A Survey on Latest Trends and Technologies of Computer Systems Network

Authors

  • Shehreyar Nawaz Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan
  • Hamayun Khan Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan
  • Wajiha Salman Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan
  • Umer Shahid Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan
  • Momin Latif Khokhar Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan
  • M Zaid Iqbal Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan
  • Abdullah Hamid Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan

Abstract

Zero trust (ZT) represents a set of evolving cybersecurity principles that shift defense strategies from fixed, network-centered perimeters to a focus on users, assets, and resources. A zero trust architecture (ZTA) applies these principles to design industrial and enterprise infrastructure and workflows. Zero trust operates on the idea that no implicit trust is granted to any asset or user account based solely on physical or network location (e.g., a local network versus the internet) or asset ownership (whether enterprise-owned or personal). Both authentication and authorization (of the user and device) are separate steps that must be completed before access to an enterprise resource is allowed. Zero trust is a response to modern network trends such as remote work, bring your own device (BYOD) practices, and the use of cloud-based resources outside an organization’s direct network boundary. Rather than focusing on network segments, zero trust prioritizes securing resources—like assets, services, workflows, and user accounts—because network location alone is no longer considered a main factor in assessing the security posture of a resource. This document provides an outline of zero trust architecture (ZTA), along with general deployment models and use cases where zero trust can enhance an organization’s overall IT security posture. 

Keywords: Architecture; Cybersecurity; Enterprise; Network Security; Zero Trust.

Downloads

Published

2024-11-14

How to Cite

Shehreyar Nawaz, Hamayun Khan, Wajiha Salman, Umer Shahid, Momin Latif Khokhar, M Zaid Iqbal, & Abdullah Hamid. (2024). A Survey on Latest Trends and Technologies of Computer Systems Network. Spectrum of Engineering Sciences, 2(4), 85–114. Retrieved from https://sesjournal.com/index.php/1/article/view/67