{"id":1617,"date":"2012-09-28T11:36:13","date_gmt":"2012-09-28T16:36:13","guid":{"rendered":"http:\/\/alexceli.org\/blog\/?p=1617"},"modified":"2012-09-28T11:38:03","modified_gmt":"2012-09-28T16:38:03","slug":"hacking-etico-a-una-red-implementada-por-cipher-sac","status":"publish","type":"post","link":"https:\/\/alexceli.org\/blog\/2012\/09\/28\/hacking-etico-a-una-red-implementada-por-cipher-sac-1617.php","title":{"rendered":"Hacking \u00c9tico a una red implementada por CIPHER SAC"},"content":{"rendered":"<p>Con mucho agrado tenemos a bien informarles que el firewall y servidores monitoreados por <strong>CIPHER SAC<\/strong><a href=\"http:\/\/cipher.pe\" title=\"CIPHER SAC\" target=\"_blank\"><\/a> que son propiedad de la empresa <a href=\"http:\/\/www.apeseg.org.pe\" title=\"APESEG\" target=\"_blank\">Asociaci\u00f3n Peruana de Empresas de Seguros &#8211; APESEG<\/a>, -a solicitud de su Comite de Sistemas- fueron evaluados por la empresa internacional especializada en seguridad inform\u00e1tica <a href=\"http:\/\/www.digiware.net\" title=\"Digiware\" target=\"_blank\">Digiware<\/a> por medio de un Hacking \u00c9tico Externo, en donde sus conclusiones fueron que el nivel de seguridad externo es <strong>ACEPTABLE<\/strong>.<\/p>\n<p><a href=\"http:\/\/cipher.pe\/web\/nuestra-experiencia\/54-hacking-etico-a-una-red-implementada-por-cipher-sac.html\" title=\"CIPHER SAC ETHICAL HACKING\" target=\"_blank\">Seguir leyendo<\/p>\n<p><center><img decoding=\"async\" src=\"http:\/\/cipher.pe\/web\/images\/articulos\/cipher_ethical_hacking.jpg\" alt=\"CIPHER ETHICAL HACKING\" \/><\/center><\/a><\/p>\n<p>Alex Celi<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Con mucho agrado tenemos a bien informarles que el firewall y servidores monitoreados por CIPHER SAC que son propiedad de la empresa Asociaci\u00f3n Peruana de Empresas de Seguros &#8211; APESEG, -a solicitud de su Comite de Sistemas- fueron evaluados por la empresa internacional especializada en seguridad inform\u00e1tica Digiware por medio de un Hacking \u00c9tico Externo, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,12,15,17,3,11,24],"tags":[],"class_list":["post-1617","post","type-post","status-publish","format-standard","hentry","category-asterisk","category-cipher","category-computo","category-hacking","category-linux","category-peru","category-tecnologia"],"_links":{"self":[{"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/posts\/1617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/comments?post=1617"}],"version-history":[{"count":4,"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/posts\/1617\/revisions"}],"predecessor-version":[{"id":1622,"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/posts\/1617\/revisions\/1622"}],"wp:attachment":[{"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/media?parent=1617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/categories?post=1617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alexceli.org\/blog\/wp-json\/wp\/v2\/tags?post=1617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}