31:
369:
60:
570:
Most people interested in computer security will be familiar with the topic, and the article gives context to a number of other information security articles. Is mentioned by many books and academic papers, and discussed in detail in more than one.
511:
626:
390:
138:
Thank You for your interest in WikiProject
Computing/Computer and Information Security task force ! Please be aware, that this WikiProject is now under the imperium of
504:
745:
355:
565:
608:
585:
536:
395:
143:
139:
55:
45:
Either the page is no longer relevant or consensus on its purpose has become unclear. To revive discussion, seek broader input via a forum such as the
708:
300:
238:
223:
209:
180:
821:
195:
786:
46:
338:
292:
215:
760:
320:
75:
17:
384:
176:
801:
671:
645:
816:
462:
160:
615:
Most individuals, standards and software projects will be low importance unless they are well known or have high adoption.
722:
142:. All Malware articles are currently being transferred over to the new project. In any case, we welcome you to join us at
327:
431:
103:
514:
are: (1) referenced; (2) coverage; (3) structure; (4) grammar; (5) supporting materials; (6) accessible language.
685:
420:
189:
733:
543:
High-traffic articles which many people outside of computer security will already have a good knowledge of.
296:
219:
696:
659:
205:
170:
38:
30:
185:
95:
319:
Any articles that are within the scope of this project should be tagged with the project banners of
774:
593:
550:
90:
exists to centralize efforts to improve
Knowledge (XXG)'s coverage of related matters, to include:
450:
Anyone can assess articles (regardless of membership to the WikiProject) by adding or editing the
288:
248:
154:
613:
More specific and specialized content known only to some people interested in computer security.
370:
Knowledge (XXG):WikiProject
Computing/Outreach/User Computer and Information Security task force
546:
234:
597:
201:
166:
541:
Core articles which are a "must have" for the
Computer and Information Security Task Force.
121:
622:
578:
291:
from a verbatim quote from a U.S. government source to an actual encyclopædic article.
265:
Find editors who have shown interest in this subject and ask them to take a look here.
810:
150:
618:
574:
230:
601:
337:
as this will automatically put the page in the appropriate categories., such as
243:
110:
446:{{WikiProject Computing|class=|importance=|security=yes|security-importance=}}
679:{{WikiProject Computing|class=|importance=|software=yes|software-importance=}}
590:
Known to many people interested in computer security, even if not in detail.
753:{{WikiProject Computing|class=|importance=|network=yes|network-importance=}}
653:{{WikiProject Computing|class=|importance=|malware=yes|malware-importance=}}
383:
554:
117:
99:
558:
260:
Todo items for members of
Computer and Information Security task force
25:
37:
This page is currently inactive and is retained for
716:{{WikiProject Computer science|class=|importance=}}
627:
339:
109:
Events, outages, and notable virus/worm outbreaks (
333:useful. To each of these banners, you should add
277:Review importance and quality of existing articles
746:Knowledge (XXG):WikiProject Computer networking
468:template. The template is found on talk pages.
356:Knowledge (XXG):WikiProject Computing/Templates
713:All articles in the area of computer science
8:
768:{{WikiProject Computing|class=|importance=}}
750:All articles related to computer networking
709:Knowledge (XXG):WikiProject Computer science
88:Computer and Information Security task force
72:Computer and Information Security task force
650:Articles about malicious computer software
787:Knowledge (XXG):WikiProject Cryptography
521:
475:
761:Knowledge (XXG):WikiProject Computing
478:
18:Knowledge (XXG):WikiProject Computing
7:
802:Knowledge (XXG):WikiProject Cyberlaw
672:Knowledge (XXG):WikiProject Software
378:
646:Knowledge (XXG):WikiProject Malware
24:
479:Computer and Information Security
274:Identify articles for improvement
382:
29:
676:All software-related articles
271:Identify articles for creation
1:
822:WikiProject Computer Security
396:WikiProject Computer Security
198:) - 10:01 8 August 2008 (UTC)
144:WikiProject Computer Security
140:WikiProject Computer Security
56:WikiProject Computer Security
301:03:42, 16 October 2008 (UTC)
239:22:51, 18 October 2008 (UTC)
505:WikiProject computing scale
389:WikiProject Computing is a
210:10:31, 9 October 2008 (UTC)
838:
353:
181:05:15, 4 August 2008 (UTC)
104:hacker (computer security)
52:This WikiProject has been
503:The quality scale is the
491:
483:
224:11:17, 11 June 2024 (UTC)
444:
94:Topics and Terminology (
794:{{CryptographyProject}}
817:Inactive project pages
791:Cryptography articles
315:Tagging and assessment
635:Featured/Good content
463:WikiProject Computing
323:. You may also find
321:WikiProject Computing
282:Todo items for anyone
268:Tag related articles.
76:WikiProject Computing
723:compu-scientist-stub
640:Related Wikiprojects
96:information security
594:Chaos Computer Club
551:Computer insecurity
456:security-importance
458:parameters to the
328:WikiProjectBanners
289:Protected Computer
632:
631:
547:Computer security
496:
495:
432:Computer security
403:
402:
68:
67:
829:
779:
773:
738:
732:
727:
721:
701:
695:
690:
686:Infobox Software
684:
664:
658:
598:Snort (software)
522:
518:Importance scale
512:B-Class criteria
476:
472:Project Articles
467:
461:
457:
453:
436:
430:
425:
421:Computer hacking
419:
412:Infobox template
386:
379:
374:
368:
361:Userbox template
336:
332:
326:
64:
50:
33:
26:
837:
836:
832:
831:
830:
828:
827:
826:
807:
806:
777:
771:
736:
734:compu-prog-stub
730:
725:
719:
699:
693:
688:
682:
662:
656:
642:
637:
520:
501:
474:
465:
459:
455:
451:
448:
447:
443:
434:
428:
423:
417:
414:
404:
372:
366:
363:
358:
352:
347:
334:
330:
324:
317:
312:
284:
262:
257:
186:Sephiroth storm
131:
122:Marcus J. Ranum
116:Practitioners (
84:
70:Welcome to the
51:
44:
22:
21:
20:
12:
11:
5:
835:
833:
825:
824:
819:
809:
808:
805:
804:
798:
797:
796:
795:
789:
783:
782:
781:
780:
769:
765:All computing
763:
757:
756:
755:
754:
748:
742:
741:
740:
739:
728:
717:
711:
705:
704:
703:
702:
691:
680:
674:
668:
667:
666:
665:
654:
648:
641:
638:
636:
633:
630:
629:
623:Datenschleuder
616:
614:
611:
605:
604:
591:
588:
582:
581:
579:Bruce Schneier
572:
568:
562:
561:
544:
542:
539:
533:
532:
529:
526:
519:
516:
500:
497:
494:
493:
490:
486:
485:
482:
480:
473:
470:
445:
442:
439:
438:
437:
426:
413:
410:
408:
407:
406:
401:
400:
387:
377:
376:
375:
362:
359:
351:
348:
346:
343:
316:
313:
311:
308:
306:-In progress.
304:
303:
283:
280:
279:
278:
275:
272:
269:
266:
261:
258:
256:
253:
252:
251:
246:
241:
228:
227:
226:
199:
183:
164:
130:
127:
126:
125:
114:
107:
83:
80:
66:
65:
54:superseded by
43:
34:
23:
15:
14:
13:
10:
9:
6:
4:
3:
2:
834:
823:
820:
818:
815:
814:
812:
803:
800:
799:
793:
792:
790:
788:
785:
784:
776:
770:
767:
766:
764:
762:
759:
758:
752:
751:
749:
747:
744:
743:
735:
729:
724:
718:
715:
714:
712:
710:
707:
706:
698:
697:Software-stub
692:
687:
681:
678:
677:
675:
673:
670:
669:
661:
655:
652:
651:
649:
647:
644:
643:
639:
634:
628:
624:
620:
617:
612:
610:
607:
606:
603:
599:
595:
592:
589:
587:
584:
583:
580:
576:
573:
569:
567:
564:
563:
560:
556:
552:
548:
545:
540:
538:
535:
534:
530:
527:
524:
523:
517:
515:
513:
508:
506:
499:Quality scale
498:
488:
487:
477:
471:
469:
464:
440:
433:
427:
422:
416:
415:
411:
409:
398:
397:
392:
388:
385:
381:
380:
371:
365:
364:
360:
357:
349:
344:
342:
340:
335:|security=yes
329:
322:
314:
309:
307:
302:
298:
294:
293:69.140.152.55
290:
286:
285:
281:
276:
273:
270:
267:
264:
263:
259:
254:
250:
247:
245:
242:
240:
236:
232:
229:
225:
221:
217:
213:
212:
211:
207:
203:
200:
197:
194:
191:
187:
184:
182:
178:
175:
172:
168:
165:
162:
159:
156:
152:
149:
148:
147:
145:
141:
136:
135:
128:
123:
119:
115:
112:
108:
105:
101:
97:
93:
92:
91:
89:
81:
79:
77:
73:
62:
58:
57:
48:
42:
40:
35:
32:
28:
27:
19:
660:malware-stub
619:Michael Lynn
575:Port scanner
509:
502:
449:
405:
394:
318:
305:
216:201.55.46.60
192:
173:
157:
137:
133:
132:
129:Participants
87:
85:
71:
69:
53:
47:village pump
36:
602:Morris worm
525:Importance
484:Importance
391:participant
354:Main page:
202:DavidBailey
167:Tinucherian
111:Morris Worm
811:Categories
775:Compu-stub
441:Assessment
345:Categories
310:Guidelines
61:discussion
41:reference.
39:historical
531:Examples
528:Criteria
350:Templates
214:ugfuggyu
555:Firewall
492:Quality
481:articles
287:Convert
196:contribs
177:contribs
161:contribs
151:Jclemens
118:Dan Geer
100:firewall
559:Malware
231:h2g2bob
134:NOTICE!
124:, etc.)
113:, etc.)
106:, etc.)
249:Stutya
244:Gl1d3r
452:class
82:Scope
16:<
566:High
510:The
454:and
297:talk
255:Todo
235:talk
220:talk
206:talk
190:talk
179:) -
171:talk
155:talk
86:The
609:Low
586:Mid
537:Top
393:in
74:of
63:).
813::
778:}}
772:{{
737:}}
731:{{
726:}}
720:{{
700:}}
694:{{
689:}}
683:{{
663:}}
657:{{
625:,
621:,
600:,
596:,
577:,
557:,
553:,
549:,
507:.
489:-
466:}}
460:{{
435:}}
429:{{
424:}}
418:{{
373:}}
367:{{
341:.
331:}}
325:{{
299:)
237:)
222:)
208:)
146:!
120:,
102:,
98:,
78:.
399:.
295:(
233:(
218:(
204:(
193:·
188:(
174:·
169:(
163:)
158:·
153:(
59:(
49:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.