Results 61 to 70 of about 773 (179)
Designing a Zero Trust Architecture for Securing API Gateways in Digital Banking Systems
In the era of digital banking transformation, Application Programming Interfaces (APIs) are essential for system integration and customer-facing innovations but also increase exposure to cyber security risks such as credential theft, API abuse, data ...
Riama Santy Sitorus, B. Junedi Hutagaol
doaj +1 more source
A comprehensive access control model integrating zero trust architecture [PDF]
In contemporary IT landscapes, trust in entities, whether internal or external, within organizations has become obsolete. Establishing and enforcing strict access controls, alongside continuous verification, is imperative to safeguard organizational ...
Jyosthna, Pattabhi Mary +1 more
core +2 more sources
A three-tier microsegmentation framework for enterprise networks under Zero Trust Architecture
Traditional perimeter-based security models are increasingly inadequate for modern enterprise environments, often leading to “security silos” where inconsistent policies across infrastructure layers facilitate lateral movement by attackers.
Hari N.N. +5 more
doaj +1 more source
MEASURING TRUST IN NAVY INFORMATION SYSTEMS ARCHITECTURES TO AID IN NAVY'S ADOPTION OF ITS ZERO TRUST STRATEGY [PDF]
This thesis examines the cybersecurity impacts of a Zero Trust Architecture (ZTA) within a U.S. Navy data center, specifically focusing on information systems’ trust evaluations.
Thompson, Jesse L.
core +1 more source
The transformation of contemporary corporate IT infrastructures has rendered conventional cybersecurity models ineffective, prompting a shift to the Zero Trust Architecture (ZTA); however, its practical implementation is complicated by a rigid reliance ...
A. Palamarchuk
doaj +1 more source
Overview of Zero Trust Architecture Trend and Advancement in Information Security [PDF]
Zero Trust Architecture (ZTA) has become a trending and revolutionary architecture in information security, transitioning from the conventional concept of perimeter security to a ‘never trust, always verify’ model. This study examines the concepts of ZTA,
Alade, Olanrewaju E. +2 more
core +1 more source
Federated Zero Trust Architecture using Artificial Intelligence [PDF]
Cloud computing services have become ubiquitous, and currently, every organization uses some form of cloud computing service. Furthermore, even if an organization does not allow BYOD for work, employees will still bring their own devices to manage their ...
Foo, Ernest +4 more
core +2 more sources
PALANTIR: Zero-trust architecture for Managed Security Service Provider [PDF]
The H2020 PALANTIR project aims at delivering a Security-as-a-Service solution to SMEs and microenterprises via the exploitation of containerised Network Functions. However, these functions are conceived by third-party developers and can also be deployed
Antonio Lioy +8 more
core
The Open Radio Access Network (O-RAN) paradigm promises unprecedented flexibility and cost efficiency for 6G networks but introduces critical security risks due to its disaggregated, AI-driven architecture.
Mohammed El-Hajj
doaj +1 more source
The growing number and sophistication of cyberattacks against financial institutions have underscored the need for a more robust cybersecurity framework in Nigeria’s banking industry. This research examines the implementation of Zero Trust Architecture (ZTA), a contemporary security model that focuses on identity authentication, the principle of least ...
Adewale Ashogbon, Oscar Okpere
openaire +1 more source

