{"id":7871,"date":"2025-11-26T03:51:32","date_gmt":"2025-11-26T03:51:32","guid":{"rendered":"https:\/\/kibu.ac.ke\/sgs\/?p=7871"},"modified":"2025-11-26T03:53:02","modified_gmt":"2025-11-26T03:53:02","slug":"mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/","title":{"rendered":"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7871\" class=\"elementor elementor-7871\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73521f4b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73521f4b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ed110df\" data-id=\"1ed110df\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49c2a859 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49c2a859\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-77aa62c9\" data-id=\"77aa62c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3616e151\" data-id=\"3616e151\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27d0a1c4 elementor-section-height-min-height elementor-section-items-stretch elementor-section-boxed elementor-section-height-default\" data-id=\"27d0a1c4\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d7d800f\" data-id=\"d7d800f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-56858aa3 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default\" data-id=\"56858aa3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-37c2f910\" data-id=\"37c2f910\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b5163b elementor-widget elementor-widget-heading\" data-id=\"7b5163b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Student\u2019s Name: <br>\nMony Victor Otieno<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-42967eb3\" data-id=\"42967eb3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41a6248c elementor-widget elementor-widget-heading\" data-id=\"41a6248c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Supervisors:<br>\n1.\tDr. Anselemo Peters Ikoha<br>\n2.\tDr. Ongare Roselida Maroko\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e2ca93b\" data-id=\"e2ca93b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1115c374 elementor-widget elementor-widget-heading\" data-id=\"1115c374\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Doctor of Philosophy in Information Technology<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-751579d7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"751579d7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-571d34bd\" data-id=\"571d34bd\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-681112e3 elementor-widget elementor-widget-spacer\" data-id=\"681112e3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5b5245e\" data-id=\"5b5245e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5effeeba elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"5effeeba\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-73a18491\" data-id=\"73a18491\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65fb29e8 elementor-widget elementor-widget-heading\" data-id=\"65fb29e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ABSTRACT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3103b3 elementor-widget elementor-widget-text-editor\" data-id=\"e3103b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The widespread adoption of Cloud-Based Services (CBS) has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing, simulating and evaluating an Intelligent Zero Trust Architecture (IZTA) model tailored to mitigate authentication-related threats in CBS environments. The research was guided by four key objectives: (i) to assess threats and vulnerabilities in existing authentication schemes employed in CBS, (ii) to evaluate the effectiveness of Zero Trust Architecture (ZTA) principles in mitigating threats and vulnerabilities within authentication schemes for CBS, (iii) to design a ZTA implementation scheme tailored to CBS authentication environments, intergrating selected trust signals derived from user behavior and contextual device data, and (iv) to develop an intelligent ZTA model for dynamic authentication and threat mitigation within CBS. The study adopted a positivist philosophy and quasi-experimental design, utilizing a structured six-step methodology. Data was sourced from public repositories, including Kaggle and the NIST MITRE ATT&amp;CK framework. The study evaluated the impacts of CBS authentication threats and vulnerabilities using standard NIST procedures, selected the ZTA principle of policy enforcement as the most viable mitigation policy, and utilized two trust signals: Behavioral targeting system users and Contextual targeting system devices. Based on the trust signals, two machine learning models; Keystroke Dynamics and Device Location, were developed using Binary Logistic Regression, achieving a combined average accuracy of 80.63%, with a residual ineffectiveness rate of 19.37%. The IZTA Threat Mitigation Model was introduced to reclassify threat severity scores, resulting in the downgrading of all authentication threats to Low Severity, demonstrating a mitigation effectiveness exceeding 80%. Furthermore, the model underwent expert validation by five cybersecurity specialists. The IZTA model achieved an overall expert validation score of 86.4%, with particularly high ratings in innovation (92%) and overall effectiveness (90%), confirming its practical viability and technical relevance in securing CBS authentication systems. This research contributes to the field of cybersecurity by presenting a validated, intelligent, and context-aware ZTA model capable of enhancing identity and access management in dynamic cloud environments. The findings offer actionable insights for cloud architects, cybersecurity professionals, and policymakers aiming to strengthen trust, reduce attack surfaces, and improve threat resilience across digital infrastructures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-36118550 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36118550\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36fcf27e\" data-id=\"36fcf27e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Student\u2019s Name: Mony Victor Otieno Supervisors: 1. Dr. Anselemo Peters Ikoha 2. Dr. Ongare Roselida Maroko Doctor of Philosophy in Information Technology ABSTRACT The widespread adoption of Cloud-Based Services (CBS) has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-7871","post","type-post","status-publish","format-standard","hentry","category-theses"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture - School of Graduate Studies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture - School of Graduate Studies\" \/>\n<meta property=\"og:description\" content=\"Student\u2019s Name: Mony Victor Otieno Supervisors: 1. Dr. Anselemo Peters Ikoha 2. Dr. Ongare Roselida Maroko Doctor of Philosophy in Information Technology ABSTRACT The widespread adoption of Cloud-Based Services (CBS) has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Graduate Studies\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-26T03:51:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T03:53:02+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\"},\"headline\":\"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture\",\"datePublished\":\"2025-11-26T03:51:32+00:00\",\"dateModified\":\"2025-11-26T03:53:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/\"},\"wordCount\":403,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"articleSection\":[\"Theses\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/\",\"name\":\"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture - School of Graduate Studies\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\"},\"datePublished\":\"2025-11-26T03:51:32+00:00\",\"dateModified\":\"2025-11-26T03:53:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/sgs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"name\":\"School of Graduate Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\",\"name\":\"School of Graduate Studies\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"width\":1220,\"height\":1100,\"caption\":\"School of Graduate Studies\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/sgs\"],\"url\":\"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture - School of Graduate Studies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture - School of Graduate Studies","og_description":"Student\u2019s Name: Mony Victor Otieno Supervisors: 1. Dr. Anselemo Peters Ikoha 2. Dr. Ongare Roselida Maroko Doctor of Philosophy in Information Technology ABSTRACT The widespread adoption of Cloud-Based Services (CBS) has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/","og_site_name":"School of Graduate Studies","article_published_time":"2025-11-26T03:51:32+00:00","article_modified_time":"2025-11-26T03:53:02+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8"},"headline":"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture","datePublished":"2025-11-26T03:51:32+00:00","dateModified":"2025-11-26T03:53:02+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/"},"wordCount":403,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"articleSection":["Theses"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/","url":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/","name":"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture - School of Graduate Studies","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#website"},"datePublished":"2025-11-26T03:51:32+00:00","dateModified":"2025-11-26T03:53:02+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/sgs\/mitigating-security-threats-and-vulnerabilities-in-cloud-based-services-authentication-process-through-intelligent-zero-trust-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/sgs\/"},{"@type":"ListItem","position":2,"name":"Mitigating Security Threats and Vulnerabilities in Cloud-based Services Authentication Process through Intelligent Zero Trust Architecture"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/sgs\/#website","url":"https:\/\/kibu.ac.ke\/sgs\/","name":"School of Graduate Studies","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/sgs\/#organization","name":"School of Graduate Studies","url":"https:\/\/kibu.ac.ke\/sgs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","contentUrl":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","width":1220,"height":1100,"caption":"School of Graduate Studies"},"image":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/sgs"],"url":"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/7871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/comments?post=7871"}],"version-history":[{"count":4,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/7871\/revisions"}],"predecessor-version":[{"id":7876,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/7871\/revisions\/7876"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/media?parent=7871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/categories?post=7871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/tags?post=7871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}