CFP last date
20 October 2025
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 20 October 2025

Submit your paper
Know more
Random Articles
Reseach Article

Zero Trust Architecture Implementation in Enterprise Networks: Evaluating Effectiveness Against Cyber Threats

by Stephen Kofi Dotse, Samuel Yao Sebuabe, Augustus Obeng, Silas Asani Abudu, Edna Awisie Pappoe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 45
Year of Publication: 2025
Authors: Stephen Kofi Dotse, Samuel Yao Sebuabe, Augustus Obeng, Silas Asani Abudu, Edna Awisie Pappoe
10.5120/ijca2025925740

Stephen Kofi Dotse, Samuel Yao Sebuabe, Augustus Obeng, Silas Asani Abudu, Edna Awisie Pappoe . Zero Trust Architecture Implementation in Enterprise Networks: Evaluating Effectiveness Against Cyber Threats. International Journal of Computer Applications. 187, 45 ( Sep 2025), 21-39. DOI=10.5120/ijca2025925740

@article{ 10.5120/ijca2025925740,
author = { Stephen Kofi Dotse, Samuel Yao Sebuabe, Augustus Obeng, Silas Asani Abudu, Edna Awisie Pappoe },
title = { Zero Trust Architecture Implementation in Enterprise Networks: Evaluating Effectiveness Against Cyber Threats },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2025 },
volume = { 187 },
number = { 45 },
month = { Sep },
year = { 2025 },
issn = { 0975-8887 },
pages = { 21-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number45/zero-trust-architecture-implementation-in-enterprise-networks-evaluating-effectiveness-against-cyber-threats/ },
doi = { 10.5120/ijca2025925740 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-09-24T02:05:40+05:30
%A Stephen Kofi Dotse
%A Samuel Yao Sebuabe
%A Augustus Obeng
%A Silas Asani Abudu
%A Edna Awisie Pappoe
%T Zero Trust Architecture Implementation in Enterprise Networks: Evaluating Effectiveness Against Cyber Threats
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 45
%P 21-39
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Traditional perimeter-based cybersecurity models are inadequate for modern digital environments. This study provides the first large-scale empirical analysis of Zero Trust Architecture (ZTA) effectiveness across enterprise environments, examining adoption patterns from 2017 to 2024 and comparing ZTA with traditional security architectures. The research employed a four-phase analytical framework using validated synthetic data modeling. Three datasets comprising 300 enterprise instances across finance, technology, healthcare, and manufacturing sectors were analyzed using standardized metrics including Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), breach incidence rates, and financial impact measures. ZTA implementations demonstrated substantial improvements: 40% reduction in threat detection time, 39% improvement in incident response efficiency, and 63% decrease in successful breaches. Comparative analysis showed ZTA achieved 75% fewer annual incidents, 70% reduction in downtime, and 78% decrease in financial losses compared to traditional approaches. All improvements showed statistical significance (p < 0.001) with large effect sizes (Cohen's d > 2.0). Critical success factors included executive sponsorship (correlation: 0.78), dedicated implementation teams (0.71), and phased deployment approaches (0.68). Financial services showed fastest adoption (18 months) while healthcare demonstrated more stable implementations (24 months, 94% requiring no modifications). This research addresses critical gaps in cybersecurity literature by providing quantitative evidence of ZTA effectiveness. The findings establish Zero Trust as an effective enterprise cybersecurity approach that addresses contemporary threats while delivering substantial operational and financial benefits.

References
  1. B. Mondal, S. S. N. C. Dukkipati, M. T. Rahman, and M. T. Y. Taimun, “Using Machine Learning for Early Detection of Ransomware Threat Attacks in Enterprise Networks,” Saudi Journal of Engineering and Technology, vol. 10, no. 04, pp. 159–168, Apr. 2025, doi: 10.36348/sjet.2025.v10i04.006.
  2. O. J. Tiwo, T. O. Adesokan-Imran, D. C. Babarinde, I. A. Salami, O. S. Onyenaucheya, and O. O. Olaniyi, “Improving Patient Data Privacy and Authentication Protocols against AI-Powered Phishing Attacks in Telemedicine,” Asian Journal of Research in Computer Science, vol. 18, no. 4, pp. 93–114, Mar. 2025, doi: 10.9734/ajrcos/2025/v18i4610.
  3. Y. Kim et al., “Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study,” KSII Transactions on Internet and Information Systems, vol. 18, no. 9, pp. 2665–2691, 2024, doi: 10.3837/tiis.2024.09.011.
  4. M. L. Gambo and A. Almulhem, “Zero Trust Architecture: A Systematic Literature Review,” Mar. 2025, [Online]. Available: http://arxiv.org/abs/2503.11659
  5. H. Bhoite, “Zero-Trust Architecture in Streaming Dataflows,” Jul. 20, 2025. doi: 10.36227/techrxiv.175303721.12297807/v1.
  6. U. Mattsson, “Zero Trust Architecture,” Controlling Privacy and the Use of Data Assets, pp. 127–134, 2022, doi: 10.1201/9781003189664-11.
  7. E. Sophia, “AI-Driven Behavioral Biometrics For Continuous Authentication in Zero Trust.”
  8. A. M. Abdelmagid and R. Diaz, “Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems,” Risk Analysis, 2025, doi: 10.1111/risa.70026.
  9. K. M. Adamson and A. Qureshi, “Zero Trust 2.0: Advances, Challenges, and Future Directions in ZTA,” May 07, 2025. doi: 10.21203/rs.3.rs-6602547/v1.
  10. I. Symeonidis and V. Loscri, “Emerging Cybersecurity Paradigms in Wireless Networks.” [Online]. Available: https://cost.eu/
  11. L. Qudus, “Advancing Cybersecurity: Strategies for Mitigating Threats in Evolving Digital and IoT Ecosystems,” International Research Journal of Modernization in Engineering Technology and Science, Apr. 2025, doi: 10.56726/irjmets66504.
  12. O. I. Uzougbo and A. O. Augustine, “A Review of Authentication and Authorization Mechanisms in Zero Trust Architecture: Evolution and Efficiency Author(s) Details,” TSJPAS) A Subsidiary of Tech-Sphere Multidisciplinary International Journal (TSMIJ), vol. 2, no. 1, 2025, doi: 10.5281/zenodo.15149866.
  13. [13] E. G. Ogendi, “Leveraging Advanced Cybersecurity Analytics to Reinforce Zero-Trust Architectures within Adaptive Security Frameworks,” 2025. [Online]. Available: www.ijrpr.com
  14. O. A. Okunlola, “Design and Implementation of Autonomous Zero Trust Orchestration for Real-Time Risk Adaptive Access Control in Global Multi-Cloud Logistics Platforms,” International Journal of Science, Architecture, Technology and Environment, pp. 790–809, Jun. 2025, doi: 10.63680/ijsate0525211.67.
  15. P. Ramakrishnan and T. Singh, “Advanced Cybersecurity Practices for India’s IT Sector: Developing Resilient Frameworks to Combat Emerging Threats,” 2025.
  16. W. L. R. Filho, “The Role of Zero Trust Architecture in Modern Cybersecurity: Integration with IAM and Emerging Technologies,” Brazilian Journal of Development, vol. 11, no. 1, p. e76836, Jan. 2025, doi: 10.34117/bjdv11n1-060.
  17. O. Ganiyu, “Rethinking trust in the digital age: An investigation of zero trust architecture’s social consequences on organizational culture, collaboration, and knowledge sharing.”
  18. A. Dalal, “Designing Zero Trust Security Models to Protect Distributed Networks and Minimize Cyber Risks.”
  19. Rajat Kumar Gupta, “Beyond the perimeter: Zero-trust architecture as a framework for cloud API security,” World Journal of Advanced Research and Reviews, vol. 26, no. 1, pp. 3389–3398, Apr. 2025, doi: 10.30574/wjarr.2025.26.1.1446.
  20. Z. Mahar, S. Oladele, A. Dastigar, and A. Litty, “Evaluating the Impact of Zero-Trust Architectures on Data Accessibility and Security Performance in Enterprise Cloud BI Deployments,” 2025.
  21. C. S. Ravi, M. Shaik, V. Saini, S. Chitta, V. Sri, and M. Bonam, “Nanotechnology Perceptions ISSN 1660-6795 www,” 2025. [Online]. Available: www.nano-ntp.com
  22. N. Kumar, “Real-Time Detection and Prevention of Cyber Threats Using Zero Trust Architectures and AI-Powered Intrusion Detection Systems,” QIT Press. [Online]. Available: https://qitpress.com/journals/QITP-IJAIFullText:https://qitpress.com/articles/QITP-IJAI/VOLUME_6_ISSUE_1/QITP-IJAI_06_01_004.pdf
  23. G. Golovko, I. Taranenko, and O. Kushch, “ZERO TRUST: WHY TRADITIONAL SECURITY MODELS NO LONGER WORK,” 2023.
  24. A. Singh, V. Pareek, and A. Sharma, “‘Blockchain-Enabled Zero Trust Framework for Securing FinTech Ecosystems Against Insider Threats and Cyber Attacks.’”
  25. G. Abbas and S. Gul, “Zero Trust Architecture: Revolutionizing Cybersecurity in the Era of Advanced Threats.”
  26. A. Rosén, “Achieving Zero Trust-A Strategic Roadmap for Phased Implementation of Zero Trust Architecture.” [Online]. Available: www.liu.se
Index Terms

Computer Science
Information Sciences

Keywords

Zero Trust Architecture Cybersecurity Network Security Enterprise Security Security Architecture Threat Detection Incident Response