Jawaharlal Nehru Technological University Zero Trust Model Paper

User Generated

funxre0372

Computer Science

Jawaharlal Nehru Technological University

Description

Assignment Requirements

Zero trusts is a security stance for networking based on not trusting any users, devices, or applications by default, even those that are already on the network.

The zero trust model uses identity and access management (IAM) as a foundation for an organization’s security program.

For this assignment:

Research the zero trust model.

Write a report that describes the following:

  1. The purpose of zero trusts and what differentiates it from other security models
  2. An overview of how zero trust works in a network environment

How zero trust incorporates least privilege access through role-based access control (RBAC) and/or attribute-based access control (ABAC)

  • Required Resources
  • Peer reviewed articles
  • Internet access

I researched zero trusts and the zero trust model.

I described the purpose of zero trusts, what differentiates it from other security models, how it works in a network environment, and how it incorporates least privilege access through RBAC and/or ABAC.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

1

Zero Trust Model

Student’s Name:
Institutional Affiliation:
Course:
Professor:
Date:

2
Zero Trust Model
The transformation of the workplace from physical offices to digital platforms introduced
new security challenges. There is a high risk of exposure when people use various credentials to
log into sites. Consequently, numerous companies and individual users have fallen victim to data
breaches and ransomware attacks. Research shows that companies can lose up to 2.1 percent of
their market shares within two days of announcing a cyber attack (Cavusoglu et al., 2004). The
zero-trust security model ensures the safety of internet users and data by verifying the credentials
of users whenever a login attempt is made.
The zero-trust security model is a digital transformation tool that has played a significant
role in enhancing the safety of users in any computer network architecture. As companies strive
to move their businesses to the digital platform, customer and employees' data are no longer
secured behind the corporate fortresses. This mobility presents the monumental challenge of
protecting information against an array of cyberattacks. The dynamic cyber attackers armed with
the latest automation technologies have intensified threats in cyberspace. As a result, no user or
device within or outside a network can be trusted to maintain the safety of information. Besides,
government agencies in charge of cyber security passed strict regulations that require businesses
to care for the data they possess. Loss of data ...

Related Tags