Segurança de computadores Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

A partir das avaliações de 103,164, os clientes avaliam nosso Computer Security Consultants 4.86 de 5 estrelas.
Contratar Computer Security Consultants

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    46 trabalhos encontrados, preços em USD
    fix the welcome page 6 dias left
    VERIFICADO

    I hate this one above I have asked for it to fixed and many occasions. I want it to look like this one need to add links to new page WebPicID Member Services Welcome rayRayray222 Your Pay Code is : AA008 Services Utilities Employment Opportunities Family Protection Account Statement Act as an Agent IDTFLR Identity Theft Fraud Loss Reduction Fee Structure Pre Registration Payment options Notification Refer an organization Safe Purchase Paycode Sign Up an organization with WebPicID Secure Message Profile Share WebPicID with an organization VIDOTN Verified Identity Over The Net Transaction Security

    $26 (Avg Bid)
    $26 Média
    31 ofertas
    Bilgisayar 6 dias left
    VERIFICADO

    Title: Computer Troubleshooting - Slow Performance Overview: We are currently seeking assistance with troubleshooting our computer to resolve slow performance issues. Project Requirements: The ideal candidate should have the following skills and experience: - Excellent knowledge and experience in computer troubleshooting - Proficient in diagnosing and resolving slow performance issues - Strong understanding of computer hardware and software - Ability to identify and fix software errors - Familiarity with hardware malfunctions and their solutions Method of Communication: The preferred method of communication for troubleshooting this issue is via email. Please note that further project details and specific troubleshooting steps will be provided upon selection of the freelancer.

    $21 / hr (Avg Bid)
    $21 / hr Média
    5 ofertas

    Send me message firstly please to discuss the details. I am seeking an ethical hacker with expertise in web application security. The project entails both assessment and solution implementation. I am open to any programming languages and tools that the freelancer is proficient in. The ideal candidate should have a strong understanding of web application security and be able to effectively identify vulnerabilities and provide solutions to mitigate risks. Experience in network security and wireless security is a plus.

    $553 (Avg Bid)
    $553 Média
    8 ofertas

    I have HP switches model HP 1920 JG927A and HP 1910 JE006 I want to learn configuring them. I tried to learn through Youtube and web articles but problem with this approach is that we could not learn a complete solution and I can't ask question to understand further. So here you have opportunity. What I expect: You will come online and in a voice call you will guide me all options available to configure. You will advise me to make things available to setup our test environment before starting practical learning. Here are menu options that I can see in HP and we will be exploring: - Device ○ Port Management ○ Port Mirroring ○ RMON ○ SNMP - Network ○ VLAN ○ VLAN Interface ○ MSTP ○ Link Aggregation ○ LACP ○ LLDP ○ ARP Management ○ ARP Anti Attack ○ IGMP Snooping ○ MLD Snooping ○ IPv4...

    $42 (Avg Bid)
    $42 Média
    10 ofertas
    Create WIFI URL Link 5 dias left
    VERIFICADO

    Project Description: I am looking for a freelancer who can create a WIFI URL link that will provide internet access to more than 100 users with standard security measures in place. Purpose of the WIFI URL link: - The primary purpose of the WIFI URL link is to provide internet access to users. Expected user load on the WIFI link: - The WIFI link should be able to handle more than 100 users simultaneously. Security requirements for the WIFI link: - The WIFI link should have standard security measures in place to ensure the safety of the network and user data. Ideal skills and experience for the job: - Experience in creating and configuring WIFI networks - Proficiency in network security protocols - Knowledge of managing high user loads on a WIFI network - Familiarity with setting up...

    $30 (Avg Bid)
    $30 Média
    4 ofertas

    I am in need of an Outlook365 Security Expert who can help me secure my environment. The ideal candidate should have expertise in implementing specific security measures such as Data Loss Prevention (DLP) policies and Microsoft Defender. I've made a thorough report on all the features we need to add. We will be working closely together to get these features implemented and this project will be longterm. Skills and Experience: - Proficient in implementing Microsoft Defender and DLP policies - Familiarity with securing Outlook365 environment - Experience working with small-scale environments (1-50 users) - In-depth knowledge of existing security infrastructures and ability to modify them as needed The project requires working with an existing infrastructure, so the ideal candidate sh...

    $52 / hr (Avg Bid)
    ADC
    $52 / hr Média
    11 ofertas
    cyber security expert 5 dias left
    VERIFICADO

    Cyber Security Expert Needed Immediately - Specific aspect of cyber security: Network Security - Current level of organization's cyber security measures: Highly Secure - Assistance needed: Immediately - Ideal skills and experience: - Strong knowledge and experience in network security protocols and technologies - Proficient in identifying and mitigating potential network vulnerabilities - Familiarity with industry best practices and compliance standards - Ability to conduct thorough network security assessments and audits - Experience in developing and implementing robust network security strategies and policies - Proven track record in handling network security incidents and responding to cyber threats promptly - Excellent communication and problem-solving skill...

    $23 (Avg Bid)
    $23 Média
    5 ofertas

    I am looking for a NODE and MQTT protocol expert who can help me with a project that requires real-time data transmission. The ideal candidate should have experience with cloud-based development platforms and should be able to complete the project within a week. Skills and Experience: - Expertise in NODE and MQTT protocol - Strong understanding of real-time data transmission - Experience with cloud-based development platforms - Knowledge of security and encryption for data transmission - Ability to ensure scalability and performance of the project Timeline: - Urgent (Less than a week) If you have the skills and experience required for this project, please submit your proposal.

    $172 (Avg Bid)
    $172 Média
    30 ofertas

    I am looking for an experienced professional to prepare a report for ISO 27001 internal audits. These are typically performed internally but I cannot as I am a one man company. The scope of the audit will focus on ensuring compliance with the ISO 27001 standard. The primary recipient of the audit report will be the ISO 27001 assessor. The report looks to see if our settings are configured correctly, I can run through these with you in a screen share if you like. The timeline for the completion of the audit report is less than 1 month. This will be a quick job which will not take long, we have a previous audit report to work off. Skills and experience needed for this project include: - Strong understanding of ISO 27001 regulations - Experience conducting internal audits and preparin...

    $316 (Avg Bid)
    $316 Média
    25 ofertas
    ISO27001 Internal audit report 5 dias left
    VERIFICADO

    I am looking for an experienced professional to prepare a report for ISO 27001 internal audits. These are typically performed internally but I cannot as I am a one man company. The scope of the audit will focus on ensuring compliance with the ISO 27001 standard. The primary recipient of the audit report will be the ISO 27001 assessor. The report looks to see if our settings are configured correctly, I can run through these with you in a screen share if you like. The timeline for the completion of the audit report is less than 1 month. This will be a quick job which will not take long, we have a previous audit report to work off. Skills and experience needed for this project include: - Strong understanding of ISO 27001 regulations - Experience conducting internal audits and preparin...

    $296 (Avg Bid)
    $296 Média
    30 ofertas

    Project Title: Proxy service Description: I am looking for a skilled freelancer to create a high-security HTTP proxy service with a specific location. The ideal candidate for this project should have experience in developing proxy services and be familiar with HTTP protocols and security measures. Requirements: - Develop a custom HTTP proxy service with high-level security - The proxy service should have a specific location as requested by the client - Ensure the proxy service provides secure and encrypted connections - Implement measures to prevent unauthorized access and protect user privacy Skills and Experience: - Strong knowledge and experience in developing HTTP proxy services - Familiarity with HTTP protocols and security measures - Experience in implementing encryption and secu...

    $495 (Avg Bid)
    $495 Média
    19 ofertas

    Title: Ethical Hacking and Cybersecurity Expert needed for Personal Project - Project Overview: - This project is for personal use and involves exploring the field of ethical hacking and cybersecurity. - I am aware that scamming is illegal and against community guidelines, and I want to emphasize that this project is focused on ethical hacking and cybersecurity practices only. - I am open to revising my project to ensure it complies with the community guidelines. - Ideal Skills and Experience: - A background in ethical hacking and cybersecurity is essential. - Knowledge of various hacking techniques and methodologies. - Proficiency in identifying vulnerabilities and implementing effective security measures. - Experience with penetration testing and vulnerability asse...

    $1284 (Avg Bid)
    $1284 Média
    7 ofertas

    I am looking for a researcher who can assist me in conducting a study on drone flight. Specifically, I am interested in exploring the aspect of anomaly detection and secure monitoring. Research Questions and Objectives: - How can we enhance the security measures and protocols in drone flight to ensure anomaly detection? - What are the most effective techniques and technologies for secure monitoring of drone flights? - How can drones be used in various industries while maintaining a high level of security and anomaly detection? Skills and Experience Required: - Strong understanding of drone flight regulations and laws - Expertise in safety measures and protocols in drone flight - Knowledge of advanced flight techniques and technologies - Experience in conducting research on drone fl...

    $933 (Avg Bid)
    $933 Média
    47 ofertas

    I am looking for someone to troubleshoot the issues I am experiencing with my Yeastar meeting room display devices. The specific issue I am facing is that the devices are not showing in the active state. I have not tried any troubleshooting steps myself as I am not familiar with troubleshooting such devices. My preferred outcome after the troubleshooting is to have the devices showing in the active state. Skills and experience required for this job: - Expertise in troubleshooting Yeastar meeting room display devices - Knowledge of how to resolve issues with devices not showing in the active state

    $2 / hr (Avg Bid)
    $2 / hr Média
    1 ofertas

    We are looking out for Subject Matter Experts who have CCNP enterprise certification gained after passing 300-410 ENARSI and 350-401 ENCOR v1.1 exams or any one of the two. As an SME, you will be required to give content on the topics of these exams. The following are the key skills and responsibilities: 1. Should be familiar and have the required software setup: Graphic Network Simulator-3 (GNS3) 2. Should have knowledge of networking fundamentals, managing and securing network devices, network automation, Cisco router security features, routing and packet forwarding functionalities for MPLS VPNs, network devices, infrastructure security, Software-Defined Networking (SDN), routing protocol operation, authentication and authorization using AAA, and virtualization and its types 3. Should h...

    $82 (Avg Bid)
    $82 Média
    5 ofertas

    I am looking for an OT Cybersecurity Expert to secure our power grid system within a timeframe of less than a month. We require both cybersecurity assessment and implementation for this project. Specific requirements for this project include: - Securing the power grid system against cyber threats and vulnerabilities - Conducting a thorough cybersecurity assessment to identify potential risks and weaknesses - Developing and implementing effective security measures and protocols to protect the power grid system - Ensuring compliance with industry standards and regulations in the field of OT cybersecurity Ideal skills and experience for this job: - Strong knowledge and expertise in OT systems and cybersecurity - Experience in securing power grid systems or similar critical infrastructure ...

    $1465 (Avg Bid)
    $1465 Média
    7 ofertas
    cyber security 4 dias left
    VERIFICADO

    Project Title: Application Security Improvement I am in need of assistance with improving the application security measures for my organization. Specific Requirements: - The focus of this project is on application security, including the identification and mitigation of vulnerabilities within our applications. - I already have existing security measures in place, but they require improvement to ensure better protection against potential threats. - The implementation of the improved security measures should be completed within 1 month. Ideal Skills and Experience: - Strong knowledge and experience in application security, including familiarity with common vulnerabilities and attack vectors. - Proficiency in conducting security assessments and identifying vulnerabilities in applications....

    $129 (Avg Bid)
    $129 Média
    11 ofertas
    Network engineer 4 dias left
    VERIFICADO

    Project Title: Network Engineer Description: I am in need of a network engineer to assist with the design and implementation of a medium-sized network consisting of 10-50 devices. The ideal candidate will have experience in network design and implementation, as well as the following skills: - Network troubleshooting: The ability to identify and resolve any network issues that may arise during the implementation process. - Network security: Knowledge of best practices for securing the network and ensuring data protection. - Strong understanding of network protocols and technologies. - Familiarity with network hardware and software. - Excellent communication and problem-solving skills. As there is no existing network infrastructure, the engineer will need to start from scratch and create ...

    $36 / hr (Avg Bid)
    $36 / hr Média
    34 ofertas

    I am looking for a Certified Ethical Hacker with the CEH and/or CompTIA PenTest+ certification. The primary goal of this project is to conduct an onsite grey hat Vulnerability Assessment of a web based application in Atlanta, GA and provide a report including findings and remediation recommendations. The customer requires that the testing be done on-site. An NDA with the customer will also be required. Please provide a resume, copy of certification(s), hourly/daily/weekly rates and references if interested. Once received and reviewed, more details of the project will be provided directly.

    $57 / hr (Avg Bid)
    $57 / hr Média
    7 ofertas

    I am in need of assistance as one of my sites has recently been attacked by malware and now rendered the other sites on the same hosting package offline. Security Measures: I have not taken any steps to secure my website after the attack, so the ideal candidate should be able to implement necessary security measures to prevent future attacks. The below has come from my hosting company. ********************************************************************************* (A) Disinfecting or deleting the malicious files 1. Open the indicated link in your browser and use the access data for your primary SFTP user for authentication. Alternatively, you may also use an FTP client (such as FileZilla) to open the file in the ./logs/forensic/ directory. 2. The log file will contain additional inf...

    $142 (Avg Bid)
    $142 Média
    74 ofertas

    Project Description: - I am looking for an expert in implementing data sharing and identity verification using zero knowledge technique and proofs.

    $42 (Avg Bid)
    $42 Média
    4 ofertas
    $20 Média
    31 ofertas

    Project Description: Objective: - Build an advanced neural network classification model using Python and C to perform binary classification. Requirements: - Experience in building neural network models using Python and C. - Proficiency in handling time-series data for training the model. - Ability to handle complex model requirements and implement advanced techniques. - Strong understanding of classification algorithms and techniques. - Knowledge of data preprocessing and feature engineering for time-series data. - Familiarity with Python libraries such as TensorFlow, Keras, and PyTorch. - Proficient in C programming for model optimization and performance improvements. Deliverables: - Develop a well-performing binary classification model using a neural network. - Provide documentation o...

    $169 (Avg Bid)
    $169 Média
    32 ofertas

    I am looking for a skilled professional who can conduct a penetration testing on a Metasploitable VM using a Kali VM. Purpose of the attack: - The main objective of this project is to perform penetration testing to identify vulnerabilities and weaknesses in the system. Report detail: - A detailed report is required after the attack, including step-by-step documentation and screenshots of the process. Number of vulnerabilities: - The focus will be on targeting 1-3 vulnerabilities in the system. Skills and experience required: - In-depth knowledge and experience in penetration testing and ethical hacking. - Proficiency in working with Metasploitable VM and Kali VM. - Strong understanding of different attack vectors and techniques. - Ability to document findings and create detailed repor...

    $102 (Avg Bid)
    $102 Média
    24 ofertas
    system admin 2 dias left
    VERIFICADO

    System Admin - Linux - Server Maintenance We are looking for a skilled system administrator with experience in Linux operating system to assist us with server maintenance tasks. Specifically, we need assistance with: - Regular server updates and patches - Performance monitoring and optimization - Troubleshooting and resolving server issues - Managing server backups and data restoration Ideally, the candidate should have: - Strong knowledge and experience in Linux administration - Proficiency in server security measures and best practices - Familiarity with data management tools and techniques Please note that there are specific software or applications that need to be maintained, and we will provide the necessary details to the chosen candidate. If you are experienced in Linux system...

    $4 / hr (Avg Bid)
    $4 / hr Média
    20 ofertas
    SOPHO SSL VPN CLient SET UP 2 dias left
    VERIFICADO

    I am looking for a freelancer to help me with the setup of a SOPHO SSL VPN client on my Windows operating system. I require both a one-time setup and ongoing support for this VPN client. Skills and experience needed: - Experience with setting up SOPHO SSL VPN clients on Windows operating systems - Knowledge of SSL VPN protocols, specifically OpenVPN, IPSec, and PPTP - Understanding of remote access setup for SSL VPNs The ideal freelancer will have experience in setting up SOPHO SSL VPN clients on Windows and will be able to provide ongoing support as needed. They should also be familiar with SSL VPN protocols such as OpenVPN, IPSec, and PPTP, and have the ability to set up remote access for SSL VPNs.

    $10 / hr (Avg Bid)
    $10 / hr Média
    13 ofertas

    Project Description: - I am looking for an expert in implementing data sharing and identity verification using zero knowledge technique and proofs.

    $13 (Avg Bid)
    $13 Média
    8 ofertas

    Project Description: - I am looking for an expert in implementing data sharing and identity verification using zero knowledge technique and proofs.

    $17 (Avg Bid)
    $17 Média
    13 ofertas

    I am looking for a freelancer who can help me examine the pfsense router configuration backups in order to assess security vulnerabilities. I have a specific security concern in mind, and I am worried about unauthorized access, data leakage, and malware attacks. The ideal candidate for this project should have experience in network security and expertise in PFSense router configuration. or each of the downloaded configuration backup files, review the configuration in the backup to determine if there are unusual settings that may indicate compromise. Some of the kinds of things you should be checking for could include the following: Look for obviously invalid or unusable IP addresses Look for suspicious services configured Look for accounts which are suspicious Look for administrative acces...

    $9 / hr (Avg Bid)
    $9 / hr Média
    9 ofertas

    Title: Proxy Expert for Enhanced Online Security and Access Project Description: I am searching for a knowledgeable professional well-versed in the intricacies of proxies to enhance the security and accessibility of our online activities. As our reliance on online platforms grows, I require an expert who can implement and manage proxies effectively for various purposes. Scope of Work: Proxy Setup and Configuration: Configure and set up proxies to ensure secure and anonymous online browsing. Optimize proxy settings for maximum performance and reliability. Security Measures: Implement measures to safeguard against potential security threats and unauthorized access. Provide recommendations for enhancing overall online security using proxies. Geo-Blocking Solutions: Develop strategies ...

    $211 (Avg Bid)
    $211 Média
    10 ofertas
    OSCP Cybersecurity Live Training 2 dias left
    VERIFICADO

    YOU MUST HAVE A OSCP CERTIFICATION TO QUALIFY! I am looking for an OSCP certified cybersecurity expert to provide live training sessions for OSCP (Offensive Security Certified Professional) certification. The ideal candidate should have advanced cybersecurity experience and expertise in network security. Specific topics that need to be covered in the training include: - Network security techniques and best practices - Vulnerability scanning and penetration testing - Windows Network Traversal The training sessions are expected to be conducted over 1-3 live sessions, depending on the depth and complexity of the topics covered. Skills and experience required for this project: - Advanced knowledge of network security principles and techniques - Experience in conducting cybersecurity traini...

    $106 (Avg Bid)
    $106 Média
    15 ofertas
    Theoretical Framework 2 dias left
    VERIFICADO

    I need help in designing a theoretical framework as I have survey results. This research related to privacy and HCI.

    $25 / hr (Avg Bid)
    $25 / hr Média
    9 ofertas

    I am seeking a research assistant with a completed PhD in SDN to assist me with my project on network architecture. The ideal candidate will have expertise in the following areas: - SDN network architecture - Network security and privacy - Performance optimization The desired format for the research outcomes is both a research report and a presentation. The research report will provide a detailed analysis of the findings, while the presentation will allow for a visually engaging overview of the research. Communication with the research assistant will primarily be through email. This will allow for efficient and timely communication, as well as the exchange of research materials and progress updates. If you have the necessary skills and experience in SDN research, please submit your pro...

    $679 (Avg Bid)
    $679 Média
    34 ofertas

    I am looking for a skilled cryptographer for a personal project that needs to be completed within 1-2 weeks. Requirements: - The freelancer must have past experience and a proven track record in cryptography. - Detailed project proposals are required in the application. Ideal Skills and Experience: - Strong knowledge and expertise in cryptographic algorithms and protocols. - Experience in developing secure communication systems and encryption methods. - Proficiency in programming languages such as Python, C++, or Java. - Familiarity with cryptographic libraries and tools. - Ability to analyze and identify vulnerabilities in cryptographic systems. - Understanding of key management and secure key exchange protocols. Please include your past work and relevant experience in your applicati...

    $1082 (Avg Bid)
    $1082 Média
    28 ofertas
    Help with SDN experiment 1 dia left
    VERIFICADO

    Need someone to run an SDN experiment. I have the guideline ( flow chart ) and design. You need to setup mininer, VM etc and run the experiment. Plot those in a graph and display in the format of a research paper.

    $269 (Avg Bid)
    $269 Média
    20 ofertas

    The purpose of this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE): • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege ACTIVITY Today, let's model a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The context level diagram of the file sharing system is represented in Figure 1: Context Level Diagram T...

    $60 (Avg Bid)
    $60 Média
    2 ofertas

    Architecture overview, how the system interaction with external systems puts it at risk. Variation of the boundaries of the system vary from deployment In your opinion, are there locations in the architecture where too many assets reside? Analysis of your threat Model. More explanation about boundaries of the system. The purpose of this deliverable is to come up with the architecture and design of your product Your deliverable must include: ● Architecture Overview. Describe the architecture of the system. Please answer the following questions: o What are the subsystems? What does each subsystem do? o Are there subsystems that are expressly security features? (e.g. encryption, authentication) Describe these in more depth. o Consider the cost of developer mistakes in terms of subsystems...

    $44 (Avg Bid)
    $44 Média
    7 ofertas
    computer network 22 horas left

    I have 2 computers at my home office that I would like to be able to connect to share files. These are connected by way of an ethernet cable thru a Netgear GS305 switch. Note these 2 computer were previously connected to my office network and so the previous setup will be to be removed.

    $116 (Avg Bid)
    $116 Média
    38 ofertas

    Project Title: Fix the website being redflagged by antivirus for users Description: I am looking for a skilled developer to fix the issue of our website being flagged by Mcafee antivirus for users. We need to ensure that our website is safe and accessible for all users without any threat detection. Ideal Skills and Experience: - Experience in website security and fixing issues related to antivirus flagging - Proficiency in Mcafee antivirus software and understanding its threat detection mechanisms - Strong knowledge of web development and coding languages - Ability to analyze and troubleshoot website code and content to identify potential threats - Familiarity with website hosting and server configurations - Excellent communication skills to understand and address any concerns or quest...

    $82 (Avg Bid)
    $82 Média
    9 ofertas

    Architecture overview, how the system interaction with external systems puts it at risk. Variation of the boundaries of the system vary from deployment In your opinion, are there locations in the architecture where too many assets reside? Analysis of your threat Model. More explanation about boundaries of the system. The purpose of this deliverable is to come up with the architecture and design of your product. Your deliverable must include: ● Architecture Overview. Describe the architecture of the system. Please answer the following questions: o What are the subsystems? What does each subsystem do? o Are there subsystems that are expressly security features? (e.g. encryption, authentication) Describe these in more depth. o Consider the cost of developer mistakes in terms of subsystems...

    $22 (Avg Bid)
    $22 Média
    21 ofertas

    this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE). a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The aim of this activity is to Identify Threats based on the STRIDE threat modeling using Microsoft Threat Modeling Tool (TMT).

    $21 (Avg Bid)
    $21 Média
    3 ofertas

    I am looking for an experienced freelancer who can help me protect my website from DDoS attacks. The purpose of this project is to enhance the security measures and ensure the website is well-protected. Skills and Experience: - In-depth knowledge of DDoS attack prevention and mitigation techniques. - Experience implementing Cloudflare security measures to protect websites. - Ability to create and implement effective security policies for Pleask servers. - Familiarity with the latest security best practices and emerging threats. The current security measures in place need improvement, so the freelancer should be able to assess the existing setup and make necessary enhancements. This project requires immediate attention, as the website is at risk of DDoS attacks. Should work with Remote...

    $75 (Avg Bid)
    $75 Média
    10 ofertas
    Computer science research paper 12 horas left
    VERIFICADO

    I am looking for a computer science researcher to write a research paper on the topic of cybersecurity. The paper should be approximately 10-20 pages in length. I have a specific topic or question in mind that I would like the paper to address. Ideal skills and experience for this job include: - Strong knowledge and understanding of cybersecurity concepts and principles - Proficiency in conducting research and analyzing data in the field of cybersecurity - Ability to write clear and concise academic papers - Familiarity with relevant research methodologies and citation styles

    $122 (Avg Bid)
    $122 Média
    94 ofertas
    Ethical hacker 12 horas left
    VERIFICADO

    Project Title: Ethical hacker I am looking for an ethical hacker who can assist me with penetration testing, vulnerability assessment, and social engineering for my Instagram account. Skills and Experience: - Extensive knowledge and experience in ethical hacking and cybersecurity - Proven track record of successful past work in similar projects - Ability to provide detailed project proposals outlining the approach and methodology - Familiarity with Instagram's security features and vulnerabilities - Strong problem-solving and analytical skills Access Level: The freelancer should be able to gain access independently without any provided access credentials. Please include your past work and experience in your application.

    $138 (Avg Bid)
    $138 Média
    24 ofertas
    ethical hacker 8 horas left

    I am looking for an ethical hacker who can assist me with my cybersecurity needs, specifically in the area of social media security. Specific goals have been set for this project, and I am seeking an experienced hacker who can help me achieve them. The timeline for this project is immediate, and I would like to have it completed within a week. Ideal skills and experience for this job include: - Proficiency in network security and web application security - Experience with social engineering techniques - Knowledge of social media platforms and their security vulnerabilities - Ability to identify and mitigate potential risks and threats in the social media environment If you have the necessary skills and experience in these areas, please reach out to me with your proposal. Thank you.

    $126 (Avg Bid)
    $126 Média
    16 ofertas

    Artigos Recomendados Só para Você

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ