Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation, continuous authentication, least privilege a...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ediciones Universidad de Salamanca
2024-12-01
|
Series: | Advances in Distributed Computing and Artificial Intelligence Journal |
Subjects: | |
Online Access: | https://revistas.usal.es/cinco/index.php/2255-2863/article/view/31611 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832590583264182272 |
---|---|
author | Pushpendra Kumar Verma Bharat Singh Preety Shubham Kumar Sharma Rakesh Prasad Joshi |
author_facet | Pushpendra Kumar Verma Bharat Singh Preety Shubham Kumar Sharma Rakesh Prasad Joshi |
author_sort | Pushpendra Kumar Verma |
collection | DOAJ |
description | As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation, continuous authentication, least privilege access, and micro-segmentation are some of the basic ideas and elements of Zero Trust Architecture that are covered in this research. By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity.
To shed light on the real-world application of Zero Trust Architecture, the paper also investigates empirical data and case studies from real-world scenarios. The influence of Zero Trust Architecture on operational processes and network performance are also be covered, along with recommended practices and various deployment strategies. Additionally, the research assesses how well Zero Trust Architecture conforms to regulatory standards, compliance needs, and existing security frameworks. The results of this study help us comprehend Zero Trust Architecture and its possible advantages and disadvantages. By offering a thorough evaluation framework and useful suggestions for effective implementation, it is helpful to organizations looking to adopt Zero Trust Architecture. The study's findings add to the corpus of information on Zero Trust Architecture and its role in strengthening network security in the face of evolving cyber threats. |
format | Article |
id | doaj-art-15d7537b88df4d18ab18c4b51e316458 |
institution | Kabale University |
issn | 2255-2863 |
language | English |
publishDate | 2024-12-01 |
publisher | Ediciones Universidad de Salamanca |
record_format | Article |
series | Advances in Distributed Computing and Artificial Intelligence Journal |
spelling | doaj-art-15d7537b88df4d18ab18c4b51e3164582025-01-23T11:25:18ZengEdiciones Universidad de SalamancaAdvances in Distributed Computing and Artificial Intelligence Journal2255-28632024-12-0113e31611e3161110.14201/adcaij.3161137092Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent ThreatsPushpendra Kumar Verma0Bharat Singh1Preety2Shubham Kumar Sharma3Rakesh Prasad Joshi4Associate Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001Assistant Professor, FMC, Swami Vivekanad Subharti University, Uttar Pradesh, India, 250002Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation, continuous authentication, least privilege access, and micro-segmentation are some of the basic ideas and elements of Zero Trust Architecture that are covered in this research. By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity. To shed light on the real-world application of Zero Trust Architecture, the paper also investigates empirical data and case studies from real-world scenarios. The influence of Zero Trust Architecture on operational processes and network performance are also be covered, along with recommended practices and various deployment strategies. Additionally, the research assesses how well Zero Trust Architecture conforms to regulatory standards, compliance needs, and existing security frameworks. The results of this study help us comprehend Zero Trust Architecture and its possible advantages and disadvantages. By offering a thorough evaluation framework and useful suggestions for effective implementation, it is helpful to organizations looking to adopt Zero Trust Architecture. The study's findings add to the corpus of information on Zero Trust Architecture and its role in strengthening network security in the face of evolving cyber threats.https://revistas.usal.es/cinco/index.php/2255-2863/article/view/31611zero trust architecturenetwork segmentationcontinuous authenticationmicro-segmentationoperational workflows |
spellingShingle | Pushpendra Kumar Verma Bharat Singh Preety Shubham Kumar Sharma Rakesh Prasad Joshi Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats Advances in Distributed Computing and Artificial Intelligence Journal zero trust architecture network segmentation continuous authentication micro-segmentation operational workflows |
title | Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats |
title_full | Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats |
title_fullStr | Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats |
title_full_unstemmed | Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats |
title_short | Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats |
title_sort | evaluating the effectiveness of zero trust architecture in protecting against advanced persistent threats |
topic | zero trust architecture network segmentation continuous authentication micro-segmentation operational workflows |
url | https://revistas.usal.es/cinco/index.php/2255-2863/article/view/31611 |
work_keys_str_mv | AT pushpendrakumarverma evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats AT bharatsingh evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats AT preety evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats AT shubhamkumarsharma evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats AT rakeshprasadjoshi evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats |