Results 51 to 60 of about 773 (179)
IMPLEMENTASI ZTA PADA WEBSITE ASPIRASI KAMPUS [PDF]
Penelitian ini bertujuan untuk mengimplementasikan konsep Zero Trust Architecture (ZTA) pada Website Portal Aspirasi Kampus merupakan langkah tepat untuk peningkatan level keamanan data, terutama keamanan data mahasiswa dalam pengiriman pesan kritik ...
AL-HAFIZ, AHMAD
core +2 more sources
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim +3 more
wiley +1 more source
Advanced cloud security framework based on zero trust architecture and adaptive deep learning for next-generation systems [PDF]
Static rule-based models and cloud access security brokers (CASBs) — traditional cloud security frameworks— can no longer effectively mitigate modern and evolving cyber threats.
Basim, Israa +2 more
core +2 more sources
This article reviews the cyber‐physical vulnerabilities of wireless sensor networks (WSNs) in oil and gas operations. It examines real‐world attack scenarios, highlights key threat vectors such as spoofing and malware, and outlines best practices for securing WSNs within industrial control environments.
Ali Sayghe
wiley +1 more source
Secure and responsible training: the key role of cybersecurity in simulation-based medical education. Implementing a Zero Trust Architecture [PDF]
This article examines the challenges and solutions related to enhancing cybersecurity in the use of medical simulators for training healthcare professionals.
Manushev, Daniel, Vankova, Desislava
core +2 more sources
Challenges in power quality and reliability present significant difficulties in conventional power grids for both service providers and customers. Smart grids (SGs) provide the opportunity to integrate renewable energy resources, and integrating Internet of Things (IoT) in the grid can enhance the capabilities of the SG.
Ahmed S. Alsafran +3 more
wiley +1 more source
A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and capabilities, yet it amplifies concerns regarding security vulnerabilities.
Nurun Nahar +3 more
doaj +1 more source
Sporadic deployment of unmanned aerial vehicles for priority‐based logistics demands inclusive safety‐driven and security smartness to address the myriads of associated risks. The incremental integration of explainable AI, blockchain, and zero trust cybersecurity paradigms is essential to achieving this, albeit with several requirements and ...
Simeon Okechukwu Ajakwe +1 more
wiley +1 more source
Abstract Connectivity and data exchange are key features of Industry 4.0. In this paradigm, (Industrial) Internet of Things ((I)IoT) devices are a vital component facilitating the collection and transmission of environmental data from the physical system to the central station for processing and analysis (digital twin [DT]).
Mohammed El‐Hajj +2 more
wiley +1 more source
Zero Trust and Advanced Persistent Threats: Who Will Win the War? [PDF]
Advanced Persistent Threats (APTs) are state-sponsored actors who break into computer networks for political or industrial espionage. Because of the nature of cyberspace and ever-changing sophisticated attack techniques, it is challenging to prevent and ...
Karabacak, Bilge, Whittaker, Todd
core +1 more source

