Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Hire Computer Security Consultants
I will provide document about project and infor mation give me answers for 2,14 ,15 16 by 8:00PM today and send me remaining and document in 3 days thats fine 2) LAN/WAN UPS not operational 14) Password hasn't been changed in over a year 15)Office left unlocked during lunch/breaks and overnight 16) Retired employee able to login identify Threats that can exploit the Vulnerabilities/Weaknesses add Risks that can generate loss to an Asset (Hardware, Software, Data, Service, etc) add Countermeasures that can mitigate the Risks
Experience in performing Security Incident Response and Forensics evaluation with SIEM Tools. A minimum of three (3) years of experience in conducting static code and dynamic application analysis using code analysis tools such as Fortify, AppScan, Veracode, SonarQube and penetration testing utilities Analyze and define security requirements for Multilevel Security (MLS) issues. Design, develop, engineer, and implement solutions to MLS requirements. Responsible for the implementation and development of the MLS. Gather and organize technical information about security mission, goals and needs, existing security products, and ongoing programs in the MLS arena. Perform risk analyses, which also include risk assessment. Incident Response and Forensics evaluation using security information and event management (SIEM) tools Provide support for audit responses in accordance with organizational requirements. Ensure that the MHBE system security requirements are addressed during all phases of the system development life cycle. Conduct daily/weekly security audit log reviews, and report any suspicious activities. Conduct security impact analysis of controls on proposed system changes. Conduct ongoing security reviews and tests of the MHBE systems to periodically verify that security and operating controls are functional and effective. Review and update systems security documentation and artifacts such as SSP, ISRA, PIA, SSR, CAP and POA&Ms. Create and track POA&M requirements for resolving security findings. Adhere to all security, change control and MHBE Project Management Office (PMO) policies, processes and methodologies.
Reparación de sistema operativo, Formateo del ordenador, Instalación de driver, instalación de programas, Programas Antivirus, Fallos de conexión a internet, Problemas con navegadores, Problemas con impresoras, Preguntas de ofimática, Preguntas de programas de uso común, como Zip, RAR, Office, etc
need to implement cryptic Secure communication with the help of cryptographic services trust based routing and policy based access control and embed data in a QR code just need report and source code and simulation using cooja simulator
A specialist in computer network security is required in CentOS 7 operating systems, to configure an email server (Postfix) in order to prevent reporting of the unwanted email list, and to try to optimize the security and speed of the network. Example: Remove the botnet reported in the following url with the IP [login to view URL]: [login to view URL]
We need IT specialists, software developers, blockchain hackers, engineers and others, for our project. Possible work in Europe.
Part 1 • Input – A given text file for plaintext or ciphertext (assume only 26 letters, no special characters, numbers and punctuations) – 3 substitution ciphers, M1,M2,M3 • M1 – left shift 3 letters • M2 – Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: D K V Q F I B J W P E S C X H T M Y A U O L R G Z N • M3 – right shift 5 letters – cycling pattern • n=3: M1,M3,M2,M3; M1,M3,M2,M3; • Output – Encrypted ciphertext or decrypted plaintext Part 2 • Input – A given text file for plaintext or ciphertext – A given depth of rail fence • Output – Encrypted ciphertext or decrypted plaintext
Read Carefully before bidding !!!!!! Only Expert CPP just bid , if you are not expert on CPP don't bid please or your bid will be ignored. need a coder HTTP Controller will be coded with C++/Cwith PHP admin panel to control the client's machines. it should work from Windows XP to Windows 10 x64. More details will be sent via text file about the panel and the executable file. Requirements: have experience with this: obfuscation Watchdog techniques Code injection. Direct memory write Application initialization registry key Windows Hook Winlogon notification packages Permission modification. File locking Object access control lists Account privileges Rootkit techniques Usermode. Kernel mode'
Hi, [login to view URL] are looking for custom development solution, related to injector cleaning virus . [login to view URL] will be providing virus sample for your analyses. 3. Detection speed should be reasonable - desirable under 200 milliseconds for single file. This may require to change method from disassembler to static analysis. [login to view URL] detection and disinfection ratio for samples, which we provide Example tool link below [login to view URL]
GcPro Key is a GSM Professional Dongle, i want to share this usb key online, i tried every usb share software you will imagine nothing work the problem when GcPro software installed if it detect any usb share software it will close the application i even tried to share it using Remote Desktop Connection but can't detect dongle drivers so can't share it to another computer
Network Intrusion Detection System using Machine Learning (Reinforcement algorithm) To detect these intrusions our proposed approach would be using Deep Reinforcement Learning and Q Learning which improves the stability and performance of the system. We want to detect DDoS attack: DDoS: Distributed Denial of Service attack is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. These attacks are one of the most dangerous security threats, in which attackers aim to break down the victim’s computer network or cyber system and interrupt their services. MEC systems are especially vulnerable to distributed DoS attacks, in which some distributed edge devices that are not well protected by security protocols can be easily compromised and then used to attack other edge nodes. Some attackers also aim to prevent the collaborative caching users from accessing the caching data. Jamming can be viewed as a special type of DoS attack. The simplest approach could be to examine the logs of the web server and to identify whether the query relates to the DoS/DDoS attack or not. Collect the good and bad queries, label them (either bot or not). The tricky part will be to extract features. As features you can use: HTTP request method HTTP status code URL File name ([login to view URL]) Useragent IP address Geolocation of the IP address Train and test machine learning model. The drawback of the proposed approach is that the requests are treated as single objects and not as a part of the attack. Our proposed method consists of first by using a supervised learning model the Support Vector Machines (SVM), which captures network traffic, filters HTTP headers, normalizes the data on the basis of the operational variables: rate of false positives, rate of false negatives, rate of classification and then sends the information to corresponding SVM’s training and testing sets. then, we use Deep Q learning to attain the best possible reward. We are using CICIDS 2017 dataset for intrusion detection which has the latest attributes with new types of attacks. In this section we have analyzed various types of publicly available dataset which we have used for training our neural network. CICIDS2017: Generating the realistic background traffic is one of the highest priorities of this work. For this dataset, we used our proposed B-Profile system (Sharafaldin et al., 2017), which is responsible for profiling the abstract behavior of human interactions and generate a naturalistic benign background traffic. Our B-Profile for this dataset extracts the abstract behavior of 25 users based on the HTTP, HTTPS, FTP, SSH, and email protocols. It also includes the results of the network traffic analysis using CICFlowMeter with labeled flows based on the time stamp, source and destination IPs, source and destination ports, protocols and attack (CSV files).
Hello I am my name is Siddhanth and i am an freelancer although i am planning on making new company related to cyber-security & Technology. In order to do so i am hiring an team who can spare their time to work with each other and earn more profit and some respect.I am stating the requirements below:- Requirements: [login to view URL] member must be living in mumbai and must have proper understanding with us on the pay [login to view URL] member must have atleast intermediate Cyber-Security and Penetration Testing Experience [login to view URL] provide proper identity proof & shall give us proper resume or info on your previous achievements. Thanks for paying attention we await you response.
We are looking to build some stable solution for screen sharing or parental control of peers Laptops (aproxx 50) using local network/LAN without using Internet.
There is an Instagram account which hasn't been used since 2011, very few followers and only 2 pictures uploaded. Is it possible to delete the account (for an anonymous user) which hasnt been used for 7 years and reactivate it as a new user which is me?
Hello, I am looking for someone to edit the technical document in terms of drawing flowchart with any tools and writing few paragraphs in the report. Note: 1. Due in next 33 hrs 2. The writer should have an experience in Network and Security domain 3. Good command on the language
I need a VISIO Expert who has good skills in making Diagrams of Class Diagram, etc of Computer Sciences. I need a serious and hard working person
Need freelancers on network security CITRIX experience in Germay for 195 days on per day basis. Check the file and bid only if you have CITRIX experience. Happy bidding.