{"id":9710,"date":"2025-12-09T11:42:51","date_gmt":"2025-12-09T11:42:51","guid":{"rendered":"https:\/\/kibu.ac.ke\/sgs\/?p=9710"},"modified":"2025-12-09T11:45:05","modified_gmt":"2025-12-09T11:45:05","slug":"an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/","title":{"rendered":"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9710\" class=\"elementor elementor-9710\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7bd63da6 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"7bd63da6\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ce8dd4b\" data-id=\"6ce8dd4b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28398724 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"28398724\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27a5e39b elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"27a5e39b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-555bfdf9\" data-id=\"555bfdf9\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-116e3d19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"116e3d19\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1e0451ad elementor-invisible\" data-id=\"1e0451ad\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-358afd04 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"358afd04\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-86b638 elementor-invisible\" data-id=\"86b638\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19b6bbd6 elementor-widget elementor-widget-heading\" data-id=\"19b6bbd6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a127b93 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4a127b93\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Victor Otieno Mony<br \/>Anselemo Peters Ikoha<br \/>Roselida O. Maroko<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-70439e99 elementor-invisible\" data-id=\"70439e99\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e46f645 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"3e46f645\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/www.techscience.com\/JCS\/v7n1\/64013\/html\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-24614e6d elementor-widget elementor-widget-heading\" data-id=\"24614e6d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-195890e6 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"195890e6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The widespread adoption of Cloud-Based Services has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing and evaluating an Intelligent Zero Trust Architecture model tailored to mitigate authentication-related threats in Cloud-Based Services environments. Data was sourced from public repositories, including Kaggle and the National Institute for Standards and Technology MITRE Corporation\u2019s Adversarial Tactics, Techniques, &amp; Common Knowledge (ATT&amp;CK) framework. The study utilized two trust signals: Behavioral targeting system users and Contextual targeting system devices. Based on the trust signals, two machine learning models\u2014Keystroke Dynamics and Device Location\u2014were developed using Binary Logistic Regression, achieving a combined average accuracy of 80.63%, with a residual ineffectiveness rate of 19.37%. The Intelligent Zero-Trust Architecture Threat Mitigation Model was introduced to reclassify threat severity scores, resulting in the downgrading of all authentication threats to Low Severity, demonstrating a mitigation effectiveness exceeding 80%. This research contributes to the field of cybersecurity by presenting a validated, intelligent, and context-aware Intelligent Zero-Trust Architecture model capable of enhancing identity and access management in dynamic cloud environments. The findings offer actionable insights for cloud architects, cybersecurity professionals, and policymakers aiming to strengthen trust, reduce attack surfaces, and improve threat resilience across digital infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2025 Authors Victor Otieno MonyAnselemo Peters IkohaRoselida O. Maroko VIEW ON PUBLISHER SITE Abstract The widespread adoption of Cloud-Based Services has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing and evaluating an [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-9710","post","type-post","status-publish","format-standard","hentry","category-publications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services - School of Graduate Studies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services - School of Graduate Studies\" \/>\n<meta property=\"og:description\" content=\"2025 Authors Victor Otieno MonyAnselemo Peters IkohaRoselida O. Maroko VIEW ON PUBLISHER SITE Abstract The widespread adoption of Cloud-Based Services has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing and evaluating an [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Graduate Studies\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T11:42:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T11:45:05+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\"},\"headline\":\"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services\",\"datePublished\":\"2025-12-09T11:42:51+00:00\",\"dateModified\":\"2025-12-09T11:45:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/\"},\"wordCount\":245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"articleSection\":[\"Publications\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/\",\"name\":\"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services - School of Graduate Studies\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\"},\"datePublished\":\"2025-12-09T11:42:51+00:00\",\"dateModified\":\"2025-12-09T11:45:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/sgs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"name\":\"School of Graduate Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\",\"name\":\"School of Graduate Studies\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"width\":1220,\"height\":1100,\"caption\":\"School of Graduate Studies\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/sgs\"],\"url\":\"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services - School of Graduate Studies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/","og_locale":"en_US","og_type":"article","og_title":"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services - School of Graduate Studies","og_description":"2025 Authors Victor Otieno MonyAnselemo Peters IkohaRoselida O. Maroko VIEW ON PUBLISHER SITE Abstract The widespread adoption of Cloud-Based Services has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing and evaluating an [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/","og_site_name":"School of Graduate Studies","article_published_time":"2025-12-09T11:42:51+00:00","article_modified_time":"2025-12-09T11:45:05+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8"},"headline":"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services","datePublished":"2025-12-09T11:42:51+00:00","dateModified":"2025-12-09T11:45:05+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/"},"wordCount":245,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"articleSection":["Publications"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/","url":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/","name":"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services - School of Graduate Studies","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#website"},"datePublished":"2025-12-09T11:42:51+00:00","dateModified":"2025-12-09T11:45:05+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/sgs\/an-intelligent-zero-trust-architecture-model-for-mitigating-authentication-threats-and-vulnerabilities-in-cloud-based-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/sgs\/"},{"@type":"ListItem","position":2,"name":"An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/sgs\/#website","url":"https:\/\/kibu.ac.ke\/sgs\/","name":"School of Graduate Studies","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/sgs\/#organization","name":"School of Graduate Studies","url":"https:\/\/kibu.ac.ke\/sgs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","contentUrl":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","width":1220,"height":1100,"caption":"School of Graduate Studies"},"image":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/sgs"],"url":"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/comments?post=9710"}],"version-history":[{"count":4,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9710\/revisions"}],"predecessor-version":[{"id":9715,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9710\/revisions\/9715"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/media?parent=9710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/categories?post=9710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/tags?post=9710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}