Top 15+ Information Security Thesis Topics

Information security is nothing but safeguarding web-based information from unauthenticated network devices and users. Majorly, it is intended to provide data safety, reliability, Secrecy, trust, and accessibility for the authenticated devices/users.

For the purpose of data protection, it concentrates on special information security policies and strategies. These policies ensure to shield the data against interruption, illegal access, alteration, and revelation. In the following, we have mentioned the core processes involved in information security.

Top 10 Information Security Thesis Topics

Key Processes in Information Security

  • Protect the network information against both internal and external attacks and store them securely
  • Assure the trust and privacy for stored data
  • Validate the identity of the communication devices
  • Ensure the network information privacy and reliability
  • Assure the security over components connected in the network
  • In exiting, the attackers easily hack the network and access the system data. So, the efficient approach is needed to get back the control of attackers
  • Provide secure sophisticated platform for system design in contradiction of unpredictable services and system
  • Verify the user identity for resource accessibility through several techniques
  • For instance: Authenticate the user by personal password or pre-shared key
  • Guard the system content against sudden undesirable hackers, attacks, intruders and viruses.
  • Recognize the each and every system by their unique features
  • Manage the resource accessibility based on the authenticated user privileges along with their constrains
  • Distribute requested services only to the authenticated users  / devices
  • Block the resource or network accessibility of the illegal users/ devices

Our research guidance will best suit your needs if you’re looking for qualified expert guidance. Our experts are frequently updating their skills on current research developments in information security thesis topics . So, we are ready to support you in tackling all the research challenges. Here, we have listed out few common threats that are evolving in information security.

Different Kinds of Security Attacks

  • Abuse and delay the data which is actively driving the defective functions to perform
  • For instance: Fault injection (based on Electromagnetic, CPU Frequency and Voltage)
  • Abuse and delay the data which is passively collected and monitored from the network entities
  • Improper manipulation of fundamental features while development of TrustZone
  • For instance: device sleep mode and bug fixing methods
  • It refers the characteristics that are not properly utilized for security purpose
  • For instance: pointer based data sanitization and downgrade resilience
  • It is kind of attack that leads to data insecurity because of utilizing weak cryptographic techniques
  • For instance: digest methods and weak authentication
  • It is kind of attack that cause due to the logical errors
  • For instance: mismatch data type and ineffective data assessment
  • It is kind of attack that affect the memory of the system
  • For instance: buffer overhead, buffer underflow and buffer overflow

In this project, we have addressed the latest Information Security Thesis Topics along with their research directions!!!

What are the 3 elements of layered security?

Now, we can see the layered security in the network since the data is communicated over the network through different layers. So, it is essential to secure those layers for the privacy of transmitting data.

In specific, the layered security approach is designed to focus on overlying layers. Here, we have mentioned three main entities that are required to maintain safety for overlying layers. They are the detection layer, correction layer, and prevention layer . Further, we have specified add-on layers in the network security .

  • Penetration Analysis and Testing
  • Advanced Access Control
  • Continuous Credential Modification
  • Secure Information Backup and Storage Hardware
  • Safety of Physical Components
  • Trust based Information Privacy and Approachability
  • Biometric based Multi-factor User Identification
  • Authentication and Authorization of Network entities
  • IDS and IPS
  • Security Information And Event Management (SIEM) Software
  • Anti-malware
  • Data Backup and Recovery
  • Intrusion Prevention System (IPS)
  • Instigate Alternative Input Devices
  • Digital Forensics Security
  • Identification and Matching of Attack Signature
  • Regular Firewalls Policies Updates

Some other layers in information security can be follows,

  • Secure Data Confidentiality
  • Authenticated Key Exchange
  • Anti-Virus and Anti-Malware
  • Secure Cloud based Intelligent System
  • Improved Cryptographic Techniques
  • Network Enmities (user and device) Authentication
  • Sensed Information Security and Privacy
  • Private Key Agreement and Distribution

As the research team, our development team also works efficiently in implementing any sort of research solution despite complications . Below, they have mentioned some significant approaches that are used for modern security models modelling a novel research proposal .

Important Functions of Information Security Thesis Topics Model

  • Determine the security risk mitigation techniques
  • Continuously observe the network actions and do needed modification  for enhancing the security
  • Detect the data extortions, susceptibilities and other security related issues
  • Need to assess the risk activities that affect the data
  • What kind of process did the user do? 
  • Which strategies are followed to access the network amenities?
  • Who are the users have network data accessibility rights?
  • Select the optimum result yielding security approaches and apply them in required phase of development

In addition, our developers have also suggested other important techniques used to untie the challenging security issues like threats and vulnerabilities . Beyond this, we let you know other vital techniques based on your project needs. Also, we assure you that we will support you to the fullest till the end of the project with expected results.

  • Attack Hypothesis Testing
  • Security Mechanism Assessment
  • Perfect System Maintenance
  • Detection of Security Vulnerability
  • Attack Recognition
  • Proactive and Reactive Defences
  • Decision Making Validation
  • Persistent Retraining Models
  • Randomization
  • Enhanced Ensembles Classifier
  • Data Hiding and Encryption
  • Attack Identification
  • Adversarial Reinforcement Learning
  • Strong Machine and Deep Learning Approaches

Our experts have itemized the highest-demanding research notions in the information security field for your awareness of current Information Security Thesis Topics . More than this, we are furnished with a wide range of interesting topics to serve you in all respects.

Top 15 Information Security Thesis Topics [Research Ideas]

  • Secure Remote Healthcare Application
  • Enhancing Security using effective Access Control Strategies
  • Modelling of Reputation assisted Trust Systems  
  • De-Anonymization Approach for Secure Data Mining and Analytics
  • Intrusion Prevention and Detection System
  • Novel Computation Mechanisms for Preserving Secrecy
  • Innovative Structural design of Cybersecurity Models
  • Blockchain based Cross‐Domain Trust Assessment 
  • Artificial Intelligence-aided Trustable Inference System
  • Real-time Improved Safety Application in HetNet-IoT
  • Lightweight Multi-Factor authentication in IoT Networks
  • Secure Data Aggregation and Mining Technologies
  • New Development of Automated Security Mechanisms
  • Adaptive Anonymity Approach for System Privacy and Security
  • Trust enabled MAC and application layer protocols for Network Security
  • Secure Key Generation and Distribution in Edge-Fog computing

Then for development, we have recommended few widely used tools for information security . These tools are listed based on the specific operations involved in information security along with their unique characteristics.

Information Security Monitoring Tools

  • Argus (real-time simulation, multi-platform)
  • Snoop (0% packet loss, offer > 12 choices)
  • Ethereal (Easy to use and robustness)
  • Net2pcap (Support auditing service and Linux-oriented)
  • Tcpdump (Low interference in compare to ethereal)
  • Gulp (Very powerful and user-friendly)
  • Ngrep (Support massive data and Cross-layer)
  • Libcap (Very efficient)
  • Aimsniff (Support Linux platform)
  • IPgrab (Presentation of packet header)
  • Karski (Restricted appropriateness)
  • Nfdump (Friendly packet inspection)
  • Dsniff  (Support Unix platform)
  • Angst (Powerful and user-friendly)
  • Cain and able (user-friendly)
  • Nast ( Resourceful and provide > 12 choices)
  • Tcptrace (Powerful and Popular)
  • TCPtrack (Support linux platform and TCP study)
  • Ettercap (Competent, enable > 35 choices)
  •  Nfsen (Smooth network data flow)

Information Security Thesis Guidance

How to structure a thesis for effective writing?

When we talk about thesis writing, it is necessary to confirm the thesis format/structure. Since it only gives the first impression of the thesis before start reading the thesis by forming encapsulated information with fine-tuned alignment.

Our native writers strictly follow the pre-defined rules that help to uplift the thesis quality by knowing this importance. Basically, for all Information Security Thesis Topics , we usually follow the below chapter, which may change based on the institute’s requirement.

 Here, we have given the common information that must address in perfect thesis writing.

  • Start with the precise thesis statement which address the research objectives
  • Describe the sufficient background context for better understanding of the concept
  • Explain the detailed introduction about the research that further going to discuss in whole thesis
  • Denote the research topic in short and crisp with clear insight
  • Intelligently move on to the literature survey
  • Discuss the examined recent previous research work related to the concept
  • Figure out the merit and demerits of the exiting methodologies and algorithms
  • Pin point the research gaps that are not addressed properly
  • Perform qualitative and quantitative study
  • Use appropriate methodologies, techniques and algorithms for solving the problem
  • Address the used numerical or mathematical functions
  • Present the obtained experimental results
  • Signify the data gathered while analysing process
  • Surely address the minor and major evidence and proofs
  • Prove the research objective
  • Discuss the achieved research outcome in conclusion
  • Write overview of the research findings
  • Give the future research possibility and directions

On the whole, we are ready to give end-to-end research assistance in PhD/MS study . And, we also support you to build information security thesis topics , if you are curious about knowing other new technologies reach our expert team.

Why Work With Us ?

Senior research member, research experience, journal member, book publisher, research ethics, business ethics, valid references, explanations, paper publication, 9 big reasons to select us.

Our Editor-in-Chief has Website Ownership who control and deliver all aspects of PhD Direction to scholars and students and also keep the look to fully manage all our clients.

Our world-class certified experts have 18+years of experience in Research & Development programs (Industrial Research) who absolutely immersed as many scholars as possible in developing strong PhD research projects.

We associated with 200+reputed SCI and SCOPUS indexed journals (SJR ranking) for getting research work to be published in standard journals (Your first-choice journal).

PhDdirection.com is world’s largest book publishing platform that predominantly work subject-wise categories for scholars/students to assist their books writing and takes out into the University Library.

Our researchers provide required research ethics such as Confidentiality & Privacy, Novelty (valuable research), Plagiarism-Free, and Timely Delivery. Our customers have freedom to examine their current specific research activities.

Our organization take into consideration of customer satisfaction, online, offline support and professional works deliver since these are the actual inspiring business factors.

Solid works delivering by young qualified global research team. "References" is the key to evaluating works easier because we carefully assess scholars findings.

Detailed Videos, Readme files, Screenshots are provided for all research projects. We provide Teamviewer support and other online channels for project explanation.

Worthy journal publication is our main thing like IEEE, ACM, Springer, IET, Elsevier, etc. We substantially reduces scholars burden in publication side. We carry scholars from initial submission to final acceptance.

Related Pages

Our benefits, throughout reference, confidential agreement, research no way resale, plagiarism-free, publication guarantee, customize support, fair revisions, business professionalism, domains & tools, we generally use, wireless communication (4g lte, and 5g), ad hoc networks (vanet, manet, etc.), wireless sensor networks, software defined networks, network security, internet of things (mqtt, coap), internet of vehicles, cloud computing, fog computing, edge computing, mobile computing, mobile cloud computing, ubiquitous computing, digital image processing, medical image processing, pattern analysis and machine intelligence, geoscience and remote sensing, big data analytics, data mining, power electronics, web of things, digital forensics, natural language processing, automation systems, artificial intelligence, mininet 2.1.0, matlab (r2018b/r2019a), matlab and simulink, apache hadoop, apache spark mlib, apache mahout, apache flink, apache storm, apache cassandra, pig and hive, rapid miner, support 24/7, call us @ any time, +91 9444829042, [email protected].

Questions ?

Click here to chat with us

For enquiries call:

+1-469-442-0620

banner-in1

60+ Latest Cyber Security Research Topics for 2024

Home Blog Security 60+ Latest Cyber Security Research Topics for 2024

Play icon

The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cyber security thesis topics /ideas helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security. 

This article aims to demonstrate the most current Cyber Security Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security research questions, cyber security topics for the project, best cyber security research topics, research titles about cyber security and web security research topics.

Cyber Security Research Topics

List of Trending Cyber Security Research Topics for 2024

Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends.

A) Exciting Mobile Cyber Security Research Paper Topics

  • The significance of continuous user authentication on mobile gadgets. 
  • The efficacy of different mobile security approaches. 
  • Detecting mobile phone hacking. 
  • Assessing the threat of using portable devices to access banking services. 
  • Cybersecurity and mobile applications. 
  • The vulnerabilities in wireless mobile data exchange. 
  • The rise of mobile malware. 
  • The evolution of Android malware.
  • How to know you’ve been hacked on mobile. 
  • The impact of mobile gadgets on cybersecurity. 

B) Top Computer and Software Security Topics to Research

  • Learn algorithms for data encryption 
  • Concept of risk management security 
  • How to develop the best Internet security software 
  • What are Encrypting Viruses- How does it work? 
  • How does a Ransomware attack work? 
  • Scanning of malware on your PC 
  • Infiltrating a Mac OS X operating system 
  • What are the effects of RSA on network security ? 
  • How do encrypting viruses work?
  • DDoS attacks on IoT devices 

C) Trending Information Security Research Topics

  • Why should people avoid sharing their details on Facebook? 
  • What is the importance of unified user profiles? 
  • Discuss Cookies and Privacy  
  • White hat and black hat hackers 
  • What are the most secure methods for ensuring data integrity? 
  • Talk about the implications of Wi-Fi hacking apps on mobile phones 
  • Analyze the data breaches in 2024
  • Discuss digital piracy in 2024
  • critical cyber-attack concepts 
  • Social engineering and its importance 

D) Current Network Security Research Topics

  • Data storage centralization
  • Identify Malicious activity on a computer system. 
  • Firewall 
  • Importance of keeping updated Software  
  • wireless sensor network 
  • What are the effects of ad-hoc networks  
  • How can a company network be safe? 
  • What are Network segmentation and its applications? 
  • Discuss Data Loss Prevention systems  
  • Discuss various methods for establishing secure algorithms in a network. 
  • Talk about two-factor authentication

E) Best Data Security Research Topics

  • Importance of backup and recovery 
  • Benefits of logging for applications 
  • Understand physical data security 
  • Importance of Cloud Security 
  • In computing, the relationship between privacy and data security 
  • Talk about data leaks in mobile apps 
  • Discuss the effects of a black hole on a network system. 

F) Important Application Security Research Topics

  • Detect Malicious Activity on Google Play Apps 
  • Dangers of XSS attacks on apps 
  • Discuss SQL injection attacks. 
  • Insecure Deserialization Effect 
  • Check Security protocols 

G) Cybersecurity Law & Ethics Research Topics

  • Strict cybersecurity laws in China 
  • Importance of the Cybersecurity Information Sharing Act. 
  • USA, UK, and other countries' cybersecurity laws  
  • Discuss The Pipeline Security Act in the United States 

H) Recent Cyberbullying Topics

  • Protecting your Online Identity and Reputation 
  • Online Safety 
  • Sexual Harassment and Sexual Bullying 
  • Dealing with Bullying 
  • Stress Center for Teens 

I) Operational Security Topics

  • Identify sensitive data 
  • Identify possible threats 
  • Analyze security threats and vulnerabilities 
  • Appraise the threat level and vulnerability risk 
  • Devise a plan to mitigate the threats 

J) Cybercrime Topics for a Research Paper

  • Crime Prevention. 
  • Criminal Specialization. 
  • Drug Courts. 
  • Criminal Courts. 
  • Criminal Justice Ethics. 
  • Capital Punishment.
  • Community Corrections. 
  • Criminal Law. 

Research Area in Cyber Security

The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including: 

  • Quantum & Space  
  • Data Privacy  
  • Criminology & Law 
  • AI & IoT Security

How to Choose the Best Research Topics in Cyber Security

A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics. 

1. Brainstorm

In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible. 

2. Understanding the Background

In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it. 

3. Write a Single Topic

Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about. 

4. Be Flexible

There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out. 

The Layout of Cybersecurity Research Guidance

It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.  

In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness. 

Writing Tips from Expert

Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security Research Topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.

  • Before you begin writing your research paper, make sure you understand the assignment. 
  • Your Research Paper Should Have an Engaging Topic 
  • Find reputable sources by doing a little research 
  • Precisely state your thesis on cybersecurity 
  • A rough outline should be developed 
  • Finish your paper by writing a draft 
  • Make sure that your bibliography is formatted correctly and cites your sources. 
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!

Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.

The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.

Frequently Asked Questions (FAQs)

Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices. 

Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others. 

The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security. 

Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses? 

Profile

Mrinal Prakash

I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cyber Security Batches & Dates

Course advisor icon

University of Nebraska Omaha logo

  • Director's Welcome
  • Prospective Students
  • Faculty & Staff Directory
  • News & Events
  • Policies, Forms & Resources
  • Faculty Grievance Resources
  • BIOI Programs
  • Second BS in BIOI
  • Minor in BIOI
  • Forms & Resources
  • BMI Programs
  • CYBR Programs
  • BS CYBR Operations Track
  • Second BS in CYBR
  • Minor in CYBR
  • Online MS in CYBR
  • Graduate Certificate in CYBR
  • ITIN Programs
  • Second BS in ITIN
  • Minor in ITIN
  • Student Involvement

MS in Cybersecurity Thesis

Target students.

The thesis option allows students to plan, execute, and report on an individual project that addresses a substantial problem covering both practical and scientific aspects. Through the thesis project, students demonstrate their understanding of and ability to apply the concepts, methods, and techniques covered in the MS in Cybersecurity core and elective courses. Students planning to pursue a PhD degree after completing the MS in Cybersecurity degree are particularly encouraged to pick the thesis option.

Thesis Scope and Content

The thesis must represent an independent effort to address a significant and well-scoped problem. The thesis should present a treatment of this problem that has both practical and academic merit. Although some thesis projects may have a more practical focus and others a more academic focus, both aspects should be covered.

The thesis must be much broader in scope than a one-semester class project. It should address a topic that supersedes the content of a single course. The thesis topic can be proposed by the student. Inspiration for possible topics comes from exposure to the materials covered in the core courses and the concentrations, from current articles in vocational and academic publications, and from ongoing research projects from graduate faculty.

Degree Requirements

33 semester hours

The student is responsible for finding a Graduate Faculty Member to approve the thesis topic and agrees to supervise the thesis. Next, the student prepares a thesis proposal.

While preparing the proposal, the thesis supervisor and student form a thesis committee. The committee must be composed of three Graduate Faculty Members. Non-graduate faculty members can participate as co-chair or member of the committee. Ex-officio members (e.g., representatives from the organization where the thesis project is executed) can be included on the committee. The composition of the committee has to be approved by the MS in Cybersecurity Graduate Program Committee and the Dean for Graduate Studies.

The student can enroll in thesis hours:

  • after successfully defending the thesis proposal to the thesis committee and delivering the signed thesis proposal form to their advisor, and
  • after successfully completing 18 hours on the Plan of Study

The 6 thesis hours are expected to be taken over two semesters. However, the student's thesis supervisor can petition the Graduate Program Committee to grant registration of all 6 hours in a single semester.

Thesis Defense

The student must defend the thesis during a public oral examination by the thesis committee in the last semester of enrollment. The thesis committee may decide to:

  • pass the student, or
  • pass the student, contingent upon specified revisions, or
  • fail the student.

Graduate Program Requirements for International Students

International students should register for thesis along with other coursework, when possible. If the international student has not finished his/her thesis after two semesters (excluding summers), he/she will need to meet with his/her thesis supervisor and submit a projected date of completion form for an International Student Advisor's approval. It is recommended that the international student register for credit each semester in which he/she is working on the thesis.

UNO Graduate College - Proposed Supervisory Committee Form UNO Graduate College - Thesis Proposal Approval Form

Thesis Guide

UNO Graduate College - Guide for Preparing Theses

University of Bristol Logo

  • Help & Terms of Use

Cryptography and Information Security

  • Website http://www.bris.ac.uk/engineering/research/cryptography/

United Kingdom

Student theses

  • Title (descending)

Search results

A multi-domain approach for security compliance, insider threat modelling and risk management.

Supervisor: Tryfonas, T. (Supervisor)

Student thesis : Doctoral Thesis › Doctor of Philosophy (PhD)

Analysis of Implementations and Side-Channel Security of Frodo on Embedded Devices

Supervisor: Oswald, M. E. (Supervisor) & Stam, M. (Supervisor)

A Study of Inference-Based Attacks with Neural Network Classifiers

Supervisor: Page, D. (Supervisor) & Oswald, E. (Supervisor)

A systems approach to asset management for the Clifton Suspension Bridge Trust

Supervisor: Tryfonas, T. (Supervisor) & Taylor, C. (Supervisor)

Student thesis : Doctoral Thesis › Engineering Doctorate (EngD)

Breaking boundaries for adoption of accessible high fidelity haptic feedback technologies

Supervisor: Roudaut, A. (Supervisor) & Warinschi, B. (Supervisor)

Cryptographic Access Control: Security Models, Relations and Construction

Supervisor: Warinschi, B. (Supervisor)

Engineering a platform for local peer-to-peer electricity trading

Supervisor: Chitchyan, R. (Supervisor), Delalonde, C. (External person) (Supervisor), Byrne, A. (External person) (Supervisor), Ferguson, D. (External person) (Supervisor) & Warinschi, B. (Supervisor)

Enhancing Current Software Safety Assurance Practice to Increase System Mission Effectiveness

Supervisor: May, J. (Supervisor), Tryfonas, T. (Supervisor) & Hadley, M. J. (External person) (Supervisor)

Game theory applied to cybersecurity threat mitigation - Analysis of Threshold FlipThem

Supervisor: Leslie, D. (Supervisor) & Smart, N. (Supervisor)

Handling organisational complexity with a framework of accessible founding principles

Supervisor: Oikonomou, G. (Supervisor) & Tryfonas, T. (Supervisor)

Hydrological Applications of Multi-source Soil Moisture Products

Supervisor: Han, D. (Supervisor) & Tryfonas, T. (Supervisor)

Modelling and Simulation Applications on Cyber-Physical Systems’ Security and Resilience

Supervisor: Tryfonas, T. (Supervisor) & Oikonomou, G. (Supervisor)

On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures

Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor)

Side Channel Attacks on IoT Applications

Supervisor: Oswald, M. E. (Supervisor) & Tryfonas, T. (Supervisor)

Software Defined Networking for the Industrial Internet of Things

Supervisor: Nejabati, R. (Supervisor) & Oikonomou, G. (Supervisor)

Technology innovation for improving bridge management

Supervisor: Vardanega, P. J. (Supervisor) & Tryfonas, T. (Supervisor)

Towards Dynamic, SDN-assisted Interface Bonding for Heterogeneous 802.11 Devices

Supervisor: Doufexi, A. (Supervisor) & Oikonomou, G. (Supervisor)

Usable Abstractions for Secure Programming: A Mental Model Approach

Supervisor: Rashid, A. (Supervisor) & Warinschi, B. (Supervisor)

edugate

  • Information Security Thesis Topics

This page is all about the information regarding Information Security Thesis topics and their upcoming research areas. Information security is the mechanism of keeping both analog and digital data securely while transferring data over wired and wireless communication . Due to the tremendous growth of the digital era, the information security field spreads its footprints in all emerging research domains such as mobile computing, cryptography, networking, big data analytics, etc.

As a matter of fact, this field provides the opportunity of creating a massive number of real-time and non-real-time applications for protecting sensitive information . For instance: healthcare, social websites, banking, etc. The data privacy guaranteed techniques and algorithms used in the applications/services are needed to solve the issues related to security attacks, threats, and vulnerabilities . Now, we can see the basic functionalities that are used to achieve respectable data security.

Information Security Topics for Research Scholars

What are the operations available for information security?

  • Utilize the operative data collection, assimilation, examination and assessment techniques in terms of software and hardware
  • Dynamically observe and inspect the network for identifying security extortions
  • Prevent the threats by interpreting the behavior and effect of the security risks
  • Comprise enhanced audit functions includes for providing proactive system maintenance which include both software and hardware
  • Collect the hidden solid proofs by applying the intelligent techniques over the raw information
  • Practice of advanced user/device verification and validation approaches. And, grant the access rights only to the authenticated users. 
  • Analyze both the internal / external threats and attacks and take effective measure to prevent malicious actions

As a matter of fact, our research team has years of experience in handling information security.  Until now, we have developed an infinite number of real and non-real applications and services . So, we have sufficient knowledge of current research areas and ideas of information security . For your reference, here we have given you few widely known real-time applications.

Real-Time Applications of Information Security

  • Malware Detection : In this, it recognizes the malicious code that affect the system performance
  • Automated Forensic based Facial recognition : In this, it matches facial structure, make-up, position and the other physical features
  • Identification of Distributed Denial of Service (DDoS) : In this, it monitor the network and inspect the network behavior that block the user accessibility
  • Handwritten Character Identification : In this, it analyzes the various writing styles and font size

Next, we can see the list of open research issues that are waiting to be solved effectively. Usually, our research team has the routine Practice of updating skills in the latest developments and research issues . From this deep study, our experts have short-listed few most important research gaps for active research scholars.

Open Issues in Information Security

The main two issues that are not effectively solved in information security are as follows.

  • In heterogeneous networks, there are no effective functions used for data collection. So, it is difficult to switch and adapt network from one to another in runt-time. 
  • In the case of various kinds of networks, there is no proper background information on security. Also, the extendable security techniques are not addressed appropriately
  • Security Misconfiguration
  • Hardware Backdoor Attacks
  • Weak Cryptographic Mechanisms
  • Inappropriate User Interface and Network Topology
  • Lack of Security in Web Interface
  • Application / Firmware Vulnerabilities
  • Self-doubting Mobile Connection
  • Improper Key Agreement and Distribution
  • Insecure Plaintext Password
  • Uncertain Cloud and Network Device Connectivity
  • Restricted Data Access and Privacy
  • Ineffective Buffer Management
  • Exploitation of Command and SQL Injection
  • Lack of Physical Security
  • Constrained Authentication, Authorization and Accounting Services

Next, we can see the summary about information security thesis. By the by, it includes common security threats, requirements, and appropriate solutions . Our resource teams are thoughtful to carry over all kinds of research issues and smart enough to tackle the problems.

Overview of Information Security

  • Secure routing protocol
  • Pre-distribution of Random Key
  • Public Key Cryptography
  • Recurrent Routing
  • Intrusion Detection System (IDS)
  • Advance Access Control Scheme
  • Link / Network Layer Data Encryption
  • Check data integrity and node tamper-proof ability
  • Secure group interaction and intrusion detection system
  • Digital signature and Hash Function Implementation

Below, we have specified the most frequently asked questions regarding current information security research along with their answer. These questions will be sure to help you in knowing the current research demands of scholars

Research Questions and Answers for Information Security

  • Reveals by what means the mobile services are operated as the security options
  • Focus on issues related to security that doesn’t incorporate information systems
  • Analyze the vulnerability of the system devices and perform comparative study over different security solutions
  • Concern on reliability of system devices that address in what way the ricks are managed and control
  • Provide solution based on the methodical characteristics of mobile computing

In general, there are many methods available to tackle the research problem. Based on the selected area and topic, we have to choose the best fitting problem-solving techniques and algorithms .  In fact, the security solutions of digital information are classified as follows,

Methods for Information Security

  • Generally, it is designed to address the intruders who attempt to attack the network / system
  • However, it detects the intrusion but fails to take effective measure to prevent the intrusion
  • In fact, it is similar to the intrusion detection system (IDS) with their features
  • In addition, it incorporates prevention techniques by means of response system.
  • So, it will stop the further disturbances in service
  • Mainly, it is intended to satisfy the particular system attacks through network protocols
  • So, it flops in pointing the dynamic attacks, hackers and intruders
  • Also, it is difficult to guarantee the nonstop network operations in the time of attack.

Based on the different protocol layers, various security schemes can be followed since each layer has a unique role and functionalities to perform. So, the applied schemes will vary depends on the layer operations. For instance: below, we have given the layer and their  network security mechanisms.

  • Strategies for physical security
  • Virtual private network access control
  • Secure Socket protocol to transfer data
  • Secure MAC protocol to control the data flow
  • End-to-end encryption for secure communication

Information Security Thesis Ideas for Research Scholars

Key Research Areas of Information Security Thesis

In evolving information technologies, large-scale data management in heterogeneous networks has become a challenging process. Until now, more numbers of researches are conducted to solve this problem. Though this field has few limitations, it is widely integrated into the following cybersecurity research domains due to their security benefits.

  • Wireless Sensor Network (WSN)
  • Integration of Fog-Edge Computing
  • Wireless Satellite Communications
  • Internet of Vehicles (IoV)
  • Green Cloud Computing
  • Mobile Ad-hoc Network ( MANET )
  • 5G and Beyond 5G Communication
  • IoT based Electronics and Aerospace Systems

In addition, we have also given you some current research notions in the information security thesis field. Our experts cherry-pick these notions in all top research areas which has high demand in the research community. Once you make the bond with us, we also let you know other exciting research areas and ideas.

Best Research Ideas in Information Security Thesis

  • Innovations in Internet Security Technologies
  • Multi-Layered Security Approach for Attack Mitigation
  • Newly Emerging Attacks in Internet
  • Internet Protocol based Security Threats and Vulnerabilities
  • Intrusion Prevention and Detection Systems (IPS and IDS)
  • Information Security Resource Registration and Management
  • Enhancement of Security in Heterogeneous Networks
  • Virtual private network (VPN) based Access Control Mechanism

So far, we have discussed the information security risks and challenges along with their research areas. Now, we can see the about our information security thesis writing services . We have long-term experienced native writers to support you in preparing a perfect thesis. When you complete the thesis, you have more knowledge in the following aspects,

  • Current Information Security Risk and Vulnerability
  • Basic concepts of Information Security
  • Future Enabling Technologies in Information Security
  • Latest and Upcoming Growths of Information Security
  • Different forms of Information Security Threats and Attack
  • Hardware and Software Requirements of Information Security Projects

How to organize dissertation, thesis or research project?

Basically, the Information Security Thesis has six essential chapters. These chapters are common for all the research topics, but the institution needs the format to change. The core chapters are Introduction, Literature survey, Methodology, Results Discussion, and Conclusion. Below, we have specified an outline of each chapter.

  • Introduction – Address the thesis statement with respect to research question and objectives
  • Literature Survey – Describe the background information of the proposed research topic. In other words, how the relevant researches are handled with their advantage and drawbacks
  • Methodology – Elucidate the proposed suitable techniques and algorithms for solving the targeted research issue. 
  • Result Discussion – Debate on the obtained experimental results where you can collect the evidences / proofs for defensive purpose in future
  • Conclusion – Overall summary on research aim and findings with the proof

In order to do a flawless thesis, our technical writer team generally follow certain rules. This will surely elevate the thesis presentation and quality in many aspects. For your information, we have highlighted few vital guidelines that we follow to create the best information security thesis.

Best Tips for Information Security Thesis Writing

  • Do proper plan before start writing the thesis
  • Ensure to follow the plan and execute the plan
  • Complete the sections within the scheduled time
  • Make sure that key information are described in detail
  • After completion, Revise the thesis in all aspects for fine-tuning
  • Once satisfied submit the thesis

For the most part, we individual teams for each phase of research to support every PhD / MS study step. Our research team helps you to identify your interested area and topic with appropriate solutions . Then, our development team assists you in implementing the handpicked topic through a suitable tool practically. Next, our writing team supports you in preparing Information Security Thesis with plagiarism-free manuscript in the stipulated time. Further, if you need more details on our services, then contact us.

Related Pages

Services we offer.

Mathematical proof

Pseudo code

Conference Paper

Research Proposal

System Design

Literature Survey

Data Collection

Thesis Writing

Data Analysis

Rough Draft

Paper Collection

Code and Programs

Paper Writing

Course Work

Florida Tech Evans Library Logo

Information Assurance & Cybersecurity

  • Government Documents

Full Text Online

From other sources, from florida tech students, thesis manual and style guide for use at florida institute of technology – 3rd edition.

  • Standards and Guiding Documents
  • Writing & Citing
  • Global Electronic Thesis and Dissertation Search This link opens in a new window OPEN ACCESS. Search for theses and dissertations from universities around the world. Links to full text are provided.

Theses and dissertations not owned by the Evans Library can be borrowed through the Interlibrary Loan service in most cases.  You can search for these in the databases listed below.   Use the ‘advanced’ search and combine your selected search terms with (thesis or dissertation). 

  • ACM Digital Library This link opens in a new window Bibliographic citations from major publishers related to the field of computer science and full text of every article published by the Association for Computing Machinery (ACM).

Theses and dissertations written by students from the School of Computing are located in the book collection on the 4th floor of the Library under the Library of Congress call number QA 96.5 .

To search for them by subject, Include the word "thesis" in your Library Catalog search.  Example search: " information assurance" and thesis.

  • Library Catalog This link opens in a new window Information about the physical books, journals, government documents, and multimedia available in the Evans Library building.
  • Thesis Manual and Style Guide for Use at FIT by Florida Institute of Technology Call Number: L901 M67 2012 Publication Date: 2012
  • << Previous: Government Documents
  • Next: Standards and Guiding Documents >>
  • Last Updated: Feb 12, 2024 9:13 AM
  • URL: https://libguides.lib.fit.edu/InformationAssuranceandCybersecurity

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

Primary view of object titled 'The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective'.

PDF Version Also Available for Download.

Description

This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to … continued below

Physical Description

viii, 153 pages : illustrations (some color)

Creation Information

Hanus, Bartlomiej T. August 2014.

This dissertation is part of the collection entitled: UNT Theses and Dissertations and was provided by the UNT Libraries to the UNT Digital Library , a digital repository hosted by the UNT Libraries . It has been viewed 2873 times, with 20 in the last month. More information about this dissertation can be viewed below.

People and organizations associated with either the creation of this dissertation or its content.

  • Hanus, Bartlomiej T.
  • Windsor, John C. (John Clayton), 1946- Major Professor

Committee Members

  • Pavur, Robert J.
  • Kim, Dan J.
  • University of North Texas Publisher Info: www.unt.edu Place of Publication: Denton, Texas

Rights Holder

For guidance see Citations, Rights, Re-Use .

Provided By

Unt libraries.

The UNT Libraries serve the university and community by providing access to physical and online collections, fostering information literacy, supporting academic research, and much, much more.

Descriptive information to help identify this dissertation. Follow the links below to find similar items on the Digital Library.

Degree Information

  • Department: Department of Information Technology and Decision Sciences
  • Discipline: Business Computer Information Systems
  • Level: Doctoral
  • Name: Doctor of Philosophy
  • Grantor: University of North Texas
  • PublicationType: Doctoral Dissertation

This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by proposing and validating a universal definition of security awareness. It provides practitioners with an instrument to examine awareness in a plethora of settings and design customized security training activities.

  • information security
  • policy compliance
  • security awareness
  • threat avoidance

Library of Congress Subject Headings

  • Computer networks -- Security measures.
  • Data protection.
  • Phishing -- Case studies.
  • Thesis or Dissertation

Unique identifying numbers for this dissertation in the Digital Library or other systems.

  • Archival Resource Key : ark:/67531/metadc699974

Collections

This dissertation is part of the following collection of related materials.

UNT Theses and Dissertations

Theses and dissertations represent a wealth of scholarly and artistic content created by masters and doctoral students in the degree-seeking process. Some ETDs in this collection are restricted to use by the UNT community .

What responsibilities do I have when using this dissertation?

Digital Files

  • 162 image files available in multiple sizes
  • 1 file (.pdf)
  • Metadata API: descriptive and downloadable metadata available in other formats

Dates and time periods associated with this dissertation.

Creation Date

  • August 2014

Added to The UNT Digital Library

  • Aug. 21, 2015, 5:42 a.m.

Description Last Updated

  • March 27, 2020, 9:48 a.m.

Usage Statistics

When was this dissertation last used?

Interact With This Dissertation

Here are some suggestions for what to do next.

Search Inside

  • or search this site for other thesis or dissertations

Start Reading

  • All Formats

Citations, Rights, Re-Use

  • Citing this Dissertation
  • Responsibilities of Use
  • Licensing and Permissions
  • Linking and Embedding
  • Copies and Reproductions

International Image Interoperability Framework

IIF Logo

We support the IIIF Presentation API

Print / Share

Links for robots.

Helpful links in machine-readable formats.

Archival Resource Key (ARK)

  • ERC Record: /ark:/67531/metadc699974/?
  • Persistence Statement: /ark:/67531/metadc699974/??

International Image Interoperability Framework (IIIF)

  • IIIF Manifest: /ark:/67531/metadc699974/manifest/

Metadata Formats

  • UNTL Format: /ark:/67531/metadc699974/metadata.untl.xml
  • DC RDF: /ark:/67531/metadc699974/metadata.dc.rdf
  • DC XML: /ark:/67531/metadc699974/metadata.dc.xml
  • OAI_DC : /oai/?verb=GetRecord&metadataPrefix=oai_dc&identifier=info:ark/67531/metadc699974
  • METS : /ark:/67531/metadc699974/metadata.mets.xml
  • OpenSearch Document: /ark:/67531/metadc699974/opensearch.xml
  • Thumbnail: /ark:/67531/metadc699974/thumbnail/
  • Small Image: /ark:/67531/metadc699974/small/
  • In-text: /ark:/67531/metadc699974/urls.txt
  • Usage Stats: /stats/stats.json?ark=ark:/67531/metadc699974

Hanus, Bartlomiej T. The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective , dissertation , August 2014; Denton, Texas . ( https://digital.library.unt.edu/ark:/67531/metadc699974/ : accessed April 22, 2024 ), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu ; .

Resubmit my Information Security Thesis? — You must be joking!

  • Conference paper
  • First Online: 26 October 2007
  • Cite this conference paper

Book cover

  • Helen Armstrong 3 &
  • Louise Ynström 4  

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 237))

Included in the following conference series:

  • IFIP World Conference on Information Security Education

804 Accesses

1 Citations

This paper presents a model for use by students and supervisors embarking upon higher degrees by research with specific application to information security. The model details a set of questions to be asked in preparing for the research in order to ensure a well planned and cohesive research project and written thesis.

Please use the following format when citing this chapter : Armstrong, H., Ynström, L., 2007, in IFIP International Federation for Information Processing, Volume 237, Fifth World Conference on Information Security Education, eds. Futcher. L.. Dodge, R., (Boston: Springer), pp. 9–16.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others.

information security for thesis

Two Approaches to Information Security Doctoral Research

information security for thesis

On the modern problems and challenges of information security international scientific-practical conference

V. V. Arutyunov

On the international research-to-practice conference on modern problems and tasks of information-security assurance (SIB’2017)

  • Higher degrees by research
  • information security education
  • research supervision
  • examination of higher degrees by research

Mullins, Gerry & Kiley, Margaret, 2002, “It’s a PhD, not a Nobel Prize’: how experienced examiners assess research theses”, Studies in Higher Education, Vol 27, No. 4, pages 369–386

Article   Google Scholar  

Johnston, Sue, 1997, “Examining the Examiners: an analysis of examiners’ reports on doctoral theses”, Studies in Higher Education, Vol. 22, No. 3, pages 333–347

Holbrook Allyson, Bourke Sid, Loval Terence & Dally Kerry, 2004, “Investigating PhD thesis examination reports”, International Journal of Educational Research, Vol 41, pages 98–120

Keen, Peter G.W.: “Relevance, and Rigor in Information Systems Research: Improving Quality, Confidence, Cohesion and Impact”, in Nissen, H-E et al. (Eds) Information Systems Research: Contemporary Approaches and Emergent Traditions, Elsevier Science Publishers B.B. (North-Holland) IFIP 1991, pp 27–49

Google Scholar  

Smith, Alan Jay, “The Task of the Referee”, 0018-9162/90/0400-0065501-00, 1990 IEEE

Download references

Author information

Authors and affiliations.

School IS, Curtin University, Hayman Road, Bentley, Western Australia, Australia

Helen Armstrong

Department Computer & System Sciences, DSV, Kista, Stockholm, Sweden

Louise Ynström

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Centre of Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa

Lynn Futcher

United States Military Academy, West Point, New York, USA

Ronald Dodge

Rights and permissions

Reprints and permissions

Copyright information

© 2007 International Federation for Information Processing

About this paper

Cite this paper.

Armstrong, H., Ynström, L. (2007). Resubmit my Information Security Thesis? — You must be joking!. In: Futcher, L., Dodge, R. (eds) Fifth World Conference on Information Security Education. WISE 2007. IFIP Advances in Information and Communication Technology, vol 237. Springer, New York, NY. https://doi.org/10.1007/978-0-387-73269-5_2

Download citation

DOI : https://doi.org/10.1007/978-0-387-73269-5_2

Published : 26 October 2007

Publisher Name : Springer, New York, NY

Print ISBN : 978-0-387-73268-8

Online ISBN : 978-0-387-73269-5

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

information security for thesis

Cyber Security Hub

  • Research projects
  • PhD research

Euroopa Regionaalarengu Fond

MSc thesis on Cyber Security related topics defended at the University of Tartu :

  • Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System"
  • Mammadzada. K., "Blockchain Oracles"
  • Matsalu. M., "The Development of Digital Forensics Workforce Competency on the Example of Estonian Defence League"
  • Padur. K., "Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution"
  • Puniani. R., "Conceptualization of a Blockchain Based Voting Ecosystem in Estonia"
  • Pure. I., "An Automated Methodology for Validating Web Related Cyber Threat Intelligence by Implementing a Honeyclient"
  • Produit. B.D., "Optimization of the ROCA (CVE-2017-15361) Attack"
  • Sarapuu. D., "Penetration Testing of Glia’s Web Application"
  • Seeba. M., "A Specification of Layer-Based Information Security Management System for the Issue Tracking System"
  • Simisker. M., "Security of Health Information Databases"
  • Tõnisson. R., "Tighter Post-quantum Secure Encryption Schemes Using Semi-classical Oracles"
  • Yerokhin. M., "Multi-level Policy-aware Privacy Analysis"

See more at the thesis database .

  • Abbasi A., GDPR Implementation in an Airline’s Contact Center
  • Akande A., Disruptive Power of Blockchain on the Insurance Industry
  • Avramenko V., Cost-Benefit Analysis of a Hybrid Terrorist Attack on a Power Plant

  • Affia A-A. O., Security Risk Management of E-commerce Systems
  • Çelebi I., 
Privacy Enhanced Secure Tropos:
 A Privacy Modeling Language for GDPR Compliance
  • Cherednychenko O., Designing Visually Effective and Intuitive Modelling Notations for Security Risk Management
  • Elazazy A. A. A. A., HoneyProxy Implementation in Cloud Environment with Docker Container HoneyFarm
  • Filipczak K. M., Testing the Security Awareness using Open-Source Tools: Spear Phishing
  • Islami L., Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations
  • Jüristo K., How to Conduct Email Phishing Experiments
  • Kaasik M., A Tool for Supporting Multi-perspective System Development Through Security Risk Management
  • Kopylash V., An Ethereum-Based Real Estate Application with Tampering-Resilient Document Storage
  • Luomala M., Evaluation of Efficiency of Cybersecurity
  • Mendelman K., Fingerprint Organization Using Metadata of Public Documents
  • Mitt S., Blockchain Application - Case Study on Hyperledger Fabric
  • Mohamed G. Z. A. R., Detecting Social Spamming on Facebook Platform
  • Nugis R., Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
  • Orange A., Blockchain-based Provenance Solution for Handcrafted Jewellery
  • Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists’ Cyber Incident Reporting Skills
  • Rebane R.-M., Post-Quantum Secure Time-Stamping
  • Ristikivi A., Ensuring the Integrity of Electronic Health Records
  • Räni E., Prediction Model for tendencies in Cybercesurity
  • Sing E., A Meta-Model Driven Method for Establishing Business Process Compliance to GDPR
  • Shapaval R., Security Risk Management for the IoT systems
  • Soonberg M., The Employee-Based Information Security Risks on the Example of the Estonian Literary Museum
  • Sõgel K., Distributed Ledger Technology and External Mandatory Reporting in Banking Industry
  • Velázquez J. A. S., ''Securing openHAB Smart Home Through User Authentication and Authorization'
  • Värva I., Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application
  • Zaitsev A., Comparison of STS and ArchiMate Risk and Security Overlay
  • AbuSeada W. M. F. A., Alternative Approach to Automate Detection of DOM-XSS Vulnerabilities
  • Bascuñana G. F., Method for Effective PDF Files Manipulation Detection
  • Brodar G., Analysis of Exploit-kit Incidents and Campaigns Through a Graph Database Framework
  • Djagilev V., Android Chat Application Forensic Process Improvement & XRY Support
  • Ellervee A., A Reference Model for Blockchain-Based Distributed Ledger Technology
  • Jõgi M., Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance
  • Kinger M., Enterprise Cloud Security Guidance and Strategies for Enterprises
  • Kuldmaa A., On Secure Bulletin Boards for E-Voting
  • Lahesoo P., The Electronic Evidence Examination Reporting System by the Example of West Prefecture
  • Lashkarara S., Managing Security Risks Using Attack-Defense Trees
  • Maennel K., Improving and Measuring Learning Effectiveness at Cyber Defence Exercises
  • Nafies A., A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver
  • Sivalingapandi D., Comparison and Alignment of Access Control Models
  • Oksvort R., A Prototype for Learning Privacy-Preserving Data Publishing
  • Pappas S., Investigation of JTAG and ISP Techniques for Forensic Procedures
  • Proskurin A., Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application
  • Treier D., Research and Proof of Concept of Selected ISKE Highest Level Integrity Requirements
  • Tschida C., The Way to the Specialist and Management Level of Cyber Hygiene Initiative
  • Tsintsabadze L., A Prototype to Analyze Role- and Attribute-Based Access Control Models
  • Vallaots A., Federation of Cyber Ranges
  • Vunk M., A Framework for Assessing Organisational IT Governance Risk and Compliance
  • Allyson I. H., Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises
  • Duran S. A. U., Organizational Interaction Mechanisms Affecting Strategic Decision-Making During Cybercrime Investigations
  • Herrera V. L. C., A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
  • Martínez F. C. A., Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding and Development
  • Pantoja V. C. A., Analysis of the Cyber Attacks against ADS-B Perspective of Aviation Experts
  • Pinto R. Y. A., Development of National Cyber Security Strategies (NCSSs), and an Application of Perspective to the Colombian Case
  • Rozario V. I. D. J., Model-based Role Based Access Control for RESTful Spring applications
  • Samarütel S., Revision of Security Risk-oriented Patterns for Distributed Systems
  • Sarmiento B. S. A., Detection Solution Analysis for Simplistic Spoofing Attacks in Commercial Mini and Micro UAVs
  • Sergeev A., Role Based Access Control as SecureUML Model in Web Applications Development with Spring Security
  • Siim J., Secure and Efficient Mix-Nets
  • Siim S., A Comprehensive Protocol Suite for Secure Two-Party Computation
  • Sokk V., An Improved Type System for a Privacy-aware Programming Language and its Practical Applications
  • Suarez M. D. D., Assessment of Web-based Information Security Awareness Courses
  • Velasquez H. L. A., Colombia and the Intelligence Cycle in the 21st Century, the Digital Age
  • Guler S., Secure Bitcoin Wallet
  • Kiiver J., NFC Security Solution for Web Applications
  • Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation
  • Rao S. P. Analysis and Mitigation of Recent Attacks on Mobile Communication Backend
  • Rrenja A., Pattern Based Security Requirements Derivation with Security Risk-aware Secure Tropos
  • Tursunova S., Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks
  • Vaht M., The Analysis and Design of a Privacy-Preserving Survey System
  • AbuLamddi M., Safety and Security Dependability Analysis
  • Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes
  • Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools
  • Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis
  • Okugbeni J., Security Implementation of Mission Control System for ESTCube-1 Satellite
  • Pikma T., Auditing of Secure Multiparty Computations
  • Preobrazenskaja A., Development of Security Risk Measurement Model within Misuse Cases and BPMN
  • Teder T. Extracting Bole-based Access Control Models from Business Process Event Logs
  • Tovstukha I., Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities
  • Turban T., A Secure Multi-Party Computation Protocol Suite Inspired by Shamir’s Secret Sharing Scheme
  • Altuhhova O., Developing System Security through Business Process Modelling
  • Onchukova A., Transformation rules between MUC and MAD
  • Pankova A., Insecurity of Transformation-Based Privacy-Preserving Linear Programming
  • Pullonen P., Actively Secure Two-Party Computation: Efficient Beaver Triple Generation
  • Rebane R., A Feasibility Analysis of Secure Multiparty Computation Deployments
  • Tark K., Role Based Access Model in XML based Documents
  • Cakabey O., Role-based Access Control Using Knowledge Acquisition in Automated Specification
  • Khan N. H., A Pattern-based Development of Secure Business Processes
  • Lakk H., Model-driven Role-based Access Control for Databases
  • Soomro I. U., Alignment of Misuse Cases to ISSRM
  • Turan Y., Extension and Application of Event-driven Process Chain for Information System Security Risk Management
  • Chowdhury M. J. M., Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
  • Seeba I., Adding a transformation language to the Cryptoanalyser
  • Talviste R., Deploying secure multiparty computation for joint data analysis - a case study

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber Services #protect2024 Secure Our World Shields Up Report A Cyber Issue

Joint Guidance on Deploying AI Systems Securely

Today, the National Security Agency’s Artificial Intelligence Security Center (NSA AISC) published the joint Cybersecurity Information Sheet Deploying AI Systems Securely in collaboration with CISA, the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK).

The guidance provides best practices for deploying and operating externally developed artificial intelligence (AI) systems and aims to:

  • Improve the confidentiality, integrity, and availability of AI systems. 
  • Ensure there are appropriate mitigations for known vulnerabilities in AI systems.
  • Provide methodologies and controls to protect, detect, and respond to malicious activity against AI systems and related data and services.

CISA encourages organizations deploying and operating externally developed AI systems to review and apply this guidance as applicable. CISA also encourages organizations to review previously published joint guidance on securing AI systems: Guidelines for secure AI system development and Engaging with Artificial Intelligence . For more CISA information and guidance on securing AI systems, see cisa.gov/ai .

This product is provided subject to this  Notification  and this  Privacy & Use  policy.

Please share your thoughts

We recently updated our anonymous product survey ; we’d welcome your feedback.

Related Advisories

Cisco releases security advisories for cisco integrated management controller, cisa releases three industrial control systems advisories, oracle releases critical patch update advisory for april 2024, cisa and partners release advisory on akira ransomware.

This is a potential security issue, you are being redirected to https://csrc.nist.gov .

You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock Locked padlock icon ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Federal Cybersecurity & Privacy Professionals Forum Meeting - May 21, 2024

Banner announcing the May 21, 2024 Forum

An Agenda will be added closer to the event date. 

Any questions, please reach out to [email protected]

Registration Info

Participation in the Forum is limited to cybersecurity and privacy professionals at U.S. federal, state, and local government, and U.S. higher education organizations. Contractors supporting these organizations may register and attend if they have a .gov, .mil, or .edu email address. 

A Registration Link will be added closer to the event date. 

Registration for this event is free.

Event Details

Starts: May 21, 2024 - 09:00 AM EDT Ends: May 21, 2024 - 12:00 PM EDT

Format: Virtual Type: Forum

Attendance Type: Open to members,Government and their contractors only Audience Type: Government,Academia

Related Events

Previous: << Federal Cybersecurity & Privacy Professionals Forum Meeting - February 27, 2024

More From Forbes

How smbs can build email security awareness.

Forbes Technology Council

  • Share to Facebook
  • Share to Twitter
  • Share to Linkedin

Rom Hendler is CEO and cofounder of Trustifi , which provides a comprehensive suite of AI-powered, SaaS-based security and email encryption.

The development of an organization-wide email security awareness (SA) program is critical to decrease the vulnerability of network users, especially in the small- to medium-sized business (SMB) market.

SA is becoming more imperative in a market where threats and phishing emails have become extremely difficult to identify due to AI-based malware that's been placed in the hands of highly motivated cybercriminals. SA is an essential component of protection since human interaction with cleverly composed but infected email messages is the top activity that leads to breaches .

Building SA involves training personnel to better recognize the characteristics of phishing emails and other threats, and it should include actionable strategies to test their ability to recognize and report these attacks. SA can be a valuable tool for developing a company-wide security culture. It empowers everyone in the organization to become a more proactive, less susceptible member of the security effort.

Hackers do not discriminate between a company's size or market segment. SMBs and enterprise companies alike face a plethora of cyberattacks in today's environment. However, SMBs often face the additional challenge of having fewer financial resources and a smaller pool of in-house talent. This makes it all the more crucial for SMBs to take an active role in building email security awareness among all of their network users.

AEW Dynasty 2024 Results Winners And Grades As Swerve Makes History

A psychologist reveals 8 secret ingredients for ‘manifesting’ success, xiaomi 14 ultra review: the camera phone to beat.

An SA strategy leverages knowledge gained from technology controls while incorporating various educational training strategies to help users identify email phishing attacks, business email compromise and impostor attacks. One way to accomplish this is to take advantage of threat simulation software.

What Are Threat Simulation Tools?

Threat simulation tools allow companies to create persuasive "mock" phishing emails and attack scenarios, just like a hacker might, to be circulated to their employees as a test, but they pose no actual threat to the organization.

"A good way to get ahead of existing and emerging threats is to look at them through the lens of an attacker," Expert Insights' Caitlin Jones noted . "In mimicking the ways in which a cyber adversary might target your environments, organizations can better identify and eliminate weak points before they can be exploited."

Personnel members who click on the fake links show they have low email security awareness and can be given extra support in this area. Ideally, sophisticated tools should be embedded in an existing cybersecurity solution, allowing companies to avoid pursuing a separate (and potentially more costly) vendor for this purpose.

Steps Toward Creating A Security Awareness Program

Achieving a balance between a company's technology investments and its commitment to security activities can create a dynamic and effective companywide culture of cybersecurity. This can help lower incidents, address risk and avoid damages associated with a breach. SMBs can implement a combination of the below steps as part of their program, which incorporates some recommendations from the NIST Cybersecurity Framework 2.0 .

• Create and enable security policies, including for email usage, social media and document sharing. These could include a policy of immediately reporting any requests for credentials, wire transfers or updates of sensitive information to management—no matter how trusted the requesting source may seem.

• Establish an annual or bi-annual security training cadence with any personnel member with access to organizational data and systems.

• Deploy an AI-powered, next-generation email cybersecurity platform with multiple features, which can include encryption with tokenization capabilities, archiving modules and account takeover visibility.

• In executing phishing simulations, use customizable templates that mimic well-known IT vendors your users patronize. These might include Google Workspace, Microsoft, GoDaddy or Salesforce. An effective cybersecurity solution should include a threat simulation module for the sake of consolidation and ease of use.

• Employ real-time analytics to determine the effectiveness of these tests. Include measures that help re-educate employees who "fail" the tests on what to look for in phishing or imposter attacks.

• Conduct these simulations on a repeating basis to gauge whether departments have improved their ability to recognize threats (e.g., improvement is defined by fewer personnel members clicking on the faux phishing links). Don't overuse these techniques, however, since it may create complacency among network users who assume any questionable emails they receive are simply a test.

• Try implementing a competition within the organization, providing an incentive to the department that improves its awareness rates the most through training and attack simulation activities over time.

• Encourage employees to report suspicious emails, phone calls and text messages. Develop a comfortable and empowering environment for employees to report this suspicious activity such as an anonymous platform through which they can submit information.

• Other SA activities can include circulating cyber awareness questionnaires to select groups based on real-world testing results, holding open forum discussions or organizing an interactive workshop run by a cybersecurity subject matter expert.

Proactive Protection Through Email Security Awareness

Proactive security is not just for large organizations with big budgets and a wealth of internal talent. SMBs can also find creative ways to migrate from a solely reactive security posture to a more dynamic and cost-effective proactive model.

The incorporation of SA through threat simulation and other awareness activities is a solid path to protection. It supports an organization's physical and software-based security controls and investments, with the goal of reducing the need for IT administrators to remediate as frequently as they otherwise would.

It also gives business owners, IT administrators and CIOs an effective weapon against attacks beyond the essential cybersecurity solutions, IP filters and remediation controls. It's a squarely human approach that helps a company’s employees become more immersed in a pervasive security culture.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Rom Hendler

  • Editorial Standards
  • Reprints & Permissions

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

  • Fact Sheets

Fact Sheet: How DHS is Combating Child Exploitation and Abuse

Every day, the Department of Homeland Security (DHS) leads the fight against child exploitation and abuse. As part of the Department’s mission to combat crimes of exploitation and protect victims, we investigate these abhorrent crimes, spread awareness, collaborate with interagency and international partners, and expand our reach to ensure children are safe and protected.

DHS battles child exploitation and abuse using all available tools and resources department-wide, emphasizing its commitment in April 2023 by adding “Combat Crimes of Exploitation and Protect Victims” as its sixth core mission.

As part of the Department’s ongoing work on this mission, today DHS is announcing Know2Protect, the U.S. government’s first prevention and awareness campaign to combat online child sexual exploitation and abuse. In recognition of April’s Child Abuse Prevention Month, DHS is committed to raising awareness, preventing child exploitation and abuse, and bringing perpetrators to justice.

Between October 2022 and April 2024, DHS:

  • Expanded and unified the Department’s focus on combating cybercrimes by redesignating the HSI Cyber Crimes Center as the DHS Cyber Crimes Center to enhance coordination across all DHS agencies and offices to combat cyber-related crimes and further the Department’s mission to combat online child sexual exploitation and abuse (CSEA).
  • The Blue Campaign, now part of the DHS Center for Countering Human Trafficking, increased national partnerships from 43 in FY22 to 64 in FY23. The campaign hosted 194 national trainings on the indicators of human trafficking and how to report these crimes with over 19,000 participants from the federal government, non-governmental organizations, law enforcement, and the general public. In April 2024, Blue Campaign announced a partnership with rideshare company Lyft to train their drivers, who interact with millions of riders per year, on how to recognize and report human trafficking. Read more accomplishments in the DHS Center for Countering Human Trafficking’s FY 2023 Annual Report .
  • Identified and/or assisted 2,621 child victims of exploitation through the work of Homeland Security Investigations and made more than 6,100 arrests for crimes involving the sexual exploitation of children. Learn more in Immigration and Customs Enforcement (ICE) ’s FY2023 Annual Report .
  • Joined the Biden-Harris Administration and interagency partners to collaborate on actions to keep children and teens safe as part of the Kids Online Health and Safety Task Force and the White House Online Harassment and Abuse Task Force.
  • Tasked the Department’s external advisory bodies, including the Homeland Security Advisory Council , the Homeland Security Academic Partnership Council , and the Faith-Based Security Advisory Council , to each form a subcommittee to review DHS efforts to combat online child sexual exploitation and abuse. In the coming months, they will share their findings, which will help inform the Department’s future efforts to tackle these issues.
  • Began implementing a trauma-informed and victim and survivor-centered multidisciplinary workplan through the Joint Council on Combating Child Sexual Exploitation, established by President Biden and Australian Prime Minister Albanese. The Council, co-chaired by Secretary Alejandro N. Mayorkas, is focused on building the capacity of countries in the Indo-Pacific region to combat this crime; jointly developing policy recommendations to tackle the issue; conducting joint investigations and operations; sharing research and development efforts; preventing victimization through education and awareness campaigns; and safety-by-design.

To accomplish this work, DHS coordinates with law enforcement at home and abroad to enforce and uphold our laws, protects victims with a victim-centered approach that prioritizes respect and understanding, and works to stop this heinous crime through public education and outreach.

Enforcing Our Laws

DHS works with domestic and international partners to enforce and uphold the laws that protect children from abuse. The Department works collaboratively with the Department of Justice, the FBI, U.S Marshals, Interpol, Europol, and international law enforcement partners to arrest and prosecute perpetrators.

  • Increased U.S. government and law enforcement efforts to combat financial sextortion – a crime targeting children and teens by coercing them into sending explicit images online and extorting them for money. In the past two years HSI received 4500 sextortion tips from Cote d’Ivoire and 665 children have been identified and supported by HSI. Learn more about the crime of sextortion .
  • Helped deny more than 1,400 convicted, registered U.S. child sex offenders entry to foreign countries through travel notifications sent by the HSI Angel Watch Center. These efforts build international cooperation to ensure all countries are safe from predators.
  • Partnered with 61 regional Internet Crimes Against Children Task Forces to investigate people involved in the online victimization of children, including those who produce, receive, distribute and/or possess child sexual abuse material, or who engage in online sexual enticement of children.
  • Researched and developed modern tools and technologies that equip domestic and international law enforcement partners with advanced forensic capabilities to accomplish their mission to identify victims and apprehend child sexual abusers. For example, DHS’s Science and Technology Directorate developed the StreamView application to help law enforcement more efficiently address child exploitation cases by helping investigators aggregate, organize, and analyze investigative leads to identify the location of a crime, the victim, and bring the perpetrator to justice. Since May 2023, StreamView has led to the rescue of 68 victims, 47 arrests, eight life sentences, and dismantled eight trafficking networks having up to one million registered users.
  • The U.S. Secret Service provides forensic and technical assistance to the National Center for Missing and Exploited Children (NCMEC) and state/local law enforcement in cases involving missing and exploited children. 
  • U.S. Customs and Border Protection screens all unaccompanied children and other arriving minors for indicators of abuse or exploitation, human trafficking, and other crimes, and all suspected criminal cases are referred to HSI.

Protecting and Supporting Victims

DHS incorporates a victim-centered approach into all Department programs, policies, and operations that involve victims of crime. This effort seeks to minimize additional trauma, mitigate undue penalization, and provide needed stability and support to victims.

HSI’s “ Operation Renewed Hope ” mission in July 2023 resulted in the generation of 311 probable identifications of previously unknown victims, including 94 positive contacts and several confirmed victim rescues from active abuse due to their locations being discovered through materials uncovered during the investigations. The investigation also led to the identification of perpetrators of child sexual abuse material. HSI completed “ Operation Renewed Hope II ” in Spring 2024, which resulted in the generation of 414 probable identifications of previously unknown victims, and positive identification of 30 previously unknown child sexual abuse victims, which included 8 victims rescued from active abuse.

  • Once victims of child exploitation are identified and/or rescued, the HSI Victim Assistance Program (VAP) supports them and their non-offending caretaker(s) by using highly trained forensic interview specialists to conduct victim-centered and trauma-informed forensic interviews. In addition, VAP’s victim assistance specialists provide other resources to victims such as crisis intervention, referrals for short and long term medical and/or mental health care, and contact information for local social service programs for young victims, and agencies to assist in the healing process.
  • The Center for Countering Human Trafficking hosted its second annual virtual DHS Human Trafficking Seminar for DHS employees who are part of the Department’s mission to end human trafficking or are interested in this work. Over 900 employees from across the Department attended to learn more about DHS’s work and victim-centered approach to combating this crime.
  • HSI provides  short-term immigration protections to human trafficking victims , including victims of child sex trafficking. U.S. Citizen and Immigration Services (USCIS) provides victim-based or humanitarian-related immigration benefits to child victims of human trafficking, abuse, and neglect, including Special Immigration Juvenile (SIJ) classification, T visa, U visa, and VAWA immigrant classification.

Educating and Increasing Public Awareness

An integral part of this work is educating and expanding public awareness to help prevent this crime and hold perpetrators accountable. DHS does this important work every day.

  • Trained more than 2,000 law enforcement officials and child advocacy personnel throughout the country to enhance their counter-child exploitation tactics.
  • Educated over 186,000 kids, teens, parents, and teachers about internet safety and how to stay safe from sexual predators through the iGuardian program. DHS recently revamped Project iGuardian materials and using those materials, HSI has trained 419 special agents and completed presentations across 32 states and 8 countries. Presentations target kids aged 10 and up and their trusted guardians and focus on sharing information about the dangers of online environments, how to stay safe online, and how to report abuse and suspicious activity.
  • USSS Childhood Smart Program Ambassadors educated more than 112,000 children, parents, and teachers across 31 states and the District of Columbia about how to prevent online sexual exploitation and child abduction. The Childhood Smart Program provides age-appropriate presentations to children as young as five as well as to adults. Presentations focus on internet and personal safety as well as other topics such as social media etiquette and cyber bullying.
  • The HSI Human Rights Violations and War Crimes Center trained over 955 individuals across the interagency on female genital mutilation or cutting, a severe form of child abuse under federal law when done to individuals under the age of 18.
  • The DHS Blue Campaign Blue Lighting Initiative, part of the Center for Countering Human Trafficking, trained over 260,000 aviation personnel to identify potential traffickers and human trafficking victims and report their suspicions to law enforcement in FY 2023. The Initiative added 31 new partners this past year, raising its total partners to 136 aviation industry organizations, including its first two official international partners.
  • The Cybersecurity and Infrastructure Security Agency administers SchoolSafety.gov, an interagency website that includes information, guidance and resources on a range of school safety topics. SchoolSafety.gov houses a child exploitation section and corresponding resources to help school communities identify, prevent and respond to child exploitation. Since its launch in January 2023, the SchoolSafety.gov child exploitation section has been viewed more than 17,380 times.

What You Can Do and Resources Available

  • Project iGuardians™: Combating Child Predators
  • Childhood Smart Program
  • Visit SchoolSafety.gov for resources to help educators, school leaders, parents, and school personnel identify, prevent, and respond to child exploitation. 
  • Learn more about sextortion : it is more common than you think. 
  • Learn more from the National Center for Missing and Exploited Children .

How to report suspected online child sexual exploitation and abuse in the United States:

  • Contact your local, state, campus, or tribal law enforcement officials directly. Call 911 in an emergency.
  • If you suspect a child has been abducted or faces imminent danger, contact your local police and the NCMEC tip line at 1-800-THE-LOST (1-800-843-5678) .
  • If you suspect a child might be a victim of online sexual exploitation, call the HSI Tip Line at 1-866-347-2423 and report it to NCMEC’s CyberTipline .
  • Law Enforcement
  • Child Exploitation

Ecuador's President Noboa handily wins security-focused referendum

  • Medium Text

Ecuador holds referendum on security measures to fight violence

The Reuters Daily Briefing newsletter provides all the news you need to start your day. Sign up here.

Reporting by Alexandra Valencia in Quito; Additional reporting by Tito Correa in Quito and Yury Garcia in Guayaquil Writing by Julia Symmes Cobb and Sarah Morland Editing by Matthew Lewis and Josie Kao

Our Standards: The Thomson Reuters Trust Principles. New Tab , opens new tab

Canada's Prime Minister Justin Trudeau and Finance Minister Chrystia Freeland pose for a picture holding the 2024-25 budget in Ottawa

World Chevron

Nicaragua grants asylum to Panama's ex-President Martinelli

Panama recalls ambassador to Nicaragua for consultations

Panama recalled its ambassador to Nicaragua on Monday for consultations, citing the government's "energetic protest" against what it called the illegal protection afforded to a former Panamanian president at its embassy in Panama City.

Maldives holds presidential election

Britain said North Korea had breached multiple United Nations Security Council resolutions after it fired a ballistic missile on Monday, and called for Pyongyang to "stop such provocations" and "return to dialogue."

IMAGES

  1. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    information security for thesis

  2. Professional Information Security Thesis Writing Guidance [PhD & MS]

    information security for thesis

  3. Trending Top 15 Information Security Thesis Topics [Writing Service]

    information security for thesis

  4. Professional Information Security Thesis Writing Guidance [PhD & MS]

    information security for thesis

  5. Innovative Cyber Security Master Thesis Research Guidance [#Support]

    information security for thesis

  6. Cyber Security Thesis Ideas [ PhD

    information security for thesis

VIDEO

  1. How to (not) be Popular: The Making of a 1950's Emo (vs Hipster Punk)

  2. SENS Research Thesis Programs

  3. Software Defined Networking sdn Security Projects

  4. Security Implications of Artificial Intelligence Synthesizers

  5. Cybersecurity & the importance of IT security research: Prof. Dr. Michael Waidner

  6. Existential Security

COMMENTS

  1. Good cybersecurity thesis topics for a master's degree

    A graduate-level information security project should make a timely, original contribution to an ongoing problem or debate in the field. The best cybersecurity thesis topics will therefore explore issues of current importance to the broader infosec community, ideally with some degree of both academic and practical utility.

  2. Top 15+ Information Security Thesis Topics

    Key Processes in Information Security. Safe Storage. Protect the network information against both internal and external attacks and store them securely. Assure the trust and privacy for stored data. Protected Data Communication. Validate the identity of the communication devices. Ensure the network information privacy and reliability.

  3. PDF Managing information security in organizations

    The leader of each department uses the presentation to present information security rules in the enterprise. In this matter the employees get education before they get the document. The document is to be signed by the employee. During the case study the document was in progress of being signed by the employees.

  4. Exploring Industry Cybersecurity Strategy in Protecting Critical

    crucial, make infrastructure resiliency a priority, importance of security awareness, and importance of organizational leadership support and investment. This study revealed key strategies that may help improve cybersecurity strategies used by IT and compliance professionals, which can mitigate successful attacks against critical infrastructure ...

  5. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    This thesis will lay out the importance of connectivity in our society - from the individual user to national security and the military. I will examine the vulnerabilities, ... information, school records, Social Security numbers, to government data, the list goes on about the sensitive data stored on networks.

  6. 60+ Latest Cyber Security Research Topics for 2024

    The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cyber security thesis topics/ideas helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

  7. MS in Cybersecurity Thesis

    Through the thesis project, students demonstrate their understanding of and ability to apply the concepts, methods, and techniques covered in the MS in Cybersecurity core and elective courses. Students planning to pursue a PhD degree after completing the MS in Cybersecurity degree are particularly encouraged to pick the thesis option.

  8. Information Security Policies: A Frames of Reference Perspective

    This thesis analyzes the impact of key organizational groups' perceptions of information security policies to the implementation and use of these policies in the light of a theoretical framework ...

  9. Information Security Policy Compliance: Systematic Literature Review

    The growth of research in information technology security has enlarged in recent years. Investigations in Information security besides discussing technical problems but also consider policies, behavior and user compliance issues. ... 22 conference proceeding articles, one book section and one thesis. Compliance with information security ...

  10. PDF 2010:050 MASTER'S THESIS Internal threat to information security

    The research question in this thesis is: How information security countermeasures are perceived by employees and how they change their behavior affecting internal threat level. ... 'Information security is the protection of information and its critical elements' (Whitman & Mattord, 2008 p.4). Information confidentiality, integrity and ...

  11. Cryptography and Information Security

    A Multi-Domain Approach for Security Compliance, Insider Threat Modelling and Risk Management Author: Fagade, T., 25 Sept 2018. Supervisor: Tryfonas, T. (Supervisor) Student thesis: Doctoral Thesis › Doctor of Philosophy (PhD) File. Analysis of Implementations and Side-Channel Security of Frodo on Embedded Devices Author: Martinoli, M., 29 ...

  12. Professional Information Security Thesis Writing Guidance [PhD & MS]

    This page is all about the information regarding Information Security Thesis topics and their upcoming research areas. Information security is the mechanism of keeping both analog and digital data securely while transferring data over wired and wireless communication.Due to the tremendous growth of the digital era, the information security field spreads its footprints in all emerging research ...

  13. PDF Information Security Management Practices in Organisations

    the application of managerial security controls in pursuit of information security objectives. In this thesis, three common deficiencies are identified in ISMP oriented guidelines and models for organisations. These three deficiencies are (1) poor conceptualisation around ISMP, (2) lack ... 2.3 Information security management practices (ISMPs ...

  14. Theses & Dissertations

    Example search: "information assurance" and thesis. Library Catalog This link opens in a new window. Information about the physical books, journals, government documents, and multimedia available in the Evans Library building. Thesis Manual and Style Guide for use at Florida Institute of Technology - 3rd Edition.

  15. Information Security in the Healthcare System

    These concepts are at the core of information system security for data and services. Securing information involves preserving confidentiality, integrity and availability, the well-known CIA triad [5]. If the organization can have these three bases covered, it is highly likely that they have reliable and secure systems.

  16. The Impact of Information Security Awareness on Compliance with

    This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory.

  17. Resubmit my Information Security Thesis?

    This paper presents a model for use by students and supervisors embarking upon higher degrees by research with specific application to information security. The model details a set of questions to be asked in preparing for the research in order to ensure a well planned and cohesive research project and written thesis.

  18. (PDF) Information Security in an Organization

    Information Security in an Organization. Mohammed Mahf ouz Alhassa n a*, Alexander Adjei-Quayeb. a,b Zhejiang Normal University College of Mathematics, physics & Information Engineering, 688 tying ...

  19. PDF PROGRAMMING LANGUAGES FOR INFORMATION SECURITY

    els of computation and unrealistically idealized security policies. The existing practical security-typed languages have not been proved to guarantee security. This thesis ad-dresses these limitations in several ways. First, it establishes noninterference, a basic information-flow policy, for languages richer than those previously considered.

  20. MSc thesis

    2014: AbuLamddi M., Safety and Security Dependability Analysis Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes; Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis Okugbeni J., Security Implementation of Mission Control System ...

  21. Information Security Risks Assessment: A Case Study

    With information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. ... So, this thesis analyzes various value ...

  22. Data And Information Security In Modern Day Businesses (Thesis

    This Thesis reveals a comprehensive analysis of Data and Information Security in modern-day businesses. It covers the Meaning and Background history of Data Security, Categories of Data ... Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL: Auerbach publications.

  23. PDF 2009:046 MASTER'S THESIS Information Security Threats Against ...

    code, they must conduct some security testing, which can help to develop secure mo-bile phone services and also secure the information security factor confidentiality, in-tegrity and availability. Before reading this thesis, a person should have background knowledge in the field of

  24. NSA Publishes Guidance for Strengthening AI System Security

    FORT MEADE, Md. - The National Security Agency (NSA) is releasing a Cybersecurity Information Sheet (CSI) today, "Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems." The CSI is intended to support National Security System owners and Defense Industrial Base companies that will be deploying and operating AI systems designed and developed by an ...

  25. Joint Guidance on Deploying AI Systems Securely

    Today, the National Security Agency's Artificial Intelligence Security Center (NSA AISC) published the joint Cybersecurity Information Sheet Deploying AI Systems Securely in collaboration with CISA, the Federal Bureau of Investigation (FBI), the Australian Signals Directorate's Australian Cyber Security Centre (ASD ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand ...

  26. Blue Hacks 2024

    Blue Hacks 2024. Ateneo de Manila University. 27 Apr 2024 08:00 am - 28 Apr 2024 05:00 pm. Get ready for the ultimate coding experience! The Computer Society of the Ateneo invites all undergraduate college students nationwide to participate in Blue Hacks 2024! Develop your coding skills and brainstorm innovative ideas with your fellow developers.

  27. May 21, 2024

    An official website of the United States government Here's how you know

  28. How SMBs Can Build Email Security Awareness

    This can help lower incidents, address risk and avoid damages associated with a breach. SMBs can implement a combination of the below steps as part of their program, which incorporates some ...

  29. Fact Sheet: How DHS is Combating Child Exploitation and Abuse

    Release Date: April 17, 2024. Every day, the Department of Homeland Security (DHS) leads the fight against child exploitation and abuse. As part of the Department's mission to combat crimes of exploitation and protect victims, we investigate these abhorrent crimes, spread awareness, collaborate with interagency and international partners, and ...

  30. Ecuador's President Noboa handily wins security-focused referendum

    Ecuador's President Daniel Noboa has won significant voter support for a raft of security measures he says will help him fight sharply increased crime, a quick vote tally by the national electoral ...