Need to Know - Information Technology Services - ĢĒŠÄVlog“«Ć½ Little Rock /itservices/tag/need-to-know/ ĢĒŠÄVlog“«Ć½ Little Rock Wed, 18 Dec 2024 14:22:05 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 Zero Trust: Securing everything and everybody everywhere /itservices/2023/04/21/zero-trust-securing-everything-and-everybody-everywhere/ Fri, 21 Apr 2023 20:35:25 +0000 https://ualrprd.wpengine.com/itservices/?p=13888 Have you ever heard the term ā€˜Zero Trust’? Does it mean that you cannot be trusted? Or, you cannot trust services provided by IT Services?

The post Zero Trust: Securing everything and everybody everywhere appeared first on Information Technology Services.

]]>
Have you ever heard the term ā€˜Zero Trust’?

What would you think if you heard that IT Services will implement ā€˜Zero Trust’ at ĢĒŠÄVlog“«Ć½ Little Rock? Does it mean that you cannot be trusted? Or, you cannot trust services provided by IT Services?

In fact, none of the above is true. ā€˜Zero Trust’ is defined as a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, ā€˜least privilege’ access decisions in information systems.

The definition is a bit complicated, isn’t it? Basically, ā€˜Zero Trust’ can be defined as the effort to protect data by adapting cyber systems to our changing world.

The traditional approach to cyber security can be explained by using the medieval castle vs. modern city analogy:

  • Build a castle
  • Construct a wall around it
  • Dig a moat around the wall
  • Build another wall
  • Everything (and everyone) inside of the castle is good
  • Everything (and everyone) outside of the castle is bad

While this model is relatively easier to manage and control, it does not necessarily meet the challenges of the ever-evolving cyber security threats we face today.

In today’s world, we have modern cities without walls and moats to protect the ā€œgoodā€ people from outside malicious activities. Individuals can freely travel wherever and whenever they want.

To carry this analogy further, ĢĒŠÄVlog“«Ć½ Little Rock’s open campus policy, just like modern cities, allows freedom of movement for people to come and go as they please.

However, even in an open campus there are some restrictions and not everyone is permitted to freely enter buildings, offices, or classrooms at will. To gain entrance to these buildings, individuals are required to use ID cards or keys to open doors to which they have been granted access. Otherwise, access will be denied.

The same principle of controlling access to certain areas will soon be implemented in the university’s current cyber environment. This will have the result of increasing the security of ĢĒŠÄVlog“«Ć½ Little Rock data as well as on-campus and remote working users.

ā€˜Need to know’ and ā€˜least privilege’ access will be the fundamental components of the implementation. These changes will help lower cyber security risks and increase protection for campus users from common but increasingly dangerous attacks like ransomware.

If you have questions or want additional information about ā€˜Zero Trust’, please contact IT Services.

The post Zero Trust: Securing everything and everybody everywhere appeared first on Information Technology Services.

]]>