Toward a Zero Trust Architecture Implementation in a University Environment
The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to s...
Gespeichert in:
Veröffentlicht in: | The cyber defense review 2021-10, Vol.6 (4), p.37-48 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 48 |
---|---|
container_issue | 4 |
container_start_page | 37 |
container_title | The cyber defense review |
container_volume | 6 |
creator | Dean, Erik Fonyi, Shane Morrell, Christopher Lanham, Michael Teague, Edward |
description | The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model. |
format | Article |
fullrecord | <record><control><sourceid>jstor</sourceid><recordid>TN_cdi_jstor_primary_48631305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>48631305</jstor_id><sourcerecordid>48631305</sourcerecordid><originalsourceid>FETCH-jstor_primary_486313053</originalsourceid><addsrcrecordid>eNqFissKwjAUBYMoWLSfINwfKKRJ6mMpUlHc1o2bEmrElCYpN2mlf28FcSsMnIEzExIxsREJS_lu-nNG5yT2vqaUshGR0YhcCveSeAcJN4UOCux8gD1WTx1UFTpUcDZto4yyQQbtLGg7tlere4VehwFy22t09hMsyewhG6_i7y7I6pgXh1NS--CwbFEbiUMptmuecprxf_8bmJo6_A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Toward a Zero Trust Architecture Implementation in a University Environment</title><source>JSTOR Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Dean, Erik ; Fonyi, Shane ; Morrell, Christopher ; Lanham, Michael ; Teague, Edward</creator><creatorcontrib>Dean, Erik ; Fonyi, Shane ; Morrell, Christopher ; Lanham, Michael ; Teague, Edward</creatorcontrib><description>The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.</description><identifier>ISSN: 2474-2120</identifier><identifier>EISSN: 2474-2139</identifier><language>eng</language><publisher>Army Cyber Institute</publisher><subject>PROFESSIONAL COMMENTARY</subject><ispartof>The cyber defense review, 2021-10, Vol.6 (4), p.37-48</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/48631305$$EPDF$$P50$$Gjstor$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/48631305$$EHTML$$P50$$Gjstor$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,25332,54499,54505</link.rule.ids></links><search><creatorcontrib>Dean, Erik</creatorcontrib><creatorcontrib>Fonyi, Shane</creatorcontrib><creatorcontrib>Morrell, Christopher</creatorcontrib><creatorcontrib>Lanham, Michael</creatorcontrib><creatorcontrib>Teague, Edward</creatorcontrib><title>Toward a Zero Trust Architecture Implementation in a University Environment</title><title>The cyber defense review</title><description>The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.</description><subject>PROFESSIONAL COMMENTARY</subject><issn>2474-2120</issn><issn>2474-2139</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>JFNAL</sourceid><recordid>eNqFissKwjAUBYMoWLSfINwfKKRJ6mMpUlHc1o2bEmrElCYpN2mlf28FcSsMnIEzExIxsREJS_lu-nNG5yT2vqaUshGR0YhcCveSeAcJN4UOCux8gD1WTx1UFTpUcDZto4yyQQbtLGg7tlere4VehwFy22t09hMsyewhG6_i7y7I6pgXh1NS--CwbFEbiUMptmuecprxf_8bmJo6_A</recordid><startdate>20211001</startdate><enddate>20211001</enddate><creator>Dean, Erik</creator><creator>Fonyi, Shane</creator><creator>Morrell, Christopher</creator><creator>Lanham, Michael</creator><creator>Teague, Edward</creator><general>Army Cyber Institute</general><scope>JFNAL</scope></search><sort><creationdate>20211001</creationdate><title>Toward a Zero Trust Architecture Implementation in a University Environment</title><author>Dean, Erik ; Fonyi, Shane ; Morrell, Christopher ; Lanham, Michael ; Teague, Edward</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-jstor_primary_486313053</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>PROFESSIONAL COMMENTARY</topic><toplevel>online_resources</toplevel><creatorcontrib>Dean, Erik</creatorcontrib><creatorcontrib>Fonyi, Shane</creatorcontrib><creatorcontrib>Morrell, Christopher</creatorcontrib><creatorcontrib>Lanham, Michael</creatorcontrib><creatorcontrib>Teague, Edward</creatorcontrib><collection>JSTOR Open Access Journals</collection><jtitle>The cyber defense review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dean, Erik</au><au>Fonyi, Shane</au><au>Morrell, Christopher</au><au>Lanham, Michael</au><au>Teague, Edward</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Toward a Zero Trust Architecture Implementation in a University Environment</atitle><jtitle>The cyber defense review</jtitle><date>2021-10-01</date><risdate>2021</risdate><volume>6</volume><issue>4</issue><spage>37</spage><epage>48</epage><pages>37-48</pages><issn>2474-2120</issn><eissn>2474-2139</eissn><abstract>The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.</abstract><pub>Army Cyber Institute</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2474-2120 |
ispartof | The cyber defense review, 2021-10, Vol.6 (4), p.37-48 |
issn | 2474-2120 2474-2139 |
language | eng |
recordid | cdi_jstor_primary_48631305 |
source | JSTOR Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | PROFESSIONAL COMMENTARY |
title | Toward a Zero Trust Architecture Implementation in a University Environment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T19%3A35%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Toward%20a%20Zero%20Trust%20Architecture%20Implementation%20in%20a%20University%20Environment&rft.jtitle=The%20cyber%20defense%20review&rft.au=Dean,%20Erik&rft.date=2021-10-01&rft.volume=6&rft.issue=4&rft.spage=37&rft.epage=48&rft.pages=37-48&rft.issn=2474-2120&rft.eissn=2474-2139&rft_id=info:doi/&rft_dat=%3Cjstor%3E48631305%3C/jstor%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_jstor_id=48631305&rfr_iscdi=true |