Week 14 Research Assignment

docx

School

Schoolcraft College *

*We aren’t endorsed by this school

Course

262

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

1

Uploaded by DrRamMaster341

Report
Briefly describe the main components of the Zero Trust Model/Zero Trust Architecture: How does this model/architecture relate to Perimeter Security? Do traditional security technologies like Firewalls or VPNs still play a role in this model/architecture? Why or why not? Filtering in traditional perimeters is based on the IP addresses or ports of network traffic – what is filtering based on in Zero Trust Model/Zero Trust Architecture? How does the principal of Least Privilege guide the application of the Zero Trust Model/Zero Trust Architecture? Resources: https://resources.infosecinstitute.com/zero-trust-security-what-is-it/ https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture https://www.oreilly.com/library/view/zero-trust-networks/9781491962183/ch01.html https://www.forbes.com/sites/insights-vmwaresecurity/2019/06/12/zero-trust-the-modern-approach- to-cybersecurity/#7b4b24f24e9d
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help