Your browser doesn't support javascript.
loading
A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model.
Dhiman, Poonam; Saini, Neha; Gulzar, Yonis; Turaev, Sherzod; Kaur, Amandeep; Nisa, Khair Ul; Hamid, Yasir.
Afiliação
  • Dhiman P; Government P.G. College, Idgah Road, Kabari Bazar, Ambala Cantt 133001, India.
  • Saini N; Government College, Chhachhrauli, Yamuna Nagar 135103, India.
  • Gulzar Y; Department of Management Information Systems, College of Business Administration, King Faisal University, Al-Ahsa 31982, Saudi Arabia.
  • Turaev S; Department of Computer Science & Software Engineering, College of Information Technology, United Arab Emirates University, Al Ain 15551, United Arab Emirates.
  • Kaur A; Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140601, India.
  • Nisa KU; College of Computer Science and Information Technology, University of Bisha, Al Nakhil, Bisha 67714, Saudi Arabia.
  • Hamid Y; Information Security and Engineering Technology, AbuDhabi Polytechnic College, Abu Dhabi 111499, United Arab Emirates.
Sensors (Basel) ; 24(4)2024 Feb 19.
Article em En | MEDLINE | ID: mdl-38400486
ABSTRACT
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well as an assessment of the many strategies and possibilities for effective implementation. The survey begins by examining the role of authentication and access control within Zero Trust Architectures, and subsequently investigates innovative authentication, as well as access control solutions across different scenarios. It more deeply explores traditional techniques for encryption, micro-segmentation, and security automation, emphasizing their importance in achieving a secure Zero Trust environment. Zero Trust Architecture is explained in brief, along with the Taxonomy of Zero Trust Network Features. This review article provides useful insights into the Zero Trust paradigm, its approaches, problems, and future research objectives for scholars, practitioners, and policymakers. This survey contributes to the growth and implementation of secure network architectures in critical infrastructures by developing a deeper knowledge of Zero Trust.
Palavras-chave

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article