• Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ
  • Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ

Links and Related Materials

In this section anyone with Author status can post articles about their favorite links to IT security architecture related material. We follow the same quality policy as Wikipedia and take the liberty to delete articles that might not be up to common sense quality standards.

 The community thanks you for your contribution.

 

List of articles in category Links and Related Materials
Title Hits
Ars articles on wireless security Hits: 4190
Build Security In: Process Agnostic View Hits: 5375
ICTstandard.org Hits: 4401
Mass collaboration (principles for "we think") Hits: 4190
MITRE: Common Weakness Enumeration Hits: 6512
NIST Special Publications on computer security: 800 Series Hits: 9011
No Tricks Security Blog Hits: 3995
Passwords that are simple and safe Hits: 4483
SCAP Security Content Automation Protocol Hits: 4798
Security Metrics Hits: 6658
Security Pattern Report by Kienzle / Elder Hits: 5186
Software Security Assurance : State of the Art Report Hits: 6828
Where to locate the IS function within the organisation Hits: 4621