Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    1,764 threats jobs fundet, i prisklassen EUR

    I need content to be written on the below topic Topic: Addressing Cyber threats due to the rise in IoT Devices. Words length : 700 - 800 words Full details will be shared by Private Message

    €14 (Avg Bid)
    €14 Gns Bud
    42 bud

    Hello I just need one well written page document to protect me against an unhappy customer. I did a job for them and their labor warranty expired, yet I am still willing to help them out as a favor despite their threats to make a complaint against me to the contractors board an pursue my insurance bond. "I need the document to say: -That they understand this is a non- warranty job or obli...

    €101 (Avg Bid)
    €101 Gns Bud
    14 bud

    Scenario - You are an Information Security engineer for a midsized company. The company would like to offer direct sales of its “WigIT” app to its consumers on the World Wide Web. Your manager has asked you to prepare an informational paper for the Chief Executive Officer (CEO) on wireless and mobile risk management. What risks do you envision and how will you mitigate them? Take into...

    €25 (Avg Bid)
    €25 Gns Bud
    18 bud

    I need four (4) unique, SEO friendly articles about cyber security. 1. focus on cyber security frameworks (Mainly the NIST CSF) 2. cyber security awareness 3. Recent threats, the other any 4. A random cyber security topic.

    €84 (Avg Bid)
    €84 Gns Bud
    38 bud
    Risk manament plan Udløbet left

    Risk Management Plan will contain the following sections: 1. A section titled Introduction discussing the purpose of the plan. You must include details from the scenario, above, describing the environment. 2. A section titled Scope discussing the scope of the plan. 3. A section, titled Compliance Laws and Regulations. Using the information in the scenario provided above, discuss regulations a...

    €122 (Avg Bid)
    €122 Gns Bud
    25 bud

    I need someone to create assignment briefs for higher education students. The subject will be on computing, specifically students will examine inter-networking technologies, protocols and security systems. Students will also explore a range of security vulnerabilities/threats. Students will apply and describe effective methods by which the foregoing might be combated. Students will examine how in...

    €23 (Avg Bid)
    €23 Gns Bud
    26 bud

    Write 2 - 500 word blogs on technical subject relating to IT services, web development, branding through internet and social media. The following are a list of topics I would like to propose. I would like the blog sent every other week where I would post on a site I've created. The content would be mine. I am starting to drive traffic to this site and plan on starting an IT business after...

    €18 / hr (Avg Bid)
    €18 / hr Gns Bud
    65 bud

    3+ years of experience with software development lifecycle and the software development techniques • Considerable experience with application/software security procedures, performing software/application assessments, and assisting development teams with software vulnerability remediation • Must possess in-depth, hands-on experience with one of the following: Java, C, C++, C#, ASP.Net, Sw...

    €18 / hr (Avg Bid)
    €18 / hr Gns Bud
    6 bud

    small LAN with security, introduce threats (pentesting)

    €150 (Avg Bid)
    €150 Gns Bud
    16 bud

    I need assistance in researching content for a short article regarding an organizational capacity for cyber resilience in the face of cyber threats that goes beyond just the conventional cybersecurity/IT focus and that includes more cross-functional (i.e., operations, people, strategy) and proactive approaches.

    €64 (Avg Bid)
    €64 Gns Bud
    21 bud

    I am after a solution to build New mobile platforms and ticket resale platforms. To primarily sell tickets online to live events. Ticketed events include concerts, sporting events, live theatre and festivals. Operators in the Online Event Ticket Sales industry act as agents for promoters and organisers of sporting, performing and other live events, selling tickets to t...

    €4571 (Avg Bid)
    €4571 Gns Bud
    162 bud

    I want some to crack password of my website and later on tell me the threats on my live server.

    €48 (Avg Bid)
    €48 Gns Bud
    7 bud

    Make a research on a Real-life Cyber security Data breach/security management issue case happened in a corporate organisation (must not be older than 2018 issue). Must be 1800-2000 words and use Harvard referrencing style. Must cover the following topics: Identify and analyze vulnerabilities, threats and exploits. Identify and analayze legal and ethical issues, consequences of data breach analysis...

    €76 (Avg Bid)
    €76 Gns Bud
    17 bud

    It's fun to work in a company where people truly BELIEVE in what they're doing! We're committed to bringing passion and customer focus to the business. Company Overview At Nouscom, we have a passion for protecting people, data, and brands from today’s advanced threats and compliance risks. We hire the best people in the business to: Build and enhance our proven security ...

    €15 / hr (Avg Bid)
    €15 / hr Gns Bud
    6 bud
    Case study Udløbet left

    The growth and explosion of the internet has led to a global market place. Companies can sell products all over the world and never have to leave the bounds of their physically secure location. With this move to a global economy we see an increase in security threats to organizations, individuals and agencies. All these models must have an information system to process, store, and retrieve info...

    €34 (Avg Bid)
    €34 Gns Bud
    30 bud

    With the introduction and upsurge of technologies like Artificial Intelligence (AI) and Machine Learning (ML), the career landscape is changing across industries and age groups. However, the most affected are the mid-level, middle aged professionals (between 35-50 years), whose careers are under most threats. We need around 5 articles to help such professionals manage their careers moving forward....

    €22 (Avg Bid)
    €22 Gns Bud
    28 bud
    CBM&R application Udløbet left

    Here are some basic information about the app to be developed and the target users: USER For: Forest patrollers or local community members with limited literacy level Who: wants to gather georeferenced data about wildlife, threats, and habitat

    €14 (Avg Bid)
    €14 Gns Bud
    8 bud
    Influencer Industry Udløbet left

    1. Influencers concept in general – 1 page 2. Influencers general trends – 1 page 3. Effect and influence of influencers on Italian brands – 1 page 4. Influencers in perfumer space – 1 page 5. Influencers in niche brands perspective – 1 page 6. Effects of fashion and other influencers working for Masque Milano – 1 page 7. Effects of same perfume influencer worki...

    €16 (Avg Bid)
    €16 Gns Bud
    5 bud

    Hi I need someone to use netflix api to check the validity of netflix gift card. For this project you need to implement 2captcha. Need it to have a a lot of threats and proxies incorporated. Main things I need to have are captcha bypass, multi-threaded, and load proxies.

    €206 (Avg Bid)
    €206 Gns Bud
    6 bud

    Hi I need someone to use netflix api to check the validity of netflix gift card. For this project you need to implement 2captcha. Need it to have a a lot of threats and proxies incorporated.

    €132 (Avg Bid)
    €132 Gns Bud
    18 bud
    Management report Udløbet left

    I need a 6000 word report about baxter operation management answering the following questions : Evaluate the key Operations Management issues faced by Baxter to serve the GCC market A good response should include: key process issues and constraints and highlight of potential key areas subject to improvement § According to you, what would be the best supply chain design/model that encompass...

    €121 (Avg Bid)
    €121 Gns Bud
    35 bud

    Task Brief One of the threats faced by a company is around market pricing. If a competitor launches a savings product at a market beating rate we may see some of our balances leave the bank and switch to this provider. As a result, it is important we understand our customer base and can identify balances that may be at risk of leaving. The attached data set covers 7,391 accounts and details how e...

    €119 (Avg Bid)
    €119 Gns Bud
    14 bud

    I need to secure my hospital for cyber threats. my hospital network contain 1 router, 3 switches, 1 server, 24 pcs

    €864 (Avg Bid)
    €864 Gns Bud
    2 bud

    We need an information security teacher for our online Computer Science tutorial website. Your lessons should be broadcasted in our website for the students. The curriculum is provided below. Let us know your relevant Skills and experiences. Footprinting and Information Gathering: From Social Media Web server Whois subdomain Reserved IP Location Which plat...

    €22 / hr (Avg Bid)
    €22 / hr Gns Bud
    17 bud

    I need to secure my hospital for cyber threats. my hospital network contain 1 router, 3 switches, 1 server, 24 pcs

    €749 (Avg Bid)
    €749 Gns Bud
    17 bud

    Hi We require around 100 articles each month of about 1,000-words each, this will be an ongoing order with consistent orders month-after-month, with a raise after each month until we can settle for a fixed price. About The Job 1) As a writer, your main job is to use the instructions, requirements and objectives provided by the editor to create high-quality engaging articles. 2) The topics, nic...

    €312 (Avg Bid)
    €312 Gns Bud
    26 bud

    I need a white hat tech savvy or any one skilled with online accounts to enhance the security of the chat system used in my company. The system is an internal one so you would be provided with details to discover bugs and threats and enhance the security of our portal. Bidders must be specialized in internet/computer security and have some white hat skills.

    €191 (Avg Bid)
    €191 Gns Bud
    7 bud

    I have a few questions about these topics: Network Layer 1. What core services does the network layer provide? 2. Can you explain the differences between routing and forwarding? 3. Can you work with 32-bit IPv4 addresses in terms of sub-netting, variable length subnet masking, and super-netting? 4. What are the algorithms used to compute shortest-path-routes in a network (e.g. Dijkstra, Be...

    €98 (Avg Bid)
    €98 Gns Bud
    28 bud

    In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet. It is the policy of the United States to prevent or minimize disruptions to the critical national...

    €21 (Avg Bid)
    €21 Gns Bud
    28 bud

    We are looking for a social media marketing professional with knowledge of cyber security to write posts/articles about the latest cyber security trends, threats, tactics, etc. The professional needs to have a solid knowledge of cyber security industry.

    €29 / hr (Avg Bid)
    €29 / hr Gns Bud
    16 bud

    cyber security/crime/threats questions inbox for details

    €27 (Avg Bid)
    €27 Gns Bud
    35 bud

    This is a project but before starting the project, research is required that what are the challenges and threats in the eCommerce in Pakistan. so before start building the website, it is require to have some statistically shown problems and and their solutions. and the time frame for this project is two months

    €652 (Avg Bid)
    €652 Gns Bud
    45 bud

    The year 2020 was predicted to be the most effective year for IoT revolution. , we are already witnessing the presence of IoT devices and the increment in their uses for many practical problems. The rapidly increasing number of attacks is posing a huge problem for the IoT community. The IoT devices are deemed attractive by the attackers and vice-versa. They have limited power and memory and comput...

    €2017 (Avg Bid)
    €2017 Gns Bud
    11 bud

    Lesson 16: Risk Find 2 news articles on risks of terrorism lesson 22: Cyberterrorism 2 Find 2 news articles on cyberterrorism Lesson 23: Structures for Blast Loading and Engineering Materials Find two news articles on Structures for Blast loading Lesson 26: Seven Issues in WMD Find 2 news articles on WD terrorism threats Lesson 27: Asymmetric Warfare Find two news articles on asymmetric warfa...

    €23 (Avg Bid)
    €23 Gns Bud
    38 bud

    Natural disasters are one of humanity’s greatest threats. While they may be inevitable, their impact can be reduced through technology. In conjunction with IBM’s Call for Code Global Challenge, Arrow is launching this contest to spark technology innovation for solutions that improve individual health and community well-being through better natural disaster preparedness, accelerated re...

    €4506 (Avg Bid)
    Fremhævet Garanteret Forseglet Topkonkurrence
    €4506
    183 indlæg
    Discussion writing Udløbet left

    Attacks on our national infrastructure are already happening. And the expectation is that they will continue to increase at an accelerated rate. For this week's discussion, we'll cover threats to our nation's pipelines. To get started, read this article: [log ind for at se URL] After reading the article, start a discussion thread and discuss how the types of threats discussed in t...

    €28 (Avg Bid)
    €28 Gns Bud
    17 bud

    User Lifecycle (ULC) department is part of Employee Experience Division and leads 3 streams: • Stream 1: Identity & Access Management (IAM) • Stream 2: Global Directory Services (GDS), which manages Active Directory (AD) • Stream 3: Remedy (ITSM) ULC department is in charge of the maintenance in operational conditions (MOC) of the 3 streams solutions. As a key member of the d...

    €41 / hr (Avg Bid)
    €41 / hr Gns Bud
    10 bud
    Disaster recovery Udløbet left

    You are the administrator for your team in a small IT services company named Skillage I.T. You are tasked with formulating a disaster recovery plan for the organisation. The organisation’s 20 staff are reliant on Email and a database online application that contains all customer records and billing information. Each of the users enjoys individual desktop settings and application dashboards r...

    €57 (Avg Bid)
    €57 Gns Bud
    6 bud

    Company SWOT analysis of Coca Cola (internal and external analysis) and based on weakness and threats, identify areas that need change and write a summary of that. Literature review on change management theories (at least 2) that is applicable in situation identified. Based on that evaluate possible alternatives and recommend best one. This will be part of a bigger research project based on chang...

    €36 (Avg Bid)
    €36 Gns Bud
    37 bud

    This project will be a report based on an event, risk or threat facing an airline and to critically evaluate the effectiveness of the resulting crisis management strategies that were put into place. The aim is to provide a critical analysis of the actual or potential impacts on the airline locally or in the wider sector. The report will be based on 9/11 as the topic for discussion, the report sho...

    €76 (Avg Bid)
    €76 Gns Bud
    12 bud
    Writing a book Udløbet left

    I have written two thirds of my book but now need help with research, fact checking, writing enhancements, proof reading etc. The book is: ‘Leadership, Assholes and Block-Chain’ Thesis: We are living in what I consider, the most exciting time of all times. Despite the constant flow of negative news, the world is doing better than ever: less wars, lowest poverty rate, least ep...

    €1804 (Avg Bid)
    €1804 Gns Bud
    40 bud

    1.)How are strategic decisions made at Amazon? 2.)What makes the Management team and Business Strategy competitive at Amazon? 3.) Examine Walmart(Key competitor of Amazon) focusing on their strengths, weakness, threats to amazon, opportunities etc. 4.) Examine Amazon's Internal capabilities, Advantages, market position etc. 5.) Write this paper just like you are an Industry Analyst 4 Pages- ...

    €55 (Avg Bid)
    €55 Gns Bud
    17 bud

    Review 2 servers for security threats, fix them, and recommend additions to our security protocol.

    €90 (Avg Bid)
    €90 Gns Bud
    1 bud

    We have a client organization who would like a graphic one-pager developed to communicate the "dark clouds" or threats to the organization's priorities. They want it to be a super visual representation that just says the following terms: - Drug Importation - International Reference Pricing - Competitive Acquisition Program - ASP Reimbursement Cuts - Utilization Management ...

    €271 (Avg Bid)
    €271 Gns Bud
    43 bud
    Trophy icon Create a new logo Udløbet left

    Are you inspired to create a logo that will attract attention for ThreatGet, a novel software product helping designing systems that are cybersecure by design? The ThreatGet development team (DT) is looking for a captivating logo. The ThreatGet DT is interested in a logo that 1) integrates the fonts “ThreatGet” with a symbolic illustration that best fits the characteristics of the mode...

    €123 (Avg Bid)
    €123
    128 indlæg

    Top 10 OWASP Threats - Injection Attacks - Broken Authentication - Sensitive Data Exposure - XML External Entities - Broken Access Control - Mis-configuration of Security - Cross Site Scripting - Insecure Deserialization - Use of Components with known Vulnerabilities - In-Sufficient Monitoring and Logging For ALL the 10 OWASP threats above we need : 1) Definition - Define the threat - What is ...

    €132 (Avg Bid)
    €132 Gns Bud
    17 bud

    I need a firewall installation for my website. (PHP, AJAX, CSS, JS) I want this firewall to block threats like SQL Injection, XSS, Cookie tracing, Exploiting, etc. Should be easy as I just want a simple firewall that blocks this. (WAF)

    €59 (Avg Bid)
    €59 Gns Bud
    5 bud

    Create a simple argument visualisation Diagramming using MindMup software, logical arguments diagram based on the four classical ethical theories including utilitarianism, deontology, contract, and virtue. I am going to mention few YouTube links for relevant articles and/or case studies as the basis for your Argument Visualisation. 1. [log ind for at se URL] 2. [log ind for at se URL] 3. [log i...

    €22 (Avg Bid)
    €22 Gns Bud
    1 bud

    Create a simple argument visualisation Diagramming using MindMup software, logical arguments diagram based on the four classical ethical theories including utilitarianism, deontology, contract, and virtue. I am going to mention few YouTube links for relevant articles and/or case studies as the basis for your Argument Visualisation. 1. [log ind for at se URL] 2. [log ind for at se URL] 3. [log i...

    €5 (Avg Bid)
    €5 Gns Bud
    1 bud

    You need to create a diagram with MindMup you need to create a simple argument visualisation Diagramming Simple Arguments using MindMup software logical arguments based on the four classical ethical theories including utilitarianism, deontology, contract, and virtue. I am going to mention few YouTube links for relevant articles and/or case studies as the basis for your Argument Visualisation. You...

    €15 (Avg Bid)
    €15 Gns Bud
    1 bud

    Top threats Community-artikler