0% found this document useful (0 votes)
17 views

Zero (1) 1

Uploaded by

Reem Essam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Zero (1) 1

Uploaded by

Reem Essam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Electronics and

Communication Dept.
Graduation Project 2023/2024

A. Project Information

Project Title Zero trust model

Project Track Network security


Department Electronics and communication department
Supervisor Name
Industrial partner
--------
(if any)

B. Project Members Information

# Name Mobile number Email


1 Reem Essam Dosoky 01157822205 [email protected]
2 Sara yehia marzouk 01118202255
3 Rana medhat mohamed 01113329079
4 Ghada khaled

5 Rodina ashraf

* Please note that the first name will be referred to as the main contact person
for the whole group.
Electronics and
Communication Dept.
Graduation Project 2023/2024

1. OVERVIEW

(i) Problem definition, (ii) Approach and tools/techniques, and (iii) Overview of system modules.
Electronics and
Communication Dept.
Graduation Project 2023/2024
Electronics and
Communication Dept.
Graduation Project 2023/2024

Use block diagrams and figures to describe your ideas. Be as clear as possible about the ideas in order to show the
reviewer the value of your idea.

(i) Problem Definition:


Traditional security models rely on signature-based detection methods,
which are ineffective against new and unknown threats. It has single
point of failure due to centralized control points, such as authentication
servers or central databases. Centralized systems can become
bottlenecks, leading to performance issues and increased latency. Many
traditional security models rely on weak authentication mechanisms,
such as passwords, which are susceptible to attacks like phishing, brute
force, and credential stuffing.
(ii) Approach and tools/techniques:
The Zero Trust Model, which assumes that threats can come from both
inside and outside the network, offers a robust approach to modern
security architecture. The Zero Trust Model is a security framework that
operates on the principle of "never trust, always verify." Unlike
traditional security models that assume trust within the network
perimeter, Zero Trust requires verification of every user, device, and
connection before granting access to resources. This approach
minimizes the risk of unauthorized access and lateral movement within
the network, significantly enhancing security. Implementing zero trust
hinges on network access control (NAC) systems and the
segmentation of your network according to the areas you most need to
protect.
Key principles of zero trust model:
1. Continuous verification: every request either it is from inside the
network or outside it must be verified.
2. Verify explicitly: all users, devices, applications and resources
want to access the network must be verified before granted
access.
3. Least privilege access: every user and device that has been
authenticated and enters the network will have the minimum level
of access.
4. Segmentation of the network: to divide the network into smaller
isolated segments to limit the freely movement in the network
Electronics and
Communication Dept.
Graduation Project 2023/2024

5. Always assume breach: the model operates on the assumption


can and will occur to encourage the continuous monitoring and
detection.
Electronics and
Communication Dept.
Graduation Project 2023/2024

(iii) Overview of system modules:


To Implement a zero trust model for a network architecture we need to
follow a defined procedure :
1. We need to identify and classify all the network assests (devices,
applications, and data flows) we need to classify these assets
based on their sensitivity and criticality to the organization.
2. We will use strong identity and access managment (IAM) to
manage user and device identities.
3. Segmentation of network to small segments.
4. Use multifactor authentication (MFA).
5. Secure endpoints and applications.
6. Apply different security models and tools to achieve defense in
depth.
7. Create a zero-trust policy This involves asking who, what, when,
where, why, and how for every user, device, and network that
wants to gain access.

2. IMPACT

Why do you consider this project? What is its impact on community/market/end user/…?
Electronics and
Communication Dept.
Graduation Project 2023/2024

1-Community Impact:

2-Market Impact:
Electronics and
Communication Dept.
Graduation Project 2023/2024

3-End User Impact:


Electronics and
Communication Dept.
Graduation Project 2023/2024

3. NOVELTY AND FEATURES

Explain (i) Novelty (ii) Features, and (iii) Related products, if any.

Originality doesn’t always mean coming up with completely new ideas. Building on previously developed
project and adding new modules that increase their value is considered novelty. Doing a previous idea
with lower cost or a better performance is considered novelty.

ii) features :

iii) Related Products:

4. DELIVERABLES

What is the project final outcomes (HW device, SW package, simulation ...)?

The Final deliverables of this project will be:

1-

5. BUSINESS PLAN AND MARKET ANALYSIS

Market research is essential to be included, whether national or multinational, showing the level of competition,
business opportunities, and the niche added value. Do you foresee any potential market for your project? Do you
expect any demand on the final product?
Electronics and
Communication Dept.
Graduation Project 2023/2024

6. ROLE OF THE INDUSTRIAL PARTNER (IF ANY)

What is the type of support to be provided by the industrial partner (technical, financial, access…)?

7. GANTT CHART

List your project’s phases and tasks down the side of your chart.

Tasks/Activities

8. List of needed HW/SW Components


Electronics and
Communication Dept.
Graduation Project 2023/2024

Item Type (Hardware/ Specifications (brief Unit Cost No. of Total Cost
Software/ Other) description) Items of Items
1

REFERENCES
Cite to the references those related to your idea
Electronics and
Communication Dept.
Graduation Project 2023/2024

You might also like