Abstract:As computing systems and facilities evolved, and as they expanded into industry, it became necessary to integrate specific computing devices and information systems built on them into single information-computer environments. At the same time, the developers of information computation system (ICS) faced many problems.
“…Internal services are accessible once you have access to the company's internal network, which is regarded as a critical part of security controls. This was a valid design principle in the past, when services were largely housed in internal locations or datacenters [4] [5]. The majority of businesses now use a growing number of cloud services, making it hard to safeguard access end-to-end using simply network-based access control methods [6].…”
Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting within or outside the networks. As opposed to perimeter-based architecture, which makes the assumption that all internal network parties are trusted and all external network parties are untrusted. In enterprise network the internal network parties is automatically seen as trusted entities granting them access to network resources. The insider threat actor has been successful in exploiting their access. So that, enterprise networks become more exposed to inside and outside threads. As a result, we need to add the zero-trust principle to the enterprise network to protect it from the inside. In this paper, the ZT model, is assumed inside the militarized zone. There may be a threat to the sensitive data. Any internal company network users cannot manipulation on his computer without permission from the administrator this is done by the group policies that have been implemented in ZT. This model has been shown to be quite effective in protecting the sensitive data against unauthorized access and also the manipulation by the insider user. Following that, an attack originating from inside of the network was launched against the enterprise and zero trust network. In the enterprise network, the network was effectively attacked, and the attack’s validity was also increased to fully penetrate the enterprise. The attack did not succeed in the zero-trust network because the attacker cannot pass the User Account Control (UAC) to gain the NT authority.
“…Internal services are accessible once you have access to the company's internal network, which is regarded as a critical part of security controls. This was a valid design principle in the past, when services were largely housed in internal locations or datacenters [4] [5]. The majority of businesses now use a growing number of cloud services, making it hard to safeguard access end-to-end using simply network-based access control methods [6].…”
Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting within or outside the networks. As opposed to perimeter-based architecture, which makes the assumption that all internal network parties are trusted and all external network parties are untrusted. In enterprise network the internal network parties is automatically seen as trusted entities granting them access to network resources. The insider threat actor has been successful in exploiting their access. So that, enterprise networks become more exposed to inside and outside threads. As a result, we need to add the zero-trust principle to the enterprise network to protect it from the inside. In this paper, the ZT model, is assumed inside the militarized zone. There may be a threat to the sensitive data. Any internal company network users cannot manipulation on his computer without permission from the administrator this is done by the group policies that have been implemented in ZT. This model has been shown to be quite effective in protecting the sensitive data against unauthorized access and also the manipulation by the insider user. Following that, an attack originating from inside of the network was launched against the enterprise and zero trust network. In the enterprise network, the network was effectively attacked, and the attack’s validity was also increased to fully penetrate the enterprise. The attack did not succeed in the zero-trust network because the attacker cannot pass the User Account Control (UAC) to gain the NT authority.
Improving the efficiency of business process management is a complex and extremely important task, the solution of which is unthinkable without the use of advanced information systems and management decision technologies. The paper presents the results of research on data mining technologies using On-Line Transaction Processing and On-Line Analytical Processing methods. The study proposed a generalized hierarchical representation of data processing methodologies with integration of heterogeneous sources to management decision making. Data mining base methods are systematized: classification, regression, prediction, clustering, interdependence, visualization, deviation (anomaly) detection, estimation, and feature selection (engineering). We described the possibilities of using data mining in the field of information technology, marketing, trade, financial and insurance activities.
The study examined data mining technologies in sport products business using the Microsoft® Excel® application and a special add-in of the Microsoft® SQL Server® relational database management system, capable of identifying implicit (hidden) factors that affect or, equally important, do not affect sales volumes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.