Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in March 2026 (Volume 29, Issue 3) Submit manuscript

Zero trust architecture in modern computer networks

Breadcrumb

  • Home
  • Zero trust architecture in modern computer networks

Swetha M J 1, *. Asha S N 2 and Raghavendra M 3

1 Department of Computer science Engineering, Government Polytechnic Harihar, Karnataka, India.
2 Department of Computer science Engineering, Government Polytechnic Harapanahalli, Karnataka, India.
3 Department of Computer science Engineering, School of Mines KGF, Karnataka, India.
 
Review Article
World Journal of Advanced Research and Reviews, 2020, 07(03), 347-356
Article DOI: 10.30574/wjarr.2020.7.3.0280
DOI url: https://doi.org/10.30574/wjarr.2020.7.3.0280
 
Received on 03 September  2020; Revised 15 September  2020; accepted on 19 September  2020
 
Zero Trust Architecture (ZTA) has emerged as a transformative security paradigm designed to address the evolving landscape of cyber threats in modern computer networks. Unlike traditional perimeter-based security models, which rely on implicit trust for internal users and devices, ZTA operates on the principle of "never trust, always verify." This approach mandates continuous authentication, strict access controls, and real-time monitoring to mitigate risks associated with insider threats, lateral movement, and external cyberattacks. This paper delves into the fundamental principles that define Zero Trust, including identity verification, least privilege access, micro-segmentation, and continuous monitoring. We explore various implementation strategies for organizations looking to adopt ZTA, highlighting best practices, policy frameworks, and the integration of advanced security technologies such as multi-factor authentication (MFA), endpoint detection and response (EDR), and artificial intelligence-driven threat detection. Despite its advantages, implementing Zero Trust comes with significant challenges, including scalability concerns, integration complexities with legacy systems, and the need for substantial organizational buy-in. We analyze these obstacles and propose mitigation strategies to facilitate smoother adoption and transition to a Zero Trust model. Through case studies and statistical analysis, this study evaluates the effectiveness of ZTA in preventing data breaches, unauthorized access, and other cyber threats. We present real-world examples from industries such as finance, healthcare, and government, where Zero Trust has been successfully deployed to enhance security resilience. Furthermore, quantitative data is used to assess key performance indicators (KPIs) such as threat detection rates, breach prevention metrics, and system performance improvements post-ZTA implementation.
 
Zero Trust Architecture (ZTA); Cybersecurity Continuous; Verification Identity ;Authentication Least; Privilege Access; Real-Time Monitoring; Security Posture
 
https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2020-0280.pdf

Preview Article PDF

Swetha M J, Asha S N and Raghavendra M. Zero trust architecture in modern computer networks. World Journal of Advanced Research and Reviews, 2020, 7(3), 347-356. Article DOI: https://doi.org/10.30574/wjarr.2020.7.3.0280

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution