1. Choose a cyber threat that interests you
Identify three potential options for your chosen topic. Using Google and then progressing to the e-library resources and Google Scholar, get a feel for each of the topics and the resources available, and see if one jumps out as especially interesting or viable.Some examples include: cyber-bullying, cyber-espionage, cyber-terrorism, DDOS attacks, disinformation, online child sexual exploitation, online drug trafficking, online firearms trafficking, online fraud, online harassment, online hate, online wildlife trafficking, phishing, ransomware, and SCADA attacks.
Consider whether you want to have a global or national focus, and whether you want to be more specific in the threat – e.g. Action Fraud’s A-Z of Fraud lists many types of fraud, many of which are predominantly or partially instigated online