User:Chefhare/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

Option 1

 * Article title - Cryptocurrency
 * Article Evaluation
 * In the cryptocurrency article, the lead section gives an opportunity to learn at the beginning about what the article is about and basic information about cryptocurrency. The content was good. However, there are some improvements that I would like to make. The first is around different crypto regulations by state. Although the article talks about cryptocurrency regulations by country, some laws are state by state that people need to be made aware of. Additionally, I would like to add potential regulations that are coming. In thinking about the tone and balance of the article, it was fact-based. There wasn't a bias slight one way or the other. Furthermore, the writing quality could be improved. However, it is readable and digestible. Moreover, looking at the citations, most of the citations are from reliable sources.
 * Sources
 * Regulations by state https://pro.bloomberglaw.com/brief/cryptocurrency-laws-and-regulations-by-state/’ Potential regualtions  https://www.cnbc.com/2023/02/15/sec-chair-gensler-crypto-firms-need-to-register-to-custody-assets.html

Option 2

 * Article title Application security
 * Article Evaluation
 * In the application security article, the lead section was brief but acceptable. This would be somewhere I would like to improve on. Additionally, the content was good; it talked about the approaches to application security and some of the processes and tooling used within the application security process. Further, it spoke of relevant security threats directly related to the OWASP top 10. Furthermore, it also mentions security standards and regulations which are pertinent to companies looking to implement an application security process. As mentioned before, the content was good; however, two specific things within the article need to be added. The first is around penetration testing, and the second a Review phase. The article mentioned a design phase, the initial beginning of the application security process. However, there is also a design phase to ensure that the application's architecture is secured by design. Next is pen testing; while the article talked about tooling that is used mainly by Dynamic application security testing and Static application security testing, one phase that was missing was the penetration testing phase of testing the application security for vulnerabilities. My overall impression of the article was that some of the sources, while not many, were reputable. However, one looked like it came from a personal website. The writing quality of the article was good; I, as the reader, was able to follow along with their thought process and how they laid out information. The tone was balanced. It wasn't bearish or bullish for or against the subject.
 * Sources
 * https://web.securityinnovation.com/hs-fs/hub/49125/file-14368892-pdf/whitepapers/application_security_by_design.pdf
 * https://resources.infosecinstitute.com/topic/application-architecture-review/

Option 3

 * Article title Chief information security officer
 * Article Evaluation
 * In the chief information security officer article, the Lead section was very brief but gave a good high-level overview of what the chief information security officer does, as well as some of the additional duties that this particular role will take on. However, there is room for improvement. For starters, there are only four references in this article, so it's not thoroughly vetted. Secondly, it left out some key skills that a CISO should have within the role. Additionally, the references seem to all come from a reputable source; however, as stated before, there are not many. There are four references, to be exact. From what is written in the article, the writing quality is good and factual. The tone is balanced, and the content is good. It gives a high-level overview of what the role entails, even talking about some of the certifications that a CISO may have and degrees. As mentioned before, one thing I would add is skill sets and further information on how the CISO role is evolving in today's business climate.
 * Sources
 * https://www.tandfonline.com/doi/abs/10.1080/08874417.2008.11646017 https://apps.dtic.mil/sti/pdfs/AD1046633.pdf
 * https://www.tandfonline.com/doi/abs/10.1080/08874417.2008.11646017 https://apps.dtic.mil/sti/pdfs/AD1046633.pdf

Option 4

 * Article title Chief Product security Officer
 * Article Evaluation
 * I would like to create an article not currently on Wikipedia about the Chief product security officer. I want to add this article to the wiki because the Chief product security officer is a growing role among companies offering customer products and services. Furthermore, there is a need for this role within companies. As we create more products that change our lives and impact our lives, there needs to be an executive with the security of those products at the forefront of their mission. Additionally, according to a LinkedIn search, there have been numerous companies hiring for these roles.
 * Sources
 * https://www.darkreading.com/edge-ask-the-experts/what-does-a-chief-product-security-officer-do- https://www.scmagazine.com/news/application-security/why-companies-need-a-chief-product-security-officer  https://www.infosecurity-magazine.com/news/rsac-rise-of-chief-product/
 * Sources
 * https://www.darkreading.com/edge-ask-the-experts/what-does-a-chief-product-security-officer-do- https://www.scmagazine.com/news/application-security/why-companies-need-a-chief-product-security-officer  https://www.infosecurity-magazine.com/news/rsac-rise-of-chief-product/

Option 5

 * Article title
 * Article Evaluation
 * Sources
 * Sources
 * Sources