Locate an interesting topic on cybersecurity, policy, threats, behavior, etc.
Here are some pointers that will help critically evaluate some viable topics.
• Is the topic attainable for a first-time dissertation student?
• Is the problem rooted in the literature?
• Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
• Is there a theoretical model or framework discussed?
Discuss the topic, the problem the model has been used in the research, and any present findings.
Sample Solution
One interesting topic on cybersecurity is the use of machine learning algorithms to detect and mitigate cyber-attacks. Machine learning algorithms are increasingly being used by companies and organizations to take proactive measures in the face of new security threats, as they provide an effective means of detecting malicious activity before it can cause a major disruption. The primary benefit of using machine learning algorithms is that they can be trained to recognize patterns in large data sets that may not be obvious or easily identifiable by human analysts. For example, one type of machine learning algorithm known as a deep neural network can be used to identify suspicious activities like network intrusions and malware attacks by identifying anomalous behavior within a system.
Sample Solution
One interesting topic on cybersecurity is the use of machine learning algorithms to detect and mitigate cyber-attacks. Machine learning algorithms are increasingly being used by companies and organizations to take proactive measures in the face of new security threats, as they provide an effective means of detecting malicious activity before it can cause a major disruption. The primary benefit of using machine learning algorithms is that they can be trained to recognize patterns in large data sets that may not be obvious or easily identifiable by human analysts. For example, one type of machine learning algorithm known as a deep neural network can be used to identify suspicious activities like network intrusions and malware attacks by identifying anomalous behavior within a system.