Knowledge

:WikiProject Computing/Computer and Information Security task force - Knowledge

Source 📝

38: 67: 572: 615: 592: 543: 577:
Most people interested in computer security will be familiar with the topic, and the article gives context to a number of other information security articles. Is mentioned by many books and academic papers, and discussed in detail in more than one.
376: 345: 216: 245: 266: 230: 307: 518: 391: 187: 145:
Thank You for your interest in WikiProject Computing/Computer and Information Security task force ! Please be aware, that this WikiProject is now under the imperium of
226: 633: 397: 52:
Either the page is no longer relevant or consensus on its purpose has become unclear. To revive discussion, seek broader input via a forum such as the
511: 255: 752: 362: 402: 150: 146: 62: 828: 715: 202: 622:
Most individuals, standards and software projects will be low importance unless they are well known or have high adoption.
149:. All Malware articles are currently being transferred over to the new project. In any case, we welcome you to join us at 299: 793: 222: 53: 183: 23: 521:
are: (1) referenced; (2) coverage; (3) structure; (4) grammar; (5) supporting materials; (6) accessible language.
288: 823: 767: 327: 82: 17: 808: 678: 469: 167: 729: 652: 550:
High-traffic articles which many people outside of computer security will already have a good knowledge of.
334: 438: 110: 692: 427: 196: 326:
Any articles that are within the scope of this project should be tagged with the project banners of
740: 457:
Anyone can assess articles (regardless of membership to the WikiProject) by adding or editing the
321: 303: 620:
More specific and specialized content known only to some people interested in computer security.
703: 666: 212: 177: 97:
exists to centralize efforts to improve Knowledge's coverage of related matters, to include:
548:
Core articles which are a "must have" for the Computer and Information Security Task Force.
192: 135: 102: 377:
Knowledge:WikiProject Computing/Outreach/User Computer and Information Security task force
8: 781: 600: 557: 298:
from a verbatim quote from a U.S. government source to an actual encyclopædic article.
295: 161: 45: 37: 272:
Find editors who have shown interest in this subject and ask them to take a look here.
553: 524: 478: 241: 641: 418: 367: 604: 208: 173: 646: 128: 344:
as this will automatically put the page in the appropriate categories., such as
629: 585: 505: 453:{{WikiProject Computing|class=|importance=|security=yes|security-importance=}} 686:{{WikiProject Computing|class=|importance=|software=yes|software-importance=}} 817: 597:
Known to many people interested in computer security, even if not in detail.
157: 760:{{WikiProject Computing|class=|importance=|network=yes|network-importance=}} 660:{{WikiProject Computing|class=|importance=|malware=yes|malware-importance=}} 625: 581: 261: 237: 608: 351: 250: 117: 356: 267:
Todo items for members of Computer and Information Security task force
561: 124: 106: 565: 390: 447: 316: 88: 44:
This page is currently inactive and is retained for
723:{{WikiProject Computer science|class=|importance=}} 634:
Certified Information Systems Security Professional
346:
Category:Computer and Information Security articles
116:
Events, outages, and notable virus/worm outbreaks (
340:useful. To each of these banners, you should add 284:Review importance and quality of existing articles 815: 475:template. The template is found on talk pages. 720:All articles in the area of computer science 775:{{WikiProject Computing|class=|importance=}} 757:All articles related to computer networking 95:Computer and Information Security task force 79:Computer and Information Security task force 657:Articles about malicious computer software 753:Knowledge:WikiProject Computer networking 363:Knowledge:WikiProject Computing/Templates 14: 816: 716:Knowledge:WikiProject Computer science 485: 385: 32: 30: 794:Knowledge:WikiProject Cryptography 31: 840: 486:Computer and Information Security 281:Identify articles for improvement 389: 36: 768:Knowledge:WikiProject Computing 18:Knowledge:WikiProject Computing 809:Knowledge:WikiProject Cyberlaw 683:All software-related articles 679:Knowledge:WikiProject Software 278:Identify articles for creation 13: 1: 829:WikiProject Computer Security 653:Knowledge:WikiProject Malware 403:WikiProject Computer Security 205:) - 10:01 8 August 2008 (UTC) 151:WikiProject Computer Security 147:WikiProject Computer Security 63:WikiProject Computer Security 308:03:42, 16 October 2008 (UTC) 246:22:51, 18 October 2008 (UTC) 7: 512:WikiProject computing scale 396:WikiProject Computing is a 217:10:31, 9 October 2008 (UTC) 10: 845: 360: 188:05:15, 4 August 2008 (UTC) 111:hacker (computer security) 59:This WikiProject has been 510:The quality scale is the 498: 490: 231:11:17, 11 June 2024 (UTC) 451: 101:Topics and Terminology ( 801:{{CryptographyProject}} 824:Inactive project pages 798:Cryptography articles 322:Tagging and assessment 642:Featured/Good content 470:WikiProject Computing 330:. You may also find 328:WikiProject Computing 289:Todo items for anyone 275:Tag related articles. 83:WikiProject Computing 730:compu-scientist-stub 647:Related Wikiprojects 103:information security 601:Chaos Computer Club 558:Computer insecurity 463:security-importance 465:parameters to the 335:WikiProjectBanners 296:Protected Computer 639: 638: 554:Computer security 503: 502: 439:Computer security 410: 409: 75: 74: 22:(Redirected from 836: 786: 780: 745: 739: 734: 728: 708: 702: 697: 693:Infobox Software 691: 671: 665: 605:Snort (software) 529: 528: 525:Importance scale 519:B-Class criteria 483: 482: 479:Project Articles 474: 468: 464: 460: 443: 437: 432: 428:Computer hacking 426: 419:Infobox template 393: 386: 381: 375: 368:Userbox template 343: 339: 333: 71: 57: 40: 33: 27: 24:Knowledge:CCISTF 844: 843: 839: 838: 837: 835: 834: 833: 814: 813: 784: 778: 743: 741:compu-prog-stub 737: 732: 726: 706: 700: 695: 689: 669: 663: 649: 644: 527: 508: 481: 472: 466: 462: 458: 455: 454: 450: 441: 435: 430: 424: 421: 411: 379: 373: 370: 365: 359: 354: 341: 337: 331: 324: 319: 291: 269: 264: 193:Sephiroth storm 138: 129:Marcus J. Ranum 123:Practitioners ( 91: 77:Welcome to the 58: 51: 29: 28: 21: 20: 12: 11: 5: 842: 832: 831: 826: 812: 811: 805: 804: 803: 802: 796: 790: 789: 788: 787: 776: 772:All computing 770: 764: 763: 762: 761: 755: 749: 748: 747: 746: 735: 724: 718: 712: 711: 710: 709: 698: 687: 681: 675: 674: 673: 672: 661: 655: 648: 645: 643: 640: 637: 636: 630:Datenschleuder 623: 621: 618: 612: 611: 598: 595: 589: 588: 586:Bruce Schneier 579: 575: 569: 568: 551: 549: 546: 540: 539: 536: 533: 526: 523: 507: 504: 501: 500: 497: 493: 492: 489: 487: 480: 477: 452: 449: 446: 445: 444: 433: 420: 417: 415: 414: 413: 408: 407: 394: 384: 383: 382: 369: 366: 358: 355: 353: 350: 323: 320: 318: 315: 313:-In progress. 311: 310: 290: 287: 286: 285: 282: 279: 276: 273: 268: 265: 263: 260: 259: 258: 253: 248: 235: 234: 233: 206: 190: 171: 137: 134: 133: 132: 121: 114: 90: 87: 73: 72: 61:superseded by 50: 41: 15: 9: 6: 4: 3: 2: 841: 830: 827: 825: 822: 821: 819: 810: 807: 806: 800: 799: 797: 795: 792: 791: 783: 777: 774: 773: 771: 769: 766: 765: 759: 758: 756: 754: 751: 750: 742: 736: 731: 725: 722: 721: 719: 717: 714: 713: 705: 704:Software-stub 699: 694: 688: 685: 684: 682: 680: 677: 676: 668: 662: 659: 658: 656: 654: 651: 650: 635: 631: 627: 624: 619: 617: 614: 613: 610: 606: 602: 599: 596: 594: 591: 590: 587: 583: 580: 576: 574: 571: 570: 567: 563: 559: 555: 552: 547: 545: 542: 541: 537: 534: 531: 530: 522: 520: 515: 513: 506:Quality scale 495: 494: 484: 476: 471: 440: 434: 429: 423: 422: 416: 405: 404: 399: 395: 392: 388: 387: 378: 372: 371: 364: 349: 347: 342:|security=yes 336: 329: 314: 309: 305: 301: 300:69.140.152.55 297: 293: 292: 283: 280: 277: 274: 271: 270: 257: 254: 252: 249: 247: 243: 239: 236: 232: 228: 224: 220: 219: 218: 214: 210: 207: 204: 201: 198: 194: 191: 189: 185: 182: 179: 175: 172: 169: 166: 163: 159: 156: 155: 154: 152: 148: 143: 142: 130: 126: 122: 119: 115: 112: 108: 104: 100: 99: 98: 96: 86: 84: 80: 69: 65: 64: 55: 49: 47: 42: 39: 35: 34: 25: 19: 667:malware-stub 626:Michael Lynn 582:Port scanner 516: 509: 456: 412: 401: 325: 312: 223:201.55.46.60 199: 180: 164: 144: 140: 139: 136:Participants 94: 92: 78: 76: 60: 54:village pump 43: 609:Morris worm 532:Importance 491:Importance 398:participant 361:Main page: 209:DavidBailey 174:Tinucherian 118:Morris Worm 818:Categories 782:Compu-stub 448:Assessment 352:Categories 317:Guidelines 68:discussion 48:reference. 46:historical 538:Examples 535:Criteria 357:Templates 221:ugfuggyu 562:Firewall 499:Quality 488:articles 294:Convert 203:contribs 184:contribs 168:contribs 158:Jclemens 125:Dan Geer 107:firewall 566:Malware 238:h2g2bob 141:NOTICE! 131:, etc.) 120:, etc.) 113:, etc.) 256:Stutya 251:Gl1d3r 459:class 89:Scope 16:< 573:High 517:The 461:and 304:talk 262:Todo 242:talk 227:talk 213:talk 197:talk 186:) - 178:talk 162:talk 93:The 616:Low 593:Mid 544:Top 400:in 81:of 70:). 820:: 785:}} 779:{{ 744:}} 738:{{ 733:}} 727:{{ 707:}} 701:{{ 696:}} 690:{{ 670:}} 664:{{ 632:, 628:, 607:, 603:, 584:, 564:, 560:, 556:, 514:. 496:- 473:}} 467:{{ 442:}} 436:{{ 431:}} 425:{{ 380:}} 374:{{ 348:. 338:}} 332:{{ 306:) 244:) 229:) 215:) 153:! 127:, 109:, 105:, 85:. 406:. 302:( 240:( 225:( 211:( 200:· 195:( 181:· 176:( 170:) 165:· 160:( 66:( 56:. 26:)

Index

Knowledge:WikiProject Computing
Knowledge:CCISTF

historical
village pump
WikiProject Computer Security
discussion
WikiProject Computing
information security
firewall
hacker (computer security)
Morris Worm
Dan Geer
Marcus J. Ranum
WikiProject Computer Security
WikiProject Computer Security
Jclemens
talk
contribs
Tinucherian
talk
contribs
05:15, 4 August 2008 (UTC)
Sephiroth storm
talk
contribs
DavidBailey
talk
10:31, 9 October 2008 (UTC)
201.55.46.60

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.