Find Jobs
Hire Freelancers

Website security Consultancy Java Mysql AWS Scaling

₹1500-12500 INR

Peruutettu
Julkaistu lähes 5 vuotta sitten

₹1500-12500 INR

Maksettu toimituksen yhteydessä
My website is on aws built on java, eclipse, tomcat, mysql. Looking for someone who can guide on each and every security aspect so that website cant be hacked. We want only solution. we don't want you to work on our code. 1-forced http to https 2-Mysql inset/select/update/delete commands to be completely secure. 3-Security at each data entry point 4-Logout and sessions management 5-Broken authentication 6-End to end Encryption 7-Password encryption 8-Avoid header injection 9-Avoid cross site scripting 10-Unvalidated requirements and forwards 11-Avoid sensitive data exposure 12-Avoid insecure direct object references 13-How to avoid null pointer exceptions, number format exception and other exceptions 14-Making the front end secure 15- All other web security issue that are not mentioned here. 16- All measures to save website from hacking 17-Scaling website to a large number of users
Projektin tunnus (ID): 19638702

Tietoa projektista

4 ehdotukset
Etäprojekti
Aktiivinen 5 vuotta sitten

Haluatko ansaita rahaa?

Freelancerin tarjouskilpailun edut

Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
4 freelancerit tarjoavat keskimäärin ₹11 389 INR tätä projektia
Käyttäjän avatar
Hello Hope you are doing well. I have 7 years of experience in Linux and AWS. I can handle this project. Regards VishnuLal*
₹10 000 INR 1 päivässä
4,9 (92 arvostelua)
5,9
5,9
Käyttäjän avatar
Hi there! May Peace Be Upon You !! I am a certified ethical hacker and pen tester. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. @Certified at Ethical Hacking @Certified at WEB APP SECURITY FUNDAMENTALS @Certified at Website Hacking / Penetration Testing @Certified at Cyber Security Forensics Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures, Malware Analysis. I provide a variety of security services including white/black hat penetration testing, network and host auditing, Policies and Business Impact Analysis. I will do OWASP Top 10 Application Security Pentesting. A1:2017-Injection A2:2017-Broken Authentication A3:2017-Sensitive Data Exposure A4:2017-XML External Entities (XXE) A5:2017-Broken Access Control A6:2017-Security Misconfiguration A7:2017-Cross-Site Scripting (XSS) A8:2017-Insecure Deserialization A9:2017-Using Components with Known Vulnerabilities A10:2017-Insufficient Logging&Monitoring Please Contact me anytime if you are really looking forward to the quality and world-class work delivered to you. It will be a pleasure to work with you. See you online and have a great day! Warm regards, Shofiur
₹16 666 INR 3 päivässä
4,8 (10 arvostelua)
4,9
4,9
Käyttäjän avatar
Hello, I'm Alban working as Security Analysis Consultant. I have 12 years of experience in Web application assessment, Penetration testing, SAST, DAST, Network Analysis.  •    Proven record in 100+ Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with Finance Background implemented with various technologies and frameworks. (J2EE, ASP, PHP) •    Proficient in ensuring quality and timeliness of the deliverables.  •    Expertise in reviewing OWASP Top 10, SANS Top 25, etc standards assessment reports. •    Appreciated by clients/customers for turning out quality work and time to time deliverables. My deliverable for your current project will be a 'Security  Report'  in Industry standard Report template with content of assessment summary, Security issues(Categorized according to severity) with request/ response and additional issue information.  My report will also contain fix recommendations for the identified threats,  Lett me know if we can have quick call if my skill set suits your requirement, Thanks, Alban
₹11 111 INR 5 päivässä
0,0 (0 arvostelua)
0,0
0,0
Käyttäjän avatar
I will Conduct Tests on Networks and Applications perform security tests on networks, web-based applications, and computer systems. They design these tests and tools to try to break into security-protected applications and networks to probe for vulnerabilities. keep up with the latest methods for ethical hacking and testing and are always evaluating new penetration testing tools. Physical Security Assessments conduct physical assessments of servers, systems, and network device security. look for ways to exploit vulnerabilities and design solutions to security issues like temperature, humidity, vandalism, and natural disasters. Conduct Security Audits use testing methods to pinpoint ways that attackers could exploit weaknesses in security systems. One way do this is by conducting network and system security audits, which evaluate how well an organization’s system conforms to a set of established criteria. Analyze Security Policies Organizations enforce security policies that identify procedures and rules for accessing and using their IT resources. analyze these policies for effectiveness, make suggestions on security policy improvements, and work to enhance methodology material. Write Security Assessment Reports After conducting thorough research and testing, penetration testers document their findings, write security reports, and discuss solutions with IT teams and management. i also provide feedback and verification after security fixe
₹7 777 INR 2 päivässä
0,0 (0 arvostelua)
0,0
0,0

Tietoja asiakkaasta

Maan CYPRUS lippu
Limassol, Cyprus
0,0
0
Maksutapa vahvistettu
Liittynyt toukok. 10, 2019

Asiakkaan vahvistus

Kiitos! Olemme lähettäneet sinulle sähköpostitse linkin, jolla voit lunastaa ilmaisen krediittisi.
Jotain meni pieleen lähetettäessä sähköpostiasi. Yritä uudelleen.
Rekisteröitynyttä käyttäjää Ilmoitettua työtä yhteensä
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Ladataan esikatselua
Lupa myönnetty Geolocation.
Kirjautumisistuntosi on vanhentunut ja sinut on kirjattu ulos. Kirjaudu uudelleen sisään.