Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.111070のレビューにより、クライアントは星5個中 Computer Security Consultants 4.86/の評価をしました。
I need someone who can help me clear a cybersecurity interview as proxy for the below skill set and I would like to even use their services to support the project. Application Security, Security Architecture & Design, Network Security Identity and Access Management (IAM) AWS Cloud Security API Security, Penetration Testing Mobile Security Cryptography PKI Security Information Event Management (SIEM) Security Controls and Validation IT Risk Assessments Regulatory Compliance and DevSecOps. Testing techniques to identify flaws, weakness and vulnerabilities and attack vectors in web applications (DAST, SAST, IAST). OWASP top 10
Your task is to create a honeypot in cybersecurity of early-stage research project work to include updated project plans ensuring the feasibility/viability of the proposed research and methods; refined research questions, objectives and evaluation approaches; updated social, ethical, professional and legal issues; and personal reflections on early stages of the project process.
You are required to write an application for a simple file transfer between a client and server. The application should have a connection-oriented communication to send a large file (in the magnitude of 10s or 100s of Mbytes). There is no restriction on the user interface, but it should be easy to use. Server is a public server and client and server do not share any keys prior to the communication. Your aim is to first develop a protocol for the communication and then implement it. You are free to choose any language and environment. However, a general-purpose language like C, C++, C# and Java should be preferred. Your aim is to provide a number of services during the file transfer to make it more secure and more robust. Here are the services you need to implement: o Key Exchange (creation...
My 2 websites and (which are both hosted on one package) are malware infected and this needs to be cleaned/removed. This needs to be done via ftp access. Further, I suspect the issue arises due to some plugins, which may have security issues. These need to be found out and adressed by removal or substitution. This should be easy and fast for someone with experience and the right tools.
A technical report about internet of Things (IoT) network security. Addressing the following: •IoT enabling technology with challenges •research papers addressing IoT security using various security techniques (30 techniques)
Description I am looking to hire someone to help me block all VPN and proxy access to my website. I have been having issues with bots and other unauthorized users accessing my site, and it seems that the best way to prevent this is by using a VPN blocker. I have been researching various methods of blocking access, and it seems that the best option is to use a VPN blocker tool like Matomo. However, I have not found any good guides on setting this up, so I hope someone with experience in this area can help me. If you are familiar with using Matomo or other similar tools to block VPN access, I would be very interested in hearing from you. I am looking for someone to help me set up a robust and effective VPN blocker so that my website is secure and my users' data is protected. Examp...
Problem Solving related to computing: Scenario: You work for a Software Development Company as a software engineer (or any other type of computing related company), where you are asked to develop an application or design a solution for a specific problem, where the solution of this problem is related to computing. you need to do the following tasks: ‐ Identify an application/ a specific problem and describe its requirements. ‐ Design and identify the solution for this problem/ the problem solution could be developing a software that addresses the issue using Java for example or the solution could be a combination of hardware and software. ‐ How can you Test and validate your proposed solution/ it would be great if you can implement part of your solution. ‐ Document your work. The repor...
College computer networks project: Need to implement an SDN with implementing a security concept that defends the man in the middle attack
We are hiring a new penetration tester to participate in projects with us, who has solid hacking skills mostly in web applications, written in JS and its frameworks, PHP and Mobile applications. You should be able to write a complete vulnerability assessment report and present your findings to CTO.
I think the topic of the virus is quite interesting. I put a lot of time and effort into this project. I am anticipating your a result of the increase in global temperature, glaciers and permafrost are melting, releasing bacteria and viruses that have been trapped under the ice for years. The Zombie Virus is one such amoeba virus that researchers were able to recover from melted ice.
Project consists to organize a red teaming exercise against a company of medium size to test end-to-end their security. Goal of the red teaming is to be able to take control of their infrastructure (AD domain admin). Delivery is a document which explained the way of working, what has been blocked by security measures and concrete advises how to improve the security. Organization mainly on-prem, using some azure (like office 365), Windows 10, some web applications. We are only looking for experimented person. Give a small description of your way of working and we will have a chat. Please reply with the keyword "RED" in your reply (to avoid considering automated response).
Need entire ISMS/ ISO27001 related documentation templates. ISMS Manual Disaster Recovery Plan Business Continuity Plan ISMS RACI Matrix Acceptable Use Policy Mobile Device and teleworking Policy Information Security Risk Register Internal audit plan Information Asset Register BYOD Disposal and destruction policy Information classification policy Information transfer Password policy Asset management ISMS policy Data recovery and backup policy Security incident management Logging and monitoring Cloud computing policy Risk Management ISMS Statement of applicability Patch and vulnerability management Access Control Policy Document and Record Control Procedure Cryptographic Policy ISO27001 requirements checklist