Zero-have faith in security: This involves the theory of “under no circumstances have faith in, normally validate” when deciding who and what can access your network along with the methods to use to verify people and systems are the things they assert to get. Normally done in coordination with phishing, https://ieeexplore.ieee.org/document/9941250