Talk:Security as a service

From WikiProjectMed
Jump to navigation Jump to search

Sources

Here are some sources copied from the article:

Sams, D., & Sams, P. (2012). Software security assurance a matter of global significance: product life cycle propositions. Journal Of Technology Research, 31-9.

Hahn R, Layne-Farrar A. THE LAW AND ECONOMICS OF SOFTWARE SECURITY. Harvard Journal Of Law & Public Policy [serial online]. Fall2006 2006;30(1):283-353. Available from: Academic Search Complete, Ipswich, MA. Accessed March 19, 2013.

Chahar, C., Chauhan, V., & Das, M. (2012). Code Analysis for Software and System Security Using Open Source Tools. Information Security Journal: A Global Perspective, 21(6), 346-352. doi:10.1080/19393555.2012.727132

Howard, C. E. (2011). Safety- and security-critical avionics software. Military & Aerospace Electronics, 22(2), 20-33.

Singh, V., Sharma, Y., & Jakhar, Y. (2011). Role of Antivirus Software's in Protecting Computers against Threats to their Installed Programmes. International Journal Of Research & Reviews In Computer Science, 2(6), 1353-1356.

Jojalozzo 19:03, 14 April 2013 (UTC)[reply]


This article is shallow

The article primary consists of blabla for marketing the idea of outsourcing security. It is not even clear if this mean outsourcing of security software, security services or security management. — Preceding unsigned comment added by 217.10.52.10 (talk) 12:54, 8 February 2016 (UTC)[reply]

Origin section written partially in 2nd person?

The origin section is referring to "attacks such as DDoS that are constantly searching for access points to compromise your website". I don't think this should be written in the second person, as I think in all the articles I've seen so far, all were in third person.

--82.33.245.66 (talk) 10:52, 22 February 2016 (UTC)[reply]

Shallowness and second person

You are both right. This is the typical appalling marketing blabla. I have struck a first blow against it. More improvements yet required. -- Kku 10:08, 19 December 2016 (UTC)