User:CyberKravMaga/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

Option 1
Does each claim have a citation? Are the citations reliable? Does the article tackle one of Wikipedia's equity gaps (coverage of historically underrepresented or misrepresented populations or subjects)?
 * Article title:Incident Management (Incident management):
 * Article Evaluation:Is the article's content relevant to the topic?:Yes. It is relevant to incident management concepts, but it is very light on the subject matter and mostly irrelevant to modern incident management, whether for physical threats or cybersecurity threats.:Is it written neutrally?
 * Yes. The article takes an unbiased approach to introducing the material.
 * No. Some of the sections are uncited, and the citations that do exist are old and stale. The information is no longer relevant, so it is no longer reliable.
 * No. The citations are all very old. The newest source is from 2018, but most are between 2010 and 2013. One even goes back to 1995. Of the 8 links tested, only half of them worked. The other four resulted in errors indicating the content had moved or was no longer there.
 * This is a judgment call, and it is not clear based on Wikipedia’s statements regarding “Equity Gaps,” as found on their website: 10 years of tackling Wikipedia’s equity gaps – Wiki Education Links to an external site.. It could be argued that high-quality incident management content is often located behind a paywall in the form or consulting services. Content freely available on the Internet, whether privately or from government entities (like NIST) consists mainly of templates that require significant customization to apply them to individual entities. However, there are no questions of social justice or racial equity inherent in the subject matter that would meet the respective equity criteria.
 * Sources:Clark, C. A. (2024). CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 1 - Preparation, Threat Response, & Post-Incident Activity (2nd ed., Vol. 1).:Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2012). Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology. https://doi.org/10.6028/nist.sp.800-61r2 :Emergency Management Institute - National Incident Management System (NIMS). (n.d.). https://training.fema.gov/nims/ :
 * Sources:Clark, C. A. (2024). CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 1 - Preparation, Threat Response, & Post-Incident Activity (2nd ed., Vol. 1).:Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2012). Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology. https://doi.org/10.6028/nist.sp.800-61r2 :Emergency Management Institute - National Incident Management System (NIMS). (n.d.). https://training.fema.gov/nims/ :

Option 2
Does each claim have a citation? Are the citations reliable? Does the article tackle one of Wikipedia's equity gaps (coverage of historically underrepresented or misrepresented populations or subjects)?
 * Article title:Cybersecurity architecture (Computer security):
 * Article Evaluation:Is the article's content relevant to the topic?:No. The only Wikipedia content for cybersecurity architecture is a subsection of the "Computer_Security" article, which is a jumble of different topics and provides very little information on the topic of cybersecurity architecture.::Is it written neutrally?
 * Yes. There does not appear to be any bias.
 * Yes.
 * They not notable or informative and are missing some key sources, including various NIST, ISO, and other notable publications.
 * There are not social justice equity gaps, but this clearly falls into a key gap-area for informed technical guidance that is usually behind a pay wall and typically requires significant custom design work, such as via consulting.
 * Sources:NIST, G. M. (2023). The NIST Cybersecurity Framework 2.0. https://doi.org/10.6028/nist.cswp.29.ipd :Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207 :ISO/IEC 27002:2022. (2022, March 1). ISO. https://www.iso.org/standard/75652.html :CIS controls. (n.d.). CIS. https://www.cisecurity.org/controls :PCI SSC.(2022). PCI DSS version 4.0. https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf
 * Sources:NIST, G. M. (2023). The NIST Cybersecurity Framework 2.0. https://doi.org/10.6028/nist.cswp.29.ipd :Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207 :ISO/IEC 27002:2022. (2022, March 1). ISO. https://www.iso.org/standard/75652.html :CIS controls. (n.d.). CIS. https://www.cisecurity.org/controls :PCI SSC.(2022). PCI DSS version 4.0. https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf

Option 3

 * Article title:
 * Article Evaluation:
 * Sources:

Option 4

 * Article title:
 * Article Evaluation:
 * Sources:

Option 5

 * Article title:
 * Article Evaluation:
 * Sources: