Course Description:
This course introduces students to observational, experimental, and mathematical research methods in cybersecurity. Special attention is paid to the research process, including qualitative and quantitative research methods and designs, and the development of proposals for interdisciplinary research. This course is open only to students in the 5-year BS-MS program in Computer Science-Digital Forensics and Cybersecurity and to students in the Undergraduate Certificate in Bridge to Digital Forensics and Cybersecurity.
Learning Outcomes:
Upon completion of this course, students will be able to:
- Define research concepts and identify different types of research methodologies in cybersecurity.
- Explain the research process.
- Identify and discuss ethical guidelines for cybersecurity research.
- Discuss and critically examine observational, mathematical, experimental, and applied research methods.
- Identify and discuss instrumentation, simulation, and adversarial research.
- Write a research proposal.
Course Pre-requisites:
ENG 201, CSCI 272, MAT 204. This course is open to students admitted in the 5-year BS-MS in Digital Forensics and Cybersecurity or the Undergraduate certificate in Cyberbridge or permission from the department
Course Textbook Information:
Class lectures, handouts, outside readings, PowerPoint presentations, and videos will be used to accomplish the course objectives. Students will be expected to consult the below-required texts for class preparation.
Edgar, T. W and Manz D. O. (2017). Research Methods for Cyber Security. Cambridge, MA: Elsevier.
The course is structured in such a way that you will not be able to participate in class if you have not done the assigned reading. Students are encouraged to read widely and strategically beyond the assigned texts (some recommendations for such readings will be made for you each week, under the further reading section).
Course Calendar:
Topics Covered | Discussions/Assignments Due | |
Week 1 | Introduction to the Course | Review of the syllabus and general introduction to the course. In addition, the assignments of the course will be discussed in detail. |
Week 2 | Starting Your Research Students will be introduced to the research process, key concepts, and different types of research. | Required Readings Chapters 3 In-Class Exercise: Hypotheses and Variables. Students will be placed into groups and will be asked to change a statement into a hypothesis and identify dependent and independent variables. Formulate research questions. |
Week 3 | Scientific Ethics Students will be introduced to scientific ethics and ethical guidelines for cybersecurity research. | Homework 1: Ethical Considerations in Cybersecurity. What are the important ethical issues in cybersecurity research? Please provide a one or two-paragraph response to this question and upload it to Blackboard before the class begins. Homework #1 Due Today Before Class Required Readings Chapter 15 In-class discussion of cases involving an ethical dilemma |
Week 4 | Exploratory Study Students will explore data collection as it relates to exploratory studies, different types of exploratory studies, and the design and presentation of exploratory studies. Analysis bias will also be considered. | Homework 2: Research Topic. Please submit your research topic on Blackboard before the class begins. Homework #2 Due Today Before Class Required Readings Chapter 4 |
Week 5 | Descriptive Study Students will discuss descriptive study methods (e.g., case studies, surveys, and case reports), data collection as it relates to descriptive studies, and the design and presentation of descriptive studies. | Required Readings Chapter 5 Begin literature search to inform and refine the research question for Homework 3 |
Week 6 | Machine Learning Students will be introduced to machine learning, discuss model validation, and explore the use of Bayesian networks and hidden Markov models in cybersecurity research. | Homework 3: Research Question and Hypothesis. Please submit your research question and hypothesis on Blackboard before the class begins. Homework #3 Due Today Before Class Required Readings Chapter 6 In-class exercise: How to choose a research method based on the question and literature survey? |
Week 7 | Theoretical Research Students will identify terms and concepts relating to theories, characteristics of a good theory, and theoretical research. Students will be introduced to the process of developing a strong theory. | Required Readings Chapter 7 |
Week 8 | Using Simulation for Research Students will be introduced to simulation and model validation, and simulation-specific methodologies. Information and guidance will be provided on cyber security-specific simulation practices, opportunities, and pitfalls. | Homework 4: Annotated Bibliography. Please submit an annotated bibliography on your topic that includes at least 10 scholarly references on Blackboard before the class begins. Homework #4 Due Today Before Class Required Readings Chapter 8 |
Week 9 | Hypothetico-deductive research Students will be introduced to hypothesis-driven research and aspects of experimental design. | Homework 5: Introduction. Please submit an introduction (the first part of your research proposal) on Blackboard before the class begins. Homework #5 Due Today Before Class Required Readings Chapter 9 |
Week 10 | Quasi-experimental Research Students will explore quasi-experimental research, design, and methodology. | Required Readings Chapter 10 |
Week 11 | Applied Experimentation Students will discuss applied research methods and applied experimental research. | Homework 6: Background/Literature Review. Please submit the background and literature review for your research (the first part of your research proposal) on Blackboard before the class begins. Homework #6 Due Today Before Class Required Readings Chapter 11 |
Week 12 | Applied Observational Study Students will discuss the types and design of applied studies and applied observation method selection. | Required Readings Chapter 12 |
Week 13 | Mixed Methods Students will critique mixed methods research. | Homework 7: Method and Design. Please submit your research method and design (the third part of your research proposal) on Blackboard before the class begins. Homework #7 Due Today Before Class Students will come to class and be prepared to discuss the following article: Russo, M. (2019). Quantitative and Qualitative Research Designs can no longer stand on their own. https://cybersentinel.tech/2019/07/07/cybersecurity-research-a-future-requirement-for-mixed-method/ |
Week 14 | Instrumentation Students will be informed of ways to identify proper instrumentation and controlled environments for cybersecurity experimentation. | Required Readings Chapter 13 |
Week 15 | Addressing the Adversary Students will explore adversarial studies and threat actor modeling. | Required Readings Chapter 14 Research Proposal Due! |
Final | Poster Presentation during final exam week |