The Zero Trust Security Model and Cybersecurity in the Industries

Authors

  • Suchaye Mylavarapu Mountain House High School

DOI:

https://doi.org/10.47611/jsr.v13i1.2370

Keywords:

Zero-Trust, Cybersecurity, Industry, Healthcare, Film, Software, Virus, Malaware, Cyberattack

Abstract

This paper aims to highlight the critical importance of cybersecurity in safeguarding against the ever-evolving and sophisticated nature of cyber threats that have become the norm nowadays. It is specifically pointed out that healthcare organizations must prioritize data management and robust security measures to combat ransomware and data breaches. At the same time, the software industry faces cybersecurity challenges due to the vulnerability of interconnected systems. Organizations must take proactive steps to identify potential threats and vulnerabilities and be prepared to handle any security incidents. Additionally, companies should ensure that their employees are educated on the necessary security measures to protect their data and systems. Consequently, security and development practices, software delivery, threat management, and incident management are vital for defense against cyberattacks. To protect digital assets and data, the analysis delves into firewalls, encryption, access controls, and other cybersecurity measures. Companies should also provide training to their employees on best security practices and regularly update their systems with the latest security patches. Additionally, they should develop a security policy to ensure safe access and use of the company's digital assets. Moreover, the zero-trust concept has been introduced as an advanced cybersecurity framework that challenges traditional security frameworks. Overall, this paper hopes to emphasize the importance of cybersecurity in various industries, specifically in the. healthcare, software, and the film industries are very important in safeguarding individuals, organizations, systems, assets, and information from threats.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References or Bibliography

Fox, J. (2023). Top cybersecurity statistics to know for 2023. Cobalt.

https://www.cobalt.io/blog/cybersecurity-statistics-2023#:~:text=How%20many%20cyberattacks%20per%20day,1%20cyberattack%20every%2039%20seconds.

Corporation, P. (2021). Global Top Health Industry Issues 2021. PwC.

https://www.pwc.com/gx/en/industries/healthcare/top-health-industry-issues.html

Morse, S. (2019). Healthcare’s number one financial issue is cyber security. Healthcare

Finance News. https://www.healthcarefinancenews.com/news/healthcares-number-one-financial-issue-cybersecurity

Khan, S. (2016). Flow chart for the security system | download scientific diagram.

ResearchGate. https://www.researchgate.net/figure/Flow-chart-for-the-security-system_fig4_318787447

Kaspersky, E. (2023). The human factor in IT security: How employees are making businesses

vulnerable from within. Daily English Global blogkasperskycom. https://www.kaspersky.com/blog/the-human-factor-in-it-security/

Flynn, J. (2023). 25 alarming data breach statistics [2023]: Frequency of exposed

records. Zippia. https://www.zippia.com/advice/data-breach-statistics/

McKeon, J. (2022). HC3 outlines the history of healthcare cybersecurity from the 1980s

to now. HealthITSecurity. https://healthitsecurity.com/news/hc3-outlines-history-of-healthcare-cybersecurity-from-1980s-to-

now#:~:text=The%20first%2Dever%20ransomware%20attack,AIDS%20conference%20in%20Stockholm%2C%20Sweden.

Rinaldi, A. (2023). How much should your SMB budget for cybersecurity?

business.com. https://www.business.com/articles/smb-budget-for-cybersecurity/

Theriault, C. (2022). Takeaways from 2017’s Cyber Hacks, data leaks and breaches.

TBG Security. https://tbgsecurity.com/takeaways-from-2017s-worst-cyber-hacks-data-leaks-and-breaches/

Maayan, G. D. (2023). 4 cybersecurity tools to know about: NGAV, SAST, EDR,

NGFW. Back4App Blog. https://blog.back4app.com/cybersecurity-tools/

Rana, K. (2023). What is Zero Trust security? principles of the zero trust model. ‘

CrowdStrike. https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/

Mussington, D. (2023). 4 things you can do to keep yourself cyber safe: CISA.

Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/news-events/news/4-things-you-can-do-keep-yourself-cyber-safe

PUBLICATIONS, G. (2020). Zero trust security market size and share [2023 report]. Zero

Trust Security Market Size And Share [2023 Report].

https://www.grandviewresearch.com/industry-analysis/zero-trust-security-market-report

Tucker, K. K. (2021). Pros and cons of the Zero Trust Model. Infused Innovations.

https://www.infusedinnovations.com/blog/secure-intelligent-workplace/pros-and-cons-of-the-zero-trust-model

Published

02-29-2024

How to Cite

Mylavarapu, S. (2024). The Zero Trust Security Model and Cybersecurity in the Industries. Journal of Student Research, 13(1). https://doi.org/10.47611/jsr.v13i1.2370

Issue

Section

Research Articles