Results 71 to 80 of about 773 (179)
Zero Trust Architecture (ZTA) Design and Implementation, A Comprehensive Review
Zero Trust Architecture (ZTA) has emerged as a transformative security model, evolving from perimeter-based defense systems to a more resilient, identity-centric approach in response to the growing complexity of modern cybersecurity threats. This review explores the design and implementation of ZTA, focusing on its core principles, including identity ...
openaire +1 more source
Abstract This study explores the adaptability of the Zero Trust Architecture in Higher Education Institutions (ZTA-HEIs) in Bangladesh. The traditional perimeter based security systems are becoming ineffective largely as the cyber threads are intensifying globally (Cybersecurity and Infrastructure Security Agency 2023,Rose et al. 2020,
Md. Harun Or Rashid +1 more
openaire +1 more source
IMPLEMENTASI ZERO TRUST ARCHITECTURE DENGAN JUST IN TIME AUTHENTICATION TOKEN PADA WEBSITE E - WALLET [PDF]
Seiring meningkatnya popularitas e-wallet, risiko keamanan terhadap data sensitif pengguna juga semakin tinggi. Model keamanan tradisional berbasis perimeter tidak lagi memadai untuk menghadapi ancaman siber modern, sementara implementasi Zero Trust ...
Afrrahman S. Effendi, Ali +2 more
core +2 more sources
Zero trust security architecture enhanced with federated learning for modern network environments [PDF]
The fast-paced digitization and the adoption of cloud-based services have greatly widened the enterprise attack surface and put the networks at risk from internal vulnerabilities as well as external attacks.
Shinde Sravan R. +5 more
doaj +1 more source
Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention [PDF]
Increasingly sophisticated and varied cyber threats necessitate ever-improving enterprise security postures. For many organizations today, those postures have a foundation in the Zero Trust Architecture (ZTA).
Aiello, Samuel T.
core +1 more source
As organizations continue to embrace digital transformation, the need for robust cybersecurity strategies has never been more critical. This paper explores the Zero Trust Architecture (ZTA) as a contemporary cybersecurity framework that addresses the ...
Francesca Santucci +7 more
doaj +1 more source
In order to address the challenges of integrating multimodal data and the lack of a comprehensive trust mechanism in power system access control, this paper proposes a novel approach that leverages Zero Trust Architecture (ZTA) principles and multimodal ...
Ming Xie, Mingfei Zeng
doaj +1 more source
A Zero Trust Driven Federative Learning Algorithm for Privacy Enhancement
The proliferation of Enterprise Networks, characterized by heterogeneous devices, distributed data sources, and increasingly sophisticated cyber threats, has exposed the limitations of traditional perimeter-based security models. Guided by the principles
Beverly Pule +2 more
doaj +1 more source
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
This research introduced a new novel “Unified Quantum-Resilient Blockchain-Zero-Knowledge Proofs Privacy Authentication Framework (QBC-ZKPAF)” to upgrade the IoT environments with greater security.
Mohammed A. Aleisa
doaj +1 more source
Meningkatnya kompleksitas dan keterhubungan dalam ekosistem Internet of Things (IoT) telah menimbulkan tantangan baru dalam hal keamanan jaringan, di mana arsitektur tradisional tidak lagi memadai untuk menghadapi ancaman yang dinamis dan kontekstual. Penelitian ini bertujuan untuk mengembangkan dan menguji sebuah pendekatan keamanan adaptif berbasis ...
R Wahyudi Darmawan +2 more
openaire +1 more source

