Find Jobs
Hire Freelancers

Cyber Security Use Case

£20-250 GBP

Cerrado
Publicado hace alrededor de 4 años

£20-250 GBP

Pagado a la entrega
We’re looking for a set of use cases (threat scenarios) written around the current issues/risks faced by small/medium sized businesses in regard to opening up their networks for remote connectivity. What the forced shift to remote working means for the cyber threat landscape. We would like this to take the format of 5 detailed/technical blog posts or similar (as below). Potential E-Mail Spam Malware / Large volume of emails sent from single address in a short timeframe or large volume of non-deliverable emails This scenario can indicate malware hijacking mailboxes, causing a significant amount of spam/malicious emails to be sent from a user’s mailbox. Actions: Speak to the user whose address has been potentially compromised to determine whether they are aware of the situation. If they are not aware, halt any outgoing mail from the exchange server from their mailbox and investigate their profile for any malware artifacts. Correlation: Mail transfer agent (MTA) or mail relay software logs will be correlated to detect bandwidth threshold-based alerts, threshold-based alerts and anomaly-based alerts. Matches will raise a correlated event/alert. Event Sources: Mail transfer agents, Firewalls, IDS/IPS, Antivirus / Malware solutions Step 1: Preparation This action can indicate potential bots sending spam from an internal host. For this to happen, the system must have been previously compromised. Technicians should be able to have access to AD or have up-to-date lists of contacts of all assets and staff information. Being able to quickly contact a user or the person in charge of a server is the key to being effective. IT Response Team should have knowledge of Anti-Botnet remediation best practices. Step 2: Identification The crucial goal is to determine which host is infected and sending an email. There are several symptoms which often manifest shortly after botnet infiltration as the compromised machine begins executing its instructions. Awareness of these symptoms can aid in early botnet detection. In action, bots are essentially backdoor Trojans. Look for unexpected IRC traffic from internal hosts. The port being used for IRC traffic may even be a non-standard IRC port (6666, 6667...) Run a complete IP check for sending Mail servers. Step 3: Containment Speak to the user whose address has been potentially compromised to determine whether they are aware of the situation. If they are not aware, halt any outgoing mail from the exchange server from their mailbox and investigate their profile for any malware artefacts. A good practice is only to allow mail traffic between the server and the internet. This is usually done by restricting communication to standard ports such as 25, 465 and 587. Step 4: Eradication Like most of the newer forms of malware, bots can be hard to detect and even harder difficult to remove. Methods can be tool based or manual. Depending on the remediator’s infrastructure and line of businesses, their respective may differ substantially. Step 5: Recovery To recover from a computer virus infection or to prevent future infections from malware or computer viruses, use a reliable antivirus. Check if you already have antivirus software installed, many operating systems bring their preinstalled security tools. Identify and track servers, keep a patch maintenance policy and follow post-patch security best practices. Please note that these services do not remove malware, generally only removing the infection manually and rebuilding the site from backup can do that. Step 6: Lessons Learned Implement security awareness policies for employees and end users. Install virus-checking software and update it regularly. Use security software to block or disable potentially harmful applications. Malware is often a component of advanced multi-stage attacks. Configure your firewalls to send email notifications, SNMP Traps and syslog.
ID del proyecto: 24587990

Información sobre el proyecto

25 propuestas
Proyecto remoto
Activo hace 4 años

¿Buscas ganar dinero?

Beneficios de presentar ofertas en Freelancer

Fija tu plazo y presupuesto
Cobra por tu trabajo
Describe tu propuesta
Es gratis registrarse y presentar ofertas en los trabajos
25 freelancers están ofertando un promedio de £152 GBP por este trabajo
Avatar del usuario
Hi. I am an IT Security expert and an experienced technical writer with an MS in Computer Science and Engineering. I have a very good understanding on security compliances such as PCI DSS, ISO 27000 series, NIST, HIPPA, GDPR etc. Check my work history. I have completed 300+ technical writing projects on IT Security, Digital Forensics, Cloud, IoT, system administration, network design/simulation etc. I have access to IEEE journals also. I will assure you plagiarism-free writing.
£200 GBP en 7 días
4,9 (214 comentarios)
7,6
7,6
Avatar del usuario
I have done PhD in cyber security and networking and have been helping clients from all over the world on diverse research topics. Can deliver a great quality job as I have been into academic research (aware of different referencing style) and writing since past many years. Looking forward to work with you. Can start right away with this and deliver within deadline
£225 GBP en 2 días
4,8 (125 comentarios)
6,3
6,3
Avatar del usuario
Hello, I am expert in cyber security as i have completed many projects on cyber security. I have 7 years of research and writing experience and have worked on PhD level thesis projects, published papers in peer reviewed journals and have also worked with several companies on creating research based reports. Guaranteed Plagiarism Free Content As I have TURNITIN ACCOUNT . Please consider my proposal. Thanks
£250 GBP en 7 días
4,7 (88 comentarios)
6,4
6,4
Avatar del usuario
i can help you in cyber security case. Please tell me the deadline. I assure you quality work as per your given deadline. I can provide you with a guarantee of plagiarism free work. I am producing quality content for my clients including ARTICLE WRITING, ESSAY WRITING, RESEARCH PAPERS, BUSINESS PLAN, TECHNICAL WRITING, MATLAB, THESIS & DISSERTATIONS. I can provide your work as per your requirements along with free of cost changes facility. https://www.freelancer.com/u/PremiumSolution?w=f. Thanks
£20 GBP en 7 días
4,7 (210 comentarios)
6,4
6,4
Avatar del usuario
Hello, i am Cyber Security Expert with 6 years of experience and ready to complete this project because i have great skills set practical and worming in Security Operation Center. That's why i ma perfect for this project . Contact me
£350 GBP en 4 días
4,9 (90 comentarios)
6,3
6,3
Avatar del usuario
I have a Bachelor’s degree in computer science and diploma in B.I.T with 8 years’ experience in academic, articles, reports & technical writing experience. As pertains to this project, I have read and understood all the instructions. I have successfully completed over 3000 related projects and the responses are positively overwhelming as you can see from my reviews. I will deliver the paper within the given deadline and will engage in constant communication to avoid any inconveniences. Happy to work with YOU
£200 GBP en 5 días
4,7 (78 comentarios)
6,2
6,2
Avatar del usuario
Hello, i have gone through your project description and i can confirm that i am deem fit to deliver it as expected. I have a strong attention to detail and i can guarantee you quality work analysinng the case study. i am well conversant with all the referencing styles of writing such as APA referencing style. Kindly contact me so that we can discuss more on the specifics. Thank You
£55 GBP en 1 día
4,9 (76 comentarios)
6,0
6,0
Avatar del usuario
Dear customer, i confidently express my desire to work on this paper as I am committed to provide you with the best possible services including plagiarism free work, timely delivery and of course, excellent quality.
£135 GBP en 1 día
4,8 (64 comentarios)
5,8
5,8
Avatar del usuario
Dear Sir/Madam, I have Completed 1070+ LEGAL projects on Freelancer related to CONTRACTS, PATENTS, TERMS OF SERVICE, PRIVACY POLICY, LEGAL RESEARCH and IT LAW. I have drafted a lot of customized Cases for my clients in accordance with their requirements and existing laws. I will make sure that your legal rights are well protected in the documents and the other party shall indemnify you if you suffer any loss/damage due to breach of terms of the legal document. If required I can share sample of work done by me for your kind perusal. It will help you gain confidence in me. Please review feedback on my profile page; I am sure you will like it. I also have access to LEXIS NEXIS and TOTAL PATENT. I have rich experience in international law, contract drafting and revision, International Arbitration, trademark, copyright, patent, entertainment law, legal research, business law, employment law, e-commerce law, terms of service, privacy policy, cyber law and information technology. Looking forward for a long-term association.
£150 GBP en 3 días
4,6 (49 comentarios)
5,9
5,9
Avatar del usuario
Greetings, This is Kelvin here, an expert in Cyber Security. Please invite me for a chat and we shall discuss more. Regards Kelvin.
£100 GBP en 5 días
4,7 (29 comentarios)
5,5
5,5
Avatar del usuario
I am a Professional writer with seven years of experience. I hold an M B A and first Degree in Economic which provides me with the necessary background to handle your projects. The 100% client satisfaction is my priority. My fields of specialization are Proofreading, Academic Writing, Business Writing, Essay Writing, Dissertations, Press Release, Article Writing, C .V, Resumes and Cover letters, Articles, Research point presentation, Reviews papers, Report and many more. I provide well researched academic in 1. A.P.A 2. M.L.A 3. Chicago and Oxford and any other writing styles. Your consideration will meet the following. . Excellent communication and interpersonal skills. . Affordable Cost • Free plagiarism papers (0% plagiarism) • High quality work within the given deadline • Well, formatted documents. • I strictly adhere to Instructions provided •Good Customer Service. Just click on the Hire Me button to get the best services. Please feel free to contact me.
£60 GBP en 1 día
4,7 (53 comentarios)
5,4
5,4
Avatar del usuario
I am system architecture designer and UML model designer I will write use cases Please send details of work to be done
£135 GBP en 7 días
4,6 (28 comentarios)
5,2
5,2
Avatar del usuario
I will help you with Cyber Security Use Case I assure you to accomplish your task within time with Least prices, Deadline and quality is my first priority. I have 6-7 years of experience in a vast range of exceptional areas, a huge number of clients are being served by me with a high level of satisfaction. For further details, you can check out my portfolio containing remarkable reviews about plagiarism. It's obligatory to give me a chance for once, ensuring you would love to work with me again and again. Waiting for your positive response. https://www.freelancer.com/u/Writerollogy
£135 GBP en 7 días
4,9 (26 comentarios)
4,7
4,7
Avatar del usuario
I am an experienced writer having 3 years of experience in writing field and I can provide you help in Academic writing, Blogs & Business writing, Assignments and Homework. I will provide you 100% PLAGIARISIM FREE content with excellent quality at less price. Let's chat to discuss more or award me this project.
£20 GBP en 1 día
4,7 (65 comentarios)
5,0
5,0
Avatar del usuario
Hi My name is Randy,  I'm a Cybersecurity expert based in Costa Rica. My usual schedule is from 7 am to 9 pm GMT-6  but I can be flexible as needed. I'm very interested in your project, I'm skilled in what you are looking for, feel free to ping me to discuss more details about the project. I will be glad to assist you with your request. You can ask for my LinkedIn for reference. Any questions let me know.
£200 GBP en 20 días
5,0 (5 comentarios)
2,0
2,0
Avatar del usuario
Hello, I'm a good technical writer, research writer and business plan too, including market research paper, I also write articles and contents. I will be glad to help you write your research paper in case study based on cyber security facing (SME) in the world. It will be plagiarism free. I will be waiting for your response. Thank you,
£21 GBP en 1 día
5,0 (1 comentario)
0,9
0,9
Avatar del usuario
Hello, I can provide you perfect work as you looking for . we can discuss more in chat . I will be waiting for your response . I have very great experience about your project , if you want discuss more please send me a text Thank you
£135 GBP en 7 días
0,0 (0 comentarios)
0,0
0,0
Avatar del usuario
hey I am a professional information security engineer I can deliver your project on the time with the accurate results
£88 GBP en 2 días
0,0 (0 comentarios)
0,0
0,0
Avatar del usuario
Hi, I am Atul and having experience 17 years of experience in Information security and cyber security. My skill will be useful for you and will be great to help you out. All consultancy during project time frame will be free of cost. Regards Atul
£200 GBP en 7 días
0,0 (0 comentarios)
0,0
0,0
Avatar del usuario
Currently working as a cyber consultant. Have an experience of server, web application testing (owasp10) Audit checks as per ISO 27001:2013 standard. I wrote blogs 2 years back (at my graduation period),thus have an excellent idea of writing contents. Bid Amount and project delivery will be based on the type of project and your need.I will assure you the rest.
£35 GBP en 2 días
0,0 (0 comentarios)
0,0
0,0

Sobre este cliente

Bandera de UNITED KINGDOM
Gerrards Cross, United Kingdom
0,0
0
Miembro desde mar 23, 2020

Verificación del cliente

Otros trabajos de este cliente

Cyber Security Use Case Project
£20-250 GBP
¡Gracias! Te hemos enviado un enlace para reclamar tu crédito gratuito.
Algo salió mal al enviar tu correo electrónico. Por favor, intenta de nuevo.
Usuarios registrados Total de empleos publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Cargando visualización previa
Permiso concedido para Geolocalización.
Tu sesión de acceso ha expirado y has sido desconectado. Por favor, inica sesión nuevamente.