Hyppää sisältöön
    • Suomeksi
    • In English
Trepo
  • Suomeksi
  • In English
  • Kirjaudu
Näytä viite 
  •   Etusivu
  • Trepo
  • Opinnäytteet - ylempi korkeakoulututkinto
  • Näytä viite
  •   Etusivu
  • Trepo
  • Opinnäytteet - ylempi korkeakoulututkinto
  • Näytä viite
JavaScript is disabled for your browser. Some features of this site may not work without it.

Adapting Zero Trust for Work Environments: A Cultural Shift Towards Greater Cybersecurity

Mirjahanshahi, Hamed (2023)

 
Avaa tiedosto
MirjahanshahiHamed.pdf (3.044Mt)
Lataukset: 



Mirjahanshahi, Hamed
2023

Master's Programme in Information Technology
Informaatioteknologian ja viestinnän tiedekunta - Faculty of Information Technology and Communication Sciences
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Hyväksymispäivämäärä
2023-05-22
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tuni-202304244273
Tiivistelmä
In recent years, advancements in technology and a shift in the working culture have led to an increase in remote workers and a trend among enterprises to transfer their services to the cloud. With traditional security models, it would be more difficult to secure these complex infrastructures, despite the fact that this new norm provides numerous benefits for organisations. In addition, the use of sophisticated attack methods and artificial intelligence by malicious actors makes it more difficult to defend against adversaries. Zero trust is a new security architecture that could help organisations improve their security by introducing new methods of authenticating subjects who request information, regardless of their location within or outside the company's premises.
This study will introduce the tenets and components of zero trust architecture and examine how to implement a zero trust security model in a case study organisation. The study will evaluate the organisation's current infrastructure and make recommendations based on zero trust strategies provided by authorities. In addition, the study will investigate the possible barriers that may arise during the implementation of the zero trust security model.
This study will demonstrate that the case organisation has several vulnerabilities in different domains that need to be addressed using zero trust strategies. In addition, the study will show that a successful implementation of zero trust architecture in the case organisation necessitates additional employee training and the resolution of hidden problems, such as security fatigue among the employees.
Kokoelmat
  • Opinnäytteet - ylempi korkeakoulututkinto [41996]
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste
 

 

Selaa kokoelmaa

TekijätNimekkeetTiedekunta (2019 -)Tiedekunta (- 2018)Tutkinto-ohjelmat ja opintosuunnatAvainsanatJulkaisuajatKokoelmat

Omat tiedot

Kirjaudu sisäänRekisteröidy
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste