Topic 1: Impact of malware on the cyber security of an organisation
Research Aim: Malware may negatively affect both people and businesses, from slowing down the network to stealing the data, or even taking control of it. This study will analyse the impact of malware on the security systems of an organisation. The study will also identify the factors through which the cyber-security of an organisation can be vulnerable. This study will employ a mixed research method.
Topic 2: Importance of anti-malware application to prevent cyber-attacks
Research Aim: By analysing inbound data to prevent malware from being executed and attacking a system, antimalware can help while handling malware attacks. The study aims to analyse how significant is an anti-malware application and protects a system from cyber-attacks. This study will also identify different malware applications and which is the most effective application. The study will employ a secondary research method to complete the research.
Topic 3: Significance of cloud security posture management in cyber-security in cloud networks
Research Aim: A market niche for IT security technologies called Cloud Security Posture Management (CSPM) is created to find misconfiguration problems and compliance hazards in a cloud network. This study will aim to identify how cloud infrastructure verifies for inconsistencies in the application of security policies is a key goal of CSPM programming. This research will implement a mixed research method to signify the cloud security posture management in cloud networks.
Topic 4: The interrelation between cyber-security and cookies
Research Aim: Cookies can be used by cybercriminals to manipulate web browsers into thinking a website is unavailable. The study aims to analyse how cybercriminals put code and stole cookies. The study will also identify how cookies can be utilised by cybercriminals to access sensitive user data. The study will utilise secondary research methods to accomplish the investigation.
Topic 5: Impact of a firewall to prevent cyber-attacks in cyber-security networks
Research Aim: Most data transmission is monitored by a firewall, which can also recognise and restrict undesirable traffic. The goal of this study is to highlight the potential features of a firewall while preventing cyber-attacks. The study aims to provide a detailed overview of the various categories of current and contemporary firewalls. The study will use a secondary research methodology to complete the research.
Topic 6: Security initiatives of operating systems (Windows, Ubuntu, UNIX, and MacOS) capable to prevent cyber-attacks?
Research Aim: Nowadays operating system plays a vital role in preventing cyber-attacks. The study is intended to identify the most resilient operating system that can prevent a cyber-attack. The study will also analyse the significance of that operating system and what are the factors through which it sustains cyber security. This study will employ a mixed research method while analysing the perfect operating system for cyber security.
Topic 7: Implications of computer forensics and it is significance in this digital era
Research Aim: Computer forensics is considered to be the most helpful tool in cyber-security while analysing deficiencies in a system. It also assists in identifying network vulnerabilities and developing countermeasures for them. This study will identify how computer forensics is performed to sustain cyber security. Another goal of this research is to analyse how computer forensics assemble, prepare, keep, and examine evidence relating to computer systems to maintain cyber security. This study will employ a secondary research methodology to complete the study.
Topic 8: How cyber security can be ensured while reducing data breaches: pros and cons of mitigating a data breach
Research Aim: A data breach may occur accidentally or on purpose, sensitive information of a company can be leaked through a data breach by a cybercriminal. The goal of this study is to analyse how cyber security can be ensured by mitigating data breaches. Moreover, the study will also identify the initiatives to control or even eliminate data breaches in a network. The study will adopt a secondary research method to complete the investigation.
Topic 9: Impact of data protection laws on the cyber security of an organisation
Research Aim: Around the world, new rules are going into force to control how personal data is collected, used, retained, disclosed, and disposed of. This study aims to analyse the impact of data protection laws on the cyber security of an institution, and how data protection laws restrict an organisation to follow the regulation set by the government. This study will use a secondary research methodology to complete the research.
Topic 10: Impact of vulnerability analysis and reverse engineering on the cyber-security initiatives
Research Aim: Without an awareness of the runtime characteristics of a binary, the majority of issue disrupts computer forensics investigations and environments and cannot be completed correctly. This study will analyse the significance of vulnerability analysis and reverse engineering while maintaining cyber-security. Furthermore, the study will identify the factors through which vulnerability analysis and reverse engineering ensure cyber-security.
Topic 11: Impact of data storage centralisation on the cyber security
Research Aim: There are several entry points by which cybercriminals can breach the data of a firm which increases as a result of data being scattered across multiple machines. The study aims to identify how a network or computing servers can share databases, files, and data through centralised storage. This study will employ a secondary research method to complete the study.
Topic 12: Importance of data governance in cyber-security
Research Aim: Any firm focused on its ability to improve processes, performance, and decision-making must quickly adopt good data governance. The goal of this study is to analyse how data governance can sustain cyber security. The study will also analyse the components of data governance while maintaining cyber security. The study will use a secondary research method to complete the research.
Topic 13: Impact of data privacy on cyber security
Research Aim: An appropriate data handling concerning consent, notification, sensitivity, and regulation considerations is regarded as information privacy. This study aims to analyse the effect of data privacy on cyber security. The study will identify the data privacy initiatives that can ensure cyber security within an institution. This study will employ a mixed research method to complete the investigation.
Topic 14: Impact of remote working on the cyber security of an organisation
Research Aim: The disruption of the pandemic and the mobility of the workforce led to an increase in highly skilled data breaches and cyberattacks. The study attempts to determine the key cyber security concerns for enterprises and also the trends in cyberattacks and responses by cyber security professionals. The study will also identify patterns of illegal data breach attempts, and also the impact of these attempts on the reputation of the organisation. The study will employ a mixed research method to complete the investigation.
Topic 15: Utilising cyber security intelligence to reduce cyber crimes
Research Aim: Through the analysis of threat data and the provision of information about enemies, cyber intelligence is indeed the information that enables organisations to stop or lessen cyberattacks. This study will analyse the aspects of cyber security intelligence through which cyber-threat management and cyber threat detection are performed. The study will determine the cyber intelligence collection technique to mitigate cyber-attacks. This study will implement a qualitative research method to analyse the research topic.
Topic 16: Significance of communication and network security
Research Aim: The core components of this area of information security include protecting communications, networks, and information systems that construct cyberspace. This research aims to identify how communication and network security reduce the occurrence of a cyberattack. The study also aims to analyse different paradigms of communication and network security. The study will employ a qualitative research methodology to complete the research.
Topic 17: Impact of employee training with regards to information security on the cybersecurity of an organisation
Research Aim: Information security aims to protect sensitive data, including financial data, intellectual property, and consumer account information, while also maintaining user privacy. This study will identify how information security awareness and training of employees are beneficial for the cybersecurity of an organisation. The study will also analyse the critical factors of employee training through which employees are trained to secure sensitive data of an organisation. This study will implement a secondary research method.
Topic 18: Critical cyber security initiatives after a cybersecurity breach
Research Aim: Indeed, several important initiatives must be taken after a cyber-security breach or hacking. This study will analyse the main precautionary measures that an organisation or an individual must take after a cybersecurity breach. The study will also identify the approaches to mitigate a cyberattack after its occurrence. The study will employ a qualitative research approach to find out the precautionary measures after a hacking or cyber security breach.
Topic 19: Importance of cybersecurity to control money laundering
Research Aim: Money laundering can be done with certain anonymity and also the ability to transfer unlawful funds swiftly between accounts. This study will examine how cyber security is essential to minimise money laundering attempts. The study will also identify how cyber security can sustain transaction monitoring checks and customer due diligence and restricts money launderers from illegally transferring money between accounts. The study will use a mixed research approach to complete the study.
Topic 20: Impact of the legal framework on cybercrimes
Research Aim: The increased utilisation of electronic and computing technologies has resulted in both legal and technical issues, cybersecurity must include legal measures to deter cybercrimes. The main objective of this study is to analyse how legislation can restrict cybercrimes. The study will also analyse how these legal clauses can restrict cybercrimes. This study will employ a qualitative research method to analyse the research.