Knowledge (XXG)

:WikiProject Computing/Computer and Information Security task force - Knowledge (XXG)

Source 📝

31: 369: 60: 570:
Most people interested in computer security will be familiar with the topic, and the article gives context to a number of other information security articles. Is mentioned by many books and academic papers, and discussed in detail in more than one.
511: 626: 390: 138:
Thank You for your interest in WikiProject Computing/Computer and Information Security task force ! Please be aware, that this WikiProject is now under the imperium of
504: 745: 355: 565: 608: 585: 536: 395: 143: 139: 55: 45:
Either the page is no longer relevant or consensus on its purpose has become unclear. To revive discussion, seek broader input via a forum such as the
708: 300: 238: 223: 209: 180: 821: 195: 786: 46: 338: 292: 215: 760: 320: 75: 17: 384: 176: 801: 671: 645: 816: 462: 160: 615:
Most individuals, standards and software projects will be low importance unless they are well known or have high adoption.
722: 142:. All Malware articles are currently being transferred over to the new project. In any case, we welcome you to join us at 327: 431: 103: 514:
are: (1) referenced; (2) coverage; (3) structure; (4) grammar; (5) supporting materials; (6) accessible language.
685: 420: 189: 733: 543:
High-traffic articles which many people outside of computer security will already have a good knowledge of.
296: 219: 696: 659: 205: 170: 38: 30: 185: 95: 319:
Any articles that are within the scope of this project should be tagged with the project banners of
774: 593: 550: 90:
exists to centralize efforts to improve Knowledge (XXG)'s coverage of related matters, to include:
450:
Anyone can assess articles (regardless of membership to the WikiProject) by adding or editing the
288: 248: 154: 613:
More specific and specialized content known only to some people interested in computer security.
370:
Knowledge (XXG):WikiProject Computing/Outreach/User Computer and Information Security task force
546: 234: 597: 201: 166: 541:
Core articles which are a "must have" for the Computer and Information Security Task Force.
121: 622: 578: 291:
from a verbatim quote from a U.S. government source to an actual encyclopædic article.
265:
Find editors who have shown interest in this subject and ask them to take a look here.
810: 150: 618: 574: 230: 601: 337:
as this will automatically put the page in the appropriate categories., such as
243: 110: 446:{{WikiProject Computing|class=|importance=|security=yes|security-importance=}} 679:{{WikiProject Computing|class=|importance=|software=yes|software-importance=}} 590:
Known to many people interested in computer security, even if not in detail.
753:{{WikiProject Computing|class=|importance=|network=yes|network-importance=}} 653:{{WikiProject Computing|class=|importance=|malware=yes|malware-importance=}} 383: 554: 117: 99: 558: 260:
Todo items for members of Computer and Information Security task force
25: 37:
This page is currently inactive and is retained for
716:{{WikiProject Computer science|class=|importance=}} 627:
Certified Information Systems Security Professional
339:
Category:Computer and Information Security articles
109:
Events, outages, and notable virus/worm outbreaks (
333:useful. To each of these banners, you should add 277:Review importance and quality of existing articles 746:Knowledge (XXG):WikiProject Computer networking 468:template. The template is found on talk pages. 356:Knowledge (XXG):WikiProject Computing/Templates 713:All articles in the area of computer science 8: 768:{{WikiProject Computing|class=|importance=}} 750:All articles related to computer networking 709:Knowledge (XXG):WikiProject Computer science 88:Computer and Information Security task force 72:Computer and Information Security task force 650:Articles about malicious computer software 787:Knowledge (XXG):WikiProject Cryptography 521: 475: 761:Knowledge (XXG):WikiProject Computing 478: 18:Knowledge (XXG):WikiProject Computing 7: 802:Knowledge (XXG):WikiProject Cyberlaw 672:Knowledge (XXG):WikiProject Software 378: 646:Knowledge (XXG):WikiProject Malware 24: 479:Computer and Information Security 274:Identify articles for improvement 382: 29: 676:All software-related articles 271:Identify articles for creation 1: 822:WikiProject Computer Security 396:WikiProject Computer Security 198:) - 10:01 8 August 2008 (UTC) 144:WikiProject Computer Security 140:WikiProject Computer Security 56:WikiProject Computer Security 301:03:42, 16 October 2008 (UTC) 239:22:51, 18 October 2008 (UTC) 505:WikiProject computing scale 389:WikiProject Computing is a 210:10:31, 9 October 2008 (UTC) 838: 353: 181:05:15, 4 August 2008 (UTC) 104:hacker (computer security) 52:This WikiProject has been 503:The quality scale is the 491: 483: 224:11:17, 11 June 2024 (UTC) 444: 94:Topics and Terminology ( 794:{{CryptographyProject}} 817:Inactive project pages 791:Cryptography articles 315:Tagging and assessment 635:Featured/Good content 463:WikiProject Computing 323:. You may also find 321:WikiProject Computing 282:Todo items for anyone 268:Tag related articles. 76:WikiProject Computing 723:compu-scientist-stub 640:Related Wikiprojects 96:information security 594:Chaos Computer Club 551:Computer insecurity 456:security-importance 458:parameters to the 328:WikiProjectBanners 289:Protected Computer 632: 631: 547:Computer security 496: 495: 432:Computer security 403: 402: 68: 67: 829: 779: 773: 738: 732: 727: 721: 701: 695: 690: 686:Infobox Software 684: 664: 658: 598:Snort (software) 522: 518:Importance scale 512:B-Class criteria 476: 472:Project Articles 467: 461: 457: 453: 436: 430: 425: 421:Computer hacking 419: 412:Infobox template 386: 379: 374: 368: 361:Userbox template 336: 332: 326: 64: 50: 33: 26: 837: 836: 832: 831: 830: 828: 827: 826: 807: 806: 777: 771: 736: 734:compu-prog-stub 730: 725: 719: 699: 693: 688: 682: 662: 656: 642: 637: 520: 501: 474: 465: 459: 455: 451: 448: 447: 443: 434: 428: 423: 417: 414: 404: 372: 366: 363: 358: 352: 347: 334: 330: 324: 317: 312: 284: 262: 257: 186:Sephiroth storm 131: 122:Marcus J. Ranum 116:Practitioners ( 84: 70:Welcome to the 51: 44: 22: 21: 20: 12: 11: 5: 835: 833: 825: 824: 819: 809: 808: 805: 804: 798: 797: 796: 795: 789: 783: 782: 781: 780: 769: 765:All computing 763: 757: 756: 755: 754: 748: 742: 741: 740: 739: 728: 717: 711: 705: 704: 703: 702: 691: 680: 674: 668: 667: 666: 665: 654: 648: 641: 638: 636: 633: 630: 629: 623:Datenschleuder 616: 614: 611: 605: 604: 591: 588: 582: 581: 579:Bruce Schneier 572: 568: 562: 561: 544: 542: 539: 533: 532: 529: 526: 519: 516: 500: 497: 494: 493: 490: 486: 485: 482: 480: 473: 470: 445: 442: 439: 438: 437: 426: 413: 410: 408: 407: 406: 401: 400: 387: 377: 376: 375: 362: 359: 351: 348: 346: 343: 316: 313: 311: 308: 306:-In progress. 304: 303: 283: 280: 279: 278: 275: 272: 269: 266: 261: 258: 256: 253: 252: 251: 246: 241: 228: 227: 226: 199: 183: 164: 130: 127: 126: 125: 114: 107: 83: 80: 66: 65: 54:superseded by 43: 34: 23: 15: 14: 13: 10: 9: 6: 4: 3: 2: 834: 823: 820: 818: 815: 814: 812: 803: 800: 799: 793: 792: 790: 788: 785: 784: 776: 770: 767: 766: 764: 762: 759: 758: 752: 751: 749: 747: 744: 743: 735: 729: 724: 718: 715: 714: 712: 710: 707: 706: 698: 697:Software-stub 692: 687: 681: 678: 677: 675: 673: 670: 669: 661: 655: 652: 651: 649: 647: 644: 643: 639: 634: 628: 624: 620: 617: 612: 610: 607: 606: 603: 599: 595: 592: 589: 587: 584: 583: 580: 576: 573: 569: 567: 564: 563: 560: 556: 552: 548: 545: 540: 538: 535: 534: 530: 527: 524: 523: 517: 515: 513: 508: 506: 499:Quality scale 498: 488: 487: 477: 471: 469: 464: 440: 433: 427: 422: 416: 415: 411: 409: 398: 397: 392: 388: 385: 381: 380: 371: 365: 364: 360: 357: 349: 344: 342: 340: 335:|security=yes 329: 322: 314: 309: 307: 302: 298: 294: 293:69.140.152.55 290: 286: 285: 281: 276: 273: 270: 267: 264: 263: 259: 254: 250: 247: 245: 242: 240: 236: 232: 229: 225: 221: 217: 213: 212: 211: 207: 203: 200: 197: 194: 191: 187: 184: 182: 178: 175: 172: 168: 165: 162: 159: 156: 152: 149: 148: 147: 145: 141: 136: 135: 128: 123: 119: 115: 112: 108: 105: 101: 97: 93: 92: 91: 89: 81: 79: 77: 73: 62: 58: 57: 48: 42: 40: 35: 32: 28: 27: 19: 660:malware-stub 619:Michael Lynn 575:Port scanner 509: 502: 449: 405: 394: 318: 305: 216:201.55.46.60 192: 173: 157: 137: 133: 132: 129:Participants 87: 85: 71: 69: 53: 47:village pump 36: 602:Morris worm 525:Importance 484:Importance 391:participant 354:Main page: 202:DavidBailey 167:Tinucherian 111:Morris Worm 811:Categories 775:Compu-stub 441:Assessment 345:Categories 310:Guidelines 61:discussion 41:reference. 39:historical 531:Examples 528:Criteria 350:Templates 214:ugfuggyu 555:Firewall 492:Quality 481:articles 287:Convert 196:contribs 177:contribs 161:contribs 151:Jclemens 118:Dan Geer 100:firewall 559:Malware 231:h2g2bob 134:NOTICE! 124:, etc.) 113:, etc.) 106:, etc.) 249:Stutya 244:Gl1d3r 452:class 82:Scope 16:< 566:High 510:The 454:and 297:talk 255:Todo 235:talk 220:talk 206:talk 190:talk 179:) - 171:talk 155:talk 86:The 609:Low 586:Mid 537:Top 393:in 74:of 63:). 813:: 778:}} 772:{{ 737:}} 731:{{ 726:}} 720:{{ 700:}} 694:{{ 689:}} 683:{{ 663:}} 657:{{ 625:, 621:, 600:, 596:, 577:, 557:, 553:, 549:, 507:. 489:- 466:}} 460:{{ 435:}} 429:{{ 424:}} 418:{{ 373:}} 367:{{ 341:. 331:}} 325:{{ 299:) 237:) 222:) 208:) 146:! 120:, 102:, 98:, 78:. 399:. 295:( 233:( 218:( 204:( 193:· 188:( 174:· 169:( 163:) 158:· 153:( 59:( 49:.

Index

Knowledge (XXG):WikiProject Computing

historical
village pump
WikiProject Computer Security
discussion
WikiProject Computing
information security
firewall
hacker (computer security)
Morris Worm
Dan Geer
Marcus J. Ranum
WikiProject Computer Security
WikiProject Computer Security
Jclemens
talk
contribs
Tinucherian
talk
contribs
05:15, 4 August 2008 (UTC)
Sephiroth storm
talk
contribs
DavidBailey
talk
10:31, 9 October 2008 (UTC)
201.55.46.60
talk

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.