International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 1 January-March 2025 Submit your research before last 3 days of March to publish your research paper in the issue of January-March.

Implementation and Challenges of Zero Trust Architecture in Network Security

Author(s) Sabeeruddin shaik
Country United States
Abstract The changing cybersecurity landscape requires creative frameworks to combat advanced threats. Zero Trust Architecture (ZTA) represents a fundamental transformation from conventional perimeter-based security frameworks by implementing the principles of "never trust, always verify." This study examines the deployment of ZTA, its challenges, applications, and its effect on network security. This paper emphasizes ZTA's efficiency in addressing insider threats and lateral movement and improving data protection through an extensive examination of the literature before 2021. The report finishes with observations regarding ZTA's potential and suggestions for future integration.
Keywords Zero Trust Architecture, Network Security, Cybersecurity, Insider Threats, Micro-Segmentation, Access Management, Cloud Security
Field Engineering
Published In Volume 15, Issue 1, January-March 2024
Published On 2024-02-14
Cite This Implementation and Challenges of Zero Trust Architecture in Network Security - Sabeeruddin shaik - IJSAT Volume 15, Issue 1, January-March 2024. DOI 10.71097/IJSAT.v15.i1.1650
DOI https://doi.org/10.71097/IJSAT.v15.i1.1650
Short DOI https://doi.org/g83jfh

Share this