ZERO TRUST EVALUATION METHODOLOGY

Authors

  • Kateryna Novosad Lesya Ukrainka Volyn National University
  • Volodymyr Harashchenko Lesya Ukrainka Volyn National University

Keywords:

Zero Trust, cyber security, mathematical model, threat detection models

Abstract

This work examines the methodologies for Zero Trust assessment, which include risk analysis to assess current threats and vulnerabilities and the use of metrics to assess performance.

References

Ahmadi S. Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports. 2024. Vol. 26, no. 2. P. 215–228. URL: https://doi.org/10.9734/jerr/2024/v26i21083

Irei A., Shea S. What is the Zero-Trust Security Model. Security. URL: https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network

Published

2024-06-09