Electronic Theses and Dissertations

Date

2023

Document Type

Thesis

Degree Name

Master of Science

Department

Computer Science

Committee Chair

Dipankar Dasgupta

Committee Member

Mohd Ali

Committee Member

Myounggyu Won

Abstract

As organizations navigate an increasingly complex and dynamic cyber threat landscape, the conventional paradigms of cybersecurity are being reevaluated. This thesis delves into the evolution of zero trust architectures (ZTA), tracing the origins of zero trust and providing a critical comparison with traditional cybersecurity measures. Emphasizing the imperative need for advanced security frameworks, particularly in the face of escalating threats like social engineering and ransomware attacks, this study articulates the fundamental motivations behind the adoption of zero trust principles. The core of the thesis articulates a systematic breakdown of the components and pillars constituting a zero trust architecture, explaining the foundational principles that distinguish it from conventional security models. Special attention is given to the resilience of zero trust architectures against social engineering and ransomware threats, showcasing the paradigm shift required to fortify organizational defenses. Practical implementation aspects are explored through detailed use cases and an exhaustive vendor comparison, offering insights into the diverse applications of zero trust architectures across various industries. This thesis undertakes a comparative analysis of different zero trust vendors as a guide for organizations seeking to tailor their security infrastructure to specific operational needs and threat landscapes. This thesis also provides a comprehensive overview of the strengths and weaknesses inherent in zero trust architectures. By combining theoretical foundations with practical applications, this research contributes to the understanding and effective implementation of zero trust principles in contemporary cybersecurity strategies. The findings aim to inform organizations, policymakers, and cybersecurity professionals about the significance of embracing zero trust architectures as a proactive and adaptive approach to safeguarding digital assets in an ever-evolving threat landscape.

Comments

Data is provided by the student.

Library Comment

Dissertation or thesis originally submitted to ProQuest.

Notes

Open Access

Share

COinS