Knowledge

:WikiProject Computer Security/Article requests - Knowledge

Source đź“ť

320:
security focuses more generally on "the protection of information and telecommunication technologies (ICT), the data processed and the infrastructure, products and services depending on them", whereas the others are specializations. Not sure I agree, but bumping here.
27: 171: 290: 191: 124: 270: 224: 105: 93:
and looking for html comments. I will try to write some myself but I am more than happy if someone can contribute, writing or assessing the articles.
254: 152: 286: 302: 259: 330: 207: 313: 243: 239: 82: 17: 344: 293:, which was used as part of that attack. I don't have the expertise but there seems to be a good number of articles on it. 89:(at no level or in same cases at very start class level) in wikipedia articles. Some example you can find reading 28:
Knowledge:Requested articles/Applied arts and sciences/Computer science, computing, and Internet § Security
282: 140: 230: 62: 32: 148: 101: 212: 115:, which targets articles related to threat, risk, security, etc. in need of generalization. 8: 298: 144: 326: 120: 97: 316:
to differentiate cybersecurity from computer/information security. The claim is that
276: 90: 72: 52: 307: 198:
Above unsigned suggestion was added on: 21:16, July 14, 2018‎ by: 2.49.40.186. --
130: 112: 294: 266: 250: 220: 203: 177: 167: 57: 338: 322: 116: 162:
article now exists (for anyone else following the pages requested link). --
135:
Perhaps it's not in the scope of this project, but I've started a page for
262: 246: 216: 199: 163: 159: 187: 143:
If anyone wants to help, feel free to edit the crap out of it.
67: 47: 183: 45:, at least according to my point of view) topics, such as 235:
Requests for encyclopædia articles on malware go here.
136: 79:
most basic terminology cited in authoritative sources
182:
Talking about honeypot systems, there is a page for
190:which is more actively maintained. It might need a 336: 111:This heavily overlaps with the focus of 83:National Information Assurance Glossary 18:Knowledge:WikiProject Computer Security 14: 337: 77:Writing the last article I found that 281:I've been editing an article on the 23: 24: 356: 285:and came across the concept of a 215:is now available for editing. -- 71:(I added a specialized article 61:(I added a specialized article 51:(I added a specialized article 13: 1: 37:I realise that wikipedia is l 345:Knowledge requested articles 271:01:29, 8 December 2021 (UTC) 255:22:21, 7 December 2021 (UTC) 225:17:13, 16 January 2020 (UTC) 208:15:36, 16 January 2020 (UTC) 172:15:21, 16 January 2020 (UTC) 7: 331:19:59, 18 August 2024 (UTC) 283:British Library cyberattack 125:19:14, 18 August 2024 (UTC) 106:15:47, 5 October 2010 (UTC) 10: 361: 303:14:14, 12 March 2024 (UTC) 25: 63:countermeasure (computer) 153:19:41, 1 June 2017 (UTC) 39:acking articles on basic 291:keyword guessing attack 192:Cowrie (disambiguation) 186:, but not yet one for 213:Draft:Cowrie_honeypot 231:Malicious software 91:Threat (computer) 73:Threat (computer) 53:attack (computer) 33:Basic terminology 352: 113:WikiProject Risk 360: 359: 355: 354: 353: 351: 350: 349: 335: 334: 314:an old proposal 310: 279: 233: 180: 133: 35: 30: 22: 21: 20: 12: 11: 5: 358: 348: 347: 309: 306: 287:keyword attack 278: 277:Keyword attack 275: 274: 273: 257: 232: 229: 228: 227: 210: 194:page as well. 179: 176: 175: 174: 145:AManNamedEdwan 132: 129: 128: 127: 87:is not covered 85:, or RFC 2828 76: 58:countermeasure 34: 31: 15: 9: 6: 4: 3: 2: 357: 346: 343: 342: 340: 333: 332: 328: 324: 319: 315: 308:Cybersecurity 305: 304: 300: 296: 292: 288: 284: 272: 268: 264: 261: 258: 256: 252: 248: 245: 241: 238: 237: 236: 226: 222: 218: 214: 211: 209: 205: 201: 197: 196: 195: 193: 189: 185: 173: 169: 165: 161: 157: 156: 155: 154: 150: 146: 142: 138: 126: 122: 118: 114: 110: 109: 108: 107: 103: 99: 98:Pastore Italy 94: 92: 88: 84: 80: 74: 70: 69: 64: 60: 59: 54: 50: 49: 44: 40: 29: 19: 317: 311: 280: 234: 181: 134: 95: 86: 78: 66: 56: 46: 42: 38: 36: 141:my sandbox. 43:fundamental 260:Sogomn RAT 26:See also: 295:JamJamSvn 339:Category 323:Tule-hog 117:Tule-hog 160:Keybase 158:FYI, a 137:keybase 131:Keybase 244:Teabot 240:Anatsa 188:Cowrie 178:Cowrie 68:Threat 48:attack 318:cyber 184:Kippo 41:(but 16:< 327:talk 312:See 299:talk 267:talk 263:Bwrs 251:talk 247:Bwrs 221:talk 217:Yae4 204:talk 200:Yae4 168:talk 164:Yae4 149:talk 121:talk 102:talk 289:or 242:or 139:in 81:as 65:), 55:), 341:: 329:) 301:) 269:) 253:) 223:) 206:) 170:) 151:) 123:) 104:) 96:-- 75:). 325:( 297:( 265:( 249:( 219:( 202:( 166:( 147:( 119:( 100:(

Index

Knowledge:WikiProject Computer Security
Knowledge:Requested articles/Applied arts and sciences/Computer science, computing, and Internet § Security
attack
attack (computer)
countermeasure
countermeasure (computer)
Threat
Threat (computer)
National Information Assurance Glossary
Threat (computer)
Pastore Italy
talk
15:47, 5 October 2010 (UTC)
WikiProject Risk
Tule-hog
talk
19:14, 18 August 2024 (UTC)
keybase
my sandbox.
AManNamedEdwan
talk
19:41, 1 June 2017 (UTC)
Keybase
Yae4
talk
15:21, 16 January 2020 (UTC)
Kippo
Cowrie
Cowrie (disambiguation)
Yae4

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑