Talk:IT Baseline Protection Catalogs

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computer Security / Computing   
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
 ???  This article has not yet received a rating on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
 
WikiProject Guild of Copy Editors
WikiProject icon A version of this article was copy edited by Paulmnguyen, a member of the Guild of Copy Editors, on September 22, 2010. The Guild welcomes all editors with a good grasp of English and Wikipedia's policies and guidelines to help in the drive to improve articles. Visit our project page if you're interested in joining! If you have questions, please direct them to our talk page.
 

Notability[edit]

This article is in danger of deletion due to the fact that it is primarily single-sourced, primary sourced, and so very narrow. It really belongs on another page about computer security policy in a section that lists policies in place for various governments (this one for Germany). However, that article does not currently exist in a good way (search for information security or computer security policy and you will find a handful of articles that should be merged somehow). If anyone can improve this article in the mean time, that would be great. I will slowly work on putting the information together into a nice, complete article on the broader topic. Germany's InfoSec policy is not worthy, in and of itself, to have an encyclopedia article! –Paul M. Nguyen (chat|blame) 01:01, 23 September 2010 (UTC)

I copyedited the article anyway; I still think the general concept should be included in a broader article on Information Security Policy. It involves human resources and management, the systems infrastructure (both hardware and software), and has a fairly solid, business-aware model for an agile security management program. However, this is not compliant with WP:NOTABLE, a frequently-cited reason for deletion of an article. I believe the policy could be summarized in two paragraphs and laid to rest in a better article. Drop your comments here or contact me directly (your post will most likely be transferred here for the sake of the integrity of the discussion). –Paul M. Nguyen (chat|blame) 02:03, 23 September 2010 (UTC)

This discussion continues on the WikiProject Computer Security talk page.Paul M. Nguyen (chat|blame) 13:12, 23 September 2010 (UTC)