Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats

As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation, continuous authentication, least privilege a...

Full description

Saved in:
Bibliographic Details
Main Authors: Pushpendra Kumar Verma, Bharat Singh, Preety, Shubham Kumar Sharma, Rakesh Prasad Joshi
Format: Article
Language:English
Published: Ediciones Universidad de Salamanca 2024-12-01
Series:Advances in Distributed Computing and Artificial Intelligence Journal
Subjects:
Online Access:https://revistas.usal.es/cinco/index.php/2255-2863/article/view/31611
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832590583264182272
author Pushpendra Kumar Verma
Bharat Singh
Preety
Shubham Kumar Sharma
Rakesh Prasad Joshi
author_facet Pushpendra Kumar Verma
Bharat Singh
Preety
Shubham Kumar Sharma
Rakesh Prasad Joshi
author_sort Pushpendra Kumar Verma
collection DOAJ
description As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation, continuous authentication, least privilege access, and micro-segmentation are some of the basic ideas and elements of Zero Trust Architecture that are covered in this research. By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity. To shed light on the real-world application of Zero Trust Architecture, the paper also investigates empirical data and case studies from real-world scenarios. The influence of Zero Trust Architecture on operational processes and network performance are also be covered, along with recommended practices and various deployment strategies. Additionally, the research assesses how well Zero Trust Architecture conforms to regulatory standards, compliance needs, and existing security frameworks. The results of this study help us comprehend Zero Trust Architecture and its possible advantages and disadvantages. By offering a thorough evaluation framework and useful suggestions for effective implementation, it is helpful to organizations looking to adopt Zero Trust Architecture. The study's findings add to the corpus of information on Zero Trust Architecture and its role in strengthening network security in the face of evolving cyber threats.
format Article
id doaj-art-15d7537b88df4d18ab18c4b51e316458
institution Kabale University
issn 2255-2863
language English
publishDate 2024-12-01
publisher Ediciones Universidad de Salamanca
record_format Article
series Advances in Distributed Computing and Artificial Intelligence Journal
spelling doaj-art-15d7537b88df4d18ab18c4b51e3164582025-01-23T11:25:18ZengEdiciones Universidad de SalamancaAdvances in Distributed Computing and Artificial Intelligence Journal2255-28632024-12-0113e31611e3161110.14201/adcaij.3161137092Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent ThreatsPushpendra Kumar Verma0Bharat Singh1Preety2Shubham Kumar Sharma3Rakesh Prasad Joshi4Associate Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001Assistant Professor, FMC, Swami Vivekanad Subharti University, Uttar Pradesh, India, 250002Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation, continuous authentication, least privilege access, and micro-segmentation are some of the basic ideas and elements of Zero Trust Architecture that are covered in this research. By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity. To shed light on the real-world application of Zero Trust Architecture, the paper also investigates empirical data and case studies from real-world scenarios. The influence of Zero Trust Architecture on operational processes and network performance are also be covered, along with recommended practices and various deployment strategies. Additionally, the research assesses how well Zero Trust Architecture conforms to regulatory standards, compliance needs, and existing security frameworks. The results of this study help us comprehend Zero Trust Architecture and its possible advantages and disadvantages. By offering a thorough evaluation framework and useful suggestions for effective implementation, it is helpful to organizations looking to adopt Zero Trust Architecture. The study's findings add to the corpus of information on Zero Trust Architecture and its role in strengthening network security in the face of evolving cyber threats.https://revistas.usal.es/cinco/index.php/2255-2863/article/view/31611zero trust architecturenetwork segmentationcontinuous authenticationmicro-segmentationoperational workflows
spellingShingle Pushpendra Kumar Verma
Bharat Singh
Preety
Shubham Kumar Sharma
Rakesh Prasad Joshi
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Advances in Distributed Computing and Artificial Intelligence Journal
zero trust architecture
network segmentation
continuous authentication
micro-segmentation
operational workflows
title Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
title_full Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
title_fullStr Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
title_full_unstemmed Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
title_short Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
title_sort evaluating the effectiveness of zero trust architecture in protecting against advanced persistent threats
topic zero trust architecture
network segmentation
continuous authentication
micro-segmentation
operational workflows
url https://revistas.usal.es/cinco/index.php/2255-2863/article/view/31611
work_keys_str_mv AT pushpendrakumarverma evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats
AT bharatsingh evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats
AT preety evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats
AT shubhamkumarsharma evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats
AT rakeshprasadjoshi evaluatingtheeffectivenessofzerotrustarchitectureinprotectingagainstadvancedpersistentthreats