" An optimised risk assessment methodology using threat intelligence in SaaS Cloud Deployments"
You should focus on the traditional risk assessment processes and both strengths and limitations presented in SaaS deployments. You can then introduce a combined (updated) model suitable for Cloud service delivery models.
Typical steps involve:
the idea is to investigate how risk assessment is influenced (positively or negatively) by employing cyber threat intelligence in PT lifecycle for Cloud deployments.
Asset identification
Threat identification
Vulnerability identification
Risk assessment
Risk analysis
Controls in place (to be placed)
Communication
Review
Instructions:
The most important thing at the moment is to investigate how CTI embedded in PT lifecycle can influence the process (positively or negatively).
You can mention additional guidelines and standards in risk management as part of literature review. You need to also discuss how CTI is used today in threat identification / discovery (which is the initial part in risk management)
Aim will be to investigate how CTI can help us to improve the overall risk assessment process using SaaS as the platform. PT stands for penetration testing.
Thesis Writing-up (general structure)
- Abstract
- Acknowledgments
- Consent that you accept your thesis to be made available on BREO/LRC
- Contents page
- Introduction
- Literature review
- Research design/methodology
- Primary research work models, artefact design
- Technical Details and artefact development/implementation
- Testing and evaluation
- Conclusions
- References
- Appendices
- Maximum pages = 70
- Introduction
- The problem
- Main aim and objectives
- Methodologies and outcomes
- Thesis structure
Research
- General background to the subject
- Specific studies on the subject closely related existing work / examples
- Project realisation
- Technical requirements
- Design / structural formation
- Data acquisition
- System implementation
- Testing and analysis of results
- Improvement
- Overall evaluation
- Conclusions and recommendations
- Academic context and value of project
- References - Sources
- Published literature - books, conference papers and journal articles (best)
- References - Citation
- Appropriate citing the references is important. It acknowledges other's work and avoids plagiarism suspect.
- Appendices - what is included
- Poster
- Market survey returns
- Interim progress report
- Project proposal
- Test data