Results 71 to 80 of about 773 (179)

Zero Trust Architecture (ZTA) Design and Implementation, A Comprehensive Review

open access: yesAmerican Journal of Innovation in Science and Engineering
Zero Trust Architecture (ZTA) has emerged as a transformative security model, evolving from perimeter-based defense systems to a more resilient, identity-centric approach in response to the growing complexity of modern cybersecurity threats. This review explores the design and implementation of ZTA, focusing on its core principles, including identity ...
openaire   +1 more source

Adoption of Zero Trust Architecture in Higher Education Institutions in Bangladesh (ZTA-HEIs): Strategies, challenges, and readiness

open access: yesJournal of King Saud University Computer and Information Sciences
Abstract This study explores the adaptability of the Zero Trust Architecture in Higher Education Institutions (ZTA-HEIs) in Bangladesh. The traditional perimeter based security systems are becoming ineffective largely as the cyber threads are intensifying globally (Cybersecurity and Infrastructure Security Agency 2023,Rose et al. 2020,
Md. Harun Or Rashid   +1 more
openaire   +1 more source

IMPLEMENTASI ZERO TRUST ARCHITECTURE DENGAN JUST IN TIME AUTHENTICATION TOKEN PADA WEBSITE E - WALLET [PDF]

open access: yes
Seiring meningkatnya popularitas e-wallet, risiko keamanan terhadap data sensitif pengguna juga semakin tinggi. Model keamanan tradisional berbasis perimeter tidak lagi memadai untuk menghadapi ancaman siber modern, sementara implementasi Zero Trust ...
Afrrahman S. Effendi, Ali   +2 more
core   +2 more sources

Zero trust security architecture enhanced with federated learning for modern network environments [PDF]

open access: yesEPJ Web of Conferences
The fast-paced digitization and the adoption of cloud-based services have greatly widened the enterprise attack surface and put the networks at risk from internal vulnerabilities as well as external attacks.
Shinde Sravan R.   +5 more
doaj   +1 more source

Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention [PDF]

open access: yes
Increasingly sophisticated and varied cyber threats necessitate ever-improving enterprise security postures. For many organizations today, those postures have a foundation in the Zero Trust Architecture (ZTA).
Aiello, Samuel T.
core   +1 more source

Implementing Zero Trust: Expert Insights on Key Security Pillars and Prioritization in Digital Transformation

open access: yesInformation
As organizations continue to embrace digital transformation, the need for robust cybersecurity strategies has never been more critical. This paper explores the Zero Trust Architecture (ZTA) as a contemporary cybersecurity framework that addresses the ...
Francesca Santucci   +7 more
doaj   +1 more source

A multimodal reinforcement learning-based access control model for power systems under zero-trust architecture

open access: yesAlexandria Engineering Journal
In order to address the challenges of integrating multimodal data and the lack of a comprehensive trust mechanism in power system access control, this paper proposes a novel approach that leverages Zero Trust Architecture (ZTA) principles and multimodal ...
Ming Xie, Mingfei Zeng
doaj   +1 more source

A Zero Trust Driven Federative Learning Algorithm for Privacy Enhancement

open access: yesApplied Sciences
The proliferation of Enterprise Networks, characterized by heterogeneous devices, distributed data sources, and increasingly sophisticated cyber threats, has exposed the limitations of traditional perimeter-based security models. Guided by the principles
Beverly Pule   +2 more
doaj   +1 more source

Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments

open access: yesIEEE Access
This research introduced a new novel “Unified Quantum-Resilient Blockchain-Zero-Knowledge Proofs Privacy Authentication Framework (QBC-ZKPAF)” to upgrade the IoT environments with greater security.
Mohammed A. Aleisa
doaj   +1 more source

Analisis Adaptif Zero Trust Architecture (ZTA) Berbasis Machine Learning untuk Deteksi Intrusi pada Jaringan IoT dalam Infrastruktur Kritis

open access: yesRIGGS: Journal of Artificial Intelligence and Digital Business
Meningkatnya kompleksitas dan keterhubungan dalam ekosistem Internet of Things (IoT) telah menimbulkan tantangan baru dalam hal keamanan jaringan, di mana arsitektur tradisional tidak lagi memadai untuk menghadapi ancaman yang dinamis dan kontekstual. Penelitian ini bertujuan untuk mengembangkan dan menguji sebuah pendekatan keamanan adaptif berbasis ...
R Wahyudi Darmawan   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy