A Bayesian Network-Driven Zero Trust Model for Cyber Risk Quantification in Small-Medium Businesses
By: Ahmed M. Abdelmagid, Barry C. Ezell, Michael McShane
Potential Business Impact:
Protects small businesses from online attacks.
Small-Medium Businesses (SMBs) are essential to global economies yet remain highly vulnerable to cyberattacks due to limited budgets, inadequate cybersecurity expertise, and underestimation of cyber risks. Their increasing reliance on digital infrastructures has expanded their attack surfaces, exposing them to sophisticated and evolving threats. Consequently, implementing proactive, adaptive security measures has become imperative. This research investigates the effectiveness of Zero Trust Architecture (ZTA) as a sustainable cybersecurity solution tailored to SMBs. While ZTA adoption has been examined broadly, the specific financial, organizational, and capability constraints of SMBs remain underexplored. This study develops an integrated predictive model to assess both the feasibility and risk-mitigation potential of ZTA implementation. The model consists of two sub-models. The first sub-model evaluates the probability of successful ZTA adoption considering implied barriers, and the second tests the effectiveness of ZTA in responding to prevalent cyberattacks. The integrated model predicts the risk level in the presence of ZTA and quantifies the uncertainty of the extent to which ZTA can enhance SMBs' cyber resilience, contributing novel insights for practitioners and stakeholders seeking to enhance compliance with policies, risk, and governance activities in SMBs.
Similar Papers
Prescriptive Zero Trust- Assessing the impact of zero trust on cyber attack prevention
Cryptography and Security
Measures how well companies protect themselves online.
Rethinking trust in the digital age: An investigation of zero trust architecture's social consequences on organizational culture, collaboration, and knowledge sharing
Emerging Technologies
Makes computer security work better with people.
Bridging the Mobile Trust Gap: A Zero Trust Framework for Consumer-Facing Applications
Cryptography and Security
Secures phone apps by checking everything constantly.