19
3

Zero Trust Cybersecurity: Procedures and Considerations in Context

Main:20 Pages
Abstract

In response to the increasing complexity and sophistication of cyber threats, particularly those enhanced by advancements in artificial intelligence, traditional security methods are proving insufficient. This paper explores the Zero Trust cybersecurity framework, which operates on the principle of never trust, always verify to mitigate vulnerabilities within organizations. Specifically, it examines the applicability of Zero Trust principles in environments where large volumes of information are exchanged, such as schools and libraries. The discussion highlights the importance of continuous authentication, least privilege access, and breach assumption. The findings underscore avenues for future research that may help preserve the security of these vulnerable organizations.

View on arXiv
@article{lund2025_2505.18872,
  title={ Zero Trust Cybersecurity: Procedures and Considerations in Context },
  author={ Brady D. Lund and Tae Hee Lee and Ziang Wang and Ting Wang and Nishith Reddy Mannuru },
  journal={arXiv preprint arXiv:2505.18872},
  year={ 2025 }
}
Comments on this paper