Wikipedia:WikiProject Computer Security/Assessment
Appearance
The WikiProject Computer Security/Assessment is the department of the WikiProject Computer Security that assesses computer security articles. This page lists its members and facilitates its workflow.
Members
[edit]If you're interested in assessing articles for WikiProject Computer Security, add your name to the Department list below.
- Seba5tien (talk) 29 July 2016
- FalconK (talk) 5 October 2016
- Nanophosis (talk) 15 January 2018
- Bill Woodcock (talk) 7 June 2021
- DecorumForum125 (talk) 2 October 2021
Assessment
[edit]- Editors can add an assessment request to the list below. Instructions are in the source.
- The list is transcluded to Wikipedia:WikiProject_Computing/Assessment#Open_requests, because the WikiProjects Computer Security and Computing are related.
- Please also take the initiative to respond to another open request.
- Please move list items from "Open" to "Serviced" when you attend to them. Instructions are in the source.
- Deliver your assessment on the talk page of the assessed article.
- Articles of class Stub, Start, C, and B can be promoted to a higher class.
- Articles cannot be promoted to class A until they have been subjected to a peer review or a Good Article/Featured Article review.
- Articles of any class except GA and FA can be demoted to a lower class.
- Please increment the appropriate field of the assessment statistics table after servicing a list item.
Open requests
[edit]- Gameover ZeuS — requested by Eithersummer (talk · contribs) 04:14, 23 July 2023
- Unix Security — requested by 09:23, 14 April 2024 (UTC) (strongly suspecting: Start-Class, since severely lacking citations)
Serviced requests
[edit]- Factor Analysis of Information Risk — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 - attended to by Pastore Italy (talk · contribs) 18:03, 14 November 2010 - Disposition: Stub class, Mid importance.
- IT_risk_management — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 (UTC) - attended to by Pnm (talk · contribs) 21:22, December 22, 2010 - Disposition: Start class, High importance.
- Security service (telecommunication) — requested by Pastore Italy (talk · contribs) 12:32, 20 December 2010 - attended to by Pnm (talk · contribs) 21:43, December 22, 2010 - Disposition: C class, High importance.
- IT risk — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 - attended to by Shiftchange (talk · contribs) November 17, 2016 - Disposition: C class, Top importance.
- Cracking of wireless networks — requested by Maarten 1963 13:44, 5 May 2012 - attended to by Aunva6 (talk · contribs) 13:04, March 31, 2013 - Disposition: C class, Low importance.
- Hacking Team — requested by blackhat999 (talk · contribs) 16:09, 07 July 2015 - attended to by Falcon Kirtaran (talk · contribs) 02:19, October 5, 2016 - Disposition: B class, Mid importance.
- Lynis — requested by Mathias Hollstein (talk · contribs) 01:02, 20 March 2017 - attended to by Widefox (talk · contribs) 15:10, March 26, 2017 - Disposition: Start class, Mid importance.
- KRACK — requested by Melmann (talk · contribs) 12:05, 16 October 2017 - attended to by Widefox (talk · contribs) 15:36, October 16, 2017 - Disposition: Start class, Mid importance.
- KRACK — requested by Melmann (talk · contribs) 12:05, 16 October 2017 - attended to by Widefox (talk · contribs) 12:42, January 9, 2018 - Disposition: C class, Mid importance.
- Risk IT — requested by Pastore Italy (talk · contribs) 08:52, 20 December 2010 (UTC) - attended to by Widefox (talk · contribs) 17:39, February 2, 2018 - Disposition: Start class, Low importance.
- Hacking Team — requested by blackhat999 (talk · contribs) 16:09, 07 July 2015 - attended to by Robofish (talk · contribs) 09:37, May 30, 2020 - Disposition: B class, Low importance.
- South African hacker history - requested by 105.226.13.137 (talk · contribs) 03:25, September 10, 2020 - attended to by Bwoodcock (talk · contribs) 15:34, 15 June 2021 - Disposition: List class, Low importance.
- PLA Unit 61486 — requested by Blank61 (talk · contribs) 01:35, 9 December 2020 - attended to by Bwoodcock (talk · contribs) 16:08, 15 June 2021 - Disposition: C class, Mid importance
- Data sanitization - requested by Gaw39938 (talk · contribs) 21:04, 3 July 2021 - attended to by Bwoodcock (talk · contribs) 12:08, 6 July 2021 - Disposition: B class, Mid importance
- Packet Clearing House - requested by Bwoodcock (talk · contribs) 21:50, 15 June 2021
- Quad9 - requested by Bwoodcock (talk · contribs) 21:52, 15 June 2021
Rejected requests
[edit]- HP 7935 - requested by mikebar (talk · contribs) 13:28, 28 April 2010 - Disposition: handled under Wikipedia:WikiProject Computing
- Raspberry Pi — requested by Trevj (talk · contribs) 11:42, 1 March 2012 - Disposition: handled under Wikipedia:WikiProject Computing
- Soft body dynamics — requested by Shadowjams (talk · contribs) 20:58, 6 May 2012 - Disposition: handled under Wikipedia:WikiProject Computing
- Columbia (supercomputer) — requested by AradiaSilverWheel (talk · contribs) 14:20, 15 June 2012 - Disposition: handled under Wikipedia:WikiProject Computing
- Pleiades (supercomputer) — requested by AradiaSilverWheel (talk · contribs) 13:07, 19 June 2012 - Disposition: handled under Wikipedia:WikiProject Computing
Assessment statistics
[edit]Year | Requests | Delivered | Rejected |
---|---|---|---|
2021 | 5 | 5 | 0 |
2020 | 2 | 1 | ? |
2019 | ? | ? | ? |
2018 | ? | 2 | ? |
2017 | 2 | 2 | ? |
2016 | ? | 1 | ? |
2015 | ? | ? | ? |
2014 | ? | ? | ? |
2013 | ? | 1 | ? |
2012 | 5 | 1 | 4 |
2011 | ? | ? | ? |
2010 | 6 | 3 | 1 |
Quality
[edit]
Class | Criteria | Reader's experience | Editing suggestions | Example |
---|---|---|---|---|
FA | The article has attained featured article status by passing an in-depth examination by impartial reviewers from WP:Featured article candidates. More detailed criteria
The article meets the featured article criteria:
A featured article exemplifies Wikipedia's very best work and is distinguished by professional standards of writing, presentation, and sourcing. In addition to meeting the policies regarding content for all Wikipedia articles, it has the following attributes.
|
Professional, outstanding, and thorough; a definitive source for encyclopedic information. | No further content additions should be necessary unless new information becomes available; further improvements to the prose quality are often possible. | Acid2 |
FL | The article has attained featured list status by passing an in-depth examination by impartial reviewers from WP:Featured list candidates. More detailed criteria
The article meets the featured list criteria:
|
Professional standard; it comprehensively covers the defined scope, usually providing a complete set of items, and has annotations that provide useful and appropriate information about those items. | No further content additions should be necessary unless new information becomes available; further improvements to the prose quality are often possible. | List of convicted computer criminals |
A | The article is well organized and essentially complete, having been examined by impartial reviewers from a WikiProject or elsewhere. Good article status is not a requirement for A-Class. More detailed criteria
The article meets the A-Class criteria:
Provides a well-written, clear and complete description of the topic, as described in Wikipedia:Article development. It should be of a length suitable for the subject, appropriately structured, and be well referenced by a broad array of reliable sources. It should be well illustrated, with no copyright problems. Only minor style issues and other details need to be addressed before submission as a featured article candidate. See the A-Class assessment departments of some of the larger WikiProjects (e.g. WikiProject Military history). |
Very useful to readers. A fairly complete treatment of the subject. A non-expert in the subject would typically find nothing wanting. | Expert knowledge may be needed to tweak the article, and style problems may need solving. WP:Peer review may help. | Battle of Nam River (as of June 2014) |
GA | The article meets all of the good article criteria, and has been examined by one or more impartial reviewers from WP:Good article nominations. More detailed criteria
A good article is:
|
Useful to nearly all readers, with no obvious problems; approaching (though not necessarily equalling) the quality of a professional publication. | Some editing by subject and style experts is helpful; comparison with an existing featured article on a similar topic may highlight areas where content is weak or missing. | Digital forensics Microsoft Security Essentials |
B | The article meets all of the B-Class criteria. It is mostly complete and does not have major problems, but requires some further work to reach good article standards. More detailed criteria
|
Readers are not left wanting, although the content may not be complete enough to satisfy a serious student or researcher. | A few aspects of content and style need to be addressed. Expert knowledge may be needed. The inclusion of supporting materials should be considered if practical, and the article checked for general compliance with the Manual of Style and related style guidelines. | ITIL security management Computer security |
C | The article is substantial but is still missing important content or contains irrelevant material. The article should have some references to reliable sources, but may still have significant problems or require substantial cleanup. More detailed criteria
The article cites more than one reliable source and is better developed in style, structure, and quality than Start-Class, but it fails one or more of the criteria for B-Class. It may have some gaps or missing elements, or need editing for clarity, balance, or flow.
|
Useful to a casual reader, but would not provide a complete picture for even a moderately detailed study. | Considerable editing is needed to close gaps in content and solve cleanup problems. | Antivirus software Attack (computer) Malware |
Start | An article that is developing but still quite incomplete. It may or may not cite adequate reliable sources. More detailed criteria
The article has a meaningful amount of good content, but it is still weak in many areas. The article has one or more of the following:
|
Provides some meaningful content, but most readers will need more. | Providing references to reliable sources should come first; the article also needs substantial improvement in content and organisation. Also improve the grammar, spelling, writing style and improve the jargon use. | Ball (as of September 2014) |
Stub | A very basic description of the topic. Meets none of the Start-Class criteria. | Provides very little meaningful content; may be little more than a dictionary definition. Readers probably see insufficiently developed features of the topic and may not see how the features of the topic are significant. | Any editing or additional material can be helpful. The provision of meaningful content should be a priority. The best solution for a Stub-class Article to step up to a Start-class Article is to add in referenced reasons of why the topic is significant. | Lineage (anthropology) (as of December 2014) |
List | Meets the criteria of a stand-alone list or set index article, which is an article that contains primarily a list, usually consisting of links to articles in a particular subject area. | There is no set format for a list, but its organization should be logical and useful to the reader. | Lists should be lists of live links to Wikipedia articles, appropriately named and organized. | Comparison of computer viruses |
In the above table, examples are from:
- computer security articles (best choice);
- computing articles (second best choice);
- other articles (third best choice).
Importance
[edit]
Label | Articles |
---|---|
Top | Fundamental concepts, standards, companies, important websites, or anything that forms the basis of all information |
High | Popular applications, architectures, or anything that covers a general area of knowledge |
Mid | Core components or anything that fills in more specific information of certain areas |
Low | Optional add-ons that are not fairly important, or anything that is an obscure piece of trivia |
Statistics
[edit]Computer Security articles by quality and importance | |||||||
---|---|---|---|---|---|---|---|
Quality | Importance | ||||||
Top | High | Mid | Low | NA | ??? | Total | |
GA | 4 | 9 | 14 | 27 | |||
B | 5 | 31 | 47 | 51 | 5 | 139 | |
C | 27 | 192 | 241 | 375 | 43 | 878 | |
Start | 11 | 133 | 296 | 827 | 247 | 1,514 | |
Stub | 17 | 74 | 431 | 199 | 721 | ||
List | 8 | 9 | 21 | 4 | 42 | ||
Category | 29 | 29 | |||||
File | 7 | 7 | |||||
Redirect | 14 | 16 | 43 | 135 | 208 | ||
NA | 1 | 3 | 4 | ||||
Other | 2 | 2 | |||||
Draft | 49 | 49 | |||||
Assessed | 43 | 399 | 693 | 1,765 | 222 | 498 | 3,620 |
Total | 43 | 399 | 693 | 1,765 | 222 | 498 | 3,620 |
WikiWork factors (?) | ω = 15,884 | Ω = 4.84 |