Yongjun Ren1, Zhiming Wang1, Pradip Kumar Sharma2, Fayez Alqahtani3, Amr Tolba4, Jin Wang5,*
CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1593-1613, 2025, DOI:10.32604/cmc.2025.059170
- 17 February 2025
Abstract In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defensive techniques, Zero Trust Networks (ZTN) have emerged as a widely recognized technology. Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of “never trust, always verify.” Initially proposed by John Cortez in 2010 and subsequently promoted by Google, the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments. This paper systematically compares the current mainstream cybersecurity models, thoroughly explores More >