Wikipedia:WikiProject Computer Security/Assessment
Jump to navigation
Jump to search
The WikiProject Computer Security/Assessment is the department of the WikiProject Computer Security that assesses computer security articles. This page lists its members and facilitates its workflow.
Members[edit]
If you're interested in assessing articles for WikiProject Computer Security, add your name to the Department list below.
- Seba5tien (talk) 29 July 2016
- FalconK (talk) 5 October 2016
- Nanophosis (talk) 15 January 2018
- Bill Woodcock (talk) 7 June 2021
- DecorumForum125 (talk) 2 October 2021
Assessment[edit]
- Editors can add an assessment request to the list below. Instructions are in the source.
- The list is transcluded to Wikipedia:WikiProject_Computing/Assessment#Open_requests, because the WikiProjects Computer Security and Computing are related.
- Please also take the initiative to respond to another open request.
- Please move list items from "Open" to "Serviced" when you attend to them. Instructions are in the source.
- Deliver your assessment on the talk page of the assessed article.
- Articles of class Stub, Start, C, and B can be promoted to a higher class.
- Articles cannot be promoted to class A until they have been subjected to a peer review or a Good Article/Featured Article review.
- Articles of any class except GA and FA can be demoted to a lower class.
- Please increment the appropriate field of the assessment statistics table after servicing a list item.
Open requests[edit]
Serviced requests[edit]
- Factor Analysis of Information Risk — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 - attended to by Pastore Italy (talk · contribs) 18:03, 14 November 2010 - Disposition: Stub class, Mid importance.
- IT_risk_management — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 (UTC) - attended to by Pnm (talk · contribs) 21:22, December 22, 2010 - Disposition: Start class, High importance.
- Security service (telecommunication) — requested by Pastore Italy (talk · contribs) 12:32, 20 December 2010 - attended to by Pnm (talk · contribs) 21:43, December 22, 2010 - Disposition: C class, High importance.
- IT risk — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 - attended to by Shiftchange (talk · contribs) November 17, 2016 - Disposition: C class, Top importance.
- Cracking of wireless networks — requested by Maarten 1963 13:44, 5 May 2012 - attended to by Aunva6 (talk · contribs) 13:04, March 31, 2013 - Disposition: C class, Low importance.
- Hacking Team — requested by blackhat999 (talk · contribs) 16:09, 07 July 2015 - attended to by Falcon Kirtaran (talk · contribs) 02:19, October 5, 2016 - Disposition: B class, Mid importance.
- Lynis — requested by Mathias Hollstein (talk · contribs) 01:02, 20 March 2017 - attended to by Widefox (talk · contribs) 15:10, March 26, 2017 - Disposition: Start class, Mid importance.
- KRACK — requested by Melmann (talk · contribs) 12:05, 16 October 2017 - attended to by Widefox (talk · contribs) 15:36, October 16, 2017 - Disposition: Start class, Mid importance.
- KRACK — requested by Melmann (talk · contribs) 12:05, 16 October 2017 - attended to by Widefox (talk · contribs) 12:42, January 9, 2018 - Disposition: C class, Mid importance.
- Risk IT — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 (UTC) - attended to by Widefox (talk · contribs) 17:39, February 2, 2018 - Disposition: Start class, Low importance.
- Hacking Team — requested by blackhat999 (talk · contribs) 16:09, 07 July 2015 - attended to by Robofish (talk · contribs) 09:37, May 30, 2020 - Disposition: B class, Low importance.
- South African hacker history - requested by 105.226.13.137 (talk · contribs) 03:25, September 10, 2020 - attended to by Bwoodcock (talk · contribs) 15:34, 15 June 2021 - Disposition: List class, Low importance.
- PLA Unit 61486 — requested by Blank61 (talk · contribs) 01:35, 9 December 2020 - attended to by Bwoodcock (talk · contribs) 16:08, 15 June 2021 - Disposition: C class, Mid importance
- Data sanitization - requested by Gaw39938 (talk · contribs) 21:04, 3 July 2021 - attended to by Bwoodcock (talk · contribs) 12:08, 6 July 2021 - Disposition: B class, Mid importance
- Packet Clearing House - requested by Bwoodcock (talk · contribs) 21:50, 15 June 2021
- Quad9 - requested by Bwoodcock (talk · contribs) 21:52, 15 June 2021
Rejected requests[edit]
- HP 7935 - requested by mikebar (talk · contribs) 13:28, 28 April 2010 - Disposition: handled under Wikipedia:WikiProject Computing
- Raspberry Pi — requested by Trevj (talk · contribs) 11:42, 1 March 2012 - Disposition: handled under Wikipedia:WikiProject Computing
- Soft body dynamics — requested by Shadowjams (talk · contribs) 20:58, 6 May 2012 - Disposition: handled under Wikipedia:WikiProject Computing
- Columbia (supercomputer) — requested by AradiaSilverWheel (talk · contribs) 14:20, 15 June 2012 - Disposition: handled under Wikipedia:WikiProject Computing
- Pleiades (supercomputer) — requested by AradiaSilverWheel (talk · contribs) 13:07, 19 June 2012 - Disposition: handled under Wikipedia:WikiProject Computing
Assessment statistics[edit]
Year | Requests | Delivered | Rejected |
---|---|---|---|
2021 | 5 | 5 | 0 |
2020 | 2 | 1 | ? |
2019 | ? | ? | ? |
2018 | ? | 2 | ? |
2017 | 2 | 2 | ? |
2016 | ? | 1 | ? |
2015 | ? | ? | ? |
2014 | ? | ? | ? |
2013 | ? | 1 | ? |
2012 | 5 | 1 | 4 |
2011 | ? | ? | ? |
2010 | 6 | 3 | 1 |
Quality[edit]
Class | Criteria | Reader's experience | Editing suggestions | Example |
---|---|---|---|---|
![]() |
The article has attained featured article status by passing an in-depth examination by impartial reviewers from WP:Featured article candidates. More detailed criteria
The article meets the featured article criteria:
A featured article exemplifies Wikipedia's very best work and is distinguished by professional standards of writing, presentation, and sourcing. In addition to meeting the policies regarding content for all Wikipedia articles, it has the following attributes.
|
Professional, outstanding, and thorough; a definitive source for encyclopedic information. | No further content additions should be necessary unless new information becomes available; further improvements to the prose quality are often possible. | Acid2 |
![]() |
The article has attained featured list status. More detailed criteria
The article meets the featured list criteria:
|
Professional standard; it comprehensively covers the defined scope, usually providing a complete set of items, and has annotations that provide useful and appropriate information about those items. | No further content additions should be necessary unless new information becomes available. | List of convicted computer criminals |
![]() |
The article is well organized and essentially complete, having been examined by impartial reviewers from a WikiProject or elsewhere. Good article status is not a requirement for A-Class. More detailed criteria
The article meets the A-Class criteria:
Provides a well-written, clear and complete description of the topic, as described in Wikipedia:Article development. It should be of a length suitable for the subject, appropriately structured, and be well referenced by a broad array of reliable sources. It should be well illustrated, with no copyright problems. Only minor style issues and other details need to be addressed before submission as a featured article candidate. See the A-Class assessment departments of some of the larger WikiProjects (e.g. WikiProject Military history). |
Very useful to readers. A fairly complete treatment of the subject. A non-expert in the subject would typically find nothing wanting. | Expert knowledge may be needed to tweak the article, and style problems may need solving. WP:Peer review may help. | Battle of Nam River (as of June 2014) |
![]() |
The article has attained good article status, having been examined by one or more impartial reviewers from WP:Good article nominations. More detailed criteria
The article meets the good article criteria:
A good article is:
|
Useful to nearly all readers, with no obvious problems; approaching (but not equaling) the quality of a professional encyclopedia. | Some editing by subject and style experts is helpful; comparison with an existing featured article on a similar topic may highlight areas where content is weak or missing. | Digital forensics Microsoft Security Essentials |
B | The article is mostly complete and without major problems but requires some further work to reach good article standards. More detailed criteria
The article meets the six B-Class criteria:
|
Readers are not left wanting, although the content may not be complete enough to satisfy a serious student or researcher. | A few aspects of content and style need to be addressed. Expert knowledge may be needed. The inclusion of supporting materials should be considered if practical, and the article checked for general compliance with the Manual of Style and related style guidelines. | ITIL security management Computer security |
C | The article is substantial but is still missing important content or contains much irrelevant material. The article should have some references to reliable sources, but may still have significant problems or require substantial cleanup. More detailed criteria
The article cites more than one reliable source and is better developed in style, structure, and quality than Start-Class, but it fails one or more of the criteria for B-Class. It may have some gaps or missing elements; need editing for clarity, balance, or flow; or contain policy violations, such as bias or original research. Articles on fictional topics are likely to be marked as C-Class if they are written from an in-universe perspective. It is most likely that C-Class articles have a reasonable encyclopedic style.
|
Useful to a casual reader, but would not provide a complete picture for even a moderately detailed study. | Considerable editing is needed to close gaps in content and solve cleanup problems. | Antivirus software Attack (computer) Malware |
Start | An article that is developing but still quite incomplete. It may or may not cite adequate reliable sources. More detailed criteria
The article has a usable amount of good content but is weak in many areas. Quality of the prose may be distinctly unencyclopedic, and Wikipedia:Manual of Style compliance non-existent. The article should satisfy fundamental content policies, such as Wikipedia:Biographies of living persons. Frequently, the referencing is inadequate, although enough sources are usually provided to establish verifiability. No Start-Class article should be in any danger of being speedily deleted.
|
Provides some meaningful content, but most readers will need more. | Providing references to reliable sources should come first; the article also needs substantial improvement in content and organisation. Also improve the grammar, spelling, writing style and improve the jargon use. | Ring-tailed cardinalfish (as of June 2018) |
Stub | A very basic description of the topic. Can be well-written, but may also have significant content issues. More detailed criteria
The article is either a very short article or a rough collection of information that will need much work to become a meaningful article. It is usually very short; however, if the material is irrelevant or incomprehensible, an article of any length falls into this category. Although Stub-class articles are the lowest class of the normal classes, they are adequate enough to be an accepted article, though they do have risks of being dropped from being an article altogether.
|
Provides very little meaningful content; may be little more than a dictionary definition. Readers probably see insufficiently developed features of the topic and may not see how the features of the topic are significant. | Any editing or additional material can be helpful. The provision of meaningful content should be a priority. The best solution for a Stub-class Article to step up to a Start-class Article is to add in referenced reasons of why the topic is significant. | Crescent Falls (as of June 2018) |
List | Meets the criteria of a stand-alone list, which is an article that contains primarily a list, usually consisting of links to articles in a particular subject area. | There is no set format for a list, but its organization should be logical and useful to the reader. | Lists should be lists of live links to Wikipedia articles, appropriately named and organized. | Comparison of computer viruses |
In the above table, examples are from:
- computer security articles (best choice);
- computing articles (second best choice);
- other articles (third best choice).
Importance[edit]
Label | Articles |
---|---|
Top | Fundamental concepts, standards, companies, important websites, or anything that forms the basis of all information |
High | Popular applications, architectures, or anything that covers a general area of knowledge |
Mid | Core components or anything that fills in more specific information of certain areas |
Low | Optional add-ons that are not fairly important, or anything that is an obscure piece of trivia |
Statistics[edit]
Computer Security articles by quality and importance | |||||||
---|---|---|---|---|---|---|---|
Quality | Importance | ||||||
Top | High | Mid | Low | NA | ??? | Total | |
![]() |
1 | 1 | |||||
![]() |
3 | 6 | 6 | 1 | 16 | ||
B | 4 | 29 | 35 | 44 | 3 | 115 | |
C | 23 | 163 | 180 | 211 | 1 | 34 | 612 |
Start | 9 | 146 | 301 | 574 | 2 | 244 | 1,276 |
Stub | 24 | 89 | 375 | 8 | 249 | 745 | |
List | 13 | 8 | 20 | 3 | 44 | ||
Category | 200 | 200 | |||||
Disambig | 6 | 6 | |||||
File | 9 | 9 | |||||
Project | 17 | 17 | |||||
Redirect | 3 | 165 | 168 | ||||
Template | 31 | 31 | |||||
Draft | 51 | 51 | |||||
Assessed | 36 | 378 | 623 | 1,230 | 490 | 534 | 3,291 |
Unassessed | 235 | 235 | |||||
Total | 36 | 378 | 623 | 1,230 | 490 | 769 | 3,526 |