University of Nebraska Omaha logo

  • Director's Welcome
  • Faculty & Staff Directory
  • News & Events
  • Policies, Forms & Resources
  • Faculty Grievance Resources
  • Applied Computing and Informatics
  • Bachelors of Science in Bioinformatics
  • Masters of Science in Biomedical Informatics
  • Minor in BIOI
  • Forms & Resources
  • Bachelor of Science in Cybersecurity
  • Master of Science in Cybersecurity
  • Minor in CYBR
  • Graduate Certificate in CYBR
  • Masters of Science in IT Innovation
  • Student Involvement

MS in Cybersecurity Thesis

Target students.

The thesis option allows students to plan, execute, and report on an individual project that addresses a substantial problem covering both practical and scientific aspects. Through the thesis project, students demonstrate their understanding of and ability to apply the concepts, methods, and techniques covered in the MS in Cybersecurity core and elective courses. Students planning to pursue a PhD degree after completing the MS in Cybersecurity degree are particularly encouraged to pick the thesis option.

Thesis Scope and Content

The thesis must represent an independent effort to address a significant and well-scoped problem. The thesis should present a treatment of this problem that has both practical and academic merit. Although some thesis projects may have a more practical focus and others a more academic focus, both aspects should be covered.

The thesis must be much broader in scope than a one-semester class project. It should address a topic that supersedes the content of a single course. The thesis topic can be proposed by the student. Inspiration for possible topics comes from exposure to the materials covered in the core courses and the concentrations, from current articles in vocational and academic publications, and from ongoing research projects from graduate faculty.

Degree Requirements

33 semester hours

The student is responsible for finding a Graduate Faculty Member to approve the thesis topic and agrees to supervise the thesis. Next, the student prepares a thesis proposal.

While preparing the proposal, the thesis supervisor and student form a thesis committee. The committee must be composed of three Graduate Faculty Members. Non-graduate faculty members can participate as co-chair or member of the committee. Ex-officio members (e.g., representatives from the organization where the thesis project is executed) can be included on the committee. The composition of the committee has to be approved by the MS in Cybersecurity Graduate Program Committee and the Dean for Graduate Studies.

The student can enroll in thesis hours:

  • after successfully defending the thesis proposal to the thesis committee and delivering the signed thesis proposal form to their advisor, and
  • after successfully completing 18 hours on the Plan of Study

The 6 thesis hours are expected to be taken over two semesters. However, the student's thesis supervisor can petition the Graduate Program Committee to grant registration of all 6 hours in a single semester.

Thesis Defense

The student must defend the thesis during a public oral examination by the thesis committee in the last semester of enrollment. The thesis committee may decide to:

  • pass the student, or
  • pass the student, contingent upon specified revisions, or
  • fail the student.

Graduate Program Requirements for International Students

International students should register for thesis along with other coursework, when possible. If the international student has not finished his/her thesis after two semesters (excluding summers), he/she will need to meet with his/her thesis supervisor and submit a projected date of completion form for an International Student Advisor's approval. It is recommended that the international student register for credit each semester in which he/she is working on the thesis.

UNO Graduate College - Proposed Supervisory Committee Form UNO Graduate College - Thesis Proposal Approval Form

Thesis Guide

UNO Graduate College - Guide for Preparing Theses

  • Press Enter to activate screen reader mode.

Department of Computer Science

Semester and master's thesis projects.

The Semester Project and the Master's Thesis are mandatory courses of the Master's programme in Cyber Security. They have to be supervised by a professor of the cyber security faculty list .

Semester Project

Before starting, the project must be registered and a project description must be uploaded via myStudies.

Master's Thesis

The Master's Thesis requires 6 months of full time study/work, and we strongly discourage you from attending any courses in parallel. We recommend that you acquire all course credits before the start of the Master’s Thesis.  

Before starting the Master’s Thesis, it is important to agree with your supervisor on the task and the assessment scheme. Both have to be documented thoroughly. You electronically register the Master’s Thesis in myStudies.

Further details on internal regulations of the Master’s Thesis can be downloaded from the following website: www.inf.ethz.ch/studies/forms-and-documents.html .

Information Security Group

  • Prof. Dr. David Basin

System Security Group

  • Prof. Dr. Srdjan Capkun

Applied Cryptography Group

  • Prof. Dr. Kenny Paterson

Network Security Group

  • Prof. Dr. Adrian Perrig

Secure & Trustworthy Systems Group

  • Prof. Dr. Shweta Shinde

Secure and Private AI (SPY) Lab

  • external page Prof. Dr. Florian Tramèr call_made

Information Security and Cryptography Research Group

  • Prof. Dr. Ueli Maurer

Foundations of Cryptography Group

  • Prof. Dr. Dennis Hofheinz

Computer Security Group

  • Prof. Dr. Kaveh Razavi

cyber security master thesis

Cyber Security Hub

  • Research projects
  • PhD research

Euroopa Regionaalarengu Fond

MSc thesis on Cyber Security related topics defended at the University of Tartu :

  • Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System"
  • Mammadzada. K., "Blockchain Oracles"
  • Matsalu. M., "The Development of Digital Forensics Workforce Competency on the Example of Estonian Defence League"
  • Padur. K., "Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution"
  • Puniani. R., "Conceptualization of a Blockchain Based Voting Ecosystem in Estonia"
  • Pure. I., "An Automated Methodology for Validating Web Related Cyber Threat Intelligence by Implementing a Honeyclient"
  • Produit. B.D., "Optimization of the ROCA (CVE-2017-15361) Attack"
  • Sarapuu. D., "Penetration Testing of Glia’s Web Application"
  • Seeba. M., "A Specification of Layer-Based Information Security Management System for the Issue Tracking System"
  • Simisker. M., "Security of Health Information Databases"
  • Tõnisson. R., "Tighter Post-quantum Secure Encryption Schemes Using Semi-classical Oracles"
  • Yerokhin. M., "Multi-level Policy-aware Privacy Analysis"

See more at the thesis database .

  • Abbasi A., GDPR Implementation in an Airline’s Contact Center
  • Akande A., Disruptive Power of Blockchain on the Insurance Industry
  • Avramenko V., Cost-Benefit Analysis of a Hybrid Terrorist Attack on a Power Plant

  • Affia A-A. O., Security Risk Management of E-commerce Systems
  • Çelebi I., 
Privacy Enhanced Secure Tropos:
 A Privacy Modeling Language for GDPR Compliance
  • Cherednychenko O., Designing Visually Effective and Intuitive Modelling Notations for Security Risk Management
  • Elazazy A. A. A. A., HoneyProxy Implementation in Cloud Environment with Docker Container HoneyFarm
  • Filipczak K. M., Testing the Security Awareness using Open-Source Tools: Spear Phishing
  • Islami L., Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations
  • Jüristo K., How to Conduct Email Phishing Experiments
  • Kaasik M., A Tool for Supporting Multi-perspective System Development Through Security Risk Management
  • Kopylash V., An Ethereum-Based Real Estate Application with Tampering-Resilient Document Storage
  • Luomala M., Evaluation of Efficiency of Cybersecurity
  • Mendelman K., Fingerprint Organization Using Metadata of Public Documents
  • Mitt S., Blockchain Application - Case Study on Hyperledger Fabric
  • Mohamed G. Z. A. R., Detecting Social Spamming on Facebook Platform
  • Nugis R., Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
  • Orange A., Blockchain-based Provenance Solution for Handcrafted Jewellery
  • Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists’ Cyber Incident Reporting Skills
  • Rebane R.-M., Post-Quantum Secure Time-Stamping
  • Ristikivi A., Ensuring the Integrity of Electronic Health Records
  • Räni E., Prediction Model for tendencies in Cybercesurity
  • Sing E., A Meta-Model Driven Method for Establishing Business Process Compliance to GDPR
  • Shapaval R., Security Risk Management for the IoT systems
  • Soonberg M., The Employee-Based Information Security Risks on the Example of the Estonian Literary Museum
  • Sõgel K., Distributed Ledger Technology and External Mandatory Reporting in Banking Industry
  • Velázquez J. A. S., ''Securing openHAB Smart Home Through User Authentication and Authorization'
  • Värva I., Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application
  • Zaitsev A., Comparison of STS and ArchiMate Risk and Security Overlay
  • AbuSeada W. M. F. A., Alternative Approach to Automate Detection of DOM-XSS Vulnerabilities
  • Bascuñana G. F., Method for Effective PDF Files Manipulation Detection
  • Brodar G., Analysis of Exploit-kit Incidents and Campaigns Through a Graph Database Framework
  • Djagilev V., Android Chat Application Forensic Process Improvement & XRY Support
  • Ellervee A., A Reference Model for Blockchain-Based Distributed Ledger Technology
  • Jõgi M., Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance
  • Kinger M., Enterprise Cloud Security Guidance and Strategies for Enterprises
  • Kuldmaa A., On Secure Bulletin Boards for E-Voting
  • Lahesoo P., The Electronic Evidence Examination Reporting System by the Example of West Prefecture
  • Lashkarara S., Managing Security Risks Using Attack-Defense Trees
  • Maennel K., Improving and Measuring Learning Effectiveness at Cyber Defence Exercises
  • Nafies A., A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver
  • Sivalingapandi D., Comparison and Alignment of Access Control Models
  • Oksvort R., A Prototype for Learning Privacy-Preserving Data Publishing
  • Pappas S., Investigation of JTAG and ISP Techniques for Forensic Procedures
  • Proskurin A., Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application
  • Treier D., Research and Proof of Concept of Selected ISKE Highest Level Integrity Requirements
  • Tschida C., The Way to the Specialist and Management Level of Cyber Hygiene Initiative
  • Tsintsabadze L., A Prototype to Analyze Role- and Attribute-Based Access Control Models
  • Vallaots A., Federation of Cyber Ranges
  • Vunk M., A Framework for Assessing Organisational IT Governance Risk and Compliance
  • Allyson I. H., Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises
  • Duran S. A. U., Organizational Interaction Mechanisms Affecting Strategic Decision-Making During Cybercrime Investigations
  • Herrera V. L. C., A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
  • Martínez F. C. A., Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding and Development
  • Pantoja V. C. A., Analysis of the Cyber Attacks against ADS-B Perspective of Aviation Experts
  • Pinto R. Y. A., Development of National Cyber Security Strategies (NCSSs), and an Application of Perspective to the Colombian Case
  • Rozario V. I. D. J., Model-based Role Based Access Control for RESTful Spring applications
  • Samarütel S., Revision of Security Risk-oriented Patterns for Distributed Systems
  • Sarmiento B. S. A., Detection Solution Analysis for Simplistic Spoofing Attacks in Commercial Mini and Micro UAVs
  • Sergeev A., Role Based Access Control as SecureUML Model in Web Applications Development with Spring Security
  • Siim J., Secure and Efficient Mix-Nets
  • Siim S., A Comprehensive Protocol Suite for Secure Two-Party Computation
  • Sokk V., An Improved Type System for a Privacy-aware Programming Language and its Practical Applications
  • Suarez M. D. D., Assessment of Web-based Information Security Awareness Courses
  • Velasquez H. L. A., Colombia and the Intelligence Cycle in the 21st Century, the Digital Age
  • Guler S., Secure Bitcoin Wallet
  • Kiiver J., NFC Security Solution for Web Applications
  • Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation
  • Rao S. P. Analysis and Mitigation of Recent Attacks on Mobile Communication Backend
  • Rrenja A., Pattern Based Security Requirements Derivation with Security Risk-aware Secure Tropos
  • Tursunova S., Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks
  • Vaht M., The Analysis and Design of a Privacy-Preserving Survey System
  • AbuLamddi M., Safety and Security Dependability Analysis
  • Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes
  • Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools
  • Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis
  • Okugbeni J., Security Implementation of Mission Control System for ESTCube-1 Satellite
  • Pikma T., Auditing of Secure Multiparty Computations
  • Preobrazenskaja A., Development of Security Risk Measurement Model within Misuse Cases and BPMN
  • Teder T. Extracting Bole-based Access Control Models from Business Process Event Logs
  • Tovstukha I., Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities
  • Turban T., A Secure Multi-Party Computation Protocol Suite Inspired by Shamir’s Secret Sharing Scheme
  • Altuhhova O., Developing System Security through Business Process Modelling
  • Onchukova A., Transformation rules between MUC and MAD
  • Pankova A., Insecurity of Transformation-Based Privacy-Preserving Linear Programming
  • Pullonen P., Actively Secure Two-Party Computation: Efficient Beaver Triple Generation
  • Rebane R., A Feasibility Analysis of Secure Multiparty Computation Deployments
  • Tark K., Role Based Access Model in XML based Documents
  • Cakabey O., Role-based Access Control Using Knowledge Acquisition in Automated Specification
  • Khan N. H., A Pattern-based Development of Secure Business Processes
  • Lakk H., Model-driven Role-based Access Control for Databases
  • Soomro I. U., Alignment of Misuse Cases to ISSRM
  • Turan Y., Extension and Application of Event-driven Process Chain for Information System Security Risk Management
  • Chowdhury M. J. M., Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
  • Seeba I., Adding a transformation language to the Cryptoanalyser
  • Talviste R., Deploying secure multiparty computation for joint data analysis - a case study

Google Custom Search

Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.

Hinweise zum Einsatz der Google Suche

Technical University of Munich

  • Professorship of Cyber Trust
  • TUM School of Computation, Information and Technology
  • Technical University of Munich

Technical University of Munich

Teaching at the Professorship of Cyber Trust

Theses and student projects.

We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.

Application

Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.

Open Student Projects

This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.

Assigned Student Projects

Completed student projects.

  • Request Info
  • Check Status

Cybersecurity Science Master's Degree

Master's Program

The Master of Science in Cybersecurity Science offers a rigorous curriculum designed to empower you with knowledge and skills that employers are looking for in cybersecurity professionals.

Start Your Bold Future

By submitting this form, I agree that UTSA may contact me by email, voice, pre-recorded message and/or text message using automated technology.

Please enable javascript in your browser

Cybersecurity student works on computers in lab

Why Pursue a Master's Degree in Cybersecurity

With a strong emphasis on technical aspects and practical skills in cybersecurity, cyber operations, and computer science, this master’s program provides state-of-the-art labs and infrastructure for cybersecurity related research and education. Program graduates have been very successful in obtaining computing and cybersecurity related industry and academic jobs.

This master’s program offers excellent opportunities for conducting research in a variety of cybersecurity and computing disciplines, including:

  • Bioinformatics
  • Cloud Computing
  • Computer Architecture
  • Computer Networks
  • Data Science
  • High Performance
  • Operating Systems
  • Human-Computer Interaction and Virtual Reality
  • Machine Learning and Computer Vision
  • Parallel and Distributed Systems
  • Software Engineering

cyber security master thesis

  • Admission Requirements

Application Deadlines

Funding opportunities, career options, admission & application requirements.

Applications are submitted through the UTSA Graduate Application . Please upload all required documents (listed below) on your UTSA Graduate Application. It is the applicant’s responsibility to ensure completion and submission of the application, a nonrefundable application fee, and all required supporting documents are on file with UTSA by the appropriate application deadline.

Applicants are encouraged to have their admission file completed as early as possible. All applications, required documents and letters of recommendation, if applicable, must be submitted by 5:00 PM U.S. Central Time on the day of the deadline. Deadlines are subject to change.

UTSA prepares you for future careers that are in demand. The possible careers below is data pulled by a third-party tool called Emsi, which pulls information from sources like the U.S. Bureau of Labor Statistics, U.S. Census Bureau, online job postings, other government databases and more to give you regional and national career outlook related to this academic program.

Conditional Admission Requirements

The Master of Science in Cybersecurity Science admission requires the rough equivalent of a Bachelor’s undergraduate degree majoring in computer science or related majors is required.

Students who do not qualify for unconditional admission may be admitted on a conditional basis. Students who are admitted on a conditional basis may be required to complete specific undergraduate (or bridge) courses as conditions offer admission. If such courses are listed as deficiencies, they will not count toward the graduate degree. In such cases, students should anticipate that additional time will be required to complete the degree.

The following UTSA undergraduate courses or their equivalents are required of all prospective graduate students:

  • CS 1083 – Programming I for Computer Scientists
  • CS 1713, 1711 – Introduction to Computer Programming II and Recitation
  • CS 2123, 2121 – Data Structures and Recitation
  • CS 2233 – Discrete Mathematical Structures
  • CS 3333 – Mathematical Foundations of Computer Science
  • CS 3343 – Analysis of Algorithms
  • CS 3423, 3421 – Systems Programming and Recitation
  • CS 3443 – Application Programming
  • CS 3723 – Programming Languages
  • CS 3733 – Operating Systems
  • CS 3843, 3841 – Computer Organization and Recitation
  • CS 3873 – Computer Networking (or equivalent networking course/experience
  • CS 3853 – Computer Architecture
  • MAT 1214 – Calculus I  (The student who is not prepared for MAT 1214 must take MAT 1093 Precalculus.)
  • MAT 1224 – Calculus II

Detailed course descriptions are provided on the Undergraduate Catalog:  www.utsa.edu/ucat/

The courses MAT 1214 and 1224 are standard calculus courses for mathematics and engineering majors. CS 1063 is a Java-based introductory programming course. CS 1713 is a C-based  introductory programming course. CS 2123 is a C-based introductory data structures course. CS 2233 covers logic, automata, Boolean algebra, and various mathematically oriented topics. CS 3333 covers introductory probability and statistics. CS 3423 has a C/Unix emphasis. CS 3443 is a Java-based advanced programming course. CS 3843  covers assembler programming as well as various topics from computer systems organization.

A conditional admission to the graduate program will include a list of course deficiencies, based on the above minimal background course list, and possibly grade conditions based on the student’s grades in undergraduate course work. In case a student is denied even conditional admission, he or she may apply for and be admitted as a  special undergraduate student . Such a student may take undergraduate courses, or a graduate course with permission from the graduate advisor and the course instructor.

MS Program Guidelines

The guidelines listed here are meant to supplement the Master’s Degree Regulations and Graduate Program Requirements listed in the UTSA Graduate Catalog and to assist admitted students in meeting the requirements of the program. All general requirements listed in the catalog must be satisfied in addition to the requirements listed here which are specific to the Master of Science Degree in Cybersecurity Science. It is the student’s responsibility to know and satisfy all relevant requirements.

STEPS TOWARDS GRADUATION

  • Be admitted to the program as a degree seeking graduate student
  • Remove conditions of admission
  • Select an academic advisor
  • Establish an M.S. Supervisory Committee
  • Have an approved Program of Study
  • Complete 30 hours of courses (12 core + 18 elective)
  • Apply for the degree. From the graduate catalog … “It is the student’s responsibility to apply officially for his or her degree at the Office of Admissions and Registrar no later than October 1 for the Fall Semester, February 1 for the Spring Semester, or June 15 for the Summer Session.”

STEPS TO TAKE AT EACH SEMESTER

  • Decide on the courses you would like to take.
  • Update your 2-year plan or follow your approved Program of Study.
  • Update your Plan for Removal of Conditions if you still have conditions which have not been satisfied.
  • Meet with your advisor to discuss your progress. (This may be done electronically.)

THE TWO-YEAR PLAN

Each student, in consultation with the student’s advisor must develop a two-year plan of study which includes courses that the student plans to take during each semester for the next two years. This plan will be revised each semester and contain as much detail as possible. The plan will be kept in the student’s permanent file. Each student who is admitted with conditions must, in consultation with the student’s advisor, formulate a plan for removing these conditions by the end of the first year. The plan must be updated at the beginning of each semester in which the student is enrolled. The plan will contain a list of all conditions not yet fulfilled and for each condition a method and time frame for removing that condition. The plan will be signed by the student and the student’s advisor and reviewed by the Graduate Advisor of Record. Conditions are not officially removed until the Graduate Studies Committee has reviewed the student’s record and certifies that all conditions have been met.

For full-time students this plan will contain a complete tentative Program of Study. It is recommended that the student use the Program of Study form and Computer Science approval form as templates since the two-year plan will evolve into the student’s Program of Study. The following information is included on these forms:

  • Name of student and advisor
  • List of graduate courses already completed which will be applied toward the degree
  • Catalog of graduation
  • Admission conditions satisfied?
  • Program of Study approved?
  • Option chosen: thesis or non-thesis?
  • M.S. Supervisory Committee approved?
  • Comprehensive examination completed?
  • A list of courses/credits (by semester) planned to be taken/earned over the next 2 years
  • Date and signatures of the student and advisor

THE ADVISOR AND SUPERVISORY COMMITTEE

Upon the admission into the program, each student is assigned a faculty member as the student’s academic advisor who will guide the student through the program. The student must (at least electronically) contact with the advisor each semester to discuss the progress towards the completion of the degree program.

Each student must have an M.S. Supervisory Committee, which will provide any necessary direction to the student as well as be responsible for approving the Program of Study and administering the final oral examination. The student’s academic advisor serves as the chair of this committee. In conjunction with this advisor, the student must invite at least two other graduate faculty members to serve as M.S. Supervisory Committee members. To establish the committee, the student must fill out the form Recommendation for Appointment of Supervisory Committee for Master’s Degree Candidate.

A students may change the academic advisor at any time by filling out the  Change of Advisor Form , which is also available in the Department Office. The student is encouraged to change the advisor if the student finds a graduate faculty member whose research interests have a better match with his/her own. If a student is supported on a research project, the faculty mentor would normally be the student’s advisor.

GRADUATE STUDIES COMMITTEE

The Graduate Studies Committee is in charge of the operation of the program. Responsibilities of the committee include the following.

  • Review of applications for admission to the masters program
  • Approval of Programs of Studies and changes
  • Certification of removal of conditions of admission
  • Review of graduate student progress
  • Approval of M.S. Supervisory Committees
  • Assignment of graduate advisors
  • Approval of student petitions to deviate from the usual requirements including:
  • Undergraduate courses taken for graduate credit (very rare);
  • Graduate courses taken from another discipline at UTSA (rare);
  • Transfer of graduate credit from another institution;
  • Approval of outdated UTSA credits earned prior to six years immediately preceding the date the degree is awarded.

Program of Study

The student in consultation with his/her advisor must complete a Program of Study consisting of at least 30 semester hours of graduate work including at least 8 formal graduate courses which will be applied to the degree.The student must submit a Program of Study prior to the completion of 18 semester hours of graduate work that will be applied to the degree. The Program of Study specifies the courses and options chosen by the student, indicates which catalog the student will be graduating under, and must be approved by the student’s M.S. Supervisory Committee and the Graduate Studies Committee. The Program of Study cannot be submitted to the Office of the Associate Dean of Academic Affairs for approval if there are unsatisfied admission conditions.

The form Program of Study for the Master’s Degree should be submitted by the student. This form must be accompanied by the “Approval Form for Computer Science Program of Study” which is available from the Department Office.

A.  Core Courses  (6 hours)

CS 5323 – Principles of Cyber Security CS 5713 – Practical Attack and Defense Techniques

B.  Required Computer Science courses  Students must complete at least 6 credit hours of Computer Science graduate courses from the list below.

CS 5233 – Artificial Intelligence CS 5363 – Programming Languages and Compilers CS 5443 – Database Management Systems CS 5513 – Computer Architecture CS 5523 – Operating Systems CS 5573 – Cloud Computing CS 5633 – Analysis of Algorithms CS 6423 – Machine Learning CS 6543 – Networks

C.  Required Electives  Students must complete 6 credit hours from the elective courses listed below.

CS 5343 – Developing Secure Systems and Software CS 6353 – Unix and Network Security CS 6373 – Applied Cryptography

D.  Other Electives  Students must complete at least 6 credit hours from the elective courses listed below.

CS 5723 – Crypto Currencies and Bitcoins CS 6323 – Cybersecurity Models and Systems CS 6333 – Cybersecurity Data Analytics CS 6343 – Cyber Risk Management CS 5733 – Privacy Enhancing Techniques CS 5943 – Internship in Cyber Security IS 6363 – Computer Forensics

*Detailed course descriptions will be provided in the 2020-2022 Graduate Catalog ( not yet published by UTSA. Check back later for updated course listings and descriptions.)

Thesis & Non-Thesis Options

The thesis option.

Requirements of this option include:

  • Choose a thesis topic and write a thesis proposal
  • Have thesis proposal approved by M.S. Supervisory Committee
  • Complete 6 hours of thesis
  • Successfully defend the thesis
  • Formally submit the thesis to the university

Students who intend to write an M.S. thesis should develop a thesis proposal in conjunction with their advisor that outlines the topics, scope, and objectives of the proposed thesis. The thesis topic will normally be in a common interest area to both the student and the advisor. The thesis proposal should be discussed with and approved by the student’s M.S. Supervisory Committee before the student begins the research and writing of the thesis. A signed copy of the proposal must be placed in the student’s permanent file prior to registering for CS6983 Master’s Thesis. Please note that the Thesis Director and Thesis Committee referred to in the UTSA Graduate Catalog are the student’s advisor and M.S. Supervisory Committee, respectively, in these guidelines. The student may apply up to a maximum of 6 hours of CS 6983 Master’s Thesis toward the master’s degree. Under the thesis option, the student can also apply up to 6 hours of CS5971-6 Directed Research and/or CS 6953 Independent Study (normally in the same area of the thesis research) in the required course work. The total number of credit hours on research courses (including CS5971-6, CS6953, and CS6983) is limited to 6.

THE NON-THESIS OPTION I

  • Choose a project topic and write a project proposal
  • Have project proposal approved by M.S. Supervisory Committee
  • Complete 6 hours of directed research, independent study, or classroom-taught courses
  • Successfully defend project
  • Submit project output to the Department

Students who choose the non-thesis option must either complete a project or complete a program of course work. The option I may involve a project of a large programming or hardware development effort which is usually done over two semesters and includes a report or user’s manual submitted as a UTSA CS Technical Report. Alternatively, Option I may involve producing a research paper or technical report which is to be submitted for publication with at least the student and advisor as co-authors. The project topic will normally be in a common interest area to both student and advisor. The project should be discussed with and approved by the student’s M.S. Supervisory Committee before the student begins work associated with the project. A signed copy of the proposal must be placed in the student’s permanent file. The student may apply up to a maximum of 6 hours of CS5973 Directed Research toward the master’s degree. Under the non-thesis option I, the student will typically not apply any hours of CS6983 Master’s Thesis toward the master’s degree. Note that this is automatic since the only way to get a grade in CS6983 Master’s Thesis is to complete a thesis. In addition, although the student may apply hours of CS 6953 Independent Study towards the M.S. degree under this option, the total number of hours of CS 6953 and CS 5973 is limited to 6 hours.

THE NON-THESIS OPTION II

  • Complete additional 6 hours of graduate coursework from the courses listed in D.
  • Choose a topic and a list of (typically 3) papers on the topic
  • Have topic and papers approved by the M.S. Supervisory Committee
  • Give an oral presentation followed by an oral examination

This option requires that the student select a topic, read a list of papers in this topic, which were not discussed in any of the student’s courses, and do a formal oral presentation as an open seminar. The topic and list of papers should be discussed with and approved by the student’s M.S. Supervisory Committee before the student begins reading the papers and preparing a presentation. A signed copy of the topic and list of papers must be placed in the student’s permanent file. Under the non-thesis option II, the student will typically not apply any hours of CS5943 Internship in Cyber Security, CS5973 Directed Research, CS6983 Master’s Thesis, or CS6953 Independent Study toward the master’s degree.

THE COMPREHENSIVE EXAMINATION

The university-wide comprehensive examination requirement is satisfied by computer science students by either the oral thesis defense or the oral examination taken as part of the non-thesis option. In all the cases, the student will make a formal public presentation followed by an oral examination. Please note that University policy requires students to have completed all conditions of admission before taking the comprehensive examination. The student must register for CS6961 Comprehensive Examination if no other course is taken in the student’s final semester. The Comprehensive Examination is conducted by the student’s M.S. Supervisory Committee. The format of the oral examination will consist of an open presentation of the student’s thesis, project, or topic/papers followed by a closed period of questioning based on the content of the presentation and the student’s proposed Program of Study.

Course Offerings & Schedule

Faculty offices and research labs for Computer Science are located both on the Main Campus and Downtown Campus (San Pedro I building). Graduate courses are held in San Pedro I. Courses are scheduled in late afternoons and evenings, accommodating part-time students very well.

cyber security master thesis

Graduate Advisor of Record

Murtuza Jadliwala, PhD

(210) 458-5693

The Cyber Security M.S. program (Thesis option) is currently offered only as an online program.

Learning Outcomes

Graduates from the Master of Science program in cyber security will:

  • Possess a comprehensive understanding of the foundational concepts of cyber security.
  • Obtain and refine the skills necessary to improve an organization’s cyber security posture.
  • Apply theoretical concepts to the practice of cyber security.
  • Demonstrate professional skills and behavior.

Requirements for admission to the Graduate School, including English language proficiency, may be found in the Admission    section of this Bulletin . In addition, the following requirements must be met:

  • An undergraduate GPA of 3.0 or higher;
  • At least nine hours of mathematics and statistics at the level of calculus and above, and
  • An acceptable score on the Graduate Record Exam (GRE).

Upon the recommendation of the Graduate Dean, students who fail to meet the above requirements may be admitted conditionally pending removal of deficiencies.

Admission to the Master of Science program in cyber security requires a satisfactory score on the Graduate Record Exam (GRE) obtained within the five years preceding initial enrollment. A satisfactory score on the Graduate Management Admission Test (GMAT) or Law School Admission Test (LSAT) may be substituted, but the GRE is preferred.

The GRE requirement may be waived under certain conditions, as indicated below:

  • The requirement is automatically waived for all applicants that have already completed a master, doctoral, or law degree at an approved university.
  • Applicants who have taken the GMAT, GRE, or LSAT within five years of the date of initial enrollment may submit their score(s) for consideration as evidence of having met the requirement.
  • Applicants with three or more years’ work experience in cyber security or information technology roles.
  • Applicants with five or more years work experience in other fields who can document achievement through other means such as patents, professional licensures and certifications, refereed publications in industry-specific journals, expert testimony, company technical reports/analyses, or other documented evidence of career advancement and developing expertise.
  • Applicants holding any of these certifications   .

The following additional conditions apply:

  • It is the responsibility of the applicant to request the waiver.
  • Petitions must be accompanied by all required documentation.
  • The waiver petition form must be submitted no later than four weeks prior to the start of the semester in which the applicant intends to first enroll in the program.
  • The waiver petition, along with all required documentation, must be submitted in electronic form to [email protected] .

The waiver petition will be evaluated as soon as possible but generally within ten business days of receipt of all required documentation.

If the waiver petition is denied, the applicant must take the GRE. It is the applicant’s responsibility to schedule the test and pay the required fee. Applicants are advised that it will be difficult to achieve a satisfactory score without preparing in advance. Study guides and other preparation materials are available from a variety of commercial sources.

Whether the GRE waiver is granted or not, the applicant may still be required to complete one or more leveling courses prior to enrolling in courses.

Curriculum (30 hours)

Students must complete at least 21 hours in cyber security courses at the graduate level including the cyber security core and electives.

Cyber Security Core (12 hours)

Introductory cyber security (3 hours).

One of the following courses:

  • CYB 7153 Foundations of Cyber Security
  • Another 7000-level cyber security course chosen with approval of advisor if the student has already completed an introductory cyber security course such as CS 3073 as an undergraduate at TU or at another institution.

Cyber Security Technology Management (3 hours)

  • CYB 7173 Defensive Cyber Security Technologies
  • BIS 6073 Information Security

Network Security (3 hours)

  • CYB 7223 Network Security Concepts and Applications

Applied Cryptography and System Security (3 hours)

  • CYB 7373 System Security and Cryptography
  • CS 6153 Computer Security

Cyber Security Electives (9 hours)

The list of cyber security electives below is not all-inclusive, and courses in the list may not be offered online on a regular basis. Students are required to consult the Director of Cyber Security Professional Program each semester when selecting electives.

  • CYB 6013 Secure Electronic Commerce
  • CYB 6123 Security+ Cert Prep
  • CYB 6163 Cybersecurity Law and Policy or
  • LAW 6163 Cybersecurity Law and Policy
  • CS 7083 Security Auditing and Penetration Testing or
  • CYB 7083 Security Auditing and Penetration Testing
  • CYB 7143 Security Economics
  • CYB 7163 Cyber Security Practicum
  • CYB 7193 Blockchain Fintech Sec
  • CYB 7443 Information System Assurance
  • CS 7483 Computer and Network Forensics or
  • CYB 7483 Computer and Network Forensics
  • CYB 7493 Secure System Administration
  • CS 7863 Special Topics in Computer Science or
  • CYB 7863 Special Topics in Cyber Studies

Electives (9 hours)

Courses selected to fulfill this requirement may include up to six credit hours of CS 7981-6 Research and Thesis   .

Electives may include up to six hours of non-computer science graduate courses subject to the approval of the graduate advisor.

Oral Examination

Each student producing a master’s thesis must pass an oral examination, including presentation of the research results, upon completion of all other degree requirements.

  • Students who have taken CS 3073 may not take CYB 7153    for credit toward the degree
  • Students may not take both CIS 4073/ BIS 6073    and CYB 7173    for credit toward the degree.
  • Students may not take both CS 7473 and   CYB 7223    for credit toward the degree.
  • Students may not take both CS 6153    and CYB 7373    for credit toward the degree.

For enquiries call:

+1-469-442-0620

banner-in1

60+ Latest Cyber Security Research Topics in 2024

Home Blog Security 60+ Latest Cyber Security Research Topics in 2024

Play icon

The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cybersecurity thesis topics helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security. 

This article aims to demonstrate the most current Cyber Security Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security topics for the project, latest research titles about cyber security.

Cyber Security Research Topics

List of Trending Cyber Security Research Topics in 2024

Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends.

A. Exciting Mobile Cyber Security Research Paper Topics

  • The significance of continuous user authentication on mobile gadgets. 
  • The efficacy of different mobile security approaches. 
  • Detecting mobile phone hacking. 
  • Assessing the threat of using portable devices to access banking services. 
  • Cybersecurity and mobile applications. 
  • The vulnerabilities in wireless mobile data exchange. 
  • The rise of mobile malware. 
  • The evolution of Android malware.
  • How to know you’ve been hacked on mobile. 
  • The impact of mobile gadgets on cybersecurity. 

B. Top Computer and Software Security Topics to Research

  • Learn algorithms for data encryption 
  • Concept of risk management security 
  • How to develop the best Internet security software 
  • What are Encrypting Viruses- How does it work? 
  • How does a Ransomware attack work? 
  • Scanning of malware on your PC 
  • Infiltrating a Mac OS X operating system 
  • What are the effects of RSA on network security ? 
  • How do encrypting viruses work?
  • DDoS attacks on IoT devices 

C. Trending Information Security Research Topics

  • Why should people avoid sharing their details on Facebook? 
  • What is the importance of unified user profiles? 
  • Discuss Cookies and Privacy  
  • White hat and black hat hackers 
  • What are the most secure methods for ensuring data integrity? 
  • Talk about the implications of Wi-Fi hacking apps on mobile phones 
  • Analyze the data breaches in 2024
  • Discuss digital piracy in 2024
  • critical cyber-attack concepts 
  • Social engineering and its importance 

D. Current Network Security Research Topics

  • Data storage centralization
  • Identify Malicious activity on a computer system. 
  • Firewall 
  • Importance of keeping updated Software  
  • wireless sensor network 
  • What are the effects of ad-hoc networks  
  • How can a company network be safe? 
  • What are Network segmentation and its applications? 
  • Discuss Data Loss Prevention systems  
  • Discuss various methods for establishing secure algorithms in a network. 
  • Talk about two-factor authentication

E. Best Data Security Research Topics

  • Importance of backup and recovery 
  • Benefits of logging for applications 
  • Understand physical data security 
  • Importance of Cloud Security 
  • In computing, the relationship between privacy and data security 
  • Talk about data leaks in mobile apps 
  • Discuss the effects of a black hole on a network system. 

F. Important Application Security Research Topics

  • Detect Malicious Activity on Google Play Apps 
  • Dangers of XSS attacks on apps 
  • Discuss SQL injection attacks. 
  • Insecure Deserialization Effect 
  • Check Security protocols 

G. Cybersecurity Law & Ethics Research Topics

  • Strict cybersecurity laws in China 
  • Importance of the Cybersecurity Information Sharing Act. 
  • USA, UK, and other countries' cybersecurity laws  
  • Discuss The Pipeline Security Act in the United States 

H. Recent Cyberbullying Topics

  • Protecting your Online Identity and Reputation 
  • Online Safety 
  • Sexual Harassment and Sexual Bullying 
  • Dealing with Bullying 
  • Stress Center for Teens 

I. Operational Security Topics

  • Identify sensitive data 
  • Identify possible threats 
  • Analyze security threats and vulnerabilities 
  • Appraise the threat level and vulnerability risk 
  • Devise a plan to mitigate the threats 

J. Cybercrime Topics for a Research Paper

  • Crime Prevention. 
  • Criminal Specialization. 
  • Drug Courts. 
  • Criminal Courts. 
  • Criminal Justice Ethics. 
  • Capital Punishment.
  • Community Corrections. 
  • Criminal Law. 

Cyber Security Future Research Topics

  • Developing more effective methods for detecting and responding to cyber attacks
  • Investigating the role of social media in cyber security
  • Examining the impact of cloud computing on cyber security
  • Investigating the security implications of the Internet of Things
  • Studying the effectiveness of current cyber security measures
  • Identifying new cyber security threats and vulnerabilities
  • Developing more effective cyber security policies
  • Examining the ethical implications of cyber security

Cyber Security Topics For Research Paper

  • Cyber security threats and vulnerabilities
  • Cyber security incident response and management
  • Cyber security risk management
  • Cyber security awareness and training
  • Cyber security controls and countermeasures
  • Cyber security governance
  • Cyber security standards
  • Cyber security insurance
  • Cyber security and the law
  • The future of cyber security

5 Current Research Topics in Cybersecurity

Below are the latest 5 cybersecurity research topics. They are:

  • Artificial Intelligence
  • Digital Supply Chains
  • Internet of Things
  • State-Sponsored Attacks
  • Working From Home

Research Area in Cyber Security

The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including: 

  • Quantum & Space  
  • Data Privacy  
  • Criminology & Law 
  • AI & IoT Security
  • RFID Security
  • Authorisation Infrastructure
  • Digital Forensics
  • Autonomous Security
  • Social Influence on Social Networks

How to Choose the Best Research Topics in Cyber Security

A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics. 

1. Brainstorm

In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible. 

2. Understanding the Background

In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it. 

3. Write a Single Topic

Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about. 

4. Be Flexible

There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out. 

The Layout of Cybersecurity Research Guidance

It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.  

In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness. 

Writing Tips from Expert

Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security Research Topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.

  • Before you begin writing your research paper, make sure you understand the assignment. 
  • Your Research Paper Should Have an Engaging Topic 
  • Find reputable sources by doing a little research 
  • Precisely state your thesis on cybersecurity 
  • A rough outline should be developed 
  • Finish your paper by writing a draft 
  • Make sure that your bibliography is formatted correctly and cites your sources. 
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!

Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.

The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.

Frequently Asked Questions (FAQs)

Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices. 

Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others. 

The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security. 

Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses? 

Profile

Mrinal Prakash

I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cyber Security Batches & Dates

Course advisor icon

The Department of Computer Science and Engineering offers a Master of Science in Cybersecurity. The MS in Cybersecurity provides a high quality, academically challenging, and career-enriching educational program that is responsive to industry trends, changing standards, and employer needs. The degree develops students who are highly skilled in the field, technically savvy, and think critically about cybersecurity challenges. 

After graduation, MS in Cybersecurity graduates will be prepared for jobs in secure software development, system test/evaluation, data security analysis, IT security project management, cyber defense analysis, vulnerability assessment, and system security engineering, security architecture, enterprise architecture, and scientific research positions.

Non-thesis students

Non-thesis students in the MS in Cybersecurity will complete 33 semester hours, which include 21 hours of core coursework to gain a solid understanding of cybersecurity and 12 hours of electives.

Thesis students

Thesis students will complete 30 semester hours, which includes 21 hours of core coursework to gain a solid understanding of cybersecurity and 9 hours of electives. Thesis students are required to consult their advisor before selecting courses.

Academic standards

If a student’s GPA on all graduate and/or deficiency courses falls below 3.0, the student will be placed on probation the following term/semester. Students who cannot raise their GPA above 3.0 during that term/semester will be dropped from the program. To qualify for the master’s degree, the student must earn a grade of B or better in each of the core courses.

Core courses

The core courses provide students with a solid foundation in cybersecurity. All students will complete the 9 hours included in the required group. Courses from the applied group and networking group should be chosen in consultation with an advisor.

Non-thesis students will complete 21 hours of core courses, which include the following:

  • 9 hours from the required group,
  • 6 hours from the applied group, and
  • 6 hours from the networking group.

Thesis students will complete 15 hours of core courses, which include the following:

  • 3 hours from the applied group, and
  • 3 hours from the networking group. 

Required group

All students complete 9 hours from the following courses.

  • CSCE 5550 - Introduction to Computer Security
  • CSCE 5565 - Secure Software Development
  • CSCE 5552 - Cybersecurity Essentials

Applied group

Non-thesis students will choose 6 hours from the following courses.

Thesis students will choose 3 hours from the following courses.

  • CSCE 5050 - Applications of Cryptography
  • CSCE 5555 - Computer Forensics
  • CSCE 5560 - Secure Electronic Commerce

Networking group

  • CSCE 5520 - Wireless Networks and Protocols
  • CSCE 5575 - Blockchain and Applications
  • CSCE 5585 - Network Security

Electives courses

Non-thesis students will take 12 hours of electives. Students can choose four courses from the list below or three courses from the list below and one unrestricted three credit hour CSCE graduate course, or alternately a course outside of CSCE, with prior advisor or program approval.

Thesis students will take 9 hours of electives and 6 hours of CSCE 5950 - Master’s Thesis. Students can choose their elective courses from the list below or choose one unrestricted, three credit hour CSCE graduate course, or alternately a course outside of CSCE, with prior advisor or program approval.

  • CSCE 5170 - Graph Theory
  • CSCE 5210 - Fundamentals of Artificial Intelligence
  • CSCE 5214 - Software Development for Artificial Intelligence
  • CSCE 5215 - Machine Learning
  • CSCE 5216 - Pattern Recognition
  • CSCE 5290 - Natural Language Processing
  • CSCE 5300 - Introduction to Big Data and Data Science
  • CSCE 5380 - Data Mining

IMAGES

  1. Innovative Cyber Security Master Thesis Research Guidance [#Support]

    cyber security master thesis

  2. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    cyber security master thesis

  3. Master Thesis Topics in Cybersecurity [Worldwide Research Assistance]

    cyber security master thesis

  4. Innovative Cyber Security Master Thesis Research Guidance [#Support]

    cyber security master thesis

  5. Master Thesis Topics in Cybersecurity [Worldwide Research Assistance]

    cyber security master thesis

  6. Top 5 Cyber Security Master Thesis Topics [Professional Thesis Writers]

    cyber security master thesis

VIDEO

  1. Master of Science in Cybersecurity

  2. Master cyber resilience: Best practices for a strong cybersecurity framework

  3. ماجستير الأمن السيبراني

  4. Janell Shah

  5. Master in Cyber Security

  6. Intrusion detection cyber security projects

COMMENTS

  1. Good cybersecurity thesis topics for a master's degree

    Håkon Olsen, security engineer and founder of cybersecurity firm Cybehave, weighed in on cybersecurity thesis topics in a recent forum on Quora, where he suggested tackling the subject of identity management. "Investigate how to maximize security within each user's threshold for usability impact," Olsen wrote, adding that most users don't use ...

  2. Master of Science Cybersecurity in Computer Science

    Program Requirements. Credit hours: 30; Thesis options: Thesis and non-thesis options available.. Thesis Option: Coursework will be replaced by research credit courses. Master's Thesis Advisor and Co-advisor(s): Every Master's thesis must be supervised by a faculty advisor who must be (1) a regular full-time faculty member of GW with a primary or secondary appointment in the CS Department ...

  3. MS in Cybersecurity Thesis

    The thesis option allows students to plan, execute, and report on an individual project that addresses a substantial problem covering both practical and scientific aspects. Through the thesis project, students demonstrate their understanding of and ability to apply the concepts, methods, and techniques covered in the MS in Cybersecurity core ...

  4. PDF Measuring and Creating Situational Awareness in Cybersecurity

    The objective of this master's thesis is to study the essence of measuring cybersecurity, the key elements and relevance of the metrics. Additionally, this thesis concentrates on how to visualise the metrics; what are the sources of the metrics and how to use them to build up cybersecurity posture for situational awareness.

  5. PDF Cyber Security Engineering, MS

    CYSE 799 Cyber Security Engineering Master Thesis (If thesis option is chosen.) Total Credits 12 Accelerated Master 's Cyber Security Engineering, BS/Cyber Security Engineering, Accelerated MS Overview Highly-qualified undergraduates may be admitted to the bachelor's/ accelerated master's program and obtain a BS in Cyber Security

  6. Exploring Industry Cybersecurity Strategy in Protecting Critical

    crucial, make infrastructure resiliency a priority, importance of security awareness, and importance of organizational leadership support and investment. This study revealed key strategies that may help improve cybersecurity strategies used by IT and compliance professionals, which can mitigate successful attacks against critical infrastructure ...

  7. Semester and Master's Thesis Projects

    The Semester Project and the Master's Thesis are mandatory courses of the Master's programme in Cyber Security. They have to be supervised by a professor of the cyber security faculty list. Semester Project. Before starting, the project must be registered and a project description must be uploaded via myStudies. Master's Thesis

  8. MSc thesis

    Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists' Cyber Incident Reporting Skills. Rebane R.-M., Post-Quantum Secure Time-Stamping. Ristikivi A., Ensuring the Integrity of Electronic Health Records. Räni E., Prediction Model for tendencies in Cybercesurity.

  9. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    impacts beyond just the one primary person; the same holds true in cybersecurity. This thesis will lay out the importance of connectivity in our society - from the individual user to national security and the military. I will examine the vulnerabilities, cite case studies, and look at the consequences the cyberattacks have or could have on ...

  10. Theses and Projects

    A Serious Game for Cloud Security: Master: 2022: Methodology and Implementation of a Cyber Security Risk Management Tool: Master: 2022. On the relationships between different Android frameworks and associated security issues: Master: 2022: Nudging to Increase the SARS-CoV-2 Vaccination Rate: Bachelor: 2022

  11. AURA: Master's theses in Cyber Security

    Tapping network traffic in Kubernetes . Ledaal, Sigbjørn Skolem (Master thesis, 2023) The rapid increase in cloud usage among organizations has led to a shift in the cybersecurity industry. Whereas before, organizations wanted traditional security monitoring using statically placed IDS sensors within their ...

  12. Master's Degree in Cybersecurity

    The Cyber Security master's degree program at The University of Texas at San Antonio offers excellent opportunities for intensive study and technical research. ... Note that this is automatic since the only way to get a grade in CS6983 Master's Thesis is to complete a thesis. In addition, although the student may apply hours of CS 6953 ...

  13. PDF Project Master Thesis

    This master thesis is a completion of masters program (MSc) in Cybersecurity management at the University of Agder (UIA). The study was conducted by and written by two master students that had several courses about critical infrastructure system (CIS) and how the different sectors deal with cybersecurity, where they found

  14. Capstone Guide for MS Cybersecurity

    All Cybersecurity masters students are required to complete either a project or a thesis. Typically these are completed in the final year of studies. ... As a student in the Cybersecurity field, your thesis topic should be security-focused. The results of this should be publishable in an academic journal or conference. Potential thesis topics ...

  15. PDF Managing Cybersecurity As a Business Risk for Small and Medium

    There are endless definitions for cybercrime because there is a variety of aspects. to consider about cybercrime. The components of a cybercrime vary in three ways of 1) In some cybercrimes that computers or data are the targets. 2) Computers or digital. technologies used as tools for committing cybercrimes.

  16. Program: Cyber Security, Thesis Option, M.S.

    Graduates from the Master of Science program in cyber security will: Possess a comprehensive understanding of the foundational concepts of cyber security. Obtain and refine the skills necessary to improve an organization's cyber security posture. Apply theoretical concepts to the practice of cyber security. Demonstrate professional skills and ...

  17. PDF Thesis title: Contributing Factors in Building Cyber Resilience in

    Introduction: This master thesis explores the concept of cyber resilience and aims at identifying cyber resilience enhancing measures relevant to a complex organisation. Cyber security is a highly relevant field as the world gets more digitalised, and evaluating sufficient cyber protective measures is essential.

  18. PDF MastersThesis ChristofferSjöblom AI in Cybersecurity and Network Security

    Malware is an often-used method in cyber criminality. Malware is malicious software used to accomplish identity theft, cyber espionage, and disruptions in systems. Malware appears in the form of viruses, Trojan horses, and ransomware [24]. In contrast to a typical bug, malware is an attempt designed to cause harm.

  19. PDF Cyber-security of Cyber-Physical Systems (CPS)

    This master's thesis reports on security of a Cyber-Physical System (CPS) in the department of industrial engineering at UiT campus Narvik. The CPS targets connecting distinctive robots in the laboratory in the department of industrial engineering. The ultimate objective of the department is to propose such a system for the industry.

  20. Master thesis

    Master thesis Dealing with uncertainty: cybersecurity risk assessment approaches A qualitative research on cyber risk assessment practices in organizations Executive MSc Program Cyber Security 2019/2020 Author Kees Mastwijk Student number S2444550 Date 30 December 2020 Supervisors Dr. James Shires, Dr. Tatiana Tropina

  21. PDF Gamification of Cyber Security Awareness

    Due to these ever-present threats and risks, there is an urgent need for cyber security. Cyber security is the activities designed to safeguard the confidentiality, integrity, availability, and non-repudiation of information within a computer system against unauthorized access and attacks (Boyce et al., 2011). Cyber security is a broad socio-

  22. PDF 2010:050 MASTER'S THESIS Internal threat to information security

    MASTER'S THESIS Internal threat to information security - countermeasures and human factor within SME Liene Kreicberga Luleå University of Technology Master Thesis, Continuation Courses Security Department of Business Administration and Social Sciences Division of Information Systems Sciences 2010:050 - ISSN: 1653-0187 - ISRN: LTU-PB-EX--10/ ...

  23. 60+ Latest Cyber Security Research Topics for 2024

    Criminal Law. Cyber Security Future Research Topics. Developing more effective methods for detecting and responding to cyber attacks. Investigating the role of social media in cyber security. Examining the impact of cloud computing on cyber security. Investigating the security implications of the Internet of Things.

  24. Program: Cybersecurity, MS

    Thesis students will take 9 hours of electives and 6 hours of CSCE 5950 - Master's Thesis. Students can choose their elective courses from the list below or choose one unrestricted, three credit hour CSCE graduate course, or alternately a course outside of CSCE, with prior advisor or program approval.