Process Improvement Frameworks

The frameworks featured on this post can be applied generally to process, but also to software. Because of this, they are sometimes confused with software development models. You can find an introduction to dedicated software development models on this post.…

Information Security Domains

Information security domains or areas are the different fields where the practice and studies of information security can be split. This post proposes different classifications for the security domains. Information Security Domain Proposals Information security domain proposals featured on this…

FOSS 3D Computer Graphics Tools

This post features free and open-source (FOSS) 3D computer graphics tools. List of FOSS 3D Computer Graphics Tools FOSS 3D computer graphics tools featured on this post: Blender Blender is released under a GPLv2-or-later license. Official website

Common Criteria

ISO/IEC 15408, also known as Common Criteria for Information Technology Security Evaluation, Common Criteria or CC, is an international standard for testing and confirming the system security. Common Criteria supersedes the American TCSEC (Trusted Computer System Evaluation Criteria) or Orange…

Honeypot

A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. A honeynet is a network set up with intentional vulnerabilities hosted on a decoy server to attract…

IoT Search Engines

This post features search engines for devices of the Internet of Things (IoT) List of IoT Search Engines IoT search engines featured on this post: Shodan Shodan is probably the most known IoT search engine. Official link FOFA FOFA is…