Find Jobs
Hire Freelancers

Web Security Expert

$1500-3000 USD

Cerrado
Publicado hace casi 6 años

$1500-3000 USD

Pagado a la entrega
I need senior security Expert. To select right one, you have to answer this question. --------------------------------- Identify any and all rules to follow when securing a web application based on REST architecture: - Sensitive data such as usernames and passwords must always be passed to a web service using POST method. - A Web Service must not use any HTTP error messages. - All input validations must be done on the server. - Validate malformed XML/JSON. - PUT operations must be ready-only. ---------------------------------- if you don't answer in bid, it will be report!
ID del proyecto: 17320692

Información sobre el proyecto

19 propuestas
Proyecto remoto
Activo hace 6 años

¿Buscas ganar dinero?

Beneficios de presentar ofertas en Freelancer

Fija tu plazo y presupuesto
Cobra por tu trabajo
Describe tu propuesta
Es gratis registrarse y presentar ofertas en los trabajos
19 freelancers están ofertando un promedio de $2.222 USD por este trabajo
Avatar del usuario
HI There, I can assist you with Web Security. I am very passionate about quality of my work, You will be pleased working with me. Let's have a quick chat to discuss it further. You can check my sample work at: https://www.freelancer.com/u/extreamcode.html
$2.500 USD en 30 días
5,0 (83 comentarios)
7,7
7,7
Avatar del usuario
HI Webstar0426, I have 10 years of experience with Java, MySQL, PHP, Software Architecture, Web Security. I Can very well execute this Project "Web Security Expert" I can do this within your budget too $1500 - $3000 USD if you don\'t mind check more from here https://www.freelancer.com/u/mmadi.html?page=portfolio Thanks, Mmadi I need senior security Expert. To select right one, you have to answer this question. --------------------------------- Identify
$1.800 USD en 36 días
5,0 (47 comentarios)
7,1
7,1
Avatar del usuario
Hello Sir, First of all I would like to say, I have checked all the rules you have written here: there are many things you need to specify in each rules. I would like to conclude for first rule: for sure it should be passed with POST method but if transmission channel is not encrypted then for sure it will be prone for man in the middle attack. Let's discuss further. Thanks, Bhargav.
$1.500 USD en 20 días
4,9 (66 comentarios)
6,0
6,0
Avatar del usuario
i have experience in cybersecurity, and i have the very good understanding of cybersecurity technology, and vulnerabilities. My job responsibilities included penetration testing and vulnerability assessment of IT systems, development of malware analysis techniques, and testing of various webservices for finding security vulnerabilities and their fixes. if you have any problem mentioned above, then please give me a chance to work for you
$2.500 USD en 30 días
5,0 (184 comentarios)
5,6
5,6
Avatar del usuario
APIs Security We have used below algorithms for APIs Security. So no one can change data while transmitting from device to server over http layer. If server detects any change in data, then Server will refuse that api call. General Details: 1. The client and server agrees on 1 Password and 1 Private key: a. Private key: eviaglOba1 b. Password: e84ccee593aaf6b828a951a1daadb0db (temporary password ) 2. The Password and Private key are hard coded on both sides. 3. The Password and Private key are configurable. 4. The clear text secret and token/password will never be transferred through the network. 5. Communication to APIs that require this API security method should include: a. Nonce b. Timestamp c. Token (see below for Token generation). Steps to generate Token and send the request: 1. The client would like to request using POST data to the API 2. Ensure that the data is URL encoded. 3. We prepare the string before hashing: a. Generate the nonce and concatenate it to the string. i. Example: “nonce=aaa123” b. Generate the timestamp and concatenate it to the string. i. Example: “nonce=aaa123&timestamp=1497691559” c. Concatenate the “|” symbol and the Password to the string. i. Example: “name=andi&age=11&nonce=aaa123&timestamp=149769 1559|eviaglOba1” 4. Use HMAC SHA 256 to hash the string from Step 3 using the Password a. Example: String Token = HMAC256(parameterString, Password) Step 5 I will send you a personal message. Because I am not able to add here.
$2.500 USD en 30 días
4,9 (22 comentarios)
5,7
5,7
Avatar del usuario
Hey I'm interested - Sensitive data such as usernames and passwords must always be passed to a web service using POST method. - Validate malformed XML/JSON. I have been in the InfoSec for years. I'm a former black hat as well. I can help. Regards
$1.800 USD en 30 días
5,0 (25 comentarios)
5,2
5,2
Avatar del usuario
Hello, I am neha and we are team of expertise and did many work based on your need am able to improve security in your website as well manage all need , we are Ready to work with you, we confident to help you for this job so let me help you .... Thanks
$1.500 USD en 30 días
3,9 (72 comentarios)
5,0
5,0
Avatar del usuario
Hi, Interesting questions. All of above are more or less true when you are securing your site or APIs. Kindly provide more information about project. I am a certified security professional. PM for further discussion. Thanks
$1.500 USD en 30 días
5,0 (5 comentarios)
3,6
3,6

Sobre este cliente

Bandera de RUSSIAN FEDERATION
Vladivostok, Russian Federation
5,0
8
Miembro desde may 11, 2018

Verificación del cliente

¡Gracias! Te hemos enviado un enlace para reclamar tu crédito gratuito.
Algo salió mal al enviar tu correo electrónico. Por favor, intenta de nuevo.
Usuarios registrados Total de empleos publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Cargando visualización previa
Permiso concedido para Geolocalización.
Tu sesión de acceso ha expirado y has sido desconectado. Por favor, inica sesión nuevamente.