osorioartist – Fotolia
A graduate-level information security project should make a timely, original contribution to an ongoing problem…
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
You forgot to provide an Email Address.
This email address doesn’t appear to be valid.
This email address is already registered. Please log in.
You have exceeded the maximum character limit.
Please provide a Corporate Email Address.
Please check the box if you want to proceed.
Please check the box if you want to proceed.
By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.
or debate in the field. The best cybersecurity thesis topics will therefore explore issues of current importance to the broader infosec community, ideally with some degree of both academic and practical utility. Topics should be timely — grounded in current research, challenges and discourse — and have relevance that promises to extend beyond immediate publication. A security analysis of an electronic voting application, for example, would likely generate both current and long-term interest within the IT community.
Rather than trying to find the ideal subject immediately, however, avoid analysis paralysis by drafting a working list of possible cybersecurity thesis topics, which you can then explore, research and refine as you continue to gather information. To start brainstorming, review recent course materials, academic papers and media articles to see what themes and patterns catch your attention. Certain topics, like security awareness training and testing, are of both perennial and growing interest. Others, such as biometrics and AI, are still emerging.
“If I were working on a thesis right now, I’d focus on the use of AI in security tools,” said Andrew Froehlich, president of analyst firm West Gate Networks. In particular, he suggested exploring AI’s ability to review multiple security information streams and form analytical opinions on difficult-to-solve data security issues.
“Another great topic is the concept of fully autonomous security tools that use AI to not only find a root cause, but also have the intelligence to automate the remediation of a security event,” Froehlich added.
Håkon Olsen, security engineer and founder of cybersecurity firm Cybehave, weighed in on cybersecurity thesis topics in a recent forum on Quora, where he suggested tackling the subject of identity management.
“Investigate how to maximize security within each user’s threshold for usability impact,” Olsen wrote, adding that most users don’t use two-factor authentication when it’s available. “How much security can we inspire them to ‘turn on’ for a service?”
The evolving position of the CISO provides yet another rich and timely subject area: What is the scope of the CISO’s role, relative to both IT and lines of business, and how has it changed? What are predictors of CISO success? How do turnover rates in CISO positions compare with those in other C-level positions? What are the CISO’s responsibilities following a security breach? The list continues.
Still another resource for ideas, leads and inspiration is Cybersecurity Canon, a Palo Alto Networks project started in 2013 by then-CSO Rick Howard. Modeled after the baseball and rock-and-roll halls of fame, the Cybersecurity Canon committee recognizes a variety of must-read books for their timely and significant contributions to the infosec field. The group itself consists of security executives, analysts, consultants and practitioners.
Finally, students should think about their professional goals and consider how the right cybersecurity thesis topics could eventually help them land their dream jobs. Some projects might provide the opportunity to acquire deeper expertise in a given subject area, for example, or the chance to gain meaningful, proven experience using a particular toolset or coding language. Ask yourself how you might use this project to not just complete your degree, but also to advance your career. This line of thinking can also help identify potential cybersecurity thesis topics you find particularly interesting — a prerequisite for a project of this magnitude.
Fog computing vs. edge computing — while many IT professionals use the terms synonymously, others make subtle but important distinctions between … Continue Reading
Is there a difference between a wireless access point and a router? Yes. While the two devices are related, they meet different needs in a Wi-Fi … Continue Reading
While many IT professionals use VoIP and IP telephony synonymously, some argue for keeping a couple of subtle distinctions between the two terms in … Continue Reading
Enterprises need integrated security and networking frameworks to manage distributed IT environments and are looking to SD-WAN …
Automated pre-change network validation with Batfish can save time in the network change management process and minimize …
Valmont Industries wants an agile WAN that the company can modify in days instead of months. The global manufacturer is testing …
Creating a safe metaverse experience means bringing all stakeholders to the table, according to experts.
Traditional shadow IT is giving way to business-led technology deployments that have the IT department’s approval. But CIOs must …
Experts speaking during ITIF’s AR/VR Policy Conference pointed out that businesses need to head into the metaverse with a strong …
Microsoft’s Windows 11 2022 Update includes features for protecting sensitive corporate data and helping remote workers avoid …
When a Windows 11 desktop keeps restarting, there are a few factors that may be behind the issue. IT administrators should …
Users need unfettered access to all their apps and services to maintain productivity. Windows monitoring tools can verify the …
With alerts, cost analysis dashboards and other features, Azure cost management tools can help admins more clearly see their …
Discover the differences between Azure Data Factory and SSIS, two ETL tools. These contrasts include key data management features…
An extension of the Azure DevOps service, Azure Artifacts can help developers manage and share packages to streamline the overall…
The National Crime Agency did not seek a written explanation of a French hacking technique before applying for a surveillance …
Copenhagen-based startup initiative is driving fintech developments across the Nordic region, with Mastercard its latest global …
Artificial intelligence promises to revolutionise healthcare, but even in areas such as medical imaging, where it is easy to spot…
All Rights Reserved, Copyright 2000 – 2022, TechTarget
Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info