ZERO TRUST EVALUATION METHODOLOGY
Keywords:
Zero Trust, cyber security, mathematical model, threat detection modelsAbstract
This work examines the methodologies for Zero Trust assessment, which include risk analysis to assess current threats and vulnerabilities and the use of metrics to assess performance.
References
Ahmadi S. Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports. 2024. Vol. 26, no. 2. P. 215–228. URL: https://doi.org/10.9734/jerr/2024/v26i21083
Irei A., Shea S. What is the Zero-Trust Security Model. Security. URL: https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network
Downloads
Published
2024-06-09
Conference Proceedings Volume
Section
Security of digital systems. Cybersecurity.