BSc (Hons) Computer Science (Cyber Security)

Cyber security has become vital for organisations of all sizes and increasingly individual users, whether they are accessing services via a computer, mobile, tablet or SmartTV. Our final year students are encouraged to identify real-world problems, review academic literature and develop truly innovative solutions. There is a wide range of project topics that span the cyber security curriculum, including network security technologies such as Blockhouse, ExPz Toolz and Polaris; authentication controls such as continuous keystroke analysis and FaceLock; and digital forensics tools such as Universal Steganalysis and Bi-Frag Data Carving.

The projects currently being displayed are from our current academic year. To view other years please select below.

David Owamagbe
MALIS: Static Malware Detection in Portable Executable Files using Machine Learning

The project involves developing a web-based application that utilizes machine learning to perform ...


Etienne Brand
Using Machine Learning to Design and Implement a Risk-Adaptable Access Control Architecture

Risk Adaptable Access Control (RAdAC) aims to provide software with an access controlsolution that a...


Hannah-Mae Brown
Digital Citizen Policing Hub

For the public and the Police, who want to increase the admissibility of and use the public-submitt...


Harry Parker
FaceCCTV

Aimed for individuals or organisations who want to find out who caused them damage, but don't have t...


John Connor
NetPlus - Emulating software defined networking functionality on legacy devices.

An automated platform for network providers to maintain, secure and monitor network equipment deplo...


Kieran Wheatley
Assets? Managed.

Assets? Managed. Is for any business/organisation who have a requirement to track all their assets ...


Mohamed Hussain
Encrypto

1.RSA and AES encryption algorithms: The application should have the capability to encrypt and decry...


Robert Pengilley
Home Network Discovery Scanner

As network connected technology becomes more prevalent it is difficult for home users to know what ...


Steven Serjeant
Security Dashboard for Home User

According to Alotaibi (2020) the devices and operating systems used within the home network are pr...