Cybersecurity: Zero Trust Security Model Review

In security, an organization needs to prevent the leak of confidential data by lowering the risks of cyber-attacks. Zero Trust is a security model that treats all network traffic as hostile, even if it is inside the perimeter. In response to the weaknesses of current network security solutions, the zero-trust model follows the idea that no network – whether internal or external – is trustworthy. The concept of zero trust is enjoying increasing attention in both research and practice due to its promise to fulfill complex new network security requirements. Trust is a vulnerability and, like all vulnerabilities, should be eliminated. Zero trust is a systemic approach to information security that trusts no user, transaction, or network traffic unless verified.

Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Haruna, A. & Haruna, A (2022). Cybersecurity: Zero Trust Security Model Review. Afribary. Retrieved from https://tracking.afribary.com/works/cybersecurity-zero-trust-security-model-review

MLA 8th

Haruna, Abdurrahman, and Abdulrahman Haruna "Cybersecurity: Zero Trust Security Model Review" Afribary. Afribary, 20 Nov. 2022, https://tracking.afribary.com/works/cybersecurity-zero-trust-security-model-review. Accessed 22 Dec. 2024.

MLA7

Haruna, Abdurrahman, and Abdulrahman Haruna . "Cybersecurity: Zero Trust Security Model Review". Afribary, Afribary, 20 Nov. 2022. Web. 22 Dec. 2024. < https://tracking.afribary.com/works/cybersecurity-zero-trust-security-model-review >.

Chicago

Haruna, Abdurrahman and Haruna, Abdulrahman . "Cybersecurity: Zero Trust Security Model Review" Afribary (2022). Accessed December 22, 2024. https://tracking.afribary.com/works/cybersecurity-zero-trust-security-model-review