38:
67:
572:
615:
592:
543:
577:
Most people interested in computer security will be familiar with the topic, and the article gives context to a number of other information security articles. Is mentioned by many books and academic papers, and discussed in detail in more than one.
376:
345:
216:
245:
266:
230:
307:
518:
391:
187:
145:
Thank You for your interest in WikiProject
Computing/Computer and Information Security task force ! Please be aware, that this WikiProject is now under the imperium of
226:
633:
397:
52:
Either the page is no longer relevant or consensus on its purpose has become unclear. To revive discussion, seek broader input via a forum such as the
511:
255:
752:
362:
402:
150:
146:
62:
828:
715:
202:
622:
Most individuals, standards and software projects will be low importance unless they are well known or have high adoption.
149:. All Malware articles are currently being transferred over to the new project. In any case, we welcome you to join us at
299:
793:
222:
53:
183:
23:
521:
are: (1) referenced; (2) coverage; (3) structure; (4) grammar; (5) supporting materials; (6) accessible language.
288:
823:
767:
327:
82:
17:
808:
678:
469:
167:
729:
652:
550:
High-traffic articles which many people outside of computer security will already have a good knowledge of.
334:
438:
110:
692:
427:
196:
326:
Any articles that are within the scope of this project should be tagged with the project banners of
740:
457:
Anyone can assess articles (regardless of membership to the WikiProject) by adding or editing the
321:
303:
620:
More specific and specialized content known only to some people interested in computer security.
703:
666:
212:
177:
97:
exists to centralize efforts to improve
Knowledge's coverage of related matters, to include:
548:
Core articles which are a "must have" for the
Computer and Information Security Task Force.
192:
135:
102:
377:
Knowledge:WikiProject
Computing/Outreach/User Computer and Information Security task force
8:
781:
600:
557:
298:
from a verbatim quote from a U.S. government source to an actual encyclopædic article.
295:
161:
45:
37:
272:
Find editors who have shown interest in this subject and ask them to take a look here.
553:
524:
478:
241:
641:
418:
367:
604:
208:
173:
646:
128:
344:
as this will automatically put the page in the appropriate categories., such as
629:
585:
505:
453:{{WikiProject Computing|class=|importance=|security=yes|security-importance=}}
686:{{WikiProject Computing|class=|importance=|software=yes|software-importance=}}
817:
597:
Known to many people interested in computer security, even if not in detail.
157:
760:{{WikiProject Computing|class=|importance=|network=yes|network-importance=}}
660:{{WikiProject Computing|class=|importance=|malware=yes|malware-importance=}}
625:
581:
261:
237:
608:
351:
250:
117:
356:
267:
Todo items for members of
Computer and Information Security task force
561:
124:
106:
565:
390:
447:
316:
88:
44:
This page is currently inactive and is retained for
723:{{WikiProject Computer science|class=|importance=}}
634:
346:
116:
Events, outages, and notable virus/worm outbreaks (
340:useful. To each of these banners, you should add
284:Review importance and quality of existing articles
815:
475:template. The template is found on talk pages.
720:All articles in the area of computer science
775:{{WikiProject Computing|class=|importance=}}
757:All articles related to computer networking
95:Computer and Information Security task force
79:Computer and Information Security task force
657:Articles about malicious computer software
753:Knowledge:WikiProject Computer networking
363:Knowledge:WikiProject Computing/Templates
14:
816:
716:Knowledge:WikiProject Computer science
485:
385:
32:
30:
794:Knowledge:WikiProject Cryptography
31:
840:
486:Computer and Information Security
281:Identify articles for improvement
389:
36:
768:Knowledge:WikiProject Computing
18:Knowledge:WikiProject Computing
809:Knowledge:WikiProject Cyberlaw
683:All software-related articles
679:Knowledge:WikiProject Software
278:Identify articles for creation
13:
1:
829:WikiProject Computer Security
653:Knowledge:WikiProject Malware
403:WikiProject Computer Security
205:) - 10:01 8 August 2008 (UTC)
151:WikiProject Computer Security
147:WikiProject Computer Security
63:WikiProject Computer Security
308:03:42, 16 October 2008 (UTC)
246:22:51, 18 October 2008 (UTC)
7:
512:WikiProject computing scale
396:WikiProject Computing is a
217:10:31, 9 October 2008 (UTC)
10:
845:
360:
188:05:15, 4 August 2008 (UTC)
111:hacker (computer security)
59:This WikiProject has been
510:The quality scale is the
498:
490:
231:11:17, 11 June 2024 (UTC)
451:
101:Topics and Terminology (
801:{{CryptographyProject}}
824:Inactive project pages
798:Cryptography articles
322:Tagging and assessment
642:Featured/Good content
470:WikiProject Computing
330:. You may also find
328:WikiProject Computing
289:Todo items for anyone
275:Tag related articles.
83:WikiProject Computing
730:compu-scientist-stub
647:Related Wikiprojects
103:information security
601:Chaos Computer Club
558:Computer insecurity
463:security-importance
465:parameters to the
335:WikiProjectBanners
296:Protected Computer
639:
638:
554:Computer security
503:
502:
439:Computer security
410:
409:
75:
74:
22:(Redirected from
836:
786:
780:
745:
739:
734:
728:
708:
702:
697:
693:Infobox Software
691:
671:
665:
605:Snort (software)
529:
528:
525:Importance scale
519:B-Class criteria
483:
482:
479:Project Articles
474:
468:
464:
460:
443:
437:
432:
428:Computer hacking
426:
419:Infobox template
393:
386:
381:
375:
368:Userbox template
343:
339:
333:
71:
57:
40:
33:
27:
24:Knowledge:CCISTF
844:
843:
839:
838:
837:
835:
834:
833:
814:
813:
784:
778:
743:
741:compu-prog-stub
737:
732:
726:
706:
700:
695:
689:
669:
663:
649:
644:
527:
508:
481:
472:
466:
462:
458:
455:
454:
450:
441:
435:
430:
424:
421:
411:
379:
373:
370:
365:
359:
354:
341:
337:
331:
324:
319:
291:
269:
264:
193:Sephiroth storm
138:
129:Marcus J. Ranum
123:Practitioners (
91:
77:Welcome to the
58:
51:
29:
28:
21:
20:
12:
11:
5:
842:
832:
831:
826:
812:
811:
805:
804:
803:
802:
796:
790:
789:
788:
787:
776:
772:All computing
770:
764:
763:
762:
761:
755:
749:
748:
747:
746:
735:
724:
718:
712:
711:
710:
709:
698:
687:
681:
675:
674:
673:
672:
661:
655:
648:
645:
643:
640:
637:
636:
630:Datenschleuder
623:
621:
618:
612:
611:
598:
595:
589:
588:
586:Bruce Schneier
579:
575:
569:
568:
551:
549:
546:
540:
539:
536:
533:
526:
523:
507:
504:
501:
500:
497:
493:
492:
489:
487:
480:
477:
452:
449:
446:
445:
444:
433:
420:
417:
415:
414:
413:
408:
407:
394:
384:
383:
382:
369:
366:
358:
355:
353:
350:
323:
320:
318:
315:
313:-In progress.
311:
310:
290:
287:
286:
285:
282:
279:
276:
273:
268:
265:
263:
260:
259:
258:
253:
248:
235:
234:
233:
206:
190:
171:
137:
134:
133:
132:
121:
114:
90:
87:
73:
72:
61:superseded by
50:
41:
15:
9:
6:
4:
3:
2:
841:
830:
827:
825:
822:
821:
819:
810:
807:
806:
800:
799:
797:
795:
792:
791:
783:
777:
774:
773:
771:
769:
766:
765:
759:
758:
756:
754:
751:
750:
742:
736:
731:
725:
722:
721:
719:
717:
714:
713:
705:
704:Software-stub
699:
694:
688:
685:
684:
682:
680:
677:
676:
668:
662:
659:
658:
656:
654:
651:
650:
635:
631:
627:
624:
619:
617:
614:
613:
610:
606:
602:
599:
596:
594:
591:
590:
587:
583:
580:
576:
574:
571:
570:
567:
563:
559:
555:
552:
547:
545:
542:
541:
537:
534:
531:
530:
522:
520:
515:
513:
506:Quality scale
495:
494:
484:
476:
471:
440:
434:
429:
423:
422:
416:
405:
404:
399:
395:
392:
388:
387:
378:
372:
371:
364:
349:
347:
342:|security=yes
336:
329:
314:
309:
305:
301:
300:69.140.152.55
297:
293:
292:
283:
280:
277:
274:
271:
270:
257:
254:
252:
249:
247:
243:
239:
236:
232:
228:
224:
220:
219:
218:
214:
210:
207:
204:
201:
198:
194:
191:
189:
185:
182:
179:
175:
172:
169:
166:
163:
159:
156:
155:
154:
152:
148:
143:
142:
130:
126:
122:
119:
115:
112:
108:
104:
100:
99:
98:
96:
86:
84:
80:
69:
65:
64:
55:
49:
47:
42:
39:
35:
34:
25:
19:
667:malware-stub
626:Michael Lynn
582:Port scanner
516:
509:
456:
412:
401:
325:
312:
223:201.55.46.60
199:
180:
164:
144:
140:
139:
136:Participants
94:
92:
78:
76:
60:
54:village pump
43:
609:Morris worm
532:Importance
491:Importance
398:participant
361:Main page:
209:DavidBailey
174:Tinucherian
118:Morris Worm
818:Categories
782:Compu-stub
448:Assessment
352:Categories
317:Guidelines
68:discussion
48:reference.
46:historical
538:Examples
535:Criteria
357:Templates
221:ugfuggyu
562:Firewall
499:Quality
488:articles
294:Convert
203:contribs
184:contribs
168:contribs
158:Jclemens
125:Dan Geer
107:firewall
566:Malware
238:h2g2bob
141:NOTICE!
131:, etc.)
120:, etc.)
113:, etc.)
256:Stutya
251:Gl1d3r
459:class
89:Scope
16:<
573:High
517:The
461:and
304:talk
262:Todo
242:talk
227:talk
213:talk
197:talk
186:) -
178:talk
162:talk
93:The
616:Low
593:Mid
544:Top
400:in
81:of
70:).
820::
785:}}
779:{{
744:}}
738:{{
733:}}
727:{{
707:}}
701:{{
696:}}
690:{{
670:}}
664:{{
632:,
628:,
607:,
603:,
584:,
564:,
560:,
556:,
514:.
496:-
473:}}
467:{{
442:}}
436:{{
431:}}
425:{{
380:}}
374:{{
348:.
338:}}
332:{{
306:)
244:)
229:)
215:)
153:!
127:,
109:,
105:,
85:.
406:.
302:(
240:(
225:(
211:(
200:·
195:(
181:·
176:(
170:)
165:·
160:(
66:(
56:.
26:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.