Toward a Zero Trust Architecture Implementation in a University Environment

The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The cyber defense review 2021-10, Vol.6 (4), p.37-48
Hauptverfasser: Dean, Erik, Fonyi, Shane, Morrell, Christopher, Lanham, Michael, Teague, Edward
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 48
container_issue 4
container_start_page 37
container_title The cyber defense review
container_volume 6
creator Dean, Erik
Fonyi, Shane
Morrell, Christopher
Lanham, Michael
Teague, Edward
description The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.
format Article
fullrecord <record><control><sourceid>jstor</sourceid><recordid>TN_cdi_jstor_primary_48631305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>48631305</jstor_id><sourcerecordid>48631305</sourcerecordid><originalsourceid>FETCH-jstor_primary_486313053</originalsourceid><addsrcrecordid>eNqFissKwjAUBYMoWLSfINwfKKRJ6mMpUlHc1o2bEmrElCYpN2mlf28FcSsMnIEzExIxsREJS_lu-nNG5yT2vqaUshGR0YhcCveSeAcJN4UOCux8gD1WTx1UFTpUcDZto4yyQQbtLGg7tlere4VehwFy22t09hMsyewhG6_i7y7I6pgXh1NS--CwbFEbiUMptmuecprxf_8bmJo6_A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Toward a Zero Trust Architecture Implementation in a University Environment</title><source>JSTOR Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Dean, Erik ; Fonyi, Shane ; Morrell, Christopher ; Lanham, Michael ; Teague, Edward</creator><creatorcontrib>Dean, Erik ; Fonyi, Shane ; Morrell, Christopher ; Lanham, Michael ; Teague, Edward</creatorcontrib><description>The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.</description><identifier>ISSN: 2474-2120</identifier><identifier>EISSN: 2474-2139</identifier><language>eng</language><publisher>Army Cyber Institute</publisher><subject>PROFESSIONAL COMMENTARY</subject><ispartof>The cyber defense review, 2021-10, Vol.6 (4), p.37-48</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/48631305$$EPDF$$P50$$Gjstor$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/48631305$$EHTML$$P50$$Gjstor$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,25332,54499,54505</link.rule.ids></links><search><creatorcontrib>Dean, Erik</creatorcontrib><creatorcontrib>Fonyi, Shane</creatorcontrib><creatorcontrib>Morrell, Christopher</creatorcontrib><creatorcontrib>Lanham, Michael</creatorcontrib><creatorcontrib>Teague, Edward</creatorcontrib><title>Toward a Zero Trust Architecture Implementation in a University Environment</title><title>The cyber defense review</title><description>The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.</description><subject>PROFESSIONAL COMMENTARY</subject><issn>2474-2120</issn><issn>2474-2139</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>JFNAL</sourceid><recordid>eNqFissKwjAUBYMoWLSfINwfKKRJ6mMpUlHc1o2bEmrElCYpN2mlf28FcSsMnIEzExIxsREJS_lu-nNG5yT2vqaUshGR0YhcCveSeAcJN4UOCux8gD1WTx1UFTpUcDZto4yyQQbtLGg7tlere4VehwFy22t09hMsyewhG6_i7y7I6pgXh1NS--CwbFEbiUMptmuecprxf_8bmJo6_A</recordid><startdate>20211001</startdate><enddate>20211001</enddate><creator>Dean, Erik</creator><creator>Fonyi, Shane</creator><creator>Morrell, Christopher</creator><creator>Lanham, Michael</creator><creator>Teague, Edward</creator><general>Army Cyber Institute</general><scope>JFNAL</scope></search><sort><creationdate>20211001</creationdate><title>Toward a Zero Trust Architecture Implementation in a University Environment</title><author>Dean, Erik ; Fonyi, Shane ; Morrell, Christopher ; Lanham, Michael ; Teague, Edward</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-jstor_primary_486313053</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>PROFESSIONAL COMMENTARY</topic><toplevel>online_resources</toplevel><creatorcontrib>Dean, Erik</creatorcontrib><creatorcontrib>Fonyi, Shane</creatorcontrib><creatorcontrib>Morrell, Christopher</creatorcontrib><creatorcontrib>Lanham, Michael</creatorcontrib><creatorcontrib>Teague, Edward</creatorcontrib><collection>JSTOR Open Access Journals</collection><jtitle>The cyber defense review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dean, Erik</au><au>Fonyi, Shane</au><au>Morrell, Christopher</au><au>Lanham, Michael</au><au>Teague, Edward</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Toward a Zero Trust Architecture Implementation in a University Environment</atitle><jtitle>The cyber defense review</jtitle><date>2021-10-01</date><risdate>2021</risdate><volume>6</volume><issue>4</issue><spage>37</spage><epage>48</epage><pages>37-48</pages><issn>2474-2120</issn><eissn>2474-2139</eissn><abstract>The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.</abstract><pub>Army Cyber Institute</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2474-2120
ispartof The cyber defense review, 2021-10, Vol.6 (4), p.37-48
issn 2474-2120
2474-2139
language eng
recordid cdi_jstor_primary_48631305
source JSTOR Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects PROFESSIONAL COMMENTARY
title Toward a Zero Trust Architecture Implementation in a University Environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T19%3A35%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Toward%20a%20Zero%20Trust%20Architecture%20Implementation%20in%20a%20University%20Environment&rft.jtitle=The%20cyber%20defense%20review&rft.au=Dean,%20Erik&rft.date=2021-10-01&rft.volume=6&rft.issue=4&rft.spage=37&rft.epage=48&rft.pages=37-48&rft.issn=2474-2120&rft.eissn=2474-2139&rft_id=info:doi/&rft_dat=%3Cjstor%3E48631305%3C/jstor%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_jstor_id=48631305&rfr_iscdi=true