Jump to content

Talk:Computer security

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Former featured articleComputer security is a former featured article. Please see the links under Article milestones below for its original nomination page (for older articles, check the nomination archive) and why it was removed.
Article milestones
DateProcessResult
January 19, 2004Refreshing brilliant proseKept
October 23, 2004Peer reviewReviewed
March 17, 2006Featured article reviewDemoted
Current status: Former featured article

Wiki Education assignment: Engineering in the 21st Century - Section 003

[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 August 2024 and 3 December 2024. Further details are available on the course page. Student editor(s): Kanialdhan (article contribs). Peer reviewers: GroupScientificDiscovery.

— Assignment last updated by GroupScientificDiscovery (talk) 00:42, 21 October 2024 (UTC)[reply]

Wiki Education assignment: Research Process and Methodology - FA24 - Sect 200 - Thu

[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 5 September 2024 and 13 December 2024. Further details are available on the course page. Student editor(s): Sp7930 (article contribs).

— Assignment last updated by Sp7930 (talk) 04:21, 11 November 2024 (UTC)[reply]

inaccurate image

[edit]
An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering.

this kind of locks are often used for preventing people from partial RAM theft etc. not advanced targeting Luhanopi (talk) 17:45, 4 June 2025 (UTC)[reply]

Google.com 202.44.109.14 (talk) 17:20, 10 July 2025 (UTC)[reply]

say more
--Luhanopi (talk) 17:21, 10 July 2025 (UTC)[reply]
It doesn't claim to be anything more than a lock to prevent physical tampering. Any better ideas? A picture of an ethernet cable? --𝕁𝕄𝔽 (talk) 20:15, 10 July 2025 (UTC)[reply]
fixing up description Luhanopi (talk) 20:16, 10 July 2025 (UTC)[reply]
An RFID badge reader with a secure door may be a better example. Chainsawvasectomy (talk) 16:29, 12 November 2025 (UTC)[reply]

Additional details to improve the “Vulnerabilities and Attacks” section

[edit]

I suggest adding information about how severely AI tools have weaponized hackers and the threat they pose to cybersecurity. Anthropic has released a report of how hackers have used Claude to execute cyberattacks. https://www-cdn.anthropic.com/b2a76c6f6992465c09a6f2fce282f6c0cea8c200.pdf Imaazmm123 (talk) 05:25, 10 September 2025 (UTC)[reply]

Potential Edits

[edit]

*Controversial* This article indicates that cybersecurity is a subdiscipline of information security. This heavily implies that "Cybersecurity" is a "focus area" https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf specifically the CSF requires that risk management, governance, etc are essential in an effective cybersecurity program. Users should be made aware that this article is focused on certain aspects of cybersecurity. Even though this topic is covered, the article itself seems to indicate in the introduction that they're distinct within an organizational context. Further, many top cybersecurity platform-agnostic certifications like those from ISC2 tend to focus more on the CIA triad (or CIANA +PS). Finally, NIST SP 800-207 https://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.SP.800-207.pdf (discussing ZTA) specifies on pg 1 that "Organizations need to implement comprehensive information security and resiliency practices for zero trust to be effective. " Information Security and Cybersecurity as this article distinguishes, are two interdependent concepts. As much as I recognize the topics might be different, the interdependency should be, at least, explicitly noted. Even though the distinction can "technically" be made CNSSI 4009 https://www.cnss.gov/CNSS/issuances/Instructions.cfm indicates that cybersecurity has largely replaced Information Assurance/Security as the "correct" term.

Additionally, the "Secure by Design" section should mention that the framework was an international effort, headed by the Australian Signals Directorate: https://www.cyber.gov.au/business-government/secure-design/secure-by-design/choosing-secure-and-verifiable-technologies The article section seems to indicate "special ownership" or a "special design" of the concept when it was, in fact, a joint effort.

Software Supply Chain Failures/Vulnerabilities should also be added as its an OWASP top 10 candidate for 2025: https://owasp.org/Top10/2025/A03_2025-Software_Supply_Chain_Failures/

Editors should consider adding privacy concepts to this article in accordance with NIST CSWP 40idp as the CIA, CIANA, or CIANA + PS models are overwhelmingly starting to consider user privacy, not just data/infrastructure protection, as a major component of their cybersecurity programs.

Last, many of the references in this article do not reference "official" sources for definitions. e.g. One company's definition of a concept is not always the respected industry definition for this topic. CNSSI 4009 is a respected publication for a glossary of terms and definitions. Chainsawvasectomy (talk) 14:14, 11 November 2025 (UTC)[reply]

I've been made aware that https://www.cnss.gov/CNSS/issuances/Instructions.cfm may be a problematic link. This is due to the DoD using a TLS certificate signed from their own Signing Authority (which your browser very likely doesn't have registered by default). If you don't add that Signing Authority to your browser it will think the certificate is invalid. If you're having issues trusting the link here is an archive.org link to resolve this: https://web.archive.org/web/20251010024632/https://www.cnss.gov/CNSS/issuances/Instructions.cfm Chainsawvasectomy (talk) 15:16, 11 November 2025 (UTC)[reply]