Department

Computer Science and Cybersecurity

Document Type

Poster

Abstract

Over the past decade, Zero Trust Architecture (ZTA) has emerged as a leading cybersecurity framework in modern network defense. As a direct response to increasingly sophisticated cyber threats, ZTA aims to eliminate implicit trust by enforcing continuous verification of end users, devices, and networks through strategies such as multifactor authentication (MFA) and least privilege access, reflecting the principle of “never trust, always verify”. However, existing research and strategies on ZTA primarily focus on software and network-layer policies, often overlooking the significance of zero trust hardware capabilities. This poster analyzes peer-reviewed research to examine how hardware visibility, identity management, and access control bolster the defense capabilities and integrity of Zero Trust Architecture. Findings indicate that while ZTA directly and effectively addresses modern security challenges, it leaves room for hardware-level threats, including spoofed or rogue devices and unmanaged endpoints (BYOD, Shadow IT)

Publication Date

Spring 4-9-2026

Comments

Spring 2026: Student Research Conference

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.