Show simple item record

[journal article]

dc.contributor.authorOjo, Abraham Olasunkanmide
dc.date.accessioned2025-02-07T12:16:18Z
dc.date.available2025-02-07T12:16:18Z
dc.date.issued2025de
dc.identifier.issn2413-9009de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/99801
dc.description.abstractSecuring critical infrastructure (CI), including energy, healthcare, transportation, and financial systems, has become a pressing concern in the face of increasingly sophisticated cyber threats. These essential systems underpin modern society, and disruptions to their operations can have severe economic, social, and safety consequences. Traditional perimeter-based cybersecurity approaches have proven insufficient against evolving attack vectors, highlighting the need for more resilient strategies such as Zero Trust Architecture (ZTA). Zero Trust Architecture represents a paradigm shift in cybersecurity, advocating "never trust, always verify." Unlike legacy models, ZTA emphasises continuous authentication, least privilege access, and network micro-segmentation to mitigate external and internal threats. By assuming that breaches are inevitable, ZTA enforces stringent access controls and real-time monitoring to safeguard critical systems. This review examines the adoption of ZTA in the protection of critical infrastructure.Key findings showed the benefits of ZTA, including enhanced resilience against cyberattacks and improved regulatory compliance. The paper also discusses challenges such as integration with legacy systems, resource constraints, and organisational resistance. Recommendations are provided to guide the phased implementation of ZTA and promote cross-sector collaboration to secure critical infrastructure effectively.de
dc.languageende
dc.subject.ddcRechtde
dc.subject.ddcLawen
dc.subject.othercritical infrastructure; cyberattacks; legacy model; Zero Trust Architecturede
dc.titleAdoption of Zero Trust Architecture (ZTA) in the Protection of Critical Infrastructurede
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.identifier.urlhttps://pathofscience.org/index.php/ps/article/view/3411/1638de
dc.source.journalPath of Science
dc.source.volume11de
dc.publisher.countryMISCde
dc.source.issue1de
dc.subject.classozRechtde
dc.subject.classozLawen
dc.rights.licenceCreative Commons - Namensnennung 4.0de
dc.rights.licenceCreative Commons - Attribution 4.0en
internal.statusformal und inhaltlich fertig erschlossende
dc.type.stockarticlede
dc.type.documentZeitschriftenartikelde
dc.type.documentjournal articleen
dc.source.pageinfo5001-5009de
internal.identifier.classoz40101
internal.identifier.journal1570
internal.identifier.document32
internal.identifier.ddc340
dc.identifier.doihttps://doi.org/10.22178/pos.113-2de
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence16
internal.identifier.pubstatus1
internal.identifier.review1
internal.dda.referencehttps://pathofscience.org/index.php/index/oai/@@oai:ojs.pathofscience.org:article/3411
ssoar.urn.registrationfalsede


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record