Revision history of "Metodologia/en"

Jump to: navigation, search

Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

  • (cur | prev) 22:22, 13 May 2018Adm owisam (talk | contribs). . (8,890 bytes) (-50). . (Página creada con «In certain scenarios, such as security reviews in office buildings, shopping centers or in security areas where sensitive organizations are located (government agencies, ai...»)
  • (cur | prev) 22:22, 13 May 2018Adm owisam (talk | contribs). . (8,940 bytes) (-35). . (Página creada con «# Name of the company (client). # Contact. # Contact phone. # A person or company doing the analysis. # Duration time. # Time window.»)
  • (cur | prev) 22:22, 13 May 2018Adm owisam (talk | contribs). . (8,975 bytes) (-41). . (Página creada con «=== '''Work Authorization''' === Before starting an analysis of a wireless security, it is necessary to have an accreditation or work order signed by the company that you a...»)
  • (cur | prev) 22:21, 13 May 2018Adm owisam (talk | contribs). . (9,016 bytes) (+3). . (Página creada con «== Considerations at the beginning of the audit ==»)
  • (cur | prev) 22:21, 13 May 2018Adm owisam (talk | contribs). . (9,013 bytes) (-351). . (Página creada con «{| border="1" ! style="background:#efefef;width: 150px;" | '''Restrictions''' ! style="background:#efefef;" | '''Description of the established restrictions''' |- !align=...»)
  • (cur | prev) 22:21, 13 May 2018Adm owisam (talk | contribs). . (9,364 bytes) (-31). . (Página creada con «=== Restrictions === It is important to clarify whether the audit of a Wi-Fi infrastructure is restricted in scope. The restrictions of tests can also come defined by sever...»)
  • (cur | prev) 22:21, 13 May 2018Adm owisam (talk | contribs). . (9,395 bytes) (-126). . (Página creada con «{| border="1" ! style="background:#efefef;width: 150px;" | '''Type of analysis''' ! style="background:#efefef;" | '''Details of each type of analysis''' |- !align="cent...»)
  • (cur | prev) 22:21, 13 May 2018Adm owisam (talk | contribs). . (9,521 bytes) (-21). . (Página creada con «=== Types of analysis === Each approach has its advantages and disadvantages, and each one gives a different perspective from the point of view of security. Therefore, depe...»)
  • (cur | prev) 22:20, 13 May 2018Adm owisam (talk | contribs). . (9,542 bytes) (-50). . (Página creada con «== Introduction == When raising a wireless security patch, you should use the most appropriate approach to meet customer needs, focusing the audit to the infrastructure req...»)
  • (cur | prev) 22:19, 13 May 2018Adm owisam (talk | contribs). . (9,592 bytes) (+9,592). . (Página creada con «Methodology»)