关于教育信息化中的零信任研究有哪些请推荐5篇引用率较高的英文文献并介绍
- "Zero Trust: Moving Beyond Perimeter-Based Security" by John Kindervag, Forrester Research, Inc. (2010)
This influential paper introduced the concept of zero trust, which holds that organizations should never automatically trust any user, device, or network. Instead, they should verify every request for access to resources, using a range of security controls.
- "Zero Trust Architecture" by Scott Rose, Jericho Forum, and Paul Simmonds, The Global Identity Foundation (2013)
This paper builds on the ideas of the Forrester report, providing a detailed framework for implementing zero trust in enterprise networks. It covers topics such as access control, threat detection, and data protection, and offers practical guidance for organizations looking to adopt zero trust principles.
- "Zero Trust Networks" by Evan Gilman and Doug Barth, O'Reilly Media, Inc. (2017)
This book provides a comprehensive overview of zero trust, including its history, principles, and implementation. It covers topics such as identity and access management, network segmentation, and security analytics, and offers practical advice for securing enterprise networks in a zero trust environment.
- "The Zero Trust Security Model: An Overview" by John Pescatore, SANS Institute (2018)
This paper provides a high-level overview of zero trust, including its key principles and benefits. It also discusses the challenges of implementing zero trust, and offers guidance for organizations looking to adopt this approach.
- "Zero Trust Security: A Paradigm Shift in Cybersecurity" by Wendy Nather, Duo Security (2019)
This paper explores the importance of zero trust in the context of modern cybersecurity threats, including cloud computing and mobile devices. It offers practical guidance for implementing zero trust principles in enterprise networks, and highlights the benefits of this approach in terms of security and compliance
原文地址: https://www.cveoy.top/t/topic/fb8G 著作权归作者所有。请勿转载和采集!