Building Resilience With Zero Trust: A New Approach To Cybersecurity
Main Article Content
Abstract
Abstract. Zero Trust security requires verification from everyone attempting to ac- cess network resources, as no one is trusted by default from either inside or outside the network. It has been demonstrated that this extra security layer stops data breaches. Before access is allowed, zero trust demands verification from all entities, regardless of their device or location. In the context of cloud computing, zero trust security a strategic approach to cyber security that by default blocks access to re- sources and data has grown in importance.
Downloads
Download data is not yet available.
Article Details
How to Cite
Kalisetty Mythrayie, Kruthiventy Bhavya Sri, Veerla Kesitha Lahari, Purelli Sai Kishore, & Dr M Madhusudhana Subramanyam. (2024). Building Resilience With Zero Trust: A New Approach To Cybersecurity. Educational Administration: Theory and Practice, 30(4), 9271–9276. https://doi.org/10.53555/kuey.v30i4.3483
Issue
Section
Articles