User:Jbuchanan 1/Security information and event management/YuLinB Peer Review

General info

 * Whose work are you reviewing?

(provide username)

User:Jbuchanan 1/Security information and event management/YuLinB Peer Review


 * Link to draft you're reviewing
 * Security information and event management


 * Link to the current version of the article (if it exists)
 * Security information and event management

Evaluate the drafted changes
(Compose a detailed peer review here, considering each of the key aspects listed above if it is relevant. Consider the guiding questions, and check out the examples of what feedback looks like.)

Lead

- Concise and clear introductory sentence that describes the Security Information and Event Management (SIEM) topic.

- Based on the Contents section, I know the topics this article will address. It is an article that I will visit regularly because it is relevant.

- The lead gives a general overview of the major sections this article will cover.

Content

- The topics in the Contents section are relevant. Each topic under Correlation rules examples could be a Wikipedia article in its own right. The potential exists for this article to become rather comprehensive and/or link to other articles.

- This topic is relevant. With cybersecurity technology continuing to evolve, malicious actors will also continue to develop tactics to exploit witting and unwitting users. For this and other reasons, this page is important.

- This article has the promise to address Wikipedia's equity gap(s).

Tone and Balance

- The content is factual, neutral, and not heavily biased toward any specific positions.

- Assessing how this article could potentially take a biased position, it is possible for the article to advocate for strong cybersecurity practice to protect against nefarious cyber actors.

- At this point, I do not perceive the article is attempting to advocate one position or dissuade another.

Sources and References

- The sources listed in the Reference section appear to be relevant and credible with many being peer-reviewed.

- Given recent updates to NIST, current Administration's Executive Orders related to cybersecurity and cyberthreats, and evolving cybersecurity technology, the sources in the References section appear dated (2006 to 2014).

- I tried to access several documents through the links - and was mostly successful even with the more dated articles. The fourth article (Kent & Souppaya, September 2006) required that I sign into the NIST website. It brings up a good question, do all the sources/references need to be available free and without having to sign into websites to access?

Organization

- I look forward to reading/reviewing more of this article as my colleague, Jbuchanan 1, continues researching and writing.

- The writing is written in a conversational tone which I am not certain is the intent of Wikipedia.

///////////////////////

@YuLinB The page below is sandbox page I am working to supplement and improve into the page you read from above.

User:Jbuchanan 1/Security information and event management