Find Jobs
Hire Freelancers

Cyber Security Use Case

£20-250 GBP

Closed
Posted about 4 years ago

£20-250 GBP

Paid on delivery
We’re looking for a set of use cases (threat scenarios) written around the current issues/risks faced by small/medium sized businesses in regard to opening up their networks for remote connectivity. What the forced shift to remote working means for the cyber threat landscape. We would like this to take the format of 5 detailed/technical blog posts or similar (as below). Potential E-Mail Spam Malware / Large volume of emails sent from single address in a short timeframe or large volume of non-deliverable emails This scenario can indicate malware hijacking mailboxes, causing a significant amount of spam/malicious emails to be sent from a user’s mailbox. Actions: Speak to the user whose address has been potentially compromised to determine whether they are aware of the situation. If they are not aware, halt any outgoing mail from the exchange server from their mailbox and investigate their profile for any malware artifacts. Correlation: Mail transfer agent (MTA) or mail relay software logs will be correlated to detect bandwidth threshold-based alerts, threshold-based alerts and anomaly-based alerts. Matches will raise a correlated event/alert. Event Sources: Mail transfer agents, Firewalls, IDS/IPS, Antivirus / Malware solutions Step 1: Preparation This action can indicate potential bots sending spam from an internal host. For this to happen, the system must have been previously compromised. Technicians should be able to have access to AD or have up-to-date lists of contacts of all assets and staff information. Being able to quickly contact a user or the person in charge of a server is the key to being effective. IT Response Team should have knowledge of Anti-Botnet remediation best practices. Step 2: Identification The crucial goal is to determine which host is infected and sending an email. There are several symptoms which often manifest shortly after botnet infiltration as the compromised machine begins executing its instructions. Awareness of these symptoms can aid in early botnet detection. In action, bots are essentially backdoor Trojans. Look for unexpected IRC traffic from internal hosts. The port being used for IRC traffic may even be a non-standard IRC port (6666, 6667...) Run a complete IP check for sending Mail servers. Step 3: Containment Speak to the user whose address has been potentially compromised to determine whether they are aware of the situation. If they are not aware, halt any outgoing mail from the exchange server from their mailbox and investigate their profile for any malware artefacts. A good practice is only to allow mail traffic between the server and the internet. This is usually done by restricting communication to standard ports such as 25, 465 and 587. Step 4: Eradication Like most of the newer forms of malware, bots can be hard to detect and even harder difficult to remove. Methods can be tool based or manual. Depending on the remediator’s infrastructure and line of businesses, their respective may differ substantially. Step 5: Recovery To recover from a computer virus infection or to prevent future infections from malware or computer viruses, use a reliable antivirus. Check if you already have antivirus software installed, many operating systems bring their preinstalled security tools. Identify and track servers, keep a patch maintenance policy and follow post-patch security best practices. Please note that these services do not remove malware, generally only removing the infection manually and rebuilding the site from backup can do that. Step 6: Lessons Learned Implement security awareness policies for employees and end users. Install virus-checking software and update it regularly. Use security software to block or disable potentially harmful applications. Malware is often a component of advanced multi-stage attacks. Configure your firewalls to send email notifications, SNMP Traps and syslog.
Project ID: 24587990

About the project

25 proposals
Remote project
Active 4 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
25 freelancers are bidding on average £152 GBP for this job
User Avatar
Hi. I am an IT Security expert and an experienced technical writer with an MS in Computer Science and Engineering. I have a very good understanding on security compliances such as PCI DSS, ISO 27000 series, NIST, HIPPA, GDPR etc. Check my work history. I have completed 300+ technical writing projects on IT Security, Digital Forensics, Cloud, IoT, system administration, network design/simulation etc. I have access to IEEE journals also. I will assure you plagiarism-free writing.
£200 GBP in 7 days
4.9 (214 reviews)
7.6
7.6
User Avatar
I have done PhD in cyber security and networking and have been helping clients from all over the world on diverse research topics. Can deliver a great quality job as I have been into academic research (aware of different referencing style) and writing since past many years. Looking forward to work with you. Can start right away with this and deliver within deadline
£225 GBP in 2 days
4.8 (125 reviews)
6.3
6.3
User Avatar
Hello, I am expert in cyber security as i have completed many projects on cyber security. I have 7 years of research and writing experience and have worked on PhD level thesis projects, published papers in peer reviewed journals and have also worked with several companies on creating research based reports. Guaranteed Plagiarism Free Content As I have TURNITIN ACCOUNT . Please consider my proposal. Thanks
£250 GBP in 7 days
4.7 (88 reviews)
6.4
6.4
User Avatar
i can help you in cyber security case. Please tell me the deadline. I assure you quality work as per your given deadline. I can provide you with a guarantee of plagiarism free work. I am producing quality content for my clients including ARTICLE WRITING, ESSAY WRITING, RESEARCH PAPERS, BUSINESS PLAN, TECHNICAL WRITING, MATLAB, THESIS & DISSERTATIONS. I can provide your work as per your requirements along with free of cost changes facility. https://www.freelancer.com/u/PremiumSolution?w=f. Thanks
£20 GBP in 7 days
4.7 (210 reviews)
6.4
6.4
User Avatar
Hello, i am Cyber Security Expert with 6 years of experience and ready to complete this project because i have great skills set practical and worming in Security Operation Center. That's why i ma perfect for this project . Contact me
£350 GBP in 4 days
4.9 (90 reviews)
6.3
6.3
User Avatar
I have a Bachelor’s degree in computer science and diploma in B.I.T with 8 years’ experience in academic, articles, reports & technical writing experience. As pertains to this project, I have read and understood all the instructions. I have successfully completed over 3000 related projects and the responses are positively overwhelming as you can see from my reviews. I will deliver the paper within the given deadline and will engage in constant communication to avoid any inconveniences. Happy to work with YOU
£200 GBP in 5 days
4.7 (78 reviews)
6.2
6.2
User Avatar
Hello, i have gone through your project description and i can confirm that i am deem fit to deliver it as expected. I have a strong attention to detail and i can guarantee you quality work analysinng the case study. i am well conversant with all the referencing styles of writing such as APA referencing style. Kindly contact me so that we can discuss more on the specifics. Thank You
£55 GBP in 1 day
4.9 (76 reviews)
6.0
6.0
User Avatar
Dear customer, i confidently express my desire to work on this paper as I am committed to provide you with the best possible services including plagiarism free work, timely delivery and of course, excellent quality.
£135 GBP in 1 day
4.8 (64 reviews)
5.8
5.8
User Avatar
Dear Sir/Madam, I have Completed 1070+ LEGAL projects on Freelancer related to CONTRACTS, PATENTS, TERMS OF SERVICE, PRIVACY POLICY, LEGAL RESEARCH and IT LAW. I have drafted a lot of customized Cases for my clients in accordance with their requirements and existing laws. I will make sure that your legal rights are well protected in the documents and the other party shall indemnify you if you suffer any loss/damage due to breach of terms of the legal document. If required I can share sample of work done by me for your kind perusal. It will help you gain confidence in me. Please review feedback on my profile page; I am sure you will like it. I also have access to LEXIS NEXIS and TOTAL PATENT. I have rich experience in international law, contract drafting and revision, International Arbitration, trademark, copyright, patent, entertainment law, legal research, business law, employment law, e-commerce law, terms of service, privacy policy, cyber law and information technology. Looking forward for a long-term association.
£150 GBP in 3 days
4.6 (49 reviews)
5.9
5.9
User Avatar
Greetings, This is Kelvin here, an expert in Cyber Security. Please invite me for a chat and we shall discuss more. Regards Kelvin.
£100 GBP in 5 days
4.7 (29 reviews)
5.5
5.5
User Avatar
I am a Professional writer with seven years of experience. I hold an M B A and first Degree in Economic which provides me with the necessary background to handle your projects. The 100% client satisfaction is my priority. My fields of specialization are Proofreading, Academic Writing, Business Writing, Essay Writing, Dissertations, Press Release, Article Writing, C .V, Resumes and Cover letters, Articles, Research point presentation, Reviews papers, Report and many more. I provide well researched academic in 1. A.P.A 2. M.L.A 3. Chicago and Oxford and any other writing styles. Your consideration will meet the following. . Excellent communication and interpersonal skills. . Affordable Cost • Free plagiarism papers (0% plagiarism) • High quality work within the given deadline • Well, formatted documents. • I strictly adhere to Instructions provided •Good Customer Service. Just click on the Hire Me button to get the best services. Please feel free to contact me.
£60 GBP in 1 day
4.7 (53 reviews)
5.4
5.4
User Avatar
I am system architecture designer and UML model designer I will write use cases Please send details of work to be done
£135 GBP in 7 days
4.6 (28 reviews)
5.2
5.2
User Avatar
I will help you with Cyber Security Use Case I assure you to accomplish your task within time with Least prices, Deadline and quality is my first priority. I have 6-7 years of experience in a vast range of exceptional areas, a huge number of clients are being served by me with a high level of satisfaction. For further details, you can check out my portfolio containing remarkable reviews about plagiarism. It's obligatory to give me a chance for once, ensuring you would love to work with me again and again. Waiting for your positive response. https://www.freelancer.com/u/Writerollogy
£135 GBP in 7 days
4.9 (26 reviews)
4.7
4.7
User Avatar
I am an experienced writer having 3 years of experience in writing field and I can provide you help in Academic writing, Blogs & Business writing, Assignments and Homework. I will provide you 100% PLAGIARISIM FREE content with excellent quality at less price. Let's chat to discuss more or award me this project.
£20 GBP in 1 day
4.7 (65 reviews)
5.0
5.0
User Avatar
Hi My name is Randy,  I'm a Cybersecurity expert based in Costa Rica. My usual schedule is from 7 am to 9 pm GMT-6  but I can be flexible as needed. I'm very interested in your project, I'm skilled in what you are looking for, feel free to ping me to discuss more details about the project. I will be glad to assist you with your request. You can ask for my LinkedIn for reference. Any questions let me know.
£200 GBP in 20 days
5.0 (5 reviews)
2.0
2.0
User Avatar
Hello, I'm a good technical writer, research writer and business plan too, including market research paper, I also write articles and contents. I will be glad to help you write your research paper in case study based on cyber security facing (SME) in the world. It will be plagiarism free. I will be waiting for your response. Thank you,
£21 GBP in 1 day
5.0 (1 review)
0.9
0.9
User Avatar
Hello, I can provide you perfect work as you looking for . we can discuss more in chat . I will be waiting for your response . I have very great experience about your project , if you want discuss more please send me a text Thank you
£135 GBP in 7 days
0.0 (0 reviews)
0.0
0.0
User Avatar
hey I am a professional information security engineer I can deliver your project on the time with the accurate results
£88 GBP in 2 days
0.0 (0 reviews)
0.0
0.0
User Avatar
Hi, I am Atul and having experience 17 years of experience in Information security and cyber security. My skill will be useful for you and will be great to help you out. All consultancy during project time frame will be free of cost. Regards Atul
£200 GBP in 7 days
0.0 (0 reviews)
0.0
0.0
User Avatar
Currently working as a cyber consultant. Have an experience of server, web application testing (owasp10) Audit checks as per ISO 27001:2013 standard. I wrote blogs 2 years back (at my graduation period),thus have an excellent idea of writing contents. Bid Amount and project delivery will be based on the type of project and your need.I will assure you the rest.
£35 GBP in 2 days
0.0 (0 reviews)
0.0
0.0

About the client

Flag of UNITED KINGDOM
Gerrards Cross, United Kingdom
0.0
0
Member since Mar 23, 2020

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.