Talk:Network security

TODO

 * 1) Brief mention and cross references to various attacks possible that compromise network security
 * 2) Cite references!! --Raanoo 13:00, 15 August 2006 (UTC) Raanoo 14:02, 10 October 2007 (UTC)
 * 3) Mention how it differs from computer security. --Raanoo 12:36, 18 August 2006 (UTC) --Raanoo 06:29, 21 August 2006 (UTC)
 * 4) Provide historic perspective. --Raanoo 12:48, 19 August 2006 (UTC).
 * 5) Network organization hierarchies/ layers and how they could be protected. Raanoo 10:28, 22 August 2006 (UTC)
 * 6) Comparision to iPass http://www.ipass.com/technology/technology_p_auth.html —Preceding unsigned comment added by Raj.agrawal (talk • contribs) 20:18, 17 October 2008 (UTC)

Changelog

 * 1) I removed the external link because it no longer seems to point to a list of network security papers.  Instead it's just a company website. Mdeshon 00:14, 31 January 2007 (UTC)
 * In total agreement. Thanks! Raanoo 05:52, 1 February 2007 (UTC)
 * Just removed the same external link someone added again anonymously that does not add information on what is network security. Please do not add such tool listings here. You may create a separate article for that and cross-refer this article on that article. Thanks! Raanoo 09:09, 2 February 2007 (UTC)

No evidence of copyright infringement
Sorry, I do not understand, where am i supposed to kind the network security key of , for example, AlexH ? and why in the first place would i want to contact AlexH ? you are impossible professor SineBot, I do not know how to hack either, I guess, the network security key depends on the person, for example, AlexH makes the key, and he gives it to people who he wants to talk to ? I will read the article Denial- of-service attack and network security, and not too fast, slowly, because you are giving me a headache, don't excite Judy and me   — Preceding unsigned comment added by 76.67.11.27 (talk) 14:00, 14 October 2011 (UTC)

There is no evidence of copyright infringement unlike what is claimed on the article page. The onus is on the user who marked the infringement to prove it. For lack of sufficient evidence to support the claim, the claim should be deleted with immediate effect to save this article from being deleted unduly. Raanoo 13:11, 8 October 2007 (UTC)
 * Maybe they changed their page? (See the Google cache of that page). For more, see http://www.google.com/search?q=%22How+different+is+it%22+%22in+plain+words%22&filter=0 although I suppose it's possible that all these places are copying Wikipedia without attribution. In any case, that "How different is it from computer security? In plain words..." box doesn't seem to fit in with the rest of Wikipedia's "style". Ewlyahoocom 18:17, 8 October 2007 (UTC)
 * I strongly feel latter is the case: people copying things on their Web sites without attributing Wikipedia! The contents have been around here in the article for about an year now.  No one has objected to it. In fact, if you Google search the URL with "link:" prefix, you can see the sites where the URL is being referred. And now the specific site you have pointed out has removed it quickly. About the purple text-box, yes I agree that we can change the format to suit Wikipedia style. Please feel free to edit the formating. I suggest you (presumably you added the notice first) remove the copyright infringement notice from the article. Thanks in anticipation. Raanoo 03:54, 9 October 2007 (UTC)
 * Thanks for removing the copyright infringement tag. Indeed, all the Web sites reported by Google using the search phrase you have suggested above point at numerous sites that have copied contents from this article without attributing it to Wikipedia. Wonder what action could be taken in such cases!? Any suggestions? If you noticed, the posting dates of most of such articles is much after the original contributions of this article. Raanoo 14:00, 10 October 2007 (UTC)

Current edition of this article has lots of 'howto' stuff
WP:NOTHOWTO

As we know, Wikipedia is not a howto guide. The contents under section 'Security management' actually list how to secure various forms of network: domestic to corporate. They need revisit. This article has changed significantly, since the initial versions, in a way that does not reflect the original intent. Instead of conveying what is network security, it is more about how it is to be achieved using present means. —Preceding unsigned comment added by Raanoo (talk • contribs) 02:54, 1 June 2010 (UTC)


 * I have removed all the offending content. As WP:NOT is a policy obeying it is mandatory, not optional. Roger (Dodger67) (talk) 13:32, 26 July 2014 (UTC)

Plurals
What is with this article going from singular to plural and then back to singular again? There is no consistency in any of the headings. For example: the business sections cite 'businesses' yet the 'school' and 'government' sections are singular. Is there any specific reason for this?

Also, I changed 'Small Homes' to 'Homes & Small Businesses' - I'm not sure if this is the correct format but I can only assume that 'businesses' was accidentally omitted from the original title (small homes, really?). Eliwins (talk) 06:54, 18 April 2011 (UTC)

External links modified (February 2018)
Hello fellow Wikipedians,

I have just modified one external link on Network security. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20060827234520/http://staff.washington.edu/dittrich/network.html to http://staff.washington.edu/dittrich/network.html

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 12:36, 16 February 2018 (UTC)