Zero Trust Architecture (ZTA): A Comprehensive Survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space.
Naeem Firdous Syed +5 more
doaj +4 more sources
A Systematic Literature Review on the Implementation and Challenges of Zero Trust Architecture Across Domains [PDF]
The Zero Trust Architecture (ZTA) model has emerged as a foundational cybersecurity paradigm that eliminates implicit trust and enforces continuous verification across users, devices, and networks. This study presents a systematic literature review of 74
Sadaf Mushtaq +2 more
doaj +4 more sources
A Comprehensive Framework for Migrating to Zero Trust Architecture
Migrating to Zero Trust Architecture (ZTA) is a strategic approach to strengthen the enterprise’s security postures. The shift to ZTA requires changes across the enterprise which can be challenging to achieve.
Pacharee Phiayura, Songpon Teerakanok
doaj +3 more sources
Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture [PDF]
In a world where organisations are embracing new IT working models such as Bring Your Own Device (BYOD) and remote working, the traditional mindset of defending the network perimeter is no longer sufficient.
Lampis Alevizos +4 more
doaj +6 more sources
Zero Trust for NHIs Based on Robust Identity and Access Management for a Resilient IoT Future [PDF]
The pervasive adoption of Internet of Things (IoT) devices has profoundly reshaped digital connectivity by enabling real-time data exchange and autonomous interactions on a global scale. While this transformation presents substantial operational benefits,
Sthembile Mthethwa +2 more
doaj +2 more sources
Quantum-resilient cross-trust evaluation for zero trust 5G security [PDF]
The growing complexity of multi-domain 5G networks exposes critical trust and authentication vulnerabilities that traditional security models cannot address, especially against emerging quantum-era threats. In this paper, we propose the Quantum-Resilient
K. Jeysuriya +2 more
doaj +2 more sources
Adoption of Zero Trust Architecture (ZTA) in the Protection of Critical Infrastructure [PDF]
Securing critical infrastructure (CI), including energy, healthcare, transportation, and financial systems, has become a pressing concern in the face of increasingly sophisticated cyber threats. These essential systems underpin modern society, and disruptions to their operations can have severe economic, social, and safety consequences.
Ojo, Abraham Olasunkanmi
openaire +4 more sources
Zero Trust Architecture as a Risk Countermeasure in Small-Medium Enterprises and Advanced Technology Systems. [PDF]
The growing sophistication of cyberattacks exposes small- and medium-sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing.
Abdelmagid AM, Diaz R.
europepmc +3 more sources
A data plane security model of SR-BE/TE based on zero-trust architecture [PDF]
Facing the untrusted threats of network elements and PKI/CA faced by SR-BE/TE (Segment Routing-BE/TE) data plane in the zero-trust network environment, firstly, this paper refines it into eight specific security issues.
Liang Wang +5 more
doaj +2 more sources
RANCANG BANGUN SISTEM DOUBLE AUTHENTICATION DENGAN KONSEP ZTA ( ZERO TRUST ARCHITECTURE) [PDF]
Perkembangan teknologi informasi yang pesat telah meningkatkan ketergantungan terhadap sistem berbasis web, namun diiringi dengan ancaman keamanan siber seperti phishing, credential theft, dan session hijacking. Penelitian ini bertujuan merancang dan mengimplementasikan sistem Double Authentication berbasis Zero Trust Architecture (ZTA ...
naga, rio
openaire +4 more sources

