In security, an organization needs to prevent the leak of confidential data by lowering the risks of cyber-attacks. Zero Trust is a security model that treats all network traffic as hostile, even if it is inside the perimeter. In response to the weaknesses of current network security solutions, the zero-trust model follows the idea that no network – whether internal or external – is trustworthy. The concept of zero trust is enjoying increasing attention in both research and practice due to its promise to fulfill complex new network security requirements. Trust is a vulnerability and, like all vulnerabilities, should be eliminated. Zero trust is a systemic approach to information security that trusts no user, transaction, or network traffic unless verified.
Haruna, A. & Haruna, A (2022). Cybersecurity: Zero Trust Security Model Review. Afribary. Retrieved from https://track.afribary.com/works/cybersecurity-zero-trust-security-model-review
Haruna, Abdurrahman, and Abdulrahman Haruna "Cybersecurity: Zero Trust Security Model Review" Afribary. Afribary, 20 Nov. 2022, https://track.afribary.com/works/cybersecurity-zero-trust-security-model-review. Accessed 23 Nov. 2024.
Haruna, Abdurrahman, and Abdulrahman Haruna . "Cybersecurity: Zero Trust Security Model Review". Afribary, Afribary, 20 Nov. 2022. Web. 23 Nov. 2024. < https://track.afribary.com/works/cybersecurity-zero-trust-security-model-review >.
Haruna, Abdurrahman and Haruna, Abdulrahman . "Cybersecurity: Zero Trust Security Model Review" Afribary (2022). Accessed November 23, 2024. https://track.afribary.com/works/cybersecurity-zero-trust-security-model-review