An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Software & Systems Architecture in Cybersecurity
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Security Software Architecture & design patterns.
Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.
"Cybersecurity architecture is a fusion of architecture and cybersecurity. "Cybersecurity" is a combination of "cyber" (from the Greek word κυβερνήτης meaning "helmsman") and security ("the freedom from risk or danger"). Putting these all together, it's a model to produce an intended outcome related to freedom from technology-related danger."
Software design includes all activities that aid in the transformation from requirement specification to implementation. Major artifacts of the software design process include:
Security by design focuses on preventing a cybersecurity breach rather than repairing the issue and restoring systems after a company has been hit by a cybersecurity breach.
Also known as secure by design, security by design means that companies think about cybersecurity at the beginning of a project. Secure by design means that software engineers have designed the software to be secure from the outset so as to reduce the likelihood of flaws that might compromise a company’s information security.
AngularJS
C#
C++
Closure
Go
Java
JavaScript
Kotlin
Node
Object Oriented
PHP
Python
React
Ruby
Rust
Scala
Swift
TypeScript
UML
Vue.js
^ back to top ^
^ back to top ^
MIT License & cc license
This work is licensed under a Creative Commons Attribution 4.0 International License.
To the extent possible under law, Paul Veillard has waived all copyright and related or neighboring rights to this work.