As Cybercrimes continue to rise, researchers and industry players have continued to work hard to come up with solutions that could reduce and possibly eradicate these criminalities. This research has been able to discover the major factor that usually causes people to fall prey to these cyber criminals. This was why a school of thought came up with the Zero Trust Access model to strengthen the network framework. While previous network assets relied on the "trust but verify" philosophy, this technology's primary tenet is "never trust, always verify," which applies to every user and device connected to the network. This study interrogated the existing network models of the Integrative Trust Model (ITM) and Zero Trust Access (ZTA) in addition to the trust model (TA) to understand their concepts, implementation needs, strengths, and shortcomings. This made it possible for the study to establish the position of the ZTA model in repositioning the network security architectures vis-a-vis protecting the users