dc.contributor.author | Ojo, Abraham Olasunkanmi | de |
dc.date.accessioned | 2025-02-07T12:16:18Z | |
dc.date.available | 2025-02-07T12:16:18Z | |
dc.date.issued | 2025 | de |
dc.identifier.issn | 2413-9009 | de |
dc.identifier.uri | https://www.ssoar.info/ssoar/handle/document/99801 | |
dc.description.abstract | Securing critical infrastructure (CI), including energy, healthcare, transportation, and financial systems, has become a pressing concern in the face of increasingly sophisticated cyber threats. These essential systems underpin modern society, and disruptions to their operations can have severe economic, social, and safety consequences. Traditional perimeter-based cybersecurity approaches have proven insufficient against evolving attack vectors, highlighting the need for more resilient strategies such as Zero Trust Architecture (ZTA). Zero Trust Architecture represents a paradigm shift in cybersecurity, advocating "never trust, always verify." Unlike legacy models, ZTA emphasises continuous authentication, least privilege access, and network micro-segmentation to mitigate external and internal threats. By assuming that breaches are inevitable, ZTA enforces stringent access controls and real-time monitoring to safeguard critical systems. This review examines the adoption of ZTA in the protection of critical infrastructure.Key findings showed the benefits of ZTA, including enhanced resilience against cyberattacks and improved regulatory compliance. The paper also discusses challenges such as integration with legacy systems, resource constraints, and organisational resistance. Recommendations are provided to guide the phased implementation of ZTA and promote cross-sector collaboration to secure critical infrastructure effectively. | de |
dc.language | en | de |
dc.subject.ddc | Recht | de |
dc.subject.ddc | Law | en |
dc.subject.other | critical infrastructure; cyberattacks; legacy model; Zero Trust Architecture | de |
dc.title | Adoption of Zero Trust Architecture (ZTA) in the Protection of Critical Infrastructure | de |
dc.description.review | begutachtet (peer reviewed) | de |
dc.description.review | peer reviewed | en |
dc.identifier.url | https://pathofscience.org/index.php/ps/article/view/3411/1638 | de |
dc.source.journal | Path of Science | |
dc.source.volume | 11 | de |
dc.publisher.country | MISC | de |
dc.source.issue | 1 | de |
dc.subject.classoz | Recht | de |
dc.subject.classoz | Law | en |
dc.rights.licence | Creative Commons - Namensnennung 4.0 | de |
dc.rights.licence | Creative Commons - Attribution 4.0 | en |
internal.status | formal und inhaltlich fertig erschlossen | de |
dc.type.stock | article | de |
dc.type.document | Zeitschriftenartikel | de |
dc.type.document | journal article | en |
dc.source.pageinfo | 5001-5009 | de |
internal.identifier.classoz | 40101 | |
internal.identifier.journal | 1570 | |
internal.identifier.document | 32 | |
internal.identifier.ddc | 340 | |
dc.identifier.doi | https://doi.org/10.22178/pos.113-2 | de |
dc.description.pubstatus | Veröffentlichungsversion | de |
dc.description.pubstatus | Published Version | en |
internal.identifier.licence | 16 | |
internal.identifier.pubstatus | 1 | |
internal.identifier.review | 1 | |
internal.dda.reference | https://pathofscience.org/index.php/index/oai/@@oai:ojs.pathofscience.org:article/3411 | |
ssoar.urn.registration | false | de |