Sure, here are some research topics and ideas related to network security and computer forensics for an MS in information security:
Network Intrusion Detection and Prevention Systems: Investigating the effectiveness of various network intrusion detection and prevention systems in identifying and blocking attacks.
Cyber Threat Intelligence: Analyzing the use of cyber threat intelligence to improve network security and prevent cyber attacks.
Malware Analysis: Examining the methods and tools used to analyze and identify malware in computer systems.
Cybercrime Investigation: Investigating techniques for collecting and analyzing digital evidence to identify cyber criminals and prosecute them.
Cybersecurity Risk Assessment: Assessing the risks to network security and developing strategies to mitigate those risks.
Cybersecurity Governance: Analyzing the role of governance frameworks in managing and improving network security.
Network Security Policy: Developing and implementing network security policies to protect against cyber threats and attacks.
Cybersecurity Incident Response: Developing and implementing incident response plans for cyber attacks to minimize damage and prevent future incidents.
Digital Forensic Analysis: Examining the tools and techniques used in digital forensic analysis to investigate cyber crimes and data breaches.
Cybersecurity Compliance: Analyzing regulatory compliance requirements for network security and developing strategies to achieve compliance.
These are just a few ideas to get you started. Depending on your interests and expertise, you can explore these topics in more depth or investigate other areas related to network security and computer forensics.
You have a general topic, now think about the skills you want to use. What skills and knowledge do you want to sharpen for your next job? What have you mastered? Do you like playing with data or writing and explaining models? Are your interests interdisciplinary?
At the end of your thesis, for one hot minute, you will be the world's expert in answering one question. What do you want that question to be?
you may interested in Elliptic curve and other cryptography algorithms, please take a look at the following papers:
1. A.Abusukhon, Z. Mohammad, A. Al-Thaher (2021) An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text_to-image encryption algorithm. Concurrency and computation practice and experience.
2. Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem.
3. Z. Mohammad, V. Nyangaresi and A. Abusukhon, "On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols," 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 2021, pp. 320-325, doi: 10.1109/ICIT52682.2021.9491775.
4. Z. Mohammad, A. A. Alkhatib, M. Lafi, A. Abusukhon, D. Albashish and J. Atwan, "Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem," 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 2021, pp. 218-223, doi: 10.1109/ICIT52682.2021.9491743.