Suljettu

Computer security

writing a full report and you will be uploading all your codes, examples, etc. with a detailed readme file.

1. PDF file scripting attack: In this project, the team will create malicious pdf files that will execute a malicious script when opened. The team will also demonstrate a defense mechanism against this attack.

2. Ransomware attack & protection: The team will be applying a ransomware attack scenario: The victim will download a malicious code and the ransomware will affect the system. Also, a defense mechanism needs to be demonstrated.

3. Buffer overflow attack: You will be applying a buffer overflow attack and demonstrate how it can give access to the attackers, how we can prevent, and defend our environment against such attacks.

4. Defense against Distributed Denial of Service (DDoS) Attacks: In this project, the team will show different techniques to detect and protect against DoS attacks. The team will create a DoS attack library with minimum 3 different types of attacks and demonstrate a defense algorithm.

5. Browser attacks: In this project, the team will create a malicious website that will infect a chosen web-browser (e.g., Firefox). A mitigation method will be also demonstrated.

6. ID management: Finding/implementing multiple different authentication mechanisms (username, password, 2-factor authentication, biometrics, and more), showing their pros and cons, combining them to create secure ID management.

7. Blockchain-based solutions: Implementing blockchain-based mechanism for storage, identity or computation, etc. along with the attack scenarios and possible mitigations.

Taidot: Verkkoturva, Tietoturva

Näytä lisää: computer security bids, english computer type writing, computer security article, computer security trainer, interested writing computer security, writing computer security research paper, writing paper computer security, creative writing on a wonderful matchine computer, g.e.d. writing prompts, A a s t h a I m e g i g, prove that if a graph g v e is connected then lg e θ lg v |), gitlab a default branch (e.g. master) does not yet exist for, a default branch (e.g. master) does not yet exist for gitlab, remote: a default branch (e.g. master) does not yet exist for, a default branch (e.g. master) does not yet exist for project, make a report on computer security, writing without a computer, thrustmaster hotas warthog t.a.r.g.e.t. software download, 5 reasons for writing in a law enforcement context

Tietoa työnantajasta:
( 0 arvostelua ) Denton, United States

Projektin tunnus: #29088599

6 freelanceria on tarjonnut keskimäärin $398 tähän työhön

kaindo2017

Hello,i am an expert in cyber security. I have a more experience in article writing. I have a B.Sc. degree in computer science and certificate in CCNA and CCNP. I do give A+ articles to my clients. Kindly please try me Lisää

$110 USD 3 päivässä
(20 arvostelua)
5.0
aribafreelance20

Hi Krisha I read all your details and assignments on each topic you need to get done. I have done many projects on topics like - File binding like PDF attacks - DDoS large scale attacks and mitigation solution , Web Lisää

$130 USD 7 päivässä
(7 arvostelua)
4.3
umg536

Hi there, I'm bidding on your project "Computer security" we are a team of titanium certified developers. we excel in 2D and 3D animations. please leave a message on my chat so we can discuss the budget and deadline o Lisää

$250 USD 3 päivässä
(0 arvostelua)
0.0
(0 arvostelua)
2.2
sainib

Hi there! I am based in US with a team in India . We are a team of very experienced engineers with past experience with large companies as well. We have strong experience in Java but also security. Please see - rapidat Lisää

$250 USD 30 päivässä
(0 arvostelua)
0.0
CyberTronc

We are driven by the vision to be the most trusted cybersecurity technology consulting company, meaning that we are constantly passionate to innovate and go the extra mile. As a Managed Cyber Security, IT Audit, Digita Lisää

$1499 USD 5 päivässä
(0 arvostelua)
0.0