<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3AFerchovela</id>
		<title>User:Ferchovela - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3AFerchovela"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ferchovela&amp;action=history"/>
		<updated>2026-04-19T12:57:47Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ferchovela&amp;diff=227078&amp;oldid=prev</id>
		<title>Ferchovela at 21:59, 6 March 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ferchovela&amp;diff=227078&amp;oldid=prev"/>
				<updated>2017-03-06T21:59:21Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 21:59, 6 March 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;In fact, the world has fundamentally changed. with respect to Systems security for that reason, &lt;/del&gt;I &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;consider that system security is an amazing world of discovery, tech, and learning each day.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;I &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;am From Quito - Ecuador &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;I am &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Informatics Engineer &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;I am &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;working &lt;/del&gt;in Security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;area &lt;/del&gt;of &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the information Cyber &lt;/del&gt;Security, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;my responsibility it is supervised and verify the fulfillment of the controls of computing security of the services and technologic applications. &lt;/del&gt;Management &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;of the computing security of the institutional technologic platforms. so&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Manager the implementation of security procedures &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;politics of the components that conform the technologic infrastructure. Develop the procedures to comply the politics of computing security improvement by the institution&lt;/del&gt;. Also, &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Working &lt;/ins&gt;in &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Information &lt;/ins&gt;Security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;several years. I have worked primarily in the domain &lt;/ins&gt;of &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Information &lt;/ins&gt;Security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Management&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Risk &lt;/ins&gt;Management, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Software Security &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ethical Hacking&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Implement and create security framework procedures under the best practices to operate the services of tics.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Also, I &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;did translate Testing Guide 4&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;0 &lt;/ins&gt;of &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;OWASP &lt;/ins&gt;to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Spanish&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Analyze, design, develop and implementation of metrical and indicates that allow identifying the fulfillment and deviations of the components of TI in the ambit of computing security scope.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Present an analysis of vulnerability and probe informs of penetration testing that appears of the execution of the computing security plan.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Coordinate and work in a group with the responsible coworkers; so &lt;/del&gt;I &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;have to do the hardening of the infrastructure, systems, applications and platforms of my institution&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Design the politics and procedures that have been the applicants to the components &lt;/del&gt;of &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;infrastructure ant &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the technologic services. Evaluate the fulfillment of procedures and computing security politics.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Also, my responsibility it is analyzing of security of Developing new technologies, Implementing major project, so Developing and delivering new training programs, Creating training manuals, curricula, trainer guides, and other instructional materials Training other trainers&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Ferchovela</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ferchovela&amp;diff=227074&amp;oldid=prev</id>
		<title>KateHartmann: Creating user page for new user.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ferchovela&amp;diff=227074&amp;oldid=prev"/>
				<updated>2017-03-06T21:37:13Z</updated>
		
		<summary type="html">&lt;p&gt;Creating user page for new user.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;In fact, the world has fundamentally changed. with respect to Systems security for that reason, I consider that system security is an amazing world of discovery, tech, and learning each day.&lt;br /&gt;
&lt;br /&gt;
I am working in Security area of the information Cyber Security, my responsibility it is supervised and verify the fulfillment of the controls of computing security of the services and technologic applications. Management of the computing security of the institutional technologic platforms. so, Manager the implementation of security procedures and politics of the components that conform the technologic infrastructure. Develop the procedures to comply the politics of computing security improvement by the institution. Also, &lt;br /&gt;
Implement and create security framework procedures under the best practices to operate the services of tics.&lt;br /&gt;
Analyze, design, develop and implementation of metrical and indicates that allow identifying the fulfillment and deviations of the components of TI in the ambit of computing security scope.&lt;br /&gt;
Present an analysis of vulnerability and probe informs of penetration testing that appears of the execution of the computing security plan.&lt;br /&gt;
&lt;br /&gt;
Coordinate and work in a group with the responsible coworkers; so I have to do the hardening of the infrastructure, systems, applications and platforms of my institution. Design the politics and procedures that have been the applicants to the components of infrastructure ant to the technologic services. Evaluate the fulfillment of procedures and computing security politics.&lt;br /&gt;
Also, my responsibility it is analyzing of security of Developing new technologies, Implementing major project, so Developing and delivering new training programs, Creating training manuals, curricula, trainer guides, and other instructional materials Training other trainers&lt;/div&gt;</summary>
		<author><name>KateHartmann</name></author>	</entry>

	</feed>