{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:42Z","timestamp":1750220202577,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,21]]},"DOI":"10.1145\/3537674.3555779","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T16:08:30Z","timestamp":1662566910000},"page":"118-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Introducing Zero Trust in a Cybersecurity Course"],"prefix":"10.1145","author":[{"given":"Xinli","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computing, Grand Valley State University, USA"}]},{"given":"Samah","family":"Mansour","sequence":"additional","affiliation":[{"name":"School of Computing, Grand Valley State University, USA"}]},{"given":"Mostafa","family":"El-Said","sequence":"additional","affiliation":[{"name":"School of Computing, Grand Valley State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.191"},{"key":"e_1_3_2_1_2_1","volume-title":"Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust. Computers & Security 110","author":"Buck Christoph","year":"2021","unstructured":"Christoph Buck , Christian Olenberger , Andr\u00e9 Schweizer , Fabiane V\u00f6lter , and Torsten Eymann . 2021. Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust. Computers & Security 110 ( 2021 ), 102436: 1\u201326. https:\/\/doi.org\/10.1016\/j.cose.2021.102436 10.1016\/j.cose.2021.102436 Christoph Buck, Christian Olenberger, Andr\u00e9 Schweizer, Fabiane V\u00f6lter, and Torsten Eymann. 2021. Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust. Computers & Security 110 (2021), 102436: 1\u201326. https:\/\/doi.org\/10.1016\/j.cose.2021.102436"},{"key":"e_1_3_2_1_3_1","volume-title":"Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication. In 2016 IEEE International Conference on Smart Cloud (SmartCloud)","author":"DeCusatis Casimer","year":"2016","unstructured":"Casimer DeCusatis , Piradon Liengtiraphan , Anthony Sager , and Mark Pinelli . 2016. Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication. In 2016 IEEE International Conference on Smart Cloud (SmartCloud) . IEEE, New York city, NY, USA , 5\u201310. https:\/\/doi.org\/10.1109\/SmartCloud. 2016 .22 10.1109\/SmartCloud.2016.22 Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager, and Mark Pinelli. 2016. Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication. In 2016 IEEE International Conference on Smart Cloud (SmartCloud). IEEE, New York city, NY, USA, 5\u201310. https:\/\/doi.org\/10.1109\/SmartCloud.2016.22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(20)30097-X"},{"key":"e_1_3_2_1_5_1","volume-title":"Online. Available online at: https:\/\/www.forrester.com\/blogs\/the-definition-of-modern-zero-trust\/#:~:text=Zero%20Trust%20Defined,users%20and%20their%20associated%20devices.. Retrieved on","author":"Holmes David","year":"2022","unstructured":"David Holmes and Jess Burn . 2022. The Definition Of Modern Zero Trust. Forrester Research , Online. Available online at: https:\/\/www.forrester.com\/blogs\/the-definition-of-modern-zero-trust\/#:~:text=Zero%20Trust%20Defined,users%20and%20their%20associated%20devices.. Retrieved on May 26, 2022 . David Holmes and Jess Burn. 2022. The Definition Of Modern Zero Trust. Forrester Research, Online. Available online at: https:\/\/www.forrester.com\/blogs\/the-definition-of-modern-zero-trust\/#:~:text=Zero%20Trust%20Defined,users%20and%20their%20associated%20devices.. Retrieved on May 26, 2022."},{"key":"e_1_3_2_1_6_1","first-page":"800","article-title":"Zero Trust Architecture","author":"Rose Scott","year":"2020","unstructured":"Scott Rose , Oliver Borchert , Stu Mitchell , and Sean Connelly . 2020 . Zero Trust Architecture . NIST SP 800 - 207 . Available online at: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-207\/final. Retrieved on May 12, 2022. Scott Rose, Oliver Borchert, Stu Mitchell, and Sean Connelly. 2020. Zero Trust Architecture. NIST SP 800-207. Available online at: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-207\/final. Retrieved on May 12, 2022.","journal-title":"NIST SP"},{"key":"e_1_3_2_1_7_1","first-page":"26","article-title":"Zero Trust: The What","volume":"54","author":"Shore Malcolm","year":"2021","unstructured":"Malcolm Shore , Sherali Zeadally , and Astha Keshariya . 2021 . Zero Trust: The What , How, Why, and When. Computer 54 , 11 (2021), 26 \u2013 35 . https:\/\/doi.org\/10.1109\/MC.2021.3090018 10.1109\/MC.2021.3090018 Malcolm Shore, Sherali Zeadally, and Astha Keshariya. 2021. Zero Trust: The What, How, Why, and When. Computer 54, 11 (2021), 26\u201335. https:\/\/doi.org\/10.1109\/MC.2021.3090018","journal-title":"How, Why, and When. Computer"},{"key":"e_1_3_2_1_8_1","volume-title":"Successful SIEM and Log Management Strategies for Audit and Compliance. SANS White paper. Available online at: https:\/\/www.sans.org\/white-papers\/33528\/, last retrieved on","author":"Swift David","year":"2022","unstructured":"David Swift . 2010. Successful SIEM and Log Management Strategies for Audit and Compliance. SANS White paper. Available online at: https:\/\/www.sans.org\/white-papers\/33528\/, last retrieved on June 23, 2022 .. David Swift. 2010. Successful SIEM and Log Management Strategies for Audit and Compliance. SANS White paper. Available online at: https:\/\/www.sans.org\/white-papers\/33528\/, last retrieved on June 23, 2022.."},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Zero Trust Architecture (ZTA): A Comprehensive Survey","author":"Syed Naeem\u00a0Firdous","year":"2022","unstructured":"Naeem\u00a0Firdous Syed , Syed\u00a0 W. Shah , Arash Shaghaghi , Adnan Anwar , Zubair Baig , and Robin Doss . 2022 . Zero Trust Architecture (ZTA): A Comprehensive Survey . IEEE Access X .2021(2022), 1 \u2013 36 . https:\/\/doi.org\/10.1109\/ACCESS.2022.3174679 10.1109\/ACCESS.2022.3174679 Naeem\u00a0Firdous Syed, Syed\u00a0W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair Baig, and Robin Doss. 2022. Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access X.2021(2022), 1\u201336. https:\/\/doi.org\/10.1109\/ACCESS.2022.3174679","journal-title":"IEEE Access"}],"event":{"name":"SIGITE '22: The 23rd Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Chicago IL USA","acronym":"SIGITE '22"},"container-title":["Proceedings of the 23rd Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3555779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3537674.3555779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:50Z","timestamp":1750186970000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3555779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,21]]},"references-count":9,"alternative-id":["10.1145\/3537674.3555779","10.1145\/3537674"],"URL":"https:\/\/doi.org\/10.1145\/3537674.3555779","relation":{},"subject":[],"published":{"date-parts":[[2022,9,21]]},"assertion":[{"value":"2022-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}