Talk:Computer security: Difference between revisions
imported>Eric M Gearhart (Initial creation edit) |
imported>Howard C. Berkowitz (→Not sure...: new section) |
||
Line 3: | Line 3: | ||
==Comment here if you think I shouldn't have copied directly from WP== | ==Comment here if you think I shouldn't have copied directly from WP== | ||
Please don't just mark the article for deletion.... comment here, leave me a message, something. [[User:Eric M Gearhart|Eric M Gearhart]] 11:58, 22 June 2008 (CDT) | Please don't just mark the article for deletion.... comment here, leave me a message, something. [[User:Eric M Gearhart|Eric M Gearhart]] 11:58, 22 June 2008 (CDT) | ||
== Not sure... == | |||
It's not a bad short article, but, obviously, there is a huge amount of material in the field. I only started [[communications security]] and am not even sure if that's the right term, given the blurry line, for example, between the network proper and things such as server authentication. To some extent, I punted when putting in a stub for [[information assurance]], which is used by GCHQ and (I think) NSA. I'm not convinced that even information assurance covers things such as personnel and physical security; see [[counterintelligence]]. | |||
I would be absolutely delighted were there to be any kind of attempt, here or in the Forums or on the mailing list, to create a top-down structure of what we should cover, and perhaps even get some agreement as to who does what. As it is, there have been some differing views on how to approach [[cryptography]]; there's an author that consciously is bottom-up while I am top-down. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 13:06, 23 August 2008 (CDT) |
Revision as of 12:06, 23 August 2008
Comment here if you think I shouldn't have copied directly from WP
Please don't just mark the article for deletion.... comment here, leave me a message, something. Eric M Gearhart 11:58, 22 June 2008 (CDT)
Not sure...
It's not a bad short article, but, obviously, there is a huge amount of material in the field. I only started communications security and am not even sure if that's the right term, given the blurry line, for example, between the network proper and things such as server authentication. To some extent, I punted when putting in a stub for information assurance, which is used by GCHQ and (I think) NSA. I'm not convinced that even information assurance covers things such as personnel and physical security; see counterintelligence.
I would be absolutely delighted were there to be any kind of attempt, here or in the Forums or on the mailing list, to create a top-down structure of what we should cover, and perhaps even get some agreement as to who does what. As it is, there have been some differing views on how to approach cryptography; there's an author that consciously is bottom-up while I am top-down. Howard C. Berkowitz 13:06, 23 August 2008 (CDT)