Integrating COBIT 2019 with Zero Trust Architecture: A Strategic Approach to GRC in Cybersecurity [PDF]
This paper is the first to show a shared security governance model that combines COBIT 2019 for strategic oversight and ZTA for tactical, real-time enforcement.
Butt, Ayaan +2 more
core +1 more source
Zero-Trust Architecture for Cloud-Based AI Chat Applications: Encryption, Access Control and Continuous AI-Driven Verification [PDF]
The rise of AI chat apps has resulted in a change of communication as well as entire industries that are powered by AI technologies which bring great concern for security and privacy.
Mubeen, Muhammad
core
Perkembangan teknologi jaringan yang sangat pesat di dekade ini telah menciptakan lanskap digital yang sama sekali baru—sebuah dunia di mana batas-batas jaringan tradisional menjadi kabur dan hampir tidak relevan. Migrasi massal ke infrastruktur cloud, proliferasi perangkat Internet of Things (IoT) yang mencapai miliaran unit, dan transformasi permanen
openaire +1 more source
A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture. [PDF]
Chen B +8 more
europepmc +1 more source
Nonprofit Cybersecurity: NIST CSF 2.0 as Exemplar of the ZERO-TRUST MODEL [PDF]
This thesis investigates the integration of Zero Trust Architecture (ZTA) and the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) within nonprofit and small organizations to enhance cybersecurity posture.
Grad, Ariel Maxwell
core +1 more source
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas [PDF]
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology ...
Boeding, Matthew +4 more
core +1 more source
A data plane security model of segmented routing based on SDP trust enhancement architecture. [PDF]
Wang L +5 more
europepmc +1 more source
Zero Trust Architecture (ZTA) to enhance security in cloud computing environments
As cloud computing becomes integral to enterprise infrastructure, traditional perimeter-based security models increasingly fall short in addressing evolving threats and distributed user environments. This project investigates the application of Zero Trust Architecture (ZTA) within a cloud context to enhance security, based on the principle of “never ...
openaire +1 more source
A zero-trust digital twin framework for privacy-preserving multi-dataset intrusion detection in industrial IoT with lightweight blockchain auditing. [PDF]
Mishra S, Aldafas TSM, Alshammari NS.
europepmc +1 more source
ZTSCAN: ENHANCING ZERO TRUST RESOURCE DISCOVERY WITH MASSCAN AND NMAP INTEGRATION [PDF]
Implementing Zero Trust Architecture (ZTA) requires a comprehensive understanding of network assets as a fundamental step in implementing security policies.
Harwahyu, Ruki, Taupaani, Reikal
core +1 more source

