Abstract:
As educational institutions increasingly integrate remote (online) laboratories into their systems, the need for secure and efficient access to lab resources becomes para...Show MoreMetadata
Abstract:
As educational institutions increasingly integrate remote (online) laboratories into their systems, the need for secure and efficient access to lab resources becomes paramount. While traditional Virtual Private Networks (VPNs) have historically served as the primary solution for remote access, they are not without limitations. In this paper, we explore how zero-trust networking access solutions (ZTNA) effectively address these limitations. We examine the advantages of ZTNA-based solutions compared to traditional VPNs, discuss the underlying principles of zero-trust, and illustrate a practical application of ZTNA in educational online labs through the utilization of Twingate, a novel ZTNA-based commercial solution.
Published in: 2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Date of Conference: 27-28 June 2024
Date Added to IEEE Xplore: 30 July 2024
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Access Control ,
- Virtual Laboratory ,
- Access Network ,
- Remote Access ,
- Need For Security ,
- Virtual Private Network ,
- Continuous Monitoring ,
- End-users ,
- Educational Settings ,
- Entire Network ,
- Security Policy ,
- Laboratory Network ,
- Security Model ,
- Grant Access ,
- Malicious Activities ,
- Distributed Denial Of Service ,
- Public Key Infrastructure ,
- Remote User ,
- Practical Use Cases ,
- Cyber Threats
- Author Keywords
- Remote access ,
- Online lab ,
- Zero-Trust ,
- ZTA ,
- ZTNA ,
- Twingate
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Access Control ,
- Virtual Laboratory ,
- Access Network ,
- Remote Access ,
- Need For Security ,
- Virtual Private Network ,
- Continuous Monitoring ,
- End-users ,
- Educational Settings ,
- Entire Network ,
- Security Policy ,
- Laboratory Network ,
- Security Model ,
- Grant Access ,
- Malicious Activities ,
- Distributed Denial Of Service ,
- Public Key Infrastructure ,
- Remote User ,
- Practical Use Cases ,
- Cyber Threats
- Author Keywords
- Remote access ,
- Online lab ,
- Zero-Trust ,
- ZTA ,
- ZTNA ,
- Twingate