Programming
Python for Absolute Beginners, 4.5 hour video
Database
SQL Course For Beginners: Learn SQL Using MySQL Database, 4.5 hour video
e) English Proficiency Test (only for Applicants with prior degrees conducted not in English)
f) For a complete list, visit our Admission Requirements page .
Meet the faculty, tuition & fees, request information, forms & documents.
For general questions, please contact a graduate advisor at [email protected] .
For questions about the MSIS program, such as curriculum, prerequisites, course substitutions, or unit transfer, contact the program director, Dr. Zhongming Ma, at [email protected] .
Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.
Hinweise zum Einsatz der Google Suche
Theses and student projects.
We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.
Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.
This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.
Title | Type | Advisor |
---|---|---|
|
Title | Type | Advisor |
---|---|---|
Seamless Synergy: Unifying Local Development and Cloud Execution in Machine Learning DevOps | Bachelor | J. Grossklags D. Zhu |
Comparative Study of Web Analytics on Common Websites and Their Compliance with Data Protection Regulations | Bachelor | E. Syrmoudis |
Exploring People's Interest in Social Credit System using Baidu Index Search Data | Bachelor | C. Löfflad |
Systematic literature review on user's attitudes toward content moderation by AI-based models on platforms. | Bachelor | Ch. Ullstein |
Analyzing the Influence of Chinese Data Protection Regulations on Foreign Companies Operating in China: An Empirical Study | Bachelor | M. Chen |
Regulating Digital Gatekeepers: An Analysis of the Digital Markets Act and Its Implications | Master | E. Syrmoudis J. Grossklags |
Enhancing AI Security and Privacy through Participatory AI: A Study in the Context of the EU's AI Act's Essential Requirements | Master | Ch. Ullstein |
Review of regulatory approaches towards content moderation by AI-based models on platforms. | Bachelor | Ch. Ullstein |
Internetzensur inmitten von COVID-19: Eine datengestützte Analyse rund um den Globus | Guided Research | M. Chen |
A Critical Investigation of Personalized AI-based Interventions against Online Norm Violations | Guided Research | J. Grossklags |
Title | Type | Year |
---|---|---|
Basis of ethical moderation tooling: How to evaluate and build context-sensitive ethics and care into moderation technology | Master | 2024 |
Analyzing User Awareness and Practical Adoption of Countermeasures against Digital Fingerprinting | Bachelor | 2024 |
Analyzing societal awareness of digital fingerprinting | Bachelor | 2024 |
Development and Analysis of a Risk Assessment System for Emails based on Network Data | Master | 2024 |
Facial Processing Technology in India: Application and Public Opinion | Bachelor | 2024 |
Systematic literature review on user's attitudes toward content moderation by AI-based models on platforms. | Bachelor | 2024 |
Types of AI-based content moderation and current use of such approaches on platforms. | Bachelor | 2024 |
Exploring and Mapping People's Perceptions of Generative AI: A Structured Literature Review | Bachelor | 2024 |
A Comparison of Citizens' Experiences With Generative AI and Facial Recognition Technologies With Expert's Interest in Citizens' Opinion on These Technologies. | Bachelor | 2024 |
Towards More Inclusive AI: A Comprehensive Analysis of Participation in Participatory AI Research Projects | Bachelor | 2024 |
Enhancing User Privacy: An Analysis of GDPR Article 17 and the Erasure of Personal Data from All Forms of Online Content | Bachelor | 2024 |
Programme zur Erkennung von Gesichtsemotionen sind noch nicht ausreichend entwickelt: Überblick über Tools | Guided Research | 2024 |
Analyzing Media Coverage on the Chinese Social Credit System: A Comparative Study using Unsupervised and Supervised Topic Modeling | Bachelor | 2023 |
Will IT professionals ever be replaced? The perceptions of IT professionals in the context of generative AI and low code applications | Bachelor | 2023 |
Understanding The State of the Art of Publicly-Available Deepfake Generation Tools | Bachelor | 2023 |
Understanding The State of the Art of Publicly-Available Deepfake Detection Tools. | Bachelor | 2023 |
Detection of Hate Speech in the Wild | Master | 2023 |
An Exploration of the Current Stakeholder Debate on Facial Processing Technologies | Master | 2023 |
A Survey Study on Individuals' Understanding of Personal Data Classification Practices | Master | 2023 |
A Qualitative Analysis of Consumers' Experiences With Credit Scoring Systems | Bachelor | 2023 |
A Case Study on Moderation on TikTok | Bachelor | 2023 |
How do resistance factors against AI differ across different levels of organizational hierarchy? | Bachelor | 2023 |
Mixed Method Analysis on the Southamericans' Perception of Facial AI Inferences | Bachelor | 2023 |
Systematic literature review on facial analysis in AI in academic research: common inferences, motivations and biases | Bachelor | 2023 |
Understanding Hate Speech Victims' Needs in the Wild | Master | 2023 |
Towards an Automated Approach for Detecting Counter Speech in Online Communities | Master | 2023 |
Trustworthy Artificial Intelligence through European standardization, certification and overall technical standards: an economic and cultural competitive advantage on a global scale? | Bachelor | 2023 |
Comprehensive Review of Participatory Approaches for Fostering a Discourse on AI: Formats and Impact | Bachelor | 2023 |
A Data-Driven Investigation of Social Media Platforms on the Progress of the Chinese Social Credit System | Master | 2023 |
Structured Literature Review: Participatory AI | Master | 2023 |
Dienstauswahl und Wechselentscheidung: Nutzerbindung auf interoperablen Marktplätzen | Guided Research | 2023 |
Computer, how should we regulate artificial intelligence? Using NLP to Study the Public Consultation on the AI Act Proposal | Master | 2023 |
Qualitative Analysis of Submissions of the European Commission's Call for Feedback on the AI Act Proposal | Bachelor | 2023 |
The EU Artificial Intelligence Act Proposal's Approach to Regulating Biometric Systems | Bachelor | 2023 |
How do social media platforms tackle sexism? A comprehensive comparison of community guidelines and their implementation from the user's perspective. | Bachelor | 2023 |
Development and User-Oriented Evaluation of a NLP-Based Tool for the Detection and Distinction of Benevolent and Hostile Sexism on Social Media | Master | 2023 |
An Analysis of Mobile App Privacy Policies between 2018 and 2022 | Bachelor | 2023 |
Community Guidelines and their Enforcement in Volunteer Online Communities | Master | 2023 |
Development and User-Oriented Evaluation of a NLP-Based Tool for the Detection and Distinction of Benevolent and Hostile Sexism on Social Media | Master | 2023 |
Information Security Measures for a Digitalized Post Market Surveillance of Medical Devices | Master | 2023 |
Comparing Machine Learning Models for Breaking CAPTCHAs in Darknet Marketplaces | Bachelor | 2023 |
Are all Reports of Sexist Content Dealt with Equally? Investigating Biases Of Social Media Reporting Mechanisms | Bachelor | 2023 |
Sexism on Social Media - Extent, Handling and Possible Solutions from Moderators' Point of View. | Bachelor | 2023 |
Requirement Elicitation for AI Interventions against sexist behavior on Instagram based on interviews with female influencers | Bachelor | 2023 |
Comprehensive Review of Facial Inference AI tools that are currently used/ placed on the market | Master | 2023 |
How are Consumers' Credit Scores protected during Economic Crisis? - A Comparative Analysis of Credit Scoring Systems in the U.S and China | Bachelor | 2022 |
An Investigation of the Measures of the Credit Scoring Industry for Protecting Consumers during Economic Crises. | Bachelor | 2022 |
Identifizierung von Themen in der Reflexion über Speculative Design-Artefakte unter Verwendung von NLP | Guided Research | 2022 |
Effects of Nudging and Reputation Mechanisms on the Trustworthiness on E-Commerce Platforms - A Comparative Survey | Bachelor | 2022 |
A Study on the Chinese Social Credit System - Based on the Perspective of Chinese Internet Enterprises | Bachelor | 2022 |
An Empirical Investigation of the Helpfulness of Online Product Reviews - A Case Study on Amazon. | Bachelor | 2022 |
Data Portability and Erasure: GDPR Compliance of Third-Party Tracking Vendors | Master | 2022 |
Extraction and Insertion of Personal Data from/to Online Services: An Empirical Analysis of the Governance of Personal Data | Bachelor | 2022 |
The Effectiveness of GitHub’s Security Interventions on Code Security | Bachelor | 2022 |
Data portability under GDPR Art. 20: An empirical examination of data exports and imports | Bachelor | 2022 |
Data Portability between Online Services: GDPR Compliance and Security Implications | Bachelor | 2022 |
Economics of Interoperability - Data and Privacy in Interconnected Ecosystems | Master | 2022 |
Extraction and Insertion of Personal Data from/to Online Services: An Empirical Analysis of the Governance of Personal Data | Bachelor | 2022 |
A Serious Game for Cloud Security | Master | 2022 |
Methodology and Implementation of a Cyber Security Risk Management Tool | Master | 2022 |
On the relationships between different Android frameworks and associated security issues | Master | 2022 |
Nudging to Increase the SARS-CoV-2 Vaccination Rate | Bachelor | 2022 |
Comparison of Contact Tracing by Smartphone Apps during the Covid-19 Pandemic in the United Kingdom and China | Bachelor | 2022 |
A comparative analysis of nudge units and the Chinese Social Credit System | Master | 2022 |
Development of an Application for the Visualization of Data Exports under Article 20 GDPR | Bachelor | 2022 |
The perception of AI decision-making in the advertisement and hiring context: A mixed-methods analysis of influence factors. | Master | 2022 |
Fighting corruption and fraud concerning EU funds by making use of smart city technologies | Master | 2022 |
A Quantitative Analysis of Rule-Breaking Behavior in an Online Community | Bachelor | 2022 |
A Survey Study on Intervention against Online Hate Speech and its Implications | Master | 2021 |
Peer Review Verification with Verifiable Credentials and Zero-Knowledge Proofs | Master | 2021 |
How Useful is the GDPR´s Right to Data Portability? An Empirical Study | Bachelor | 2021 |
Evaluating on the ball decision making from shooting positions in Professional Soccer | Master | 2021 |
Unfamiliar Ground: Real World Analysis of a Modern NIST-Guided Password Policy | Bachelor | 2021 |
Development and usage of automated systems for content moderation | Master | 2021 |
Measuring the Effectiveness of Security Warnings on GitHub | Bachelor | 2021 |
A Comparative Study about Nudge Units in Different Countries | Bachelor | 2021 |
An ethical analysis of user modeling techniques for social media networks | Bachelor | 2021 |
History of Security Advice on Stack Overflow | Master | 2021 |
A Comparison of the acceptance of contact-tracing apps in the Covid-19 pandemic in the USA, India, the UK and Germany | Bachelor | 2021 |
How should Android vulnerabilities be disclosed? An Analysis of Android Security Bulletins. | Master | 2021 |
Measuring Code Review in the Linux Kernel | Master | 2021 |
Bewertung der Einhaltung von Software-Sicherheitsstandards in kontinuierlicher Software-Entwicklung | Guided Research | 2021 |
Prototypical implementation and evaluation of an anonymization solution for textual data. | Master | 2020 |
Natural Language Semantic Code Search Using Learning to Rank | Master | 2020 |
An Empirical Analysis of Enterprise Credit Reporting Systems in China | Bachelor | 2020 |
An Empirical Evaluation of the Right to Erasure in the GDPR | Bachelor | 2020 |
The Right to Data Portability - Impact on Digital Platforms | Master | 2020 |
Fairness in the Chinese Social Credit Systems - A Contest-Based Approach to Answering a Design Question | Master | 2020 |
Investigating the maturity of IT security of emerging companies in Germany according to a maturity model | Master | 2020 |
Data Portability: Empirical Study on User Expectations about Data Exports from Social Network Sites | Bachelor | 2020 |
An analysis of hate comments in the Korean Internet Society | Bachelor | 2020 |
An Empirical Evaluation of the Right to Erasure in the GDPR | Bachelor | 2020 |
The Perceived Value of Our Data – A User's Perspective on Data Portability in the Context of Social Media | Bachelor | 2020 |
End User Awareness of IoT Device Users in the domain of smart homes - A survey study | Bachelor | 2020 |
Show Don't Tell: Improving user perception and understanding of privacy or anti-tracking tools | Master | 2020 |
Analysis of process mining in the context of cyber security with the example of identity and access management | Master | 2020 |
Social Media Behavior in the Context of Genealogy Platforms | Bachelor | 2020 |
"I understand it now, which I like. But trust? No!" - The Relation Between Transparency & Trust in Visual Data-Based Automated Hiring Procedures. | Bachelor | 2020 |
A survey study on mobile operating system upgrade practices | Master | 2020 |
A data-driven comparative analysis of blacklists and redlists in the Chinese Social Credit System | Bachelor | 2020 |
An investigation of the Critical Infrastructure requirements as owner of a Critical Infrastructure | Bachelor | 2019 |
Development of the Social Credit System in China and how it effects German Companies | Bachelor | 2019 |
A comprehensive empirical study on the Android patching ecosystem | Master | 2019 |
A Survey Study on the Treatment of Personal Friends' Data in the Context of Smartphone Usage | Bachelor | 2019 |
Implementation of the Critical Infrastructure requirements as owner of a Critical Infrastructure | Bachelor | 2019 |
Search Engine for Security Documentation | Guided Research | 2019 |
Learning Program Representations from Big Code | Guided Research | 2019 |
Analysis of pseudonymous data to evaluate information flow in web-based fringe communities | Master | 2019 |
An open-source intelligence collection and analysis platform for actionable product threat intelligence and coordinated cyber incident response | Master | 2019 |
Analysis of the Changes in Privacy Policies for Mobile Apps | Master | 2019 |
Privacy Related Behavior, Lifestyles, Trust and Knowledge: Do People Securely Erase Confidential Data? | Bachelor | 2019 |
Privacy and Data Sensitivity in Health Promotion Apps: Perceptions in Private and Workplace Health Apps | Master | 2019 |
KRACK Attack: Security and Security Awareness in Multiperson Households | Bachelor | 2018 |
Quick access
{{child.heading}}
CAC - Chair of Applied Cryptography
We offer thesis topics related to cryptography, IT security and Blockchain technologies. Our major areas of research are:
We offer both more theoretical and applied thesis topics. A theoretical thesis may include a literature survey, security models and a formal security analysis of a security/cryptographic/blockchain protocols. In a more applied thesis you will implement new primitives and protocols and benchmark their performance (according to various measures). Alternatively, you may also try to attack existing cryptographic/security/blockchain systems.
If you are interested please do not hesitate to contact us via [email protected].
Title | Year |
---|---|
Trustless incoercible sale of physical goods over a blockchain | 2023 |
A Thorough Study of Hashed-State Contracts: Techniques, Optimizations and Evaluation | 2022 |
Ethereum Consensus Verification in an EGo-Enclave | 2022 |
Fractional Stake Stability in Proof-of-Stake Cryptocurrencies | 2022 |
Platooning mit Perun Channels | 2021 |
Efficient Cryptographic Schemes provable secure against real Side-Channel-Attacks | 2021 |
Random Probing Security of Shift-lnvariant Functions | 2021 |
Layer-3 Payment channels on Plasma | 2021 |
Related Key Attack Secure Authenticated Encryption | 2021 |
Fair Exchange Protocol over Bitcoin | 2021 |
Analyzing the definitions and Security of Adaptor Signatures | 2020 |
Implementation and Comparison of ECDSA Threshold Signatures | 2020 |
Blockchain-based Public Verifiable Constant Round Multi-Party Computation against Covert Adversaries | 2020 |
Evaluation of interoperability solutions for blockchains | 2020 |
Designing a Plasma TEE Payment Protocol | 2020 |
From Random Probing to Average Random Probing: Connecting Probing Models | 2020 |
Multiparty State Channels | 2019 |
Interactive Smart Contract-Based Fair Exchange Protocol | 2019 |
Free Option Problem – Avoidance through Mechanism Design based on Smart Contracts | 2019 |
On Consensus in Phantom | 2019 |
Atomic Cross-Chain Payments | 2019 |
Evaluation of payment channel networks for micropayments | 2019 |
Payment and State Channels in practice | 2018 |
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms | 2018 |
Opportunities and Risk of Crypto-Tokens and ICOS – A Critical Analysis | 2018 |
TeePay – Using Trusted Execution Environments for Off-chain Payment | 2018 |
Cryptographic Techniques for Hardware Security | 2018 |
Some example proposals are listed below. However, these are just samples. If you are interested in doing a thesis with us, we advise to check out our research web-pages and contact us for further topics.
Access restricted section: Log in to see this section .
Requirements.
We expect that undergraduate students preparing a Bachelor thesis show a strong interest in topics related to our lectures. Bachelor theses may be written in German or English. Please choose German if you have difficulties drafting a flawless document in English.
A Master thesis should have substantial knowledge in at least one sub-field of security or cryptography, and they should have prior experience with the research methodology they plan to use. The default language for Master theses is English.
We only supervise student from TU Darmstadt. In exceptional cases we supervise Master students at a company. In this case you need to write a proposal (ca. 2 pages) highlighting why your topic is important for our research.
Candidates are expected to be familiar with the general instructions for writing a thesis at the Department of Computer Science.
Please consider the following options to find a topic of the thesis:
office@cac.tu-...
work +49 6151 16-25716
Work S2|20 307 Pankratiusstraße 2 64289 Darmstadt
We would like to customise the information and usability of this website to your preferences and needs. To this end, we use so-called cookies. Please choose which cookies you would like to enable when visiting our webpages. Some of these cookies are required to load and correctly display this website on your device. These are strictly necessary or essential cookies and cannot be deselected. The preferences cookie saves your language setting, while the statistics cookie regulates how the open-source statistical software “Matomo” analyses your visits to and activities on our website. For more information about cookies we use, please refer to our privacy policy .
Topics for theses.
We are always looking for highly motivated students who want to write Bachelor's and Master's theses with us. If you are interested, please contact the supervisors of the available topics. It is good practice to get in touch well in advance of your planned starting date.
Topic | Supervisor | Degree |
bachelor, master | ||
Master | ||
Bachelor / Master | ||
Bachelor / Master | ||
Bachelor | ||
Bachelor | ||
Master | ||
Master |
Topic | Supervisor | Degree |
Bachelor / Master | ||
Master | ||
Master | ||
Master |
Topic | Supervisor | Degree |
Bachelor | ||
Master | ||
Master | ||
Bachelor | ||
Master | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Master | ||
Bachelor | ||
Bachelor / Master | ||
Bachelor | ||
Bachelor | ||
Master | ||
Bachelor | ||
Master | ||
Bachelor / Master | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor / Master | ||
Master | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor / Master | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor | ||
Bachelor / Master | ||
Bachelor / Master | ||
Bachelor / Master |
We expect that undergraduate students preparing a Bachelor's thesis show a strong interest in topics related to our lectures. Bachelor's theses should be written in German.
Graduate students preparing a Master's thesis should have substantial knowledge in at least one sub-field of security or privacy and they should have prior experience with the research methodology they plan to use. The default language for Master's theses is English.
Doctoral dissertations (Ph.D. theses) are typically prepared while working for one of our research projects. As our research group maintains strong ties to the relevant international scientific communities, we encourage our Ph.D. candidates to make use of the possibility to conduct part of their research at renowned universities abroad.
Although counting pages is generally a bad metric, take the following specifications as rules of thumb:
Length | Expectation | |
Seminar thesis | < 20 pages | research the state-of-the-art and present it in a scientifically sound way |
Bachelor's thesis | ~ 40 pages | independent replication of the state-of-the-art with scientific documentation of results |
Master's thesis | ~ 80 pages | your adviser should learn something new |
Dissertation | ~ 150 pages + publications | the scientific community should learn something new |
Candidates are expected to be familiar with the general instructions for writing a Bachelor's or Master's thesis at the Department of Computer Science.
Keep in mind that drafting the exposé is an iterative process involving your supervisor. It may require some time. Your supervisor must accept your final exposé before we schedule an initial presentation in the Seminar mit Bachelorarbeit . This presentation is the formal start of the Bachelor's thesis process. For Master's theses, the completion of the exposé means that the candidate formally passes the preparation.
The Bachelor's thesis should demonstrate that the candidate can solve problems independently and document own results according to scientific standards. If you need feedback or assistance, you must take initiative and contact your supervisor. Before every meeting with your supervisor, please send to him/her a rough agenda and supporting materials. This helps the supervisor to prepare and improves the efficiency of the meeting.
We offer each student the opportunity to hand in up to five pages of the thesis draft. The supervisor will correct it with the same standard as for the final thesis. We expect the student to extrapolate corrections to the rest of the thesis.
In addition to an electronic copy in PDF format, students must submit a signed declaration of independent work .
Writing a Master's thesis is usually a very interactive process involving the supervisor and other members of the research group. Candidates often spend part of the time at a desk in our lab. Some candidates contribute to research project or publish research results related to the thesis project in scientific workshops or conferences.
In addition to an electronic copy in PDF format, students must submit one bound hard copy of the Master's thesis including a signed declaration of independent work in the preface.
Home Blog Security 105 Latest Cyber Security Research Topics in 2024
The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cybersecurity thesis topics helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.
The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security.
This article aims to demonstrate the most current Cyber Security Research Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security topics for the project, latest research titles about cyber security.
Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends .
Below are the latest 5 cybersecurity research topics. They are:
The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including:
A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more cyber security research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics.
1. Brainstorm
In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible.
2. Understanding the Background
In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it.
3. Write a Single Topic
Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about.
4. Be Flexible
There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out.
It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.
In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness.
Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security research topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!
Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.
The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.
Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices.
Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others.
Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses?
The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security.
I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security
Avail your free 1:1 mentorship session.
Something went wrong
Name | Date | Fee | Know more |
---|
Here you find lists of bachelor theses in computer science, written at the department for IT by students on the bachelor programme (freemovers are not included). Other programmes: Master in computer science, older programme , Systems in technology and society , Msc in IT engineering , Master in computer science , Master in HCI , Master in computational science , Master in Embedded Systems and the complete list .
Did you know that one of the most important parts of writing your dissertation is finding the best topic possible? You are probably having serious problems finding a topic for your thesis. After all, the thesis topics IT students are looking for are pretty rare. The reality is that in the IT field, most topics have already been written about. There are few things left to write it seems. Well, things are a bit different. We are here to assure you that you can find thesis topics for IT students. Also, we want to assure you that it is not at all difficult to find an interesting topic that you can write an engaging paper about. We will provide you with 21 such topics shortly. College students can use our topics for free; we are very happy to help!
Exceptional it thesis topics in computer science and engineering, refreshing it thesis topics in communication and media, top it thesis topics on food technology, thoughtful it thesis topics on technology and human identity, top it thesis topics on pharmaceutical technologies, it thesis topic ideas on energy power technologies, it thesis topics on medical devices and diagnostics, it thesis topics on biotechnology, more interesting it thesis topics for you, need more it dissertation topics.
As you are probably already aware, the IT field is advancing rapidly. Advancements are made almost daily in technology, including information technology. This is why so many students are looking for fresh 2022 dissertation topics. They want to write about the latest technologies and the latest gadgets. Of course, one can go online and find various 2022 thesis topics IT students would find impressive. You will probably find some that are relatively decent. But be aware that the evaluation committee will most certainly not be impressed by decent topics. They want something new. They want something that can pique their interest. They want to LEARN something from you. And they want to award you with some bonus points. Why not take them?
Did you ever wonder why so many people dedicate so much time to finding a great topic? Probably not. Let’s shed some light on this. College students are looking for IT dissertation topics because they want bonus points. The topic is the first thing the evaluation committee sees. It is the most important part of your paper. As such, it must be interesting, engaging, and also helpful. It must show that you have put in the effort to write the dissertation. Awe the admission committee and you will surely get bonus points. Even if your dissertation is not the best, you will still get a good score if the topic you choose is exceptional. But engaging IT dissertation topics are difficult to come by. Most of your classmates have already picked the simple ones. But you are not like the rest of your class, are you? You want to be original and you want to make a lasting impression on the professors. This is why you need to take a look at our fresh dissertation topics.
Without further ado, here are the 21 thesis topics for IT students that we think are the most interesting and engaging:
If you want to write a relevant research topic, consider writing about Artificial intelligence topics (AI). AI is a relevant phenomenon, and here is a look at some ideas of artificial intelligence that you should look into.
Computer science and engineering combine two different yet interconnected worlds of machines. The use of computer science uses the computer’s brain. It is, in most cases, used to include areas of studies like programming language and algorithms. Here is a list of research topics in computer science and engineering that you can use.
One of the first areas that technology affected was communication. With technology, media is used for social interactions, business development, and educational purposes. Here are exciting ideas to use when researching your IT thesis paper.
If you are searching for a qualitative research topic about technology in the food industry, here is a list of ideas you can use.
The ethical issues surrounding the enhancement technology are intertwined with the questions of human identity and the proper trajectory of human life. Here is a list of thesis ideas you can use in your research.
Companies are using technology to search for ways they can use it to reduce costs and boost effectiveness by doing pharmaceutical technology research. Impress your lecturer by choosing one of the research topics discussed below
It is not possible to have a technology process without energy. That is the reason that scientists are always looking for ways they can improve energy power technologies. So, if you are looking for thesis topics you can use to impress your lecturer, here is a list of power technology research you can use.
The innovation of medicine and technology helps to improve life expectancy. If you feel that saving lives is your purpose, here are some thesis topics you can use in your research paper.
The development of biotechnology allows people to cure diseases and help with new machines. Here are some ideas of interesting topics you can use for your biotechnology thesis research.
Your IT thesis does not have to be boring. Here is a list of interesting thesis topics that will impress your lecturer.
Of course, there are dozens of other thesis topics on which students could write a paper. Some companies specialize in providing college students with entire lists of topics on a specific subject. You just need to contact an online academic writing company and tell its writers what you need. These people have extensive experience in the IT industry and have probably written dozens of dissertations. They can help you with more dissertation topics. And the best part is that some of these online services are quite affordable. An exceptional topic is worth the money – guaranteed!
Are you stuck with writing your thesis? Just enter promo “ mythesis ” – that’s all you need to get a 20% discount for any IT writing assignment you might have!
Information security and cybersecurity are some of the most exciting and growing areas within IT. In just a few years, it’s estimated that companies and authorities will double their investments in information- and cybersecurity. This creates a high demand on the job market for graduates from advanced studies in the field.
Protecting information and digital assets from various forms of threats, attacks, disasters and mistakes is important for individuals, organizations and companies. Concepts and topics that are covered within the master’s programme include information security, cybersecurity, network security, organizational security, IT security policies, legal aspects of security, personal privacy and data protection, and governance of information security in organizations. The programme also covers topics related to crime science, for example, digital forensics, intelligence analysis and technologies and methods for analysing social media.
The demand for educated information security specialists is already very high, almost always among the first top jobs in IT and in the coming years it is expected to continue its growth almost exponentially. Graduates of the programme are ready to work in the area of information security and related fields in both private and public sector organisations as managers, advisors and specialists providing professional and expert know-how, or with intelligence and investigations.
Stockholm University pioneered academic research and education in information security in Sweden in the 1960s. The university has since then contributed with thousands of graduates who are now part of academia and industry around the globe.
Important about selection The selection is made from the following three criteria:
It is therefore very important to submit a motivation letter . Find instructions for the motivation letter under “How to apply” below.
Congratulations! You have been admitted at Stockholm University and we hope that you will enjoy your studies with us.
In order to ensure that your studies begin as smoothly as possible we have compiled a short checklist for the beginning of the semester.
Follow the instructions on whether you have to reply to your offer or not. universityadmissions.se
Activate your university account
The first step in being able to register and gain access to all the university's IT services.
Register at your department
Registration can be done in different ways. Read the instructions from your department below.
Read all the information on this page
Here you will find what you need to know before your course or programme starts.
Your seat may be withdrawn if you do not register according to the instructions provided by your department.
Welcome to DSV!
We hope that you will enjoy your studies with us. Follow the link below for information about how to start your studies at DSV and how and when to enrol.
New student at DSV
Stockholm University organises a series of welcome activities that stretch over a few weeks at the beginning of each semester. The programme is voluntary (attendance is optional) and includes Arrival Service at the airport and an Orientation Day, see more details about these events below. Your department may also organise activities for welcoming international students. More information will be provided by your specific department.
su.se/welcomeactivities
Find your way on campus
Stockholm University's main campus is in the Frescati area, north of the city centre. While most of our departments and offices are located here, there are also campus areas in other parts of the city.
New student
During your studies
Student unions
Pre-departure information
New in Sweden
You will find detailed course information, list of course literature, schedule and start date on the course information page at "Courses and timetables". Select semester in the drop-down menu and search by course name. Courses and timetables
Programme outline We approach the subject area from both the business side and the technical side. This master’s programme includes courses such as:
The programme also includes studies relative to scientific communication and research methodology for computer and systems sciences, leading up to the independent thesis work in the final term before the graduation.
Two alternatives, depending on the student’s previous background.
Alternative 1: For students that do not have 90 credits in computer and system sciences, informatics or equivalent:
Mandatory course 1 x 15 credits
Supplementary course in Computer and Systems Sciences 15 credits
Alternative 2: For students with 90 credits in computer and system sciences, informatics or equivalent:
Mandatory course 1 x 7,5 credits Digital Forensics 7,5 credits
Elective courses 1 x 7,5 credits One from the following three courses: Advanced Requirements Engineering of IT-systems 7,5 credits Foundations of Data Science 7,5 credits Enterprise Computing and ERP Systems 7,5 credits
Alternative 1 and 2: Mandatory courses 2 x 7,5 credits
Fundamentals of Information Security 7,5 credits Information Security in Organisations 7,5 credits
Mandatory courses 4 x 7,5 credits
Scientific Communication and Research Methodology 7,5 credits Network Security 7,5 credits Cyber Forensics 7,5 credits Cyber Security 7,5 credits
For this semester, you have the possibility to apply for exchange studies. Note that , you must read the course Research Methodology for Computer and Systems Sciences 7,5 credits (or a similar course) during your exchange period to be able to write your thesis when you return. Exchange studies
Research Methodology for Computer and Systems Sciences 7,5 credits Intelligence and Security Informatics 7,5 credits Legal Aspects of Information Security 7,5 credits Information and IT-security Management 7,5 credits
Master thesis 30 credits
Required supporting documentation.
Motivation letter
The letter shall include:
Maximum one A4 page. Save the letter as “Motivation letter SMINO”. Submit the letter together with your application at universityadmissions.se
This program starts each autumn semester.
Please note that it is only possible to apply for this programme in the first admission round (mid-October to mid-January). The programme is not open for admission in the second admission round.
Find answers to the most common questions regarding application, requirements and study format (distance or campus). FAQ Master's programmes
Find the degree awarded for this programme in the syllabus, either in the right sidebar (desktop) or below (mobile device).
Please note, that you can only be awarded one bachelor’s degree, one master’s degree (60 credits) and one master’s degree (120 credits) in computer and systems sciences from our department.
Research subject at the department with relevance to the program:
Cyber Security
The job market for information security professionals is very good. Information security graduates from Stockholm University work, among other, as information security managers (CISO), information security consultants, cyber security specialists, cyber and digital forensics professionals. Some graduates choose to pursue their careers in research education that eventually leads to a doctoral degree in this exciting field.
Know what you want to study?
What can I study?
As a student at Stockholm University you get the benefit of living in the Swedish capital.
Here we explain all the different steps you need to go through when applying to a course or programme. Please read the instructions carefully.
Stockholm University arranges regular webinars and participates in educational fairs and events virtually and around the world to meet students and inform them about our study programmes. Meet us and ask what it's like to study with us!
Every year Stockholm University welcomes thousands of international students from all over the world. Each bringing their own backpack full of experiences, expectations and dreams. Each with their own story.
As a student at Stockholm University, you will have direct contact with leading researchers in your field and access to the most recent scientific findings. Our researchers. Your teachers. Meet a few of them here.
Are you wondering what former students thought about your programme? Are you curious about what your education can lead to after graduation? Hear from our alumni!
Cs 408 | english.
Lecturer: Prof. Dr. Frederik Armknecht Teaching Assistant: Youzhe Heng
The large-scale deployment of Internet-based services and the open nature of the Internet come alongside with the increase of security threats against existing services. As the size of the global network grows, the incentives of attackers to abuse the operation of online applications also increase and their advantage in mounting successful attacks becomes considerable.
These cyber-attacks often target the resources, availability, and operation of online services. In the recent years, a considerable number of online services such as Amazon, CNN, eBay, and Yahoo were hit by online attacks; the losses in revenues of Amazon and Yahoo were almost 1.1 million US dollars. With an increasing number of services relying on online resources, security becomes an essential component of every system.
This course aims to increase the security awareness of students and offers them a basic understanding with respect to a variety of interesting topics. After this course, students will be able to (1) learn about symmetric and asymmetric encryption schemes, (2) classify and describe vulnerabilities and protection mechanisms of popular network protocols, web protocols, and software systems (3) analyze / reason about basic protection mechanisms for modern OSs, software and hardware systems.
The final exam is a 90 minute written in-person exam. You may find up-to-date information on the exam schedule at https://portal2.uni-mannheim.de/portal2...flow . Please also check the “My Studies – My registrations” section in your student portal. The regular and re-sit exam dates, respectively, for the FSS 2024 will be made available as soon as they have been determined by the university administration.
See Portal2
Please register via Portal² to gain access to our ILIAS course in which you may find all lecture materials.
Once registered, you may access the course using the following URL: https://ilias.uni-mannheim.de/goto.php?target=crs_1475793
Date | Time | Room | Topics | Lecturers |
---|---|---|---|---|
Feb. 15 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Feb. 16 | --- | --- | --- | --- |
Feb. 22 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Feb. 23 | 13:45 – 15:15 | A5, B1.44 | Exercise Session 01 | Heng |
Feb. 29 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Mar. 01 | 13:45 – 15:15 | A5, B1.44 | Exercise Session 02 | Heng |
Mar. 07 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Mar. 08 | 13:45 – 15:15 | A5, B1.44 | --- | --- |
Mar. 14 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Mar. 15 | 13:45 – 15:15 | A5, B1.44 | Exercise Session 03 | Heng |
Mar. 21 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Mar. 22 | --- | --- | --- | --- |
Mar. 28 | --- | --- | /** Easter | --- |
Mar. 29 | --- | --- | * ... | --- |
Apr. 04 | --- | --- | * ... | --- |
Apr. 05 | --- | --- | * Break **/ | --- |
Apr. 11 | 13:45 – 15:15 | A5, B1.44 | --- | --- |
Apr. 12 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Apr. 18 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Apr. 19 | 13:45 – 15:15 | A5, B1.44 | Exercise Session 04 | Heng |
Apr. 25 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
Apr. 26 | --- | --- | --- | --- |
May 02 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
May 03 | 13:45 – 15:15 | A5, B1.44 | Exercise Session 05 | Heng |
May 09 | --- | --- | //Ascension Day (Public Holiday) | --- |
|
| |||
May 16 | 13:45 – 15:15 | A5, B1.44 | Armknecht | |
May 23 | 13:45 – 15:15 | A5, B1.44 | External speaker (Deutsche Bank) | |
May 24 | 13:45 – 15:15 | A5, B1.44 | Exercise Session 07 | Heng |
May 30 | --- | --- | //Corpus Christi (Public Holiday) | --- |
May 31 | 13:45 – 15:15 | A5, B1.44 | Lecture and Q'n'A | All |
Tracking cookies are currently allowed.
Tracking cookies are currently not allowed.
We regularly offer thesis work on e.g. the following topics:
Further potential IT security topics include traffic analysis, Shadow IT and vulnerability management
Start: by arrangement
Duration: min. 6 months
Become part of our team!
Send us your documents in digital form to:
Will gladly answer your questions:
A subreddit for all questions related to programming in any language.
Hello everyone, I am about to write my bachelor's thesis in the field of IT security and am looking for interesting and current topics that I could write about. I would like to hear your opinions and suggestions. Maybe there are certain areas that you are particularly interested in or where you see a need for further research? Or maybe you have even had experience with a fascinating topic that you can share? Thanks in advance!
By continuing, you agree to our User Agreement and acknowledge that you understand the Privacy Policy .
You’ve set up two-factor authentication for this account.
Create your username and password.
Reddit is anonymous, so your username is what you’ll go by here. Choose wisely—because once you get a name, you can’t change it.
Enter your email address or username and we’ll send you a link to reset your password
An email with a link to reset your password was sent to the email address associated with your account
When a system administrator configures a network so it is secure, he understands very well the users, data, and most importantly the intent—what he is trying to do. However,he has a limited understanding of the mechanisms by which components interact and the details of each component. He could easily miscongure the network so a hacker could steal confidential data. In addition to this complexity, about one hundred new security vulnerabilities are found each week, which makes it even more difficult to manage the security of a network installation---because of the large number of program vulnerabilities and challenging time constraints. Even professional administrators find this a difficult (impossible) task. How does one enable the system administrator to securely congure the network with a limited understanding of its components, program bugs and their interactions? The solution is a security analysis framework that modularizes information flow between the system administrator, security expert and the bug expert. The administrator specifies what he is trying to do, the security expert specifies component behavior, the bug expert specifies known bugs. We developed a rule based framework—---Multihost, Multistage, Vulnerability Analysis (MulVAL)---to perform end-to-end, automatic analysis of multi-host, multi-stage attacks on a large network where hosts run on different operating systems. The MulVAL framework has been demonstrated to be modular, flexible, scalable and efficient. We used the framework to find serious configuration vulnerabilities in software from several major vendors for the Windows XP platform.
We talked with Dr. Daniel Woods of the University of Innsbruck about our list of topics in February of 2021. Besides a short introduction of the topics, in the video we also rate them with regards to their feasibility and relevance for academia and the industry.
Getting into cyber insurance and risk quantification is not a straightforward process yet. Compared to varying degree well-established paths of starting a career in cyber security, established insurance lines of business, actuarial modeling, or insurance law, many current practitioners of the cyber insurance ecosystem are first exposed to the topic when they start their careers in the respective field, usually right out of university/college, or when they transition into it from their previous professional field.
While there are already a few dedicated degree university courses on cyber insurance, the majority of students that might have heard of cyber insurance will at most have had a single semester course on the topic and might have difficulties writing their bachelor or master thesis about cyber, be it for lack of awareness, availability of suitable academic chairs, or a lack of awareness for possible research topics. These difficulties are further magnified by the vastness and interdisciplinary nature of the topic, For example, a bachelor student of cyber security might be interested in cyber insurance, but not able to find access to the financial or law aspects of the topic during the completion of just three months.
While bachelor and master theses allow students to take a deep dive into a given topic and push the envelope (within reasonable constraints), cyber-economics.com wants to lower the barrier of entry for the cyber insurance and risk quantification industries and combat the chronic skill-shortage of quantitative cyber risk professionals by providing students and perhaps even academics with a list of topics that are suitable for a thesis and of ongoing interest for academic research community and industry.
As the quantification of cyber risk in an open field that touches many current and future industries and academic disciplines, we categorize the research topics broadly into qualitative and quantitative topics, with an occasional overlap of methods and thesis topics. In addition to the thesis topics, we provide the reader with literature recommendations that serve as a natural first step to dig deeper into a given topic.
Likely the first topic that was discussed in the academic cyber quantification literature, the insurability of cyber risks has been used by bachelor and master students as a thesis topic since the early 2000s. While the general question, if cyber risks are insurable given the current cyber insurance market with an estimated $5 to 8 Billion in worldwide written premiums today somewhat redundant, there are still a lot of derived questions that can provide a great thesis topic.
In the spirit of , , , and other papers, analyzing the contents of cyber insurance forms and policies provides tremendous insights for academics and the industry alike. The SERFF filling system ( ), which offers extensive up-to-date and historical documents of the US cyber insurance market, is a great source of primary information for this purpose.
Of special interest for insurers and brokers is the relationship between the coverage of cyber insurance and other related insurance types. Often the coverage of D&O (Link to cyber-economics.com page on cyber insurance), E&O, media liability, and general P&C (silent cyber, see below for a explicit discussion) , overlaps with the coverage of current cyber insurance policies. The question of how to structure cyber insurance with other insurance types is especially interesting, as there are two primary ways on how cyber insurance is currently sold, either as an addon on an existing P&C policy or as a standalone policy. The primary ways to investigate a question in this nexus are either via qualitative interviews or surveys with brokers, primary insurers, insurance lawyers, and risk owners, or by analyzing the wordings of cyber insurance and the (potential) overlap policies.
Standard research topics in microeconomics and contract theory, market failures induced by moral hazard and adverse selection can inhibit the efficient transfer of risks or prevent the formation of a functioning market for cyber insurance entirely. Linked to the insurability of cyber risks, the early academic literature on cyber of the 2000s and 2010s, in the absence of the sizeable cyber insurance market of today to empirically analyze, looked at these and other market failures as a consequence of asymmetric information or the inability for the cyber insurer to continuously monitor the cyber security maturity level of an insured entity. To setup a suitable, often agent-based model, agood way to start is to look at classical game theoretical games and adapt them to cyber as needed.
The underwriting process is the gatekeeper for cyber insurance and shapes the insurance market in many ways. While there is an overlap with analyzing current cyber insurance policies (Topic #2), e.g. by comparing what security controls or other information are required in the underwriting process, a thesis about this topic should likely involve interviews with underwriters or other industry practitioners to get additional insights into the current sentiments of underwriters towards cyber risk. gives a good overview and methodological template to conduct qualitative research into the underwriting process.
Cyber insurers have become an important principle for cyber security, law firms, PR firms and all other services or products that are involved in the claims management or underwriting process. Understanding the incentives of the various stakeholders, and perhaps even clearly mapping the current or future value chain in the first place, is important to understand and anticipate the future development of the cyber insurance market.
Analogous to topic 6, the cybercrime value chain is the dark side of the cyber insurance value chain and “producer” of the underlying cyber risk. The incentives of cybercriminals are a key consideration when it comes to cyber insurance. From recent developments of cyber crime-as-a-service and the wholesaling of databases and sensitivity of information over the darknet, the cybercrime value chain is perhaps as organized as the cyber insurance one.
In economic terms, all insurance types provide utility by smoothing the consumption of risk-averse parties, which in turn are willing to pay an economic premium on top of the expected value of damages. In the case of cyber, there are additional factors that impact the overall welfare.
A key feature of cyber incidents is that the overall costs are most often not solely internalized by the directly affected party, but also cause collateral damages to other firms and entities: Firms using the affected party as a supplier are not able to receive their raw materials and ransomware and phishing attacks can spread more quickly to business partners as well. While the damages of the directly affected party are usually only slightly increased by these collateral damages, e.g. through fines for broken service level agreements, the social planner, usually the government, following standard economic welfare theory, should internalize all damages regardless of who suffers them. Cyber incidents are, therefore, a negative externality and its mitigation via cyber insurance or a better cyber security maturity level is a positive one.
Another factor that impacts the overall welfare effect of cyber are possible substitutions of the cyber security budget of a firm by cyber insurance: If the premiums for a cyber insurance policy are paid from the existing cyber security budget, the overall cyber maturity level of a company is likely to be adversely affected and the underlying risk could even increase.
Positive externalities for cyber include the minimum requirements to get a cyber insurance policy, which prompts poorly secured companies to invest more into cyber security as a prerequisite for cyber insurance, possible cross financing opportunities of cyber security measures with a premium reduction in insurance, the knowledge transfer between the insurer and insured, and the mitigating effects of a prompt incident response orchestrated by the insurer compared to the damages the insured suffers without premeditated external help.
Insurers have to adhere to regulatory requirements such as Solvency II in the European Union. Solvency II consists of three pillars that define governance, reporting, and risk capital requirements. The Solvency II standard formula mandates an insurance company to have a maximum annual risk of ruin of 1-to-200 or 0.5%. Especially for cyber risks, the standard formula might be underestimating the fat tails of cyber and, therefore, underestimate the risk of ruin of insurers underwriting cyber, as discussed by .
An interesting possible research angle for this topic is the aforementioned SERFF filing system, which besides accepted rate schedules and documents also shows rejected and modified ones, as well as the correspondence between insurer and regulator. The unprecedented insights into how cyber insurance is regulated on an operative level have so far not been analyzed in the academic literature and might be a great thesis topic.
A great hurdle and growing concern for insurance carriers is silent cyber or non-affirmative cyber. In contrast to all affirmative cyber policies that explicitly provide protection against cyber incidents and their related causes, silent cyber describes the exposure of insurers to cyber damages in traditional property and casualty lines of business. A property example of a silent cyber claim is a fire that was started after a hacker manipulated the temperatures of a blast furnace in a steel mill or the loss of a week production of a food manufacturer because a ransomware attack has disrupted the cold chain by disabling the refrigerators. While these claims are a direct consequence of a cyber incident and would likely be covered by most affirmative cyber policies, they might be also be covered within an existing fire or loss of production insurance. This means that every P&C carrier is likely already incurring cyber-related losses, even though it might not even be offering affirmative cyber coverage.
One of the most important measures to combat silent cyber has been the silent cyber mandate by Lloyd’s of London, which requires all P&C policies underwritten in London to clearly state if they cover cyber damages. Mandatory for property policies since 2020 and 2021 for liability policies, it is perhaps a little bit too early to empirically analyze the effects of the silent cyber mandate. However it will become one of the most tangible sources for the market reaction and sentiments towards silent cyber.
While cyber insurance has seen a sharp rise in awareness and market penetration, there is still a lot of misconceptions about it in the minds of risk owners. Anecdotally speaking, the willingness of risk owners to pay for cyber insurance is low unless they or someone in their immediate peer group is hit by a cyber attack. As these behavioral inefficiencies of cyber insurance also apply to cyber security as a whole, an important research topic is how to phrase and present the facts regarding cyber to the wider public. This of course, has a natural intersection with the commercial interests of brokers and primary insurers that are looking to increase their sales.
The European Union started the CYBECO Grant ( ) in 2018 to study the behavioral aspects of cyber. The programs website is a good starting point in the topic.
Of tremendous importance for cyber risk research is the modeling of cyber damages. While looking monolithic on the surface, cyber risk modeling actually encompasses a plethora of different questions and methods. In the context of cyber insurance, the three most important questions are the (1) pricing of cyber insurance policies based on factors such as industry type, security questions, requested coverage of a given applicant, (2) the modeling of cyber damages for a given entity (firms or natural persons), with or without cyber insurance, and (3) the modelling of cyber damages for a given industry sector or cyber insurance portfolio, which are highly dependent on the correlation between cyber damages. While these questions are deeply linked to each other, from an operative view they have varying relevance for different stakeholders of the cyber insurance value chain. For example, primary insurance underwriters are often looking at the pricing of a single policy, while reinsurance underwriters are more concerned with the correlation and performance of the entire portfolio.
The approaches to model cyber also differ. The straightforward to fit a distribution to a damage dataset can and is also be utilized to model cyber, for example, by . However, because of the evolving and hard to predict threat landscape, this method does not yield the same predictive value for more traditional risks. Additionally, in the context of a bachelor or master thesis, the above discussed limited availability of free datasets might be an additional hindrance.
Besides the tried and tested method in the actuarial sciences to fit distributions to damage datasets, which are classified under 1.2.1 in our cyber-economics.com library , there are other approaches that might be interesting for a thesis. Under 1.2.2 Scenario/Catastrophe Analysis , we have gathered studies and papers that look at possible economic and insurable losses arising from bad to worst-case scenarios, like a widespread ransomware attack or outage of a major cloud provider. Under 1.2.3 Network/Node Models , you can find modeling approaches that are based on computer systems based on atomic nodes and connected via edges, which have inherent similarities with the modelling of pandemics.
Quantitative topics often require empirical cyber damage datasets or distributions. These datasets are hard to come by in general, especially if they are free of charge. The following sources for data are freely available and most of them have been used in the academic literature. We add new datasets to the 3.1 Cyber-Damages/-breaches/-Incidents Dataset in our cyber-economics.com library .
A completely different approach to modeling cyber is employed by , which reverse engineers cyber damage loss distributions based on current rate schedules of insurers. From an epistemological standpoint, rather than modeling cyber damages directly, this method quantifies the sentiments of insurers towards cyber risk. While, of course, the rate schedules should be closely connected to the “real” cyber loss distributions, at the very least this approach captures the attitude of entities that put their money where their mouth is. The mentioned paper of woods et all averages out the reverse-engineered cyber distributions of 17 insurers to provide a consensus loss distribution. However, especially within the time constraints of a bachelor and master thesis, it is probably a better idea to apply the method of Woods to a single or few recent rate schedules of a major insurer, to get an up-to-date cyber loss distribution.
Pricing higher cyber risk transfers via reinsurance within the insurance sector or with cyber bonds via the capital market is an important topic for the insurance industry, possible capital market investors, and academics. While for the pricing based on single risks the correlation between cyber damages can be neglected, it becomes the most consideration for higher risk transfers. Getting a suitable dataset to empirically model the correlation of cyber damages becomes even more difficult than getting one for cyber damages. Often the parameters guiding the correlation between damages are, therefore, exogenously imposed or derived from other parameters or assumptions within the model. A robustness analysis, i.e, changing the correlation parameters to simulate a low, medium, or high correlation, is then used to analyze the results with respect to their sensibility towards the model parameters.
Daniel Kasper is the principal of Cyber Economics.
cyber-economics.com provides you with the newest developments and news about cyber risk from academia and the business sector.
COMMENTS
National University offers a Bachelor's degree program in Cyber Security with a focus on preparing students for careers in this high-demand field. The program costs $28,480 in 2019, $30,980 in 2020, and $31,698 in 2021. ... Choosing between a thesis and a non-thesis Cyber Security degree program can feel like a big decision, but it really boils ...
The admission to this program is based on a holistic view of the following criteria: a) Resume b) Personal Statement c) Minimum GPA at 2.5 if prior degree in Information Systems or a related field; otherwise, minimum GPA at 3.0. 4-year Bachelor's Degree d) Prerequisites Basic knowledge in the areas of Networking, Programming, and Database is essential to study the MSIS program.
The deadline for thesis defense for Graduate School candidates graduating in the fall 2024 is Friday, November 22, 2024. The deadline for Graduate School candidates to submit theses, paper in lieu of thesis, comps reports, and transfer credits is 12:00 noon on Friday, December 6, 2024. Attendance: Participation in commencement is
BACHELOR'S THESIS | ABSTRACT . TURKU UNIVERSITY OF APPLIED SCIENCES . Information Technology . 2017 | 46 . ChangLiu . INVESTIGATING NETWORK SECURITY THROUGH FIREWALL UTILITIES - CASE OF CISCO ASA . Firewalls are important components of any system for information security as they are the initial line of defense against attacks on security.
Thesis (M.M. (Security))--University of the Witwatersrand, Faculty of Commerce, Law and Management, Graduate School of Public and Development Management, 2016 Technological advancement have seen South African government departments, state owned entities and private companies using cyberspace as a platform of interaction and the storage of ...
We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects. ... Bachelor: 2021: History of Security Advice on Stack Overflow: Master: 2021. A Comparison of the acceptance of contact-tracing apps in the Covid-19 pandemic in the USA, India, the ...
Theses (Bachelor/Master) We offer thesis topics related to cryptography, IT security and Blockchain technologies. Our major areas of research are: Hardware cryptography: for example, designing new cryptographic primitives that are provably secure against side-channel attacks, analyzing existing countermeasures and benchmarking their efficiency.
THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT. This thesis focuses on studying and analyzing the Cloud Computing technology in concept and its security, which is still a developing technology with great convenience and portability for exchanging information over the Internet via different platforms.
Bachelor's theses should be written in German. Graduate students preparing a Master's thesis should have substantial knowledge in at least one sub-field of security or privacy and they should have prior experience with the research methodology they plan to use. The default language for Master's theses is English.
Looking for a Bachelor-Thesis topic. Hello everyone, I'm studying computer science with a specialization on cyber security. I'm approaching my final semester and I'm trying to find an interesting topic. Unfortunately I only came up with some standard topics such as developing a malware. I have seen interesting topics like the lava lamp ...
Automating complex security tasks is a rather new field, with plenty of room for growth. Security automation ranges from using basic scripts to more complex processes like integrating machine learning and artificial intelligence in security software. This thesis discusses the methods and benefits of security automation, and explores its
Improving IT administration security by using security controls based on security frameworks Jyväskylä: JAMK University of Applied Sciences, May 2022, 60 pages. Technology, communication and transport. Degree Programme in Cyber Security. Master's thesis. Permission for web publication: Yes Language of publication: English Abstract
Criminal Law. Cyber Security Future Research Topics. Developing more effective methods for detecting and responding to cyber attacks. Investigating the role of social media in cyber security. Examining the impact of cloud computing on cyber security. Investigating the security implications of the Internet of Things.
The third section encompasses the main body of my Bachelor thesis. The relationship between cyber-security and objectives of the EU are investigated. Cyber-security policy and regulation Pre- and Post-Lisbon is mapped out by looking at EU Treaty Articles and policy documents such as Communications, Regulations, Directives and Strategies.
Bachelor Thesis Information Security - Free download as PDF File (.pdf), Text File (.txt) or read online for free. This document discusses the challenges of writing a bachelor's thesis on information security. It notes that the process requires an in-depth understanding of the subject matter as well as strong research, analytical, and writing skills.
Exploring Architectural Techniques to Improve the Efficiency of Memory Security. Student thesis, supervisor: Pavlos Aimoniotis, examiner: Johannes Borgström, Stefanos Kaxiras, IT nr 22 ... Student thesis (Bachelor Programme in Computer Science), supervisor: Niclas Hedenskog, examiner: Iordanis Kavathatzopoulos, Anders Jansson, IT nr 10 049 ...
21 Fresh Dissertation Topics for You (Absolutely Free) Without further ado, here are the 21 thesis topics for IT students that we think are the most interesting and engaging: Conducting virtual business in the era of 3D Internet - the business of the future. Analyzing e-tourism services in the UK: Factors that Influence Customer Satisfaction.
Information security and cybersecurity are some of the most exciting and growing areas within IT. ... Computer and Systems Sciences 7,5 credits (or a similar course) during your exchange period to be able to write your thesis when you return. ... that you can only be awarded one bachelor's degree, one master's degree (60 credits) and one ...
Malware is an often-used method in cyber criminality. Malware is malicious software used to accomplish identity theft, cyber espionage, and disruptions in systems. Malware appears in the form of viruses, Trojan horses, and ransomware [24]. In contrast to a typical bug, malware is an attempt designed to cause harm.
The large-scale deployment of Internet-based services and the open nature of the Internet come alongside with the increase of security threats against existing services. As the size of the global network grows, the incentives of attackers to abuse the operation of online applications also increase and their advantage in mounting successful ...
This thesis will lay out the importance of connectivity in our society - from the individual user to national security and the military. I will examine the vulnerabilities, cite case studies, and look at the consequences the cyberattacks have or could have on society. To best frame my research, I will include recent cyber events and examine the
Master- & Bachelor-Thesis in Information & IT-Security. We regularly offer thesis work on e.g. the following topics: Mobile security, automotive IT security,cloud computing security, IT risk analysis according to ISO/IEC 27005, information security management according to ISO/IEC 27001, methods/tools for the implementation of technical assessments
Hello everyone! I am currently studying Cybersecurity in the Bachelor and I am looking for an interesting topic for my Bachelor thesis. My focus is on the area of databases and their security, as I am particularly passionate about this topic. furthermore I am also interested in the topics: - Cloud Security. - Automotive Industry.
I am about to write my bachelor's thesis in the field of IT security and am looking for interesting and current topics that I could write about. I would like to hear your opinions and suggestions. Maybe there are certain areas that you are particularly interested in or where you see a need for further research?
The administrator specifies what he is trying to do, the security expert specifies component behavior, the bug expert specifies known bugs. We developed a rule based framework—---Multihost, Multistage, Vulnerability Analysis (MulVAL)---to perform end-to-end, automatic analysis of multi-host, multi-stage attacks on a large network where hosts ...
In addition to the thesis topics, we provide the reader with literature recommendations that serve as a natural first step to dig deeper into a given topic. 1. Insurability of Cyber Risks. 2. Analysis of Cyber Insurance Policies contents, Wordings, Pricing, Security questions etc. 3.