Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Ansett Computer Security Consultants
Require a person who knows the process of PCI DSS certification and can go through the process of this certification to make our existing website PCI DSS certified. Website: [logg inn for å se URL]
Hi, I needed help from an expert from the cybersecurity and IT background to help me out with the setting of my Linkedin Profile, Write CV and Cover letter writing.
Searching for a freelancer specializing in troubleshooting office electronics, computers, and networks. Must be based in the United States so as to troubleshoot hardware on-site. Need ranges from 5-15 hours a month. Some duties include: - Troubleshooting Internet and network issues - Laptop support for users - Troubleshooting other hardware in the office - Developing cheat sheets for network and ...
Appropriate machine learning algorithm has to be applied on CTU-13 dataset and should determine whether the attacks are malicious or not. Performance of the applied Machine learning algorithm has to be calculated using evaluation metrics.
I am a self-starter and solutions provider, whom amongst others is fascinated by Telecommunications engineering and renewable energy sources. Who possess a fervent commitment to making an impact in the South African economy. Through his analytical and engineering prowess, he develops creative solutions and monitors carefully the response and impact of the solutions. Project Description:The use of...
Help me to download and understand FAW - Forensics Acquisition I was unable to download and install the software in my laptop I need someone to help me download the program and explain the program and do a review of the tool Thanks
An experienced technical support specialists provide technical support, advice, and assistance to consumers and businesses with technical, hardware, and software system problems. ... Some specialists may work on site to modify, install, clean, and repair computer software and hardware.
We're launching a brand new website for the Swedish market and it contains a lot of personal data and in EU we all must be GDPR compliant so security is a HUGE issue. The site runs on a VPS (Ubuntu) and you must check that everything is secure and not easy hackable. Also, if you find vulnerabilities we of course need a report on those with suggested solutions so that we can attend to them. ...
Here are more details: Deadline: November 21nd, 2019 Number of pages: Preferably not less than 100 pages put into practice theories and concepts learned on the programme;(computer science invloving ML, AI, Cryptography) • provide an opportunity to study a particular topic in-depth; • show evidence of independent investigation; • combine relevant theories and suggest alternatives;...
The company is using AWS KMS to encrypt AWS resources such as AWS S3, AWS EBS, AWS RDS, AWS DynamoDB. Due to some policies, on regular basis, we need to re-encrypt the data using a newly created CMK. AWS doesn't deliver any method to re-encrypt the data. See more info here: [logg inn for å se URL] Therefore, the project consists to write a detailed procedure how to re-encrypt files by ...
We are Technology Partner for a Project on Emergency Response for Safe Transportation. We have developed a platform to manage the safe transportation of Chemicals. We need to do a Security Vulnerability Assessment of this platform , so the data on this platform is secured , as this a shared platform by it's subscribers
[logg inn for å se URL] This is the site that i wanted to know their backend IP adress. TAKE THE JOB ONLY IF YOU KNOW WHAT IM SEEKING FOR. Dont send me a cdn IP to me and think its done for the job thanks. such as [logg inn for å se URL]
First come to my mind is a person, who understands the barcode generation and decoding algorithm. Actually, I want to develop a pictorial view of number upto 65535(you can consider it as custom barcode). I am open for any other suggestions as well. Decoding should be in a way that it can easily be implemented in normal mobile app
Using any free software firewall or your default modem at home preform the following: (1) Write a firewall filter rule to deny all incoming TCP traffic except from a specific IP address. (2) Write a firewall filter rule to deny all outgoing TCP traffic to any webserver (3) Take screen shots of the GUI interface of the written rules. (4) Install a network sniffer such as wireshark or commview and c...
The project is to build customised VA/PT framework for organisation network using python [logg inn for å se URL] framework should have all components of VA/PT and should generate complete report in PDF.
We are looking for 2 people in Mexico to carry out a proof of concept on our tool, and see if the tool can correctly perform the assessment and treatment of operational and technological risks of a company in Mexico.
Hello, we need an expert in the Computer Science background. Most of the work is technical in nature. If you are aware of Academic Writing please apply on the job. NOTE: No agencies, groups, teams or company please.