|WikiProject Computer Security / Computing||(Rated Start-class, High-importance)|
|WikiProject Computing||(Rated Start-class, Mid-importance)|
Evolution Into A Real Article
I've started expanding the scope beyond whatever marketing materials spawned the initial page creation, degunked some of the more biased portions, and began adding in balancing viewpoints. Something to balance the "commercial" philosophy needs to be added, and if someone else doesn't get to it first I'll do so as soon as I figure out what to call it. I've tried to stick to arguments I've seen in dozens of online discussions before so that I know citing supporting sources will be easy, but I'll get back to that later (unless someone else beats me to that, too), just as soon as I have the time to dredge through Google for likely examples.
I think there's probably potential for more than one class of "philosophy" of layered security to be represented here. One obvious possibility is open source community philosophy of layered security. I'll sleep on it -- and if someone else comes along and invents a better way to organize this whole thing, I'll be pleased to see it go in a different direction (as long as it's a good direction).
The original article read like some vendor's brochure with all the incriminating vendor trademarks stripped out. I think the concept of "layered security" or "layered defense" is one bandied about often enough and practiced enough in "the real world" that it warrants an article, though, so I figured treating the marketing materials style original article as a stub to be folded, spindled, and mutilated into something more useful seemed like a good idea. Hopefully others will follow suit, and add real value to what previously looked a little like buzzwords regurgitated onto the Web.
Not just digital security: also physical layered security
This article should not just talk about digital security. Layered security is also a design pattern in physical security. Think of the article about the design of a Concentric castle which could link here if this article were better. Jrest (talk)
- Yes. This is not the way I learned what little I know about security as a network admin. The scheme was that physical security was the first layer of security, followed by password security, and then application security, if I remember correctly. There are obviously many nuances to each of these. 126.96.36.199 (talk) 13:51, 3 September 2014 (UTC)Eric
Another name for Layered Security in the physical world might be Concentric circles of protection. This name does not make sense in the digital world because a circle has no meaning in the digital world. Also, in the physical world, the word circle is not chosen well. Sphere would be better, as it is 3d instead of 2d. Jrest (talk)