|国家预印本平台
首页|Zero Trust Cybersecurity: Procedures and Considerations in Context

Zero Trust Cybersecurity: Procedures and Considerations in Context

Zero Trust Cybersecurity: Procedures and Considerations in Context

来源:Arxiv_logoArxiv
英文摘要

In response to the increasing complexity and sophistication of cyber threats, particularly those enhanced by advancements in artificial intelligence, traditional security methods are proving insufficient. This paper explores the Zero Trust cybersecurity framework, which operates on the principle of never trust, always verify to mitigate vulnerabilities within organizations. Specifically, it examines the applicability of Zero Trust principles in environments where large volumes of information are exchanged, such as schools and libraries. The discussion highlights the importance of continuous authentication, least privilege access, and breach assumption. The findings underscore avenues for future research that may help preserve the security of these vulnerable organizations.

Brady D. Lund、Tae Hee Lee、Ziang Wang、Ting Wang、Nishith Reddy Mannuru

10.3390/encyclopedia4040099

计算技术、计算机技术

Brady D. Lund,Tae Hee Lee,Ziang Wang,Ting Wang,Nishith Reddy Mannuru.Zero Trust Cybersecurity: Procedures and Considerations in Context[EB/OL].(2025-05-24)[2025-06-13].https://arxiv.org/abs/2505.18872.点此复制

评论