Talk:Defense strategy (computing)

Addition strategy types
Description of defense strategies against fileless Malware ( and other traveling security threats ) are welcomed.

Copy Edit
Hi, I'm a new editor and this article caught my eye on the list of articles needing copy edit. In my edit I have attempted to make the flow of the article less terse by adding punctuation, pronouns, and articles. I changed some wikilinks to display in lower-case, and added a few. I changed the references to the different strategies to lower-case in the body of the article. I think capitalization would be appropriate if these were trademarks, but I think they are generic terms and therefore not proper nouns. I have left the headings unchanged, but I think there may be room for clean-up in regards to capitalization there. DancesWithThermalPaste (talk) 01:36, 26 December 2019 (UTC)

A Commons file used on this page has been nominated for speedy deletion
The following Wikimedia Commons file used on this page has been nominated for speedy deletion: You can see the reason for deletion at the file description page linked above. —Community Tech bot (talk) 08:51, 19 January 2020 (UTC)
 * Boundary protection strategy in computing.gif

Commons files used on this page have been nominated for speedy deletion
The following Wikimedia Commons files used on this page have been nominated for speedy deletion: You can see the reasons for deletion at the file description pages linked above. —Community Tech bot (talk) 09:36, 19 January 2020 (UTC)
 * Unavoidable actions strategy in computing.gif
 * Useless information strategy in computing.gif

Strategy analysis
There is no point to delete strategy analysis, if someone want to improve it , he/she is very welcomed. — Preceding unsigned comment added by Davidy2001 (talk • contribs) 06:42, 29 January 2020 (UTC)