Version 1
: Received: 30 June 2023 / Approved: 3 July 2023 / Online: 3 July 2023 (05:26:47 CEST)
How to cite:
Ogbaga, I.; Ogbonnaya,, C.; Chukwuemeka, A. Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users. Preprints2023, 2023070006. https://doi.org/10.20944/preprints202307.0006.v1
Ogbaga, I.; Ogbonnaya,, C.; Chukwuemeka, A. Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users. Preprints 2023, 2023070006. https://doi.org/10.20944/preprints202307.0006.v1
Ogbaga, I.; Ogbonnaya,, C.; Chukwuemeka, A. Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users. Preprints2023, 2023070006. https://doi.org/10.20944/preprints202307.0006.v1
APA Style
Ogbaga, I., Ogbonnaya,, C., & Chukwuemeka, A. (2023). Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users. Preprints. https://doi.org/10.20944/preprints202307.0006.v1
Chicago/Turabian Style
Ogbaga, I., Chijioke Ogbonnaya, and Agwu Chukwuemeka. 2023 "Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users" Preprints. https://doi.org/10.20944/preprints202307.0006.v1
Abstract
As Cybercrimes continue to rise, researchers and industry players have continued to work hard to come up with solutions that could reduce and possibly eradicate these criminalities. This research has been able to discover the major factor that usually causes people to fall prey to these cyber criminals. This was why a school of thought came up with the Zero Trust Access model to strengthen the network framework. While previous network assets relied on the "trust but verify" philosophy, this technology's primary tenet is "never trust, always verify," which applies to every user and device connected to the network. This study interrogated the existing network models of the Integrative Trust Model (ITM) and Zero Trust Access (ZTA) in addition to the trust model (TA) to understand their concepts, implementation needs, strengths, and shortcomings. This made it possible for the study to establish the position of the ZTA model in repositioning the network security architectures vis-a-vis protecting the users
Keywords
zero trust; zero trust access; cyberspace; cybersecurity; trust model
Subject
Computer Science and Mathematics, Computer Networks and Communications
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.