Search results for Information Security: Load more results...


Information Security Managment - Audit - Policies And Procedures

Information security - audit team - policies and procedure - terms of use - comparison between UK and SA university only through their websites King Saud University and University of Liverpoolwrite a topic describe the projectsWriting two to three pages single space at least 4-5 references with providing the sources, font 12 Compare the information contents on the websites to each other (only for the English language version) the differences between policies and procedures in the different culture, does… Read Full Description

Ethical Hacking -- 2

ethical hacking is a great skill in information security and cyber security Read Full Description

1_Social Media Content Writer

I am looking for people who preferably, but not a necessity, have an understanding of data protection, information security or cybersecurity. I will like some help with advertising and writing very basic content, news, advice on my media accounts. So far it is Twitter and LinkedIn, but I am hoping to expand this. I want the content to be vibrant and catchy and in plain language, for my audience to understand — the more diagrams and similar illustration the better.… Read Full Description

Internet Research And Data Entry

Internet-based research and data entry on behalf of an information security consulting firm -- for a podcast / Web marketing campaign we're developing.We'll supply a sample list of podcasts we're researching, and ask you to build out a spreadsheet that first builds on that list by removing inactive podcasts and adding ones we've missed, then captures the podcast's "activeness" and general range of topics covered, and finally records their relevant social media / traditional contact information. Read Full Description

Data Entry And Internet-based Research

on behalf of an information security consulting firm -- for a podcast / Web marketing campaign we're developing.We'll supply a sample list of podcasts we're researching, and ask you to build out a spreadsheet that first builds on that list by removing inactive podcasts and adding ones we've missed, then captures the podcast's "activeness" and general range of topics covered, and finally records their relevant social media / traditional contact information. Read Full Description

Organization’s Information Security Infrastructure

organization’s information security infrastructure Read Full Description

Organization’s Information Security

c.The organization’s information security infrastructure including:i.Internal network (computers, servers, databases, wireless, etc.)ii.Internet facing networkiii.Firewall types and locationsiv.Demilitarized zone (DMZ)v.Host and/or network based Intrusion Detection and Prevention (IDPS) systemsvi.Virtual Private Network (VPN) Read Full Description

Organization’s Information Security Infrastructure

Create an organization’s information security infrastructure (see notional diagrams below) including:i.Internal network (computers, servers, databases, wireless, etc.)ii.Internet facing networkiii.Firewall types and locationsiv.Demilitarized zone (DMZ)v.Host and/or network based Intrusion Detection and Prevention (IDPS) systemsvi.Virtual Private Network (VPN) Read Full Description

Penetration Tester Wanted For Websites

Penetration tester wanted for websites. We have several clients who want to test their website's security and for this we need penetration testers. We will provide you with website and details of what needs to be done. If possible, we will agree on terms and fees. Please contact me if you have highly experience in this. Thank you Read Full Description

Security Of Information

As a language service provider we work closely with our clients on translation of sensitive documents including PHI and Financial information. Recently clients are asking us to improve our IT security, and I have several vendor questionnaires on my desk that we need to complete successfully in order to keep their business, which means that we have to upgrade our systems to something approaching ISO 27001. 1. Assist in the development of information security program to contain: a. Security Management… Read Full Description

Security Expert

Looking for a Cyber Security Expert, who will be part of our IoT projects and can bring the best practices to the Technology development and empower customer eccentric deliveries.Location: RemoteRole: Security ExpertEmployment Type: Consultant/Freelancer (4 Months)Job Description:•Strong experience in security monitoring, incident response and security technologies.•Experience in managing projects through use of processes like risk management, quality management, Issue/problem management & Scope change management.•Experience in handling Data Privacy, Information Security, Risk and Compliance Management.•Update and maintain critical security infrastructure.•Perform regular… Read Full Description

Academic Writing & Research Computer Science

Data management/Advanced routing/Software development/Software engineering/Information security/Data research Looking for an excellent English academic writer to reply om specific assignments from the quality department in order to verify academic grade-scaling. You get paid by the assignment which is from 1 to 4 weeks with specific topic. More information will be given upon request. Good pay for the right candidate. Read Full Description

WRITE A SOFTWARE

1. A chronological development of IoT 2. Technological forecasting of the future trends in IoT 3. A questionnaire based quantitative/qualitative survey of the IoT users to estimate future trends of IoT 4. A classification of the architectural components of IoT 5. A survey of the architecture options for IoT 6. The computational capacity of IoT and security challenges 7. Integration of IoT to an Access level network 8. A classification of Things in IoT with respect to their roles and… Read Full Description

Academic Writing & Research Computer Science -- 2

Data management/Advanced routing/Software development/Software engineering/Information security/Data research Looking for an excellent English academic writer to reply om specific assignments from the quality department in order to verify academic grade-scaling. You get paid by the assignment which is from 1 to 4 weeks with specific topic. More information will be given upon request. Good pay for the right candidate. Read Full Description

Academic Writing & Research Computer Science -- 3

Data management/Advanced routing/Software development/Software engineering/Information security/Data research Looking for an excellent English academic writer to reply om specific assignments from the quality department in order to verify academic grade-scaling. You get paid by the assignment which is from 1 to 4 weeks with specific topic. More information will be given upon request. Good pay for the right candidate. Read Full Description

 

© 2005 - 2019 getFreeLancer.com
57,844 contracts/jobs/projects currently available in our database.

There are 21 users online now.
Most online ever was 1568.