feed

For enquiries call:

+1-469-442-0620

banner-in1

95+ Latest Cyber Security Research Topics in 2024

Home Blog Security 95+ Latest Cyber Security Research Topics in 2024

Play icon

The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cybersecurity thesis topics helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security. 

This article aims to demonstrate the most current Cyber Security Research Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security topics for the project, latest research titles about cyber security.

List of Trending Cyber Security Research Topics in 2024

Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends.

A. Exciting Mobile Cyber Security Research Paper Topics

  • The significance of continuous user authentication on mobile gadgets. 
  • The efficacy of different mobile security approaches. 
  • Detecting mobile phone hacking. 
  • Assessing the threat of using portable devices to access banking services. 
  • Cybersecurity and mobile applications. 
  • The vulnerabilities in wireless mobile data exchange. 
  • The rise of mobile malware. 
  • The evolution of Android malware.
  • How to know you’ve been hacked on mobile. 
  • The impact of mobile gadgets on cybersecurity. 

B. Top Computer and Software Security Topics to Research

  • Learn algorithms for data encryption 
  • Concept of risk management security 
  • How to develop the best Internet security software 
  • What are Encrypting Viruses- How does it work? 
  • How does a Ransomware attack work? 
  • Scanning of malware on your PC 
  • Infiltrating a Mac OS X operating system 
  • What are the effects of RSA on network security ? 
  • How do encrypting viruses work?
  • DDoS attacks on IoT devices

C. Trending Information Security Research Topics

  • Why should people avoid sharing their details on Facebook? 
  • What is the importance of unified user profiles? 
  • Discuss Cookies and Privacy  
  • White hat and black hat hackers 
  • What are the most secure methods for ensuring data integrity? 
  • Talk about the implications of Wi-Fi hacking apps on mobile phones 
  • Analyze the data breaches in 2024
  • Discuss digital piracy in 2024
  • critical cyber-attack concepts 
  • Social engineering and its importance 

D. Current Network Security Research Topics

  • Data storage centralization
  • Identify Malicious activity on a computer system. 
  • Firewall 
  • Importance of keeping updated Software  
  • wireless sensor network 
  • What are the effects of ad-hoc networks
  • How can a company network be safe? 
  • What are Network segmentation and its applications? 
  • Discuss Data Loss Prevention systems  
  • Discuss various methods for establishing secure algorithms in a network. 
  • Talk about two-factor authentication

E. Best Data Security Research Topics

  • Importance of backup and recovery 
  • Benefits of logging for applications 
  • Understand physical data security 
  • Importance of Cloud Security 
  • In computing, the relationship between privacy and data security 
  • Talk about data leaks in mobile apps 
  • Discuss the effects of a black hole on a network system. 

F. Important Application Security Research Topics

  • Detect Malicious Activity on Google Play Apps 
  • Dangers of XSS attacks on apps 
  • Discuss SQL injection attacks. 
  • Insecure Deserialization Effect 
  • Check Security protocols 

G. Cybersecurity Law & Ethics Research Topics

  • Strict cybersecurity laws in China 
  • Importance of the Cybersecurity Information Sharing Act. 
  • USA, UK, and other countries' cybersecurity laws  
  • Discuss The Pipeline Security Act in the United States 

H. Recent Cyberbullying Topics

  • Protecting your Online Identity and Reputation 
  • Online Safety 
  • Sexual Harassment and Sexual Bullying 
  • Dealing with Bullying 
  • Stress Center for Teens 

I. Operational Security Topics

  • Identify sensitive data 
  • Identify possible threats 
  • Analyze security threats and vulnerabilities 
  • Appraise the threat level and vulnerability risk 
  • Devise a plan to mitigate the threats 

J. Cybercrime Topics for a Research Paper

  • Crime Prevention. 
  • Criminal Specialization. 
  • Drug Courts. 
  • Criminal Courts. 
  • Criminal Justice Ethics. 
  • Capital Punishment.
  • Community Corrections. 
  • Criminal Law.

Cyber Security Future Research Topics

  • Developing more effective methods for detecting and responding to cyber attacks
  • Investigating the role of social media in cyber security
  • Examining the impact of cloud computing on cyber security
  • Investigating the security implications of the Internet of Things
  • Studying the effectiveness of current cyber security measures
  • Identifying new cyber security threats and vulnerabilities
  • Developing more effective cyber security policies
  • Examining the ethical implications of cyber security

Cyber Security Topics For Research Paper

  • Cyber security threats and vulnerabilities
  • Cyber security incident response and management
  • Cyber security risk management
  • Cyber security awareness and training
  • Cyber security controls and countermeasures
  • Cyber security governance
  • Cyber security standards
  • Cyber security insurance
  • Cyber security and the law
  • The future of cyber security

Top 5 Current Research Topics in Cybersecurity

Below are the latest 5 cybersecurity research topics. They are:

  • Artificial Intelligence
  • Digital Supply Chains
  • Internet of Things
  • State-Sponsored Attacks
  • Working From Home

Research Area in Cyber Security

The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including: 

  • Quantum & Space  
  • Data Privacy  
  • Criminology & Law 
  • AI & IoT Security
  • RFID Security
  • Authorisation Infrastructure
  • Digital Forensics
  • Autonomous Security
  • Social Influence on Social Networks

How to Choose the Best Research Topics in Cyber Security?

A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more cyber security research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics. 

1. Brainstorm

In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible. 

2. Understanding the Background

In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it. 

3. Write a Single Topic

Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about. 

4. Be Flexible

There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out. 

The Layout of Cybersecurity Research Guidance

It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.  

In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness. 

Cyber Security Research Topic Writing Tips from Expert

Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security Research Topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.

  • Before you begin writing your research paper, make sure you understand the assignment. 
  • Your Research Paper Should Have an Engaging Topic 
  • Find reputable sources by doing a little research 
  • Precisely state your thesis on cybersecurity 
  • A rough outline should be developed 
  • Finish your paper by writing a draft 
  • Make sure that your bibliography is formatted correctly and cites your sources. 
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!

Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.

The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.

Frequently Asked Questions (FAQs)

Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices. 

Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others. 

Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses? 

The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security. 

Profile

Mrinal Prakash

I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cyber Security Batches & Dates

Course advisor icon

University of Nebraska Omaha logo

  • Director's Welcome
  • Faculty & Staff Directory
  • News & Events
  • Policies, Forms & Resources
  • Faculty Grievance Resources
  • Applied Computing and Informatics
  • Bachelors of Science in Bioinformatics
  • Masters of Science in Biomedical Informatics
  • Minor in BIOI
  • Forms & Resources
  • Bachelor of Science in Cybersecurity

Master of Science in Cybersecurity

  • Minor in CYBR
  • Graduate Certificate in CYBR
  • Masters of Science in IT Innovation
  • Student Involvement

MS in Cybersecurity

In the image, two individuals are intently looking at a computer screen. They appear to be working together on a project related to cybersecurity. The person on the left, wearing a t-shirt, is using the mouse, while the person on the right, dressed in a button-up shirt, is closely observing the screen. The background features a modern office setting, contributing to the professional and collaborative atmosphere.

  • Talk to an advisor

Cybersecurity is a critical field that stands at the forefront of protecting our increasingly digital society. The Master of Science in Cybersecurity (MS-CYBR) program equips students with the essential skills to design, develop, manage, and secure information systems . The modern world is made up of  vast data exchanges and internet-connected systems with many kinds of private and confidential information on them. Our students learn to think like an adversary to ethically hack systems to identify and mitigate vulnerabilities. 

Our curriculum is certified by National Security Agency's National Cryptologic School as a  National Center of Academic Excellence in Cybersecurity (NCAE-C) . UNO holds two NCAE-C designations in  Cyber Defense   (CAE-CD) and  Cyber Operations (CAE-CO) .  

  Online Options Available

  Designated CAE-CO & CAE-CD

  STEM-OPT Visa Eligible

 $132k  

average salary for this degree*

 25.3%  

increased demand for careers in cybersecurity in the past 5 years*

 448K  

Unfilled positions in the USA in 2024*

Program Overview

As digital threats grow, there is an increasing demand for experts who can protect sensitive information and systems. UNO CYBR prepares you to meet these challenges by equipping you with skills to understand the cybersecurity landscape and by developing the technical skills you'll need to defend digital assets. You will learn to identify vulnerabilities, anticipate potential threats, and implement effective security measures across various types of information systems.

Graduates are prepared to devise security solutions that are ethical and compliant with international standards, safeguarding the integrity and security of private information and the systems it resides on. Your experience at UNO CYBR will start with a foundation in information security grounded in risk assessment before helping you to build essential skills in penetration testing / ethical hacking, the creation of defense in depth strategies, and secure coding. 

Careers in Cybersecurity

What do students have to say about the program?

Program Details

It is easy to get started with a master's degree in Cybersecurity. Students starting in CYBR with prior computing fundamentals jump right into the core of the cybersecurity master's degree. You will get started right away with core cybersecurity courses in digital forensics, software assurance, and principles of secure design. Next, you will choose 6 elective courses in one of the two concentration areas (Cyber operations or interdisciplinary). Both concentration areas offers a wide range of electives for you to customize your education and specialize in areas you are most interested in. Students entering the MS in CYBR with no technical background will also complete a few foundational computing classes first. 

View the Cybersecurity Graduate Catalog  for more specific details.

Concentrations

A person in a U.S. Air Force uniform working on an Apple iMac in a library or study area. The background shows a calm, well-lit space with other computers and comfortable seating. The individual is focused on the screen, and the monitor displays the logo of Dr. C.C. and Mabel L. Criss Library.

Cyber Operations

A group of four students sitting around a table in a modern classroom, each with a laptop in front of them. They are looking at a large screen on the wall displaying coding or programming information. The walls have circuit-themed decorations, creating a tech-focused environment. The students appear engaged in a discussion or collaborative work.

Interdisciplinary

image

Like what you see?

Let's talk about how you can begin your journey down these exciting career paths. 

Cyber Security and Forensics MSc

Can't attend? See more open events

Course Overview

  • Full-time - January 2025
  • Full-time - September 2024
  • Part-time day - September 2024
  • Part-time day - January 2025
  • Full-time - September 2025
  • Part-time day - September 2025

* Price per academic year

Course summary

Our Cyber Security and Forensics MSc has been designed with a high degree of relevance to the industry’s needs. This course is also fully certified by the National Cyber Security Centre (NCSC), which is a sign of national excellence.

Digital devices, including computers and mobile phones, play a pivotal role in our daily lives, impacting various industries such as communications, banking, engineering, information systems and AI technologies. With this reliance the demand for enhanced cybersecurity and forensics has become more imperative. 

This course focusses on two key aspects of Cyber Security: analysing and assessing risk to minimise them and Digital Forensics, which involves investigating and extracting digital information from various devices for legal evidential purposes. You’ll gain insights into security threats facing computer systems, the nature of stored information on digital devices, and the extraction processes. 

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field of Cyber Security and Forensics. The course structure allows you to choose optional modules from either the Cyber Security or Digital Forensics themes, providing a comprehensive and flexible learning experience.  In addition, you’ll undertake and complete a Cyber Security and Forensics Major Project Module. 

The course offers access to state-of-the-art resources, including the licensed FTK Forensics Toolkit and other Open-Source Tools. 

Key features include:

  • A dedicated forensics computer laboratory
  • Over 30 computing laboratories equipped with specialist software supporting Linux/UNIX, Windows and Mac OS, facilitated by high bandwidth networks.
  • Access to a range of free software titles through a number of academic initiatives for use on home computers for educational and personal purposes
  • Specialist technicians supporting optimal utilisation of technologies and to ensure you can get the most out of these digital technologies.

You’ll have the opportunity to explore a variety of tools available in the market and learn how to use forensic tools for data retrieval. The Cyber Security and Forensics MSc addresses professional and ethical considerations in computer security and forensics, developing competencies like report writing and evidence presentation in court.  

Teaching methods involve lab sessions, student-led tutorials and lectures by internal staff and industry guest speakers. You’ll be taught by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the School of Computer Science and Engineering. Assessments predominantly comprise of practical or research-based course work.

Top reasons to study with us

  • State-of-the-art technologies and resources: You’ll be equipped with cutting-edge tools, including a licensed FTK Forensics Toolkit and other readily available Open-Source Tools. Our dedicated forensics computer laboratory, along with over 30 computing laboratories, offers an extensive range of software, providing hands-on experience with Linux/UNIX, Windows, and Mac OS. Additionally, you'll have the opportunity to utilise specialised software tools and packages specifically designed for cyber security and forensics.
  • Gain industry insider knowledge – you'll benefit from presentations by industry professionals who regularly appear as guest speakers.
  • Accredited course – you’ll be entitled to professional membership of the BCS, the Chartered Institute for IT, an important part of the criteria for achieving Chartered IT Professional (CITP) status through the institute.
  • Develop in-demand skills – the need for improved computer security has never been greater, with a growing demand for cyber security specialists.
  • This course has links to an active cyber security research group with PhD students and academic staff investigating the latest advances in cyber security and forensics studies.
  • Some of our graduates have gone on to work in leading governmental and security organisations such as the Police and the UK Ministry of Defence (MOD)

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the Programme Specification document.

Core modules

Principles of cyber security.

The module is divided into two parts. The first part introduces the fundamentals of Cyber security, such as the CIA tenets and the various models and formal methods used to design and understand threats and security methods. It will also introduce the human factor and its impact on organisations. The second part of the module will focus on understanding cryptographic concepts and introduce several applied cryptography models in different environments.

Cyber Security and Forensics Project

The project is an extended piece of supervised independent work relevant to the field of Cyber Security and Forensics. The topic is generally proposed by the student after consultation with the module leader. The project should enable the student to draw on and extend the knowledge, skills and techniques of the field covered by the taught modules and show independent work that, whilst not original, demonstrates the development of skills and knowledge. The module will allow students to show appreciation of the topic investigated by providing a critical analysis of the findings.

Principles of Digital Forensics

This module covers the fundamental concepts in computer forensics. Students will learn about the physical and logical structure and organisation of storage media for the purpose of digital forensics. Students will use a variety of investigative examination and software tools to determine disk and file organisation, the gathering of information and evidence, recovery of deleted files and revealing hidden files structures.

Network Security Management

This module examines various aspects of network security, including theoretical and practical areas. A substantial amount of work will be laboratory-based, involving the deployment of network security tools, the analysis of network data, and identifying security threats to networked computers and devices, their consequences, and methods of dealing with such threats. It provides an overview of security issues for networked systems.

Information Security Governance and Compliance

Information Security (IS) Governance and Compliance are both essential components of cyber security and Forensics activities within any organisation, incident, or case study. The Information Security governance part of this module focusses on identifying risk management frameworks to guide information security activities, while the Information Security compliance focusses on defining policies, procedures, and guidelines aligning with an organisation’s objectives and regulatory and legal requirements.

Option modules: Digital Forensics theme

Digital forensics and incident response.

This module examines digital forensics and security response with a practical focus. It introduces key network protocols and their potential vulnerabilities, emphasising tools like Wireshark, intrusion detection systems, and their role in incident response. Core topics covered include malware analysis, evidence handling and incident response procedures. Students will apply their learning to through the exploration of real world network security incidents to meet the constantly evolving and emerging challenges in forensics.

Digital Forensics Applications

The aim of this module is to explore the main aspects of the Digital Forensics Investigative  process and apply the theory to practically based exercises, which would be similar to the work conducted in Industry.  

Option modules: Cyber Security theme

Cyber security applications.

The module assumes basic knowledge of cryptography and covers both theoretical and practical issues related to cyber security applications. The module aims to explore fundamental technologies and applications in cyber security; discuss underlying technologies and techniques used in cyber security applications; introduce the latest research that can help organisations move from ‘patch and pray’ defenses to security ‘by default’; set major theoretical issues involved in security in a broader information requirements context and explore current technological trends and the way they are employed by businesses (especially for cloud-based services); introduce a variety of techniques and frameworks designed to support security and privacy with particular emphasis on various cryptographic techniques; discuss different techniques used to exploit vulnerabilities and to mount attacks that result in security breaches. Students will be exposed to many exciting open problems in the field and will have the opportunity to work on programming projects related to security.

Cyber Security Threats and Countermeasures

This module will look at system architectures and how systems can be defended; it will include consideration of the threat to security posed by legitimate users of the system and behavioural issues.

Professional accreditation

This course has been accredited by BCS, the Chartered Institute for IT for the purposes of partially meeting the further learning academic requirement for registration as a Chartered IT Professional. The accreditation is a mark of assurance that the course meets the standards set by BCS and it entitles you to professional membership of BCS, which is an important part of the criteria for achieving Chartered IT Professional (CITP) status through the Institute.

This course has also been accredited by BCS, The Chartered Institute for IT on behalf of the Engineering Council for the purposes of partially meeting the academic requirement for registration as a Chartered Engineer. The accreditation is a mark of assurance that the course meets the standards set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC).

An accredited degree will provide you with some or all of the underpinning knowledge, understanding and skills for eventual registration as an Incorporated (IEng) or Chartered Engineer (CEng). Accreditation to the BCS is valid for intakes to this course between September 2022 - August 2028.

This programme is also fully certified by the National Cyber Security Centre (NCSC), which is a sign of national excellence. Students will receive a certificate upon graduation. The NCSC is part of the UK Government’s national communications intelligence agency GCHQ. Accreditation to the NCSC is valid for intakes to this course between May 2023 - August 2028.

BCS logo

Studying Computer Science and Engineering at Westminster

Watch the video below to find out more about studying Computer Science and Engineering at Westminster.

book icon in turquoise

For more details on course structure, modules, teaching and assessment Download the programme specification (PDF) .

To request an accessible version please email [email protected]

Checklist top tips icon

Get your copy of the University of Westminster prospectus and browse the range of courses on offer.

Request a prospectus

Chat icon in turquoise

Contact us for general course enquiries:

+44 (0)20 7911 5000 EXT 65511 (Mon–Fri, 10am–4pm BST)

[email protected]

Live chat with us (Mon–Fri, 10am–4pm BST)

Open evenings

Join us at an open evening online or on campus. Get a feel for student life at the University of Westminster and talk to course leaders and our support teams.

Next open evening

This course is designed with a high degree of relevance to the industry’s needs. It will equip you with all the necessary skills needed for jobs in the field of cyber security and digital forensics. 

With computers being central to all aspects of our daily lives, as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This means that there’s a growing demand for specialists in cyber security and digital forensics.

With a growing global network of 3,000 employers, our  Careers and Employability Service  is here to support you to achieve your full potential.

masters dissertation cyber security

Industry knowledge

We have strong links to industry, a highly-experienced teaching team in the cyber security and digital forensics field, and industry professionals who regularly appear as guest speakers.

masters dissertation cyber security

Transferable skills

This course will equip you with a range of highly marketable and skills to prepare you for a successful career in this industry.

masters dissertation cyber security

Stand out from the crowd

Qualified people in cyber security and digital forensics are currently in high demand in the job market.

Industry links

We have links with professionals from a range of fields in the cyber security and digital forensics industries. They regularly appear as guest speakers and act as advisors for the course. Their input ensures that the course is continually up to date and highly relevant to the needs of the industry. 

This course will prepare you for roles such as:

  • Anti-piracy/content protection analyst
  • Computer forensics analyst
  • Computer security incident responder
  • Cyber security manager
  • Information security analyst
  • Information security assurance officer
  • Information security assurance analyst
  • Information security consultant
  • Information security risk officer
  • IT security engineer
  • IT security operations specialist
  • Penetration tester (also known as ethical hacker)
  • Researcher in applied cryptography
  • Researcher in network/computer security
  • Security officer
  • Source code auditor
  • Vulnerability assessor

Graduate employers

Graduates from this course have found employment at organisations including:

  • Metropolitan Police
  • UK Ministry of Defence
  • Willis Towers Watson

Our graduates

Profile photo of Abdul Karim.

Abdul Karim

Cyber security and forensics msc - 2024.

My Westminster experience has been a blend of academic rigour, cultural immersion, personal growth, and the excitement of being part of a vibrant city. It's an experience that has equipped me with skills, perspectives, and memories that I'll carry well beyond graduation.

Alumnus Zeena Radwan

Zeena Radwan

Cyber security and forensics msc - 2017.

Zeena graduated in 2014 from Queen Mary University of London with Computer Science degree. In 2017 she successfully completed the Cyber Security and Forensics MSc while working full time. Zeena is Currently working for the Technical Services Department for the Faculty of Science and Technology at the University of Westminster. She applies gained expertise and knowledge in cryptography, risk management, forensics and cyber security across many departments including Engineering, Psychology and Computer Science.

Najeeb Anwar Tareen

Najeeb Anwar Tareen

Cyber security and forensics (ft) msc - 2022.

The student facilities and campuses spread around central London and Harrow are excellent. The courses are practical and tailored to the industry. Not to forget the fantastic social life you can create here while studying with other like-minded people. Graduating from the University of Westminster feels different in a very good way!

Westminster Employability Award

Employers value graduates who have invested in their personal and professional development – and our Westminster Employability Award gives you the chance to formally document and demonstrate these activities and achievements.

The award is flexible and can be completed in your own time, allowing you to choose from a set of extracurricular activities. 

Activities might include gaining experience through a part-time job or placement, signing up to a University-run scheme – such as mentoring or teaching in a school – or completing online exercises.

Read more about our Westminster Employability Award .

Westminster Employability Award

Course Leader

Funminiyi Olajide profile photo's profile photo

Dr Funminiyi Olajide

Senior lecturer.

Dr Funminiyi Olajide is a Senior Lecturer in Cyber Security and Digital Forensics within the School of Computer Science and Engineering at the University of Westminster. He is currently the course leader for the Cyber Security and Forensics MSc.   Dr Olajide earned his PhD in the United Kingdom with a primary research focus on areas such as Cyber Security, Digital Forensics, Incident Response and Management of Cybercrime.   His current teaching interest are in Cyber Security and Digital Forensics, and he has extended experience in teaching modules in these subjects, including Principles of Digital Forensics, Information Security Governance and Compliance, Digital Forensics, and Incident Response (DFIR), Cyber Security Threats and Countermeasures, and Cyber Security and Forensics Projects.

Mastering cyber defense is not just a skill; it's a necessity for empowering your future in the digital era. It unlocks insights, applies knowledge in real cases, develops professional skills, and drives cyber innovation across industries, ultimately aiming to defend today and secure tomorrow.

Course Team

  • Dr Ayman El Hajjar - Senior Lecturer
  • Dr David Huang - Senior Lecturer in Computer Science and Network Systems
  • Kamalini Sivagurunathan - Associate Head of College
  • Noam Weingarten - Senior Lecturer
  • Usama Arusi - Lecturer
  • Jude Osamor - Lecturer
  • Dr Funminiyi Olajide - Senior Lecturer

Why study this course?

masters dissertation cyber security

Study in central London

Based in our Cavendish Campus in central London, you’ll enjoy the benefits of studying in a major tech hub.

masters dissertation cyber security

Prepare for industry

You’ll have access to a dedicated forensics computer laboratory, and use a range of specialised software tools and packages for cyber security and forensics.

masters dissertation cyber security

Accredited course

The programme is accredited by BCS, The Chartered Institute for IT, for partially meeting the educational requirement for CITP and CEng.

Entry Requirements

  • EU and international

A minimum of a lower second class honours degree (2:2) in a computing-related discipline. If your first degree does not have a strong computing element then your work experience and other qualifications may also be taken into account.

If your first language is not English, you should have an IELTS 6.5 with at least 6.5 in writing and no element below 6.0.

Applicants are required to submit one academic reference.

Recognition of prior learning and experience

If you have previously studied at university level, or have equivalent work experience, academic credit may be awarded towards your course at Westminster. For more information, visit our Recognition of Prior Learning page .

Application process

Visit our How to apply page  for more information on:

  • the application process
  • what you need to apply
  • deadlines for applications

More information

  • Country-specific entry requirements
  • English language requirements
  • Visas and advice

What Our Students Say

Learn new skills

masters dissertation cyber security

Volunteer and gain new skills

We offer a number of different volunteering opportunities for you to learn new skills, create connections, and make a difference in the community.

masters dissertation cyber security

Develop your entrepreneurial skills

Our award-winning  Westminster Enterprise Network  offers industry networking events, workshops, one-to-one business advice and support for your start-up projects.

masters dissertation cyber security

Get extra qualifications

We provide access to free online courses in Adobe and Microsoft Office applications, as well as thousands of specialist courses on LinkedIn Learning.

Fees and Funding

  • INTERNATIONAL

UK tuition fee: £10,500 (Price per academic year)

When you have enrolled with us, your annual tuition fees will remain the same throughout your studies with us. We do not increase your tuition fees each year.

Find out how we set our tuition fees .

Paying your fees

If you don't wish to pay the whole amount of your fees at once, you may be able to pay by instalments. This opportunity is available if you have a personal tuition fee liability of £2,000 or more and if you are self-funded or funded by the Student Loans Company.

Find out more about paying your fees .

Alumni discount

This course is eligible for an alumni discount. Find out if you are eligible and how to apply by visiting our Alumni discounts page .

There is a range of funding available that may help you fund your studies, including Student Finance England (SFE).

Find out more about postgraduate student funding options .

Scholarships

The University is dedicated to supporting ambitious and outstanding students and we offer a variety of scholarships to eligible postgraduate students.

Find out if you qualify for one of our scholarships .

Additional costs

See what you may need to pay for separately and  what you tuition fees cover .

International tuition fee: £17,000 (Price per academic year)

There are a number of funding schemes available to help you fund your studies with us.

Find out more about funding for international students .

Teaching and Assessment

Below you will find how learning time and assessment types are distributed on this course. The graphs below give an indication of what you can expect through approximate percentages, taken either from the experience of previous cohorts, or based on the standard module diet where historic course data is unavailable.  Changes to the division of learning time and assessment may be made in response to feedback and in accordance with our terms and conditions.

How you’ll be taught

Teaching methods across all our postgraduate courses focus on active student learning through lectures, seminars, workshops, problem-based and blended learning, and where appropriate practical application. Learning typically falls into two broad categories:

  • Scheduled hours: examples include lectures, seminars, practical classes, workshops, supervised time in a studio
  • Independent study: non-scheduled time in which students are expected to study independently. This may include preparation for scheduled sessions, dissertation/final project research, follow-up work, wider reading or practice, completion of assessment tasks, or revision

How you’ll be assessed

Our postgraduate courses include a variety of assessments, which typically fall into two broad categories:

  • Practical: examples include presentations, podcasts, blogs
  • Coursework: examples include essays, in-class tests, portfolios, dissertation

Data from the academic year 2023/24

Research groups

Our research achieves real-world impact and we are proud to claim a rich and diverse profile of high-quality research and knowledge exchange in a wide range of disciplines.

Find out more about the following research group related to this course:

Cyber Security research group

exterior of University of Westminster building

Supporting you

Our Student Hub is where you’ll find out about the services and support we offer, helping you get the best out of your time with us.

  • Study support — workshops, 1-2-1 support and online resources to help improve your academic and research skills
  • Personal tutors — support you in fulfilling your academic and personal potential
  • Student advice team — provide specialist advice on a range of issues including funding, benefits and visas
  • Extra-curricular activities — volunteering opportunities, sports and fitness activities, student events and more

Visit our student hub

masters dissertation cyber security

Course location

With state-of-the-art science and psychology labs and refurbished computer suites, our Cavendish Campus offers our science and technology students a range of learning spaces that are both dynamic and inspiring,

Located in central London, our Cavendish Campus is just a five-minute walk from Oxford Street and Tottenham Court Road.

For more details, visit our Cavendish Campus page .

Related Courses

Link to Big Data Technologies MSc

Big Data Technologies MSc

Link to Data, Culture and Society MA

Data, Culture and Society MA

Link to Data Science and Analytics MSc

Data Science and Analytics MSc

Call our dedicated team on:

+44 (0)20 7911 5000 ext 65511

Opening hours (GMT): 10am–4pm Monday to Friday

Your Westminster

Book an open day. Order a prospectus. Sign up for newsletters.

We use cookies to ensure the best experience on our website.

By accepting you agree to cookies being stored on your device.

Some of these cookies are essential to the running of the site, while others help us to improve your experience.

Functional cookies enable core functionality such as security, network management, and accessibility.

Analytics cookies help us improve our website based on user needs by collecting information, which does not directly identify anyone.

Marketing cookies send information on your visit to third parties so that they can make their advertising more relevant to you when you visit other websites.

IMAGES

  1. Dissertation Cyber Security Research Topics [Professional Writers]

    masters dissertation cyber security

  2. How to Write a Dissertation on Cybersecurity

    masters dissertation cyber security

  3. Master of Cyber Security by DTUdk

    masters dissertation cyber security

  4. Essay On Cyber Safety And Security

    masters dissertation cyber security

  5. Dissertation

    masters dissertation cyber security

  6. Research Master Thesis Cyber Security [ PhD / MS Thesis Writing Help ]

    masters dissertation cyber security

VIDEO

  1. DAY 1: writing my masters dissertation in a month! 🤍💻📖 #masters #dissertation #shorts

  2. Practical Research Work Video Part C

  3. DAY 3: writing my masters dissertation in 1 month!🤍💻📖 #uni #masters #dissertation #shorts

  4. DAY 4: writing my masters dissertation in 1 month!🤍💻📖 #masters #dissertation #uni #shorts

  5. DAY 2: writing my masters dissertation in a month! 🤍💻📖 #masters #dissertation #uni #shorts

  6. Master in Cyber Security

COMMENTS

  1. Exploring Industry Cybersecurity Strategy in ...

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Masthead Logo Link

  2. PDF Project Master Thesis

    This master thesis is a completion of masters program (MSc) in Cybersecurity management at the University of Agder (UIA). The study was conducted by and written by two master students that had several courses about critical infrastructure system (CIS) and how the different sectors deal with cybersecurity, where they found

  3. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    cybersecurity, President Barack Obama declared a "national emergency to deal with this threat" (White House 2015). This thesis will highlight the need for strong cyber protections and examine proposals for safeguarding the country. I will present the hypothesis that change in our national cyber culture is needed.

  4. Good cybersecurity thesis topics for a master's degree

    Håkon Olsen, security engineer and founder of cybersecurity firm Cybehave, weighed in on cybersecurity thesis topics in a recent forum on Quora, where he suggested tackling the subject of identity management. "Investigate how to maximize security within each user's threshold for usability impact," Olsen wrote, adding that most users don't use ...

  5. Exploring Cybersecurity Awareness and Training ...

    SETA is the combination of cybersecurity education, awareness, and training, with the intent of supporting the organization's initiatives to. 36. protect employees, and organizational information systems and data from intentional or unintentional compromise (Yoo et al., 2018).

  6. MS in Cybersecurity Thesis

    The thesis option allows students to plan, execute, and report on an individual project that addresses a substantial problem covering both practical and scientific aspects. Through the thesis project, students demonstrate their understanding of and ability to apply the concepts, methods, and techniques covered in the MS in Cybersecurity core ...

  7. Cybersecurity Master's Degree

    Secure your position in a highly sought-after field with our online Cybersecurity Master's Degree. Explore our online cybersecurity masters curriculum taught by internationally known experts. ... The 6 credits of master's thesis must span over a period of exactly 2 consecutive semesters. Whenever relevant, 3.00 credits of CS 9963 may be used as ...

  8. PDF Measuring and Creating Situational Awareness in Cybersecurity

    The objective of this master's thesis is to study the essence of measuring cybersecurity, the key elements and relevance of the metrics. Additionally, this thesis concentrates on how to visualise the metrics; what are the sources of the metrics and how to use them to build up cybersecurity posture for situational awareness.

  9. Master of Science Cybersecurity in Computer Science

    The Master of Science in Cybersecurity in Computer Science is designed to meet the fast-growing need for technical cybersecurity experts. ... Master's Thesis Advisor and Co-advisor(s): Every Master's thesis must be supervised by a faculty advisor who must be (1) a regular full-time faculty member of GW with a primary or secondary ...

  10. PDF Massachusetts Institute of Technology

    Massachusetts Institute of Technology

  11. Master thesis

    Master thesis Dealing with uncertainty: cybersecurity risk assessment approaches A qualitative research on cyber risk assessment practices in organizations Executive MSc Program Cyber Security 2019/2020 Author Kees Mastwijk Student number S2444550 Date 30 December 2020 Supervisors Dr. James Shires, Dr. Tatiana Tropina

  12. PDF MastersThesis ChristofferSjöblom AI in Cybersecurity and ...

    well as increase the efficiency of cybersecurity-related tasks. 1.2 Goal of this Thesis This thesis aims to illustrate how artificial intelligence-based systems and algorithms can advance cybersecurity and network security. The field AI is vast and not every aspect is covered in this research. The number and types of attacks

  13. Online Master's in Cybersecurity Program

    As part of this U.S News & World Report #1-ranked cybersecurity online, part-time program, you will develop the skills needed to protect the confidentiality, availability, and integrity of data, preserve and restore systems, and develop risk management skills to anticipate and avoid cyber threats.. Access to our state-of-the-art computing facilities and technologically advanced virtual ...

  14. PDF Thesis title: Contributing Factors in Building Cyber Resilience in

    This master thesis will take the following structure: Firstly, a justification for the relevancy of this research topic will be discussed, followed by the research statement and questions. Secondly, the literature on risk is overviewed to ensure a strong understanding before aspects of resilience, cyber resilience and cyber security are included.

  15. Theses and Projects

    We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects. ... Methodology and Implementation of a Cyber Security Risk Management Tool: Master: 2022. On the relationships between different Android frameworks and associated security issues ...

  16. PDF Cyber-security of Cyber-Physical Systems (CPS)

    This master's thesis reports on security of a Cyber-Physical System (CPS) in the department of industrial engineering at UiT campus Narvik. The CPS targets connecting distinctive robots in the laboratory in the department of industrial engineering. The ultimate objective of the department is to propose such a system for the industry.

  17. MSc thesis

    MSc thesis. MSc thesis on Cyber Security related topics defended at the University of Tartu: 2019: Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System" ... University of Tartu Narva mnt 18, 51009 Tartu, Estonia Phone: +(372) 737 5445 E-mail: ics@ut ...

  18. PDF 2010:050 MASTER'S THESIS Internal threat to information security

    Luleå University of Technology Master Thesis, Continuation Courses Security Department of Business Administration and Social Sciences Division of Information Systems Sciences 2010:050 - ISSN: 1653-0187 - ISRN: LTU-PB-EX--10/050--SE. ABSTRACT This thesis is based on the viewpoint that no security countermeasure is perfect, each an every one

  19. PDF CYBER SECURITY AS AN EMERGING

    CYBER SECURITY AS AN EMERGING CHALLENGE TO SOUTH AFRICAN NATIONAL SECURITY By Jordan Luke Griffiths Student Number 10345028 A mini-dissertation submitted in partial fulfilment of the requirements for the degree Master of Security Studies (MSS) in the Department of Political Sciences, Faculty of Humanities, University of Pretoria

  20. AURA: Master's theses in Cyber Security

    Tapping network traffic in Kubernetes . Ledaal, Sigbjørn Skolem (Master thesis, 2023) The rapid increase in cloud usage among organizations has led to a shift in the cybersecurity industry. Whereas before, organizations wanted traditional security monitoring using statically placed IDS sensors within their ...

  21. Cyber Security Dissertations

    Dissertations on Cyber Security. Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation. View All Dissertation Examples.

  22. 95+ Latest Cyber Security Research Topics in 2024

    95+ Latest Cyber Security Research Topics in 2024. The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cybersecurity thesis topics helps overcome attacks and take mitigation approaches to security risks and threats in real-time.

  23. UNF: Computing & Info Sciences: Cybersecurity (Non-Thesis) (Master of

    Degree: Master of Science (MS) Concentration: Cybersecurity (Non-Thesis) 2023-2024 Informational Text. The MS-CIS, Cybersecurity concentration (Non-Thesis), requires a total of 30 graduate credit hours, of which 24 credit hours must be earned through coursework. The student must enroll in the graduate Research Experience I & & II courses.

  24. MS in Cybersecurity

    Cybersecurity is a critical field that stands at the forefront of protecting our increasingly digital society. The Master of Science in Cybersecurity (MS-CYBR) program equips students with the essential skills to design, develop, manage, and secure information systems. The modern world is made up of vast data exchanges and internet-connected systems with many kinds of private and confidential ...

  25. Online Master's in Information Assurance

    For the Master of Science in Cybersecurity with Information Assurance - Cyber Operations Emphasis online, you must complete 30 total credit hours. This is comprised of 15 credit hours of required core coursework, 12 credit hours of emphasis elective courses, and 3 credit hours of your choice of completing a capstone/internship or elective ...

  26. Getting Started with Your Dissertation: Understanding the Requirements

    Firstly, clarify the goals for each stage of your dissertation, in line with the guidelines and milestones outlined by your course leader. This includes understanding the objectives for the literature review, methodology, data collection, data analysis, and the final writing and presentation phases. Each of these components should have a ...

  27. Cyber Security and Forensics MSc

    Course summary. Our Cyber Security and Forensics MSc has been designed with a high degree of relevance to the industry's needs. This course is also fully certified by the National Cyber Security Centre (NCSC), which is a sign of national excellence. Digital devices, including computers and mobile phones, play a pivotal role in our daily lives ...

  28. Amit Seal Ami

    About. Amit Seal Ami is researching Cyber Security and Software Engineering as Ph.D. Candidate at the William & Mary, co-advised by Dr. Adwait Nadkarni and Dr. Denys Poshyvanyk. Using software ...

  29. Cybersecurity

    Online. Unlock your leadership potential with USCA's Masters of Business Administration degree. At the University of South Carolina Aiken, our MBA degree equips professionals with the tools to make a worthwhile impact in business. Our 100% online program equips you with the skills, knowledge, and network to succeed as a dynamic business leader.

  30. Writing Your Dissertation Hypothesis: A Comprehensive Guide for

    Once you have formulated your hypothesis, you will design an experiment or study to test it this is the primary research phase of your dissertation. This involves choosing a research design, selecting a sample, and collecting data. 1. Choose a Research Design. Decide on a research design that suits your hypothesis.