| ThisWikiProject, an open group of Wikipedia editors, is believed to besemi-active. Although there may be fewer editors here than in the past, anyone is welcome to participate in the group or toleave a message for us. Remove the |Semi-active parameter from this template ifactivity resumes or if this tag was changed in error. If almost no activity occurs in this WikiProject, consider replacing this tag with{{WikiProject status|Inactive}}. |
| General information | |
| Main project page | talk |
| Members | talk |
| Popular pages | talk |
| Departments | |
| Assessment | talk |
| Tasks | |
| 7articles needing attention | |
| 0expert attention requests | |
| Articles needing cleanup | |
| Article requests | |
| Automatically assessed articles |
| Related WikiProjects | |
| Computing | talk |
| Cryptography | talk |
| Templates | |
| {{WikiProject Computer security}} | |
| {{Wikipedia:WikiProject Computer security/Userbox}} | |
| edit ·recent Computer security-related changes |
Please feel free to add your name to this list if you would like to join this project.
Participants of this WikiProject can add this userbox template {{Wikipedia:WikiProject Computer security/Userbox}} to their User page:
![]() | WikiProject Computer security is aparticipant inWikiProject Computer Security. |
To add the Userbox insert the following to the youruser page:
{{Wikipedia:WikiProject Computer security/Userbox}}Any articles that are within the scope of this project should be tagged with the project banner at{{WikiProject Computer security}}:
| Computer security:Computing | |||||||||||||||
| |||||||||||||||
To tag an article insert the following to the top of the discussion page of the article:
{{WikiProject Computer security|class=|importance=|computing-importance=}}Articles already in thecomputing wikiproject can be added to the computer security project by addingsecurity=yes andsecurity-importance= parameters to the computing banner template. For example:
{{WikiProject Computing|class=|importance=|security=yes|security-importance=}}| Articles assessed for quality:99.8% complete | ||
Anyone can assess articles (regardless of membership to the WikiProject) by adding or editing theclass andimportance parameters to the{{WikiProject Computer security}} template on the talk page of a tagged article. Assessments can be specifically requested (or the process discussed) on theComputer security/Assessment page.
| Computer security articles by quality and importance | |||||||
|---|---|---|---|---|---|---|---|
| Quality | Importance | ||||||
| Top | High | Mid | Low | NA | ??? | Total | |
| 4 | 9 | 16 | 29 | ||||
| B | 6 | 35 | 47 | 58 | 2 | 148 | |
| C | 30 | 194 | 257 | 395 | 50 | 926 | |
| Start | 6 | 129 | 293 | 859 | 248 | 1,535 | |
| Stub | 17 | 70 | 432 | 197 | 716 | ||
| List | 9 | 10 | 22 | 1 | 42 | ||
| Category | 239 | 239 | |||||
| Disambig | 7 | 7 | |||||
| File | 8 | 8 | |||||
| Project | 22 | 22 | |||||
| Redirect | 1 | 9 | 17 | 50 | 218 | 295 | |
| Template | 34 | 34 | |||||
| NA | 4 | 4 | |||||
| Other | 70 | 70 | |||||
| Assessed | 43 | 397 | 703 | 1,832 | 602 | 498 | 4,075 |
| Unassessed | 1 | 6 | 7 | ||||
| Total | 43 | 397 | 703 | 1,833 | 602 | 504 | 4,082 |
| WikiWork factors (?) | ω =16,177 | Ω = 4.82 | |||||
TheB-Class criteria are: (1) referenced; (2) coverage; (3) structure; (4) grammar; (5) supporting materials; (6) accessible language.
| Importance | Criteria | Examples |
|---|---|---|
| Top | Core articles which are a "must have" for Wikiproject Computer Security. High-traffic articles which many people outside of computer security will already have a good knowledge of. | Computer security,Computer insecurity,Firewall,Malware |
| High | Most people interested in computer security will be familiar with the topic, and the article gives context to a number of other information security articles. Is mentioned by many books and academic papers, and discussed in detail in more than one. | Port scanner,Bruce Schneier |
| Mid | Known to many people interested in computer security, even if not in detail. | Chaos Computer Club,Snort (software),Morris worm |
| Low | More specific and specialized content known only to some people interested in computer security. Most individuals, standards and software projects will be low importance unless they are well known or have high adoption. | CloudFlare,Datenschleuder |
One of the important activities of this project is to manage the list ofCategories related to Computer Security.
Proposed deletions
Good article nominees
Articles to be merged
Articles to be split
Articles for creation
The featured articles are whatWikipedia editors believe are the best articles in Wikipedia, and the status which all articles should eventually achieve. Before being listed here, articles are reviewed atWikipedia:Featured article candidates for accuracy, neutrality, completeness, and style according to ourfeatured article criteria.Bold article names have been featured on theMain Page as "Today's featured article".
The following computer security related articles have been deemed Good Articles, which places them two tiers below Featured Articles.