Cyber security is the field of science that is developing constantly and rapidly, so there are always lots of interesting topics for the research papers or even a thesis. Worry no more! Software updates and patches and their importance, The most well-known closed vulnerabilities, The unified user profiles, their advantages and dangers. Dr. Khaled Mahbub Khaled Mahbub (PhD, MEng, BEng) is a senior lecturer in software engineering at Birmingham City University. We use cookies to give you the best experience possible. Diana from A Research Guide Don't know how to start your paper? In the past Khaled has worked in several EU funded projects including, CUMULUS (Certification Infrastructure for Multi-Layer Cloud Services, EU FP7, STREP Project), ASSERT4SOA (Advanced Security Service cERTificate for SOA, EU FP7, STREP Project), S-CUBE (The Software Services and Systems Network - FP7 EU Project), Gredia (Grid enabled access to rich media content - FP6 EU Project), Serenity (System Engineering for Security & Design, FP6 EU Project), SeCSE (Service Centric System Engineering, FP6 EU Project). Property of | Privacy Policy, Dickey’s Barbeque Restaurant, an American chain with over 400 locations, has, MuddyWater, a government-linked Iranian APT, has, The Iranian hacking group ‘Silent Librarian APT’ has been, The American bookseller giant Barnes & Noble has, The operators of the Ryuk ransomware have, SonicWall, a former Dell subsidiary offering content control and security appliances, has. Get professional writing assistance from our partner. Even when we are totally offline walking in the park, there are cameras around us and lots of digital devices that could be turned on us if not the security specialists who protect them from intervention and enhance this protection every day. Automating the process of CTI sharing, and even the basic consumption, has raised new challenges for researchers and practitioners. Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Moreover, the findings reveal which topics were widely discussed, and hence considered relevant by the authors and cyber threat intelligence sharing communities. He has published more than 30 papers in different international journals and conference proceedings with more than 800 citations. But not to worry, we’ve gathered the best and most innovative academic cyber security thesis topics and put them in one list, which you’ll find below. He started his PhD at Birmingham City University in September 2014, where he researches the field of cyber threat intelligence. So no wonder that the meaning of security was significant from the very beginning. Click to learn more, Works Cited, References, and Bibliography, The policy of installing applications to the phones and tables, Security measures in Windows, Unix and MacOS, The ways of network intrusion and their detection and prevention, The most prominent pandemics of cyber viruses. Today’s security systems themselves are not able to move as fast as attackers. Sectoral and Thematic Threat Analysis reviews the threat landscape for specific sectors and technologies, including specifically the EU Agency for Cybersecurity’s work on 5G, the Internet of Things (IoT) and smart cars. In 2011, he completed his Master of Science degree with distinction in Information Assurance at the same institution. The vulnerabilities of the digital world shouldn’t cause paranoia, but still the basics of digital security are worth learning for everyone who uses the benefits of modern civilization. Later, when Internet became accessible for almost everyone, the criminals also started to use it for their own goals. Her main research interests include design, analysis and implementation of cooperation-based cryptographic protocols for fully decentralised networks and applications in emerging areas ranging from Internet of Things, smart cities, assisted living, and smart transportation. She has published a number of peer reviewed conference and journal articles. If you are struggling with the topic for your research paper on cyber security, try looking through our list of sample ones. For the latest discoveries in cyber research for the week of 19th October 2020, please download our Threat Intelligence Bulletin. All rights reserved. Check Point SandBlast and Anti-Bot blades provide protection against this threat (Ransomware.Win32.Thanos), Check Point SandBlast provides protection against this threat, Check Point IPS provides protection against this threat (Microsoft Windows TCP/IP Remote Code Execution (CVE-2020-16898)), © 1994new Date().getFullYear()>1994&&document.write("-"+new Date().getFullYear()); Check Point Software Technologies LTD. All rights reserved. He leads “information security” research at BCU focusing on topics ranging from identity management, access control and privacy to securing shared information in virtual organisations and the development of high assurance secure and resilient software. We use cookies to help provide and enhance our service and tailor content and ads. Check Point SandBlast Mobile provides protection against this threat Within an hour of discovering a vulnerable service in an enterprise, an attacker could use that service as a lateral movement channel across hosts. 16% of all election-related domains created in September were malicious, and among new domains, those related to the election are 56% more likely to … Pssssst…enter your details to find out the price. of service and privacy policy. 30 Cyber Security Research Paper Topics. Dr. Esther Palomar Esther Palomar is reader in Cyber Security in CEBE at Birmingham City University since September 2013. The police all over the world has to study how to deal with this type of crimes, the safety lessons for kids prepare them for the hazards of digital world… Of course, the big companies that have all the reasons to keep their data secret and intact invest incredible amounts of money to increase the digital security all over the world. The motivation for this research stems from the recent emergence of sharing cyber threat intelligence and the involved challenges of automating its processes. She has a PhD in computer science (2008) from University Carlos III of Madrid where she worked as Assistant Lecturer for nine years. What is firewall and how it helps to protect the network? Cyber Threat Intelligence Overview summarises the most important topics relevant to the cyber threat intelligence (CTI) community. Copyright © 2010 - 2019A Research Guide. © 2019 Elsevier Ltd. All rights reserved. We'll occasionally send you account related and promo emails. The report assesses the state-of-play of cyber threat intelligence (CTI) as a dynamic cybersecurity domain. By continuing we’ll assume you’re on board with our cookie policy. Every new gadget and software product becomes the target for cyber criminals sooner or later, so their manufacturers do everything that is possible to be one step ahead. Check Point Research has warned against a surge of attacks leveraging the 2020 US presidential elections. Esther was invited as Visiting Professor at INRIA in Paris (2009) and Simula Research Laboratory in Oslo (2012) for 6-month period each. By continuing you agree to the use of cookies. He lectures in information security, information risk management, software security, distributed systems and formal methods. Mr. Thomas D. Wagner Thomas received his bachelor of science degree from London South Bank University completing a course in Electronic Business Information Technology in 2009. Thomas worked for T-Systems in Sao Paulo, Brazil as an Application Support Analyst from 2011 to 2014. White hat and black hat hackers: who are they? She regularly serves as reviewer for a number of international journals and technical program committee member of conferences on computer science. This work comprises a considerable amount of articles from academic and gray literature, and focuses on technical and non-technical challenges. This analysis aims to indicate the main trends in the expeditious development of CTI by providing relevant references and summarizing the next steps required to advance this topic … Check Point researchers have addressed the possible security and privacy risks users of the COVID-19 contact-tracing applications face, from GPS tracking and data collection to fake applications and unauthorized data theft. Automating the process of CTI sharing, and even the basic consumption, has raised new challenges for researchers and practitioners. By clicking "Log In", you agree to our terms Attackers move fast, and we defenders have to move faster. Internet as the global network was made primarily for the military purposes. He currently studies his PhD part-time and works full time as a Threat Analyst at ETAS (Bosch Group) in Stuttgart, Germany. Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Threat Intelligence Reports. They are capable of detecting partial steps of attacks or well-known … Internet as the global network was made primarily for the military purposes. The cyber security specialists and cyber criminals started the competition that can be compared with development of offensive weapons and defensive ones to withstand the attacks. Prof. Ali E. Abdallah Ali E. Abdallah is a professor of information security at Birmingham City University. The digital security is a constantly changing field, but maybe, with some proper updating and modification, they will inspire you to make an awesome paper. This extensive literature survey explores the current state-of-the-art and approaches different problem areas of interest pertaining to the larger field of sharing cyber threat intelligence. Cyber security is the field of science that is developing constantly and rapidly, so there are always lots of interesting topics for the research papers or even a thesis.

Clarins Anti Aging Reviews, 5 Importance Of Science And Technology, Microsoft Dynamics Gp Demo, How To Dry Anchovies, Birthright Near Me, Nhs Pension Annual Allowance 2020, Alex Saint Urbain, Giada Vegetarian Pasta, Xo Communications Verizon, Net Benefit Wikipedia, Mike Brewer Motors Closed, 1 Nenokkadine Stream, Xbox One Elite Controller Series 1, High Smoke Point Oil For Cast Iron, Telus Internet 75 Vs 150, Chris Moyles Show Pippa, Ebay Office Chair, Jamil Walker Smith Net Worth, Parental Leave Policy 2018, Hello Sunshine Beverly Hills, Large Rectangle Cake Pan, Adairs Forest Hill, Oldest Buildings In Saskatchewan, Korean Udon Recipe, Homophone Of Hair, Sisi Ticket Coupon Code, How To Make Friends In Class,