Talk:Defense in depth (computing)
![]() | Computer security: Computing Stub‑class Mid‑importance | |||||||||||||||||
|
![]() | Computing: Networking Stub‑class | ||||||||||||
|
![]() | This article was nominated for deletion on 20 February 2007. The result of the discussion was keep. |
Just started this stub
Luis F. Gonzalez 22:37, 17 November 2006 (UTC)
Merge from Defense in Depth
I merged Defense in Depth to this page, and created a disambiguation page at the former. I felt this was the right move because Defense in Depth was describing the computer security term, not the military term, though they're rather intertwined. A redirect felt out of place, as it isn't obvious what someone searching for "defense in depth" really wants to see. I just want to make sure everyone is okay with this. -FrankTobia (talk) 06:41, 22 November 2007 (UTC)
Sources
I noticed that a user recently removed a {{Fact}} tag, for good reason I believe. However we should note that this article has no sources. I am not a computer security expert, and I would feel more comfortable if there was at least once authoritative source to be had. Can anyone either dig one up, or point me in the right direction? -FrankTobia (talk) 18:15, 6 December 2007 (UTC)
- "Writing Secure Code", by Michael Howard and David LeBlanc, Microsoft Press (the second edition is current, but I have the first), has a one-page write-up on Defense in Depth. --MattiasAndersson (talk) 22:18, 28 August 2008 (UTC)
links
The website http://www2.sea.siemens.com/Products/Process-Automation/safetyandsecurity/industrialsecurity/Process-Automation-SafetyandSecurity_Security.htm?languagecode=en has links and discussion of Defense in Depth for process control —Preceding unsigned comment added by Shloshed (talk • contribs) 01:44, 16 May 2008 (UTC)
Routers and switches?
I've never been paid to do IT, so take this outsider's comment with requisite salt, but: How are "routers and switches" considered a security strategy? If someone clueful agrees with me and removes that line from the article, feel free to remove this comment too, to declutter the talk page. Myself248 (talk) 22:58, 12 June 2009 (UTC)
Did NSA really invent this?
There's no date on the linked PDF file, but it does reference earlier work in September of 2000. Surely this isn't the first conception of Defense in Depth as an IT best practice? Perhaps it was already known but under another name and NSA coined this term for an existing practice. Can someone show prior art? -- 24.7.80.209 (talk) 11:39, 10 September 2009 (UTC)
I agree that this doesn't sound quite right. I'll look into it as well. Jeffp231 (talk) 20:26, 23 January 2010 (UTC)
- Stub-Class Computer security articles
- Mid-importance Computer security articles
- Stub-Class Computer security articles of Mid-importance
- Stub-Class Computing articles
- Mid-importance Computing articles
- All Computing articles
- All Computer security articles
- Unknown-importance Computing articles
- Stub-Class Computer networking articles
- Unknown-importance Computer networking articles
- Stub-Class Computer networking articles of Unknown-importance
- All Computer networking articles