State educational standard for your specialty 075400 "Complex protection of Informatization objects"
for inspiration at least once did not try to read?
Thesis, by the way, directly with computers may not be connected, because the scope of the activities of information security applies not only to unauthorized access to information. Although here, I see the audience is accustomed to think only in this way.
You don't want a diploma to conduct a comprehensive comparison of the threats posed by, on the one hand, the hardware/technical side with the other software? Perhaps, that would have shown how holistically you have learned the whole course.