Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users

Version 1 : Received: 30 June 2023 / Approved: 3 July 2023 / Online: 3 July 2023 (05:26:47 CEST)

How to cite: Ogbaga, I.; Ogbonnaya,, C.; Chukwuemeka, A. Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users. Preprints 2023, 2023070006. https://doi.org/10.20944/preprints202307.0006.v1 Ogbaga, I.; Ogbonnaya,, C.; Chukwuemeka, A. Deployment of Zero Trust Access (ZTA) Policy as a Veritable Tool for Protecting Network Infrastructures and Users. Preprints 2023, 2023070006. https://doi.org/10.20944/preprints202307.0006.v1

Abstract

As Cybercrimes continue to rise, researchers and industry players have continued to work hard to come up with solutions that could reduce and possibly eradicate these criminalities. This research has been able to discover the major factor that usually causes people to fall prey to these cyber criminals. This was why a school of thought came up with the Zero Trust Access model to strengthen the network framework. While previous network assets relied on the "trust but verify" philosophy, this technology's primary tenet is "never trust, always verify," which applies to every user and device connected to the network. This study interrogated the existing network models of the Integrative Trust Model (ITM) and Zero Trust Access (ZTA) in addition to the trust model (TA) to understand their concepts, implementation needs, strengths, and shortcomings. This made it possible for the study to establish the position of the ZTA model in repositioning the network security architectures vis-a-vis protecting the users

Keywords

zero trust; zero trust access; cyberspace; cybersecurity; trust model

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.