Find Jobs
Hire Freelancers

Web Security Expert

$1500-3000 USD

Lezárt
Kiadva ekkor: majdnem 6 évvel ezelőtt

$1500-3000 USD

Teljesítéskor fizetve
I need senior security Expert. To select right one, you have to answer this question. --------------------------------- Identify any and all rules to follow when securing a web application based on REST architecture: - Sensitive data such as usernames and passwords must always be passed to a web service using POST method. - A Web Service must not use any HTTP error messages. - All input validations must be done on the server. - Validate malformed XML/JSON. - PUT operations must be ready-only. ---------------------------------- if you don't answer in bid, it will be report!
Projektazonosító: 17320692

A projektről

19 ajánlat
Távolról teljesíthető projekt
Aktiválva: 6 évvel ezelőtt

Szeretne pénzt keresni?

A Freelancer oldalán történő árajánlatadás előnyei

Határozzon meg költségvetést és időkeretet
Kapja meg fizetését a munkáért
Vázolja ajánlatát
Ingyen regisztrálhat és adhat árajánlatot munkákra
19 szabadúszó adott átlagosan $2 222 USD összegű árajánlatot erre a munkára
Felhasználó avatár
HI There, I can assist you with Web Security. I am very passionate about quality of my work, You will be pleased working with me. Let's have a quick chat to discuss it further. You can check my sample work at: https://www.freelancer.com/u/extreamcode.html
$2 500 USD 30 napon belül
5,0 (83 értékelés)
7,7
7,7
Felhasználó avatár
HI Webstar0426, I have 10 years of experience with Java, MySQL, PHP, Software Architecture, Web Security. I Can very well execute this Project "Web Security Expert" I can do this within your budget too $1500 - $3000 USD if you don\'t mind check more from here https://www.freelancer.com/u/mmadi.html?page=portfolio Thanks, Mmadi I need senior security Expert. To select right one, you have to answer this question. --------------------------------- Identify
$1 800 USD 36 napon belül
5,0 (47 értékelés)
7,1
7,1
Felhasználó avatár
Hello Sir, First of all I would like to say, I have checked all the rules you have written here: there are many things you need to specify in each rules. I would like to conclude for first rule: for sure it should be passed with POST method but if transmission channel is not encrypted then for sure it will be prone for man in the middle attack. Let's discuss further. Thanks, Bhargav.
$1 500 USD 20 napon belül
4,9 (66 értékelés)
6,0
6,0
Felhasználó avatár
i have experience in cybersecurity, and i have the very good understanding of cybersecurity technology, and vulnerabilities. My job responsibilities included penetration testing and vulnerability assessment of IT systems, development of malware analysis techniques, and testing of various webservices for finding security vulnerabilities and their fixes. if you have any problem mentioned above, then please give me a chance to work for you
$2 500 USD 30 napon belül
5,0 (184 értékelés)
5,6
5,6
Felhasználó avatár
APIs Security We have used below algorithms for APIs Security. So no one can change data while transmitting from device to server over http layer. If server detects any change in data, then Server will refuse that api call. General Details: 1. The client and server agrees on 1 Password and 1 Private key: a. Private key: eviaglOba1 b. Password: e84ccee593aaf6b828a951a1daadb0db (temporary password ) 2. The Password and Private key are hard coded on both sides. 3. The Password and Private key are configurable. 4. The clear text secret and token/password will never be transferred through the network. 5. Communication to APIs that require this API security method should include: a. Nonce b. Timestamp c. Token (see below for Token generation). Steps to generate Token and send the request: 1. The client would like to request using POST data to the API 2. Ensure that the data is URL encoded. 3. We prepare the string before hashing: a. Generate the nonce and concatenate it to the string. i. Example: “nonce=aaa123” b. Generate the timestamp and concatenate it to the string. i. Example: “nonce=aaa123&timestamp=1497691559” c. Concatenate the “|” symbol and the Password to the string. i. Example: “name=andi&age=11&nonce=aaa123&timestamp=149769 1559|eviaglOba1” 4. Use HMAC SHA 256 to hash the string from Step 3 using the Password a. Example: String Token = HMAC256(parameterString, Password) Step 5 I will send you a personal message. Because I am not able to add here.
$2 500 USD 30 napon belül
4,9 (22 értékelés)
5,7
5,7
Felhasználó avatár
Hey I'm interested - Sensitive data such as usernames and passwords must always be passed to a web service using POST method. - Validate malformed XML/JSON. I have been in the InfoSec for years. I'm a former black hat as well. I can help. Regards
$1 800 USD 30 napon belül
5,0 (25 értékelés)
5,2
5,2
Felhasználó avatár
Hello, I am neha and we are team of expertise and did many work based on your need am able to improve security in your website as well manage all need , we are Ready to work with you, we confident to help you for this job so let me help you .... Thanks
$1 500 USD 30 napon belül
3,9 (72 értékelés)
5,0
5,0
Felhasználó avatár
Hi, Interesting questions. All of above are more or less true when you are securing your site or APIs. Kindly provide more information about project. I am a certified security professional. PM for further discussion. Thanks
$1 500 USD 30 napon belül
5,0 (5 értékelés)
3,6
3,6

Az ügyfélről

RUSSIAN FEDERATION zászlója
Vladivostok, Russian Federation
5,0
8
Tagság kezdete: máj. 11, 2018

Ügyfél-hitelesítés

Köszönjük! E-mailben elküldtük a linket, melyen átveheti ajándék egyenlegét.
E-mailje elküldése során valami hiba történt. Kérjük, próbálja újra.
Regisztrált Felhasználók Összes Közzétett Munka
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Előnézet betöltése
Hozzáférést adott a helymeghatározáshoz.
Belépési munkamenete lejárt, és kijelentkeztettük. Kérjük, lépjen be újra.