Results 111 to 120 of about 773 (179)

Integrating COBIT 2019 with Zero Trust Architecture: A Strategic Approach to GRC in Cybersecurity [PDF]

open access: yes
This paper is the first to show a shared security governance model that combines COBIT 2019 for strategic oversight and ZTA for tactical, real-time enforcement.
Butt, Ayaan   +2 more
core   +1 more source

Zero-Trust Architecture for Cloud-Based AI Chat Applications: Encryption, Access Control and Continuous AI-Driven Verification [PDF]

open access: yes
The rise of AI chat apps has resulted in a change of communication as well as entire industries that are powered by AI technologies which bring great concern for security and privacy.
Mubeen, Muhammad
core  

Zero Trust Architecture (ZTA): Paradigma Revolusioner Keamanan Jaringan di Era Cloud, IoT, dan Hybrid Work 2026

open access: yes
Perkembangan teknologi jaringan yang sangat pesat di dekade ini telah menciptakan lanskap digital yang sama sekali baru—sebuah dunia di mana batas-batas jaringan tradisional menjadi kabur dan hampir tidak relevan. Migrasi massal ke infrastruktur cloud, proliferasi perangkat Internet of Things (IoT) yang mencapai miliaran unit, dan transformasi permanen
openaire   +1 more source

A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture. [PDF]

open access: yesIEEE Internet Things J, 2021
Chen B   +8 more
europepmc   +1 more source

Nonprofit Cybersecurity: NIST CSF 2.0 as Exemplar of the ZERO-TRUST MODEL [PDF]

open access: yes
This thesis investigates the integration of Zero Trust Architecture (ZTA) and the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) within nonprofit and small organizations to enhance cybersecurity posture.
Grad, Ariel Maxwell
core   +1 more source

A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas [PDF]

open access: yes
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology ...
Boeding, Matthew   +4 more
core   +1 more source

Zero Trust Architecture (ZTA) to enhance security in cloud computing environments

open access: yes
As cloud computing becomes integral to enterprise infrastructure, traditional perimeter-based security models increasingly fall short in addressing evolving threats and distributed user environments. This project investigates the application of Zero Trust Architecture (ZTA) within a cloud context to enhance security, based on the principle of “never ...
openaire   +1 more source

ZTSCAN: ENHANCING ZERO TRUST RESOURCE DISCOVERY WITH MASSCAN AND NMAP INTEGRATION [PDF]

open access: yes
Implementing Zero Trust Architecture (ZTA) requires a comprehensive understanding of network assets as a fundamental step in implementing security policies.
Harwahyu, Ruki, Taupaani, Reikal
core   +1 more source

Home - About - Disclaimer - Privacy