{"id":172,"date":"2023-08-20T21:47:47","date_gmt":"2023-08-20T21:47:47","guid":{"rendered":"https:\/\/markficompany.com\/home\/?page_id=172"},"modified":"2023-08-20T22:36:51","modified_gmt":"2023-08-20T22:36:51","slug":"ethical-hacking","status":"publish","type":"page","link":"https:\/\/markficompany.com\/home\/services\/ethical-hacking\/","title":{"rendered":"Ethical Hacking"},"content":{"rendered":"\n\n\n<h1 dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span id=\"docs-internal-guid-8cf8e702-7fff-00d1-4268-3f4bb41e961b\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Ethical Hacking<\/span><\/span><\/h1>\n\n<p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span id=\"docs-internal-guid-c3d465be-7fff-e2ba-0457-4a1d0d352aaf\"><\/span><\/p><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\"><strong style=\"font-size: x-large;\">\u00bfQu\u00e9 es el Ethical Hacking?<\/strong><\/span><\/p>\n<span id=\"docs-internal-guid-c6aaef95-7fff-7382-5e89-9bd7fea4b2d7\"><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">El&nbsp;<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\"><strong>Ethical Hacking<\/strong><\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;o&nbsp;<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\"><strong>Hacking \u00c9tico<\/strong><\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;es un servicio de Ciberseguridad cuyo objetivo principal es detectar vulnerabilidades y debilidades de un sistema inform\u00e1tico, aplicativo, infraestructura, personas y\/o procesos.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">La empresa propietaria del sistema permite que un \u00abhacker de sombrero blanco\u00bb realice los ejercicios para probar la seguridad del sistema. Por lo tanto, a diferencia de los hackers maliciosos, este proceso est\u00e1 completamente planificado, autorizado y es 100% legal.<\/span><\/p><p><span style=\"font-size: 11pt; font-family: Arial, sans-serif; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline; white-space-collapse: preserve;\"><br><\/span><\/p><\/span><p\u00a0dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\"><strong><\/strong><\/span>\n<\/p\u00a0dir=\"ltr\">\n<h3>\n<\/h3><h2><span id=\"docs-internal-guid-0157be6d-7fff-f283-88dc-e6df21d5aafb\"><h3 dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\"><strong>\u00bfPor qu\u00e9 contratar Ethical Hacking?<\/strong><\/span><\/h3><\/span><\/h2>\n<p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Hoy en d\u00eda las empresas deben cumplir normativas de seguridad, certificar o revalidar alguna norma impuesta por el mercado, por lo que se hace indispensable contar con ejercicios anuales de&nbsp;<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Ethical Hacking<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Las empresas deben cumplir est\u00e1ndares de seguridad eficientes para resguardar la seguridad de su informaci\u00f3n y clientes, garantizando la confidencialidad, disponibilidad e integridad de los datos.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span id=\"docs-internal-guid-c4c2c92d-7fff-d4ba-295f-576fab4da1f4\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Trabajamos a trav\u00e9s de un servicio consultivo del tipo One-Time, o recurrente anual o semestral (<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Red-Team<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">)<\/span><\/span><br><\/p>\n<span style=\"font-size:x-large;\"><p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><\/p><\/span><span style=\"font-size:x-large;\"><span style=\"\"><p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">El&nbsp;<\/span><strong><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Hacking \u00c9tico<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;de&nbsp;<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Cibernex<\/span><\/strong><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;es dise\u00f1ado a la medida de cada cliente y sus necesidades. Los principales puntos que abarca nuestro servicio son:<\/span><br><\/p><\/span><\/span><p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span id=\"docs-internal-guid-e3b806a1-7fff-4e98-2d37-688499c2f54d\"><\/span><\/p><ul style=\"margin-top:0;margin-bottom:0;padding-inline-start:48px;\"><li dir=\"ltr\" style=\"list-style-type: disc; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\" role=\"presentation\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Identificaci\u00f3n de vulnerabilidades y debilidades funcionales<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;que permitan al negocio mejorar la seguridad de los productos tecnol\u00f3gicos<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\" role=\"presentation\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Evaluaci\u00f3n t\u00e9cnica interna de seguridad ofensiva.<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;Este diagn\u00f3stico se enmarca dentro de las pr\u00e1cticas conocidas como Ethical Hacking, con trabajos ofensivos.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\" role=\"presentation\"><span style=\"background-color: rgb(255, 255, 255); font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; text-decoration-skip-ink: none; vertical-align: baseline;\">Servicio consultivo<\/span><span style=\"background-color: rgb(255, 255, 255); font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; text-decoration-skip-ink: none; vertical-align: baseline;\">; Modalidad Caja negra, gris o blanca.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\" role=\"presentation\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Levantamiento y hallazgo de vulnerabilidades.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\" role=\"presentation\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Metodolog\u00edas internacionalmente reconocidas<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">; Buenas pr\u00e1cticas de seguridad y adherencia a patrones de desarrollo seguro.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\" role=\"presentation\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Contextualizaci\u00f3n de los resultados t\u00e9cnicos<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;obtenidos de las actividades ofensivas, entendiendo que estos hallazgos representan un s\u00edntoma de problemas organizacionales basales que nacen de problemas de uno o m\u00e1s procesos de control espec\u00edficos.<\/span><\/p><\/li><\/ul>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":31,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-172","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/comments?post=172"}],"version-history":[{"count":3,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/172\/revisions"}],"predecessor-version":[{"id":187,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/172\/revisions\/187"}],"up":[{"embeddable":true,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/31"}],"wp:attachment":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/media?parent=172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}