Abstract: As many organizations face the rise in cyber threats, our digital landscape demands a more vigorous network. This paper explores the effectiveness of integrating Multi-Factor Authentication (MFA) within the popular Zero Trust security model by using a collection of case studies (qualitative analysis) combined with known security breaches (quantitative analysis) as a means of identifying key strategies in determining user authenticity while strengthening trust boundaries. The findings indicate that a comprehensive collaborative approach is necessary when implementing MFA. This approach should integrate real-time enforcement of security policies, leveraging dynamic threat intelligence and situational information to effectively decrease unauthorized access and prevent data breaches. The study concludes with recommendations for implementing MFA as an essential component of Zero Trust architecture. It emphasizes continuous verification while using access control through IT policies for administrators to control user access based on multiple real-time factors. This integration strengthens security postures while maintaining alignment with regulatory compliance standards.
Abstract: As many organizations face the rise in cyber threats, our digital landscape demands a more vigorous network. This paper explores the effectiveness of integrating Multi-Factor Authentication (MFA) within the popular Zero Trust security model by using a collection of case studies (qualitative analysis) combined with known security breaches (quantitat...Show More
Sunday Oluwaseun Gbenro*,Temitayo Emmanuel Olaosebikan,Opeyemi Vincent Omole
Issue:
Volume 10, Issue 1, March 2025
Pages:
6-18
Received:
26 February 2025
Accepted:
8 March 2025
Published:
26 March 2025
DOI:
10.11648/j.ajmcm.20251001.12
Downloads:
Views:
Abstract: Emergence of novel infectious diseases and the resurgence of already known ones and its variants elicit significant concern in our contemporary world. Thus, it is very crucial to utilize all available resources to monitor and control their spread. Most of the epidemiological models developed to study and analyze the characteristics of diseases produced system of differential equations that are coupled in nature, which has become a challenge to researchers to find exact solutions. This work proposes an accurate three-step hybrid block method through optimization approach for solving mathematical models of continuous fever. The techniques of interpolation and collocation were applied to a power series polynomial for the derivation of the method using a three-parameter approximation of the hybrid points. The hybrid points were obtained by minimizing the local truncation error of the main method. The discrete schemes were produced as by-products of the continuous scheme and used to simultaneously solve mathematical models of continuous fever in block mode. The analysis of the basic properties of the method revealed that the schemes are self-starting, convergent, and A-stable. In addition, the analysis of the order of accuracy of the method showed that there is a gain of one order of accuracy in the main scheme where the optimization was carried out. Thereby, enhancing the accuracy of the whole method. The accuracy of the method was ascertained using three numerical examples. Comparison of the numerical results of the new method with those of the existing methods revealed that the newly developed method compares favorably with the existing hybrid block methods. Hence, the new method should be employed for the numerical solution of initial value problems of ordinary differential equations to obtain more accurate results.Abstract: Emergence of novel infectious diseases and the resurgence of already known ones and its variants elicit significant concern in our contemporary world. Thus, it is very crucial to utilize all available resources to monitor and control their spread. Most of the epidemiological models developed to study and analyze the characteristics of diseases prod...Show More