
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
2025
Indexing Partners



















Implementation and Challenges of Zero Trust Architecture in Network Security
Author(s) | Sabeeruddin shaik |
---|---|
Country | United States |
Abstract | The changing cybersecurity landscape requires creative frameworks to combat advanced threats. Zero Trust Architecture (ZTA) represents a fundamental transformation from conventional perimeter-based security frameworks by implementing the principles of "never trust, always verify." This study examines the deployment of ZTA, its challenges, applications, and its effect on network security. This paper emphasizes ZTA's efficiency in addressing insider threats and lateral movement and improving data protection through an extensive examination of the literature before 2021. The report finishes with observations regarding ZTA's potential and suggestions for future integration. |
Keywords | Zero Trust Architecture, Network Security, Cybersecurity, Insider Threats, Micro-Segmentation, Access Management, Cloud Security |
Field | Engineering |
Published In | Volume 15, Issue 1, January-March 2024 |
Published On | 2024-02-14 |
Cite This | Implementation and Challenges of Zero Trust Architecture in Network Security - Sabeeruddin shaik - IJSAT Volume 15, Issue 1, January-March 2024. DOI 10.71097/IJSAT.v15.i1.1650 |
DOI | https://doi.org/10.71097/IJSAT.v15.i1.1650 |
Short DOI | https://doi.org/g83jfh |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
