International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 0 | Views: 9

Informative Article | Computer Science and Information Technology | India | Volume 12 Issue 4, April 2023 | Rating: 3.7 / 10


Zero Trust Network Segmentation

Anvesh Gunuganti [3]


Abstract: Zero Trust Network Segmentation (ZTNS) is a novel security approach in the daunting fight against the contemporary threats of cyber-attacks refusing to allow trust across the entire network. This paper aims to identify and discuss the effects that ZTNS brings about within the parameters of security and efficiency in present-day organizational networks. As a member of the ZTNS operation, which works under the motto ?never trust, always check,? the platform requires verifying every request made by the user and the device. It also helps improve security to access specific assets by strictly controlling who can access them, meeting compliance in scanning and archiving documents, as well as maintaining the integrity of data and the privacy of the documents scanned. Importantly, ZTNS is not just about security but also about enhancing network efficiency, speeding up incident investigation, decreasing outages, and considering the contemporary characteristics of IT landscapes while scaling up the solution and increasing transport capacity, coverage, and availability. This should inspire optimism about the potential of ZTNS in improving organizational operations. The paper evolved a methodology known as the Structured Literature Review (SLR) under the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to analyze the current literature with regard to the use and effects of ZTNS. The present study indicates that ZTNS helps to improve security and performance effects in diverse sectors, such as energy and healthcare. The manner in which ZTNS is infused into organizations means that the concepts have to be embraced as critical, from which the organization gets to set up expertise and constantly assess and alter its security measures necessary regarding the evolving threats. Future research directions involve studying the combined system of Meta-stacking with other innovative technologies, including Artificial intelligence and blockchain and surface threats such as supply chain attacks.


Keywords: Blockchain-based identity verification, Decentralized identity management, Digital identity security


Edition: Volume 12 Issue 4, April 2023,


Pages: 1936 - 1940

Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments

Characters: 0


Type Your Registered Email Address below to Rate the Article


Verification Code will appear in 2 Seconds ... Wait

Top