Network architectures with this property continuously verify devices each time they access resources rather than maintaining a network perimeter within which no authentication is needed. For 10 points each:
[10h] Name this kind of network architecture that, as codified by the NIST 800-207 standard, relies on a policy enforcement point to authorize each session attempting to access resources.
ANSWER: zero-trust architecture
[10m] A 2020 US government data breach resulted from Zerologon, a vulnerability in this company’s Netlogon protocol that allowed attackers elevation of privileges to the domain controller of this company’s Active Directory service.
ANSWER: Microsoft Corporation
[10e] These software vulnerabilities are valuable to hackers since they’re exploitable before being known to their vendors. Examples include the four in Microsoft Windows that Stuxnet took advantage of.
ANSWER: zero-day exploits
<Vishwa Shanmugam, Other Science - Computer Science>