Zero Trust Cyber Security Architecture for Government and Private Sectors
Analyse different focus areas to develop a zero-trust security architecture.
How can we have a zero-trust security architecture that can offer satisfactory results?
How can a zero-trust security architecture be implemented on existing cybersecurity maturity models?
Study implications while implementing a zero-trust security architecture.
How can the proposed zero-trust security architecture tackle various cyber security implications effectively?
Research Objectives and Scope
Propose an effective zero-trust security architecture that can be adopted by organisations and governments for assuring confidentiality, integrity, availability, user access, non-repudiation, and authentication.
Suggested Zero trust security architecture should be able to be applied on the established cyber security best practices considering various cyber security maturity models already existing in the organisation.
Useful to cyber security policy makers to improve the cyber security postures of the organizations and governments against any cyber-attacks while designing their cyber security architectures.
Phase – 1:
In-depth literature analysis of existing cyber security maturity mechanisms.
Evaluation of various cyber security models to understand their features and improvement fields, to identify new focus areas for the zero-trust security architecture.
Phase – 2:
Propose an effective zero-trust security architecture, considering various focus areas that can deal with the future threats.
o In addition, the proposed mechanism to be designed based on different security necessities, such as user access, confidentiality, non-repudiation, integrity, availability, and authentication
Phase – 3: Carryout survey / circulate questionnaire to take inputs from organisations on the proposed zero-trust security architecture viz a viz existing cyber security maturity models.
Phase – 4: Experimental analysis of the proposed zero-trust security architecture to understand its implementation challenges in the organizations.
§ Phase – 5: Analyse the effectiveness of proposed Zero-Trust security architecture that can influence cybersecurity model of organizations and governments while designing cyber security architectures
2. Systematic Literature Review (SLR)
The objective of this section is to summarise all current literature and identify the components relevant to zero trust cyber security architecture for government and private sectors, across the world. This literature review first details the research method used in the study. It then discusses the research results and identifies possible areas of further significance.
The post Zero Trust Cyber Security Architecture- Government and Private Sectors appeared first on Assignment Essays.