Zero Trust Cybersecurity: Procedures and Considerations in Context
Zero Trust Cybersecurity: Procedures and Considerations in Context
In response to the increasing complexity and sophistication of cyber threats, particularly those enhanced by advancements in artificial intelligence, traditional security methods are proving insufficient. This paper explores the Zero Trust cybersecurity framework, which operates on the principle of never trust, always verify to mitigate vulnerabilities within organizations. Specifically, it examines the applicability of Zero Trust principles in environments where large volumes of information are exchanged, such as schools and libraries. The discussion highlights the importance of continuous authentication, least privilege access, and breach assumption. The findings underscore avenues for future research that may help preserve the security of these vulnerable organizations.
Brady D. Lund、Tae Hee Lee、Ziang Wang、Ting Wang、Nishith Reddy Mannuru
计算技术、计算机技术
Brady D. Lund,Tae Hee Lee,Ziang Wang,Ting Wang,Nishith Reddy Mannuru.Zero Trust Cybersecurity: Procedures and Considerations in Context[EB/OL].(2025-05-24)[2025-06-13].https://arxiv.org/abs/2505.18872.点此复制
评论