Version 1
: Received: 7 August 2024 / Approved: 8 August 2024 / Online: 8 August 2024 (14:14:33 CEST)
How to cite:
Lund, B. D.; Lee, T. H.; Wang, Z.; Wang, T.; Mannuru, N. R. Zero-Trust Cybersecurity: Procedures and Considerations in Context. Preprints2024, 2024080628. https://doi.org/10.20944/preprints202408.0628.v1
Lund, B. D.; Lee, T. H.; Wang, Z.; Wang, T.; Mannuru, N. R. Zero-Trust Cybersecurity: Procedures and Considerations in Context. Preprints 2024, 2024080628. https://doi.org/10.20944/preprints202408.0628.v1
Lund, B. D.; Lee, T. H.; Wang, Z.; Wang, T.; Mannuru, N. R. Zero-Trust Cybersecurity: Procedures and Considerations in Context. Preprints2024, 2024080628. https://doi.org/10.20944/preprints202408.0628.v1
APA Style
Lund, B. D., Lee, T. H., Wang, Z., Wang, T., & Mannuru, N. R. (2024). Zero-Trust Cybersecurity: Procedures and Considerations in Context. Preprints. https://doi.org/10.20944/preprints202408.0628.v1
Chicago/Turabian Style
Lund, B. D., Ting Wang and Nishith Reddy Mannuru. 2024 "Zero-Trust Cybersecurity: Procedures and Considerations in Context" Preprints. https://doi.org/10.20944/preprints202408.0628.v1
Abstract
In response to the increasing complexity and sophistication of cyber threats, particularly those enhanced by advancements in artificial intelligence, traditional security methods are proving insufficient. This paper explores the zero-trust cybersecurity framework, which operates on the principle of "never trust, always verify" to mitigate vulnerabilities within organizations. Specifically, it examines the applicability of zero-trust principles in environments where large volumes of information are exchanged, such as schools and libraries, highlighting the importance of continuous authentication, least privilege access, and breach assumption. The findings highlight avenues for future research that may help preserve the security of vulnerable organizations.
Keywords
zero-trust; security frameworks; data security; security in context
Subject
Computer Science and Mathematics, Computer Networks and Communications
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.