Building Resilience With Zero Trust: A New Approach To Cybersecurity

Main Article Content

Kalisetty Mythrayie
Kruthiventy Bhavya Sri
Veerla Kesitha Lahari
Purelli Sai Kishore
Dr M Madhusudhana Subramanyam

Abstract

Abstract. Zero Trust security requires verification from everyone attempting to ac- cess network resources, as no one is trusted by default from either inside or outside the network. It has been demonstrated that this extra security layer stops data breaches. Before access is allowed, zero trust demands verification from all entities, regardless of their device or location. In the context of cloud computing, zero trust security a strategic approach to cyber security that by default blocks access to re- sources and data has grown in importance.


 

Downloads

Download data is not yet available.

Article Details

How to Cite
Kalisetty Mythrayie, Kruthiventy Bhavya Sri, Veerla Kesitha Lahari, Purelli Sai Kishore, & Dr M Madhusudhana Subramanyam. (2024). Building Resilience With Zero Trust: A New Approach To Cybersecurity. Educational Administration: Theory and Practice, 30(4), 9271–9276. https://doi.org/10.53555/kuey.v30i4.3483
Section
Articles
Author Biographies

Kalisetty Mythrayie

Department Of Computer Science and Information Technology Koneru Lakshmaiah Education Foundation,Vaddeswaram ,Guntur-522302,Andhra Pradesh, India 

Kruthiventy Bhavya Sri

Department Of Computer Science and Information Technology Koneru Lakshmaiah Education Foundation,Vaddeswaram ,Guntur-522302,Andhra Pradesh, India

Veerla Kesitha Lahari

Department Of Computer Science and Information Technology Koneru Lakshmaiah Education Foundation,Vaddeswaram ,Guntur-522302,Andhra Pradesh, India

Purelli Sai Kishore

Department Of Computer Science and Information Technology Koneru Lakshmaiah Education Foundation,Vaddeswaram ,Guntur-522302,Andhra Pradesh, India

Dr M Madhusudhana Subramanyam

Department of computer science and Information Technology Koneru Lakshmaiah Education Foundation,Vaddeswaram,Guntur-522302,Andhra Pradesh,India

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)