This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
guide:old_articles:computing_systems_and_the_lack_of_invulnerability [2018/01/14 16:05] – ↷ Page moved from guide:computing_systems_and_the_lack_of_invulnerability to guide:old_articles:computing_systems_and_the_lack_of_invulnerability wes | guide:computing_systems_and_the_lack_of_invulnerability [2023/12/20 18:20] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Computing Systems And Security ====== | ====== Computing Systems And Security ====== | ||
- | In both the [[stararmy:star_army_of_yamatai]] and a variety of other organizations (both military and civilian), computing systems have often been seen as nigh invulnerable systems tasked with not only the operation of critical systems but also tasks that are considered too mundane for trained personnel to bother. | + | In both the [[stararmy:start]] and a variety of other organizations (both military and civilian), computing systems have often been seen as nigh invulnerable systems tasked with not only the operation of critical systems but also tasks that are considered too mundane for trained personnel to bother. |
===== The Fallacy ===== | ===== The Fallacy ===== | ||
Line 7: | Line 7: | ||
===== The Reality ===== | ===== The Reality ===== | ||
- | The reality is much more mundane than expected. | + | The reality is much more mundane than expected. |
==== The Resistance of " | ==== The Resistance of " | ||
Line 145: | Line 145: | ||
===== OOC Notes ===== | ===== OOC Notes ===== | ||
- | This page was originally created on 2013/11/05 08:12 by [[user:Matthew: | + | This page was originally created on 2013/11/05 08:12 by [[members:matthew|Abwehran Commander]]. |
+ | |||
+ | Approved: [[https:// |