Securing the Human Element in AI-Powered Cyber Defences: A Zero Trust Perspective


Authors : Eniola Akinola Odedina

Volume/Issue : Volume 10 - 2025, Issue 4 - April


Google Scholar : https://tinyurl.com/yhwfmcxu

Scribd : https://tinyurl.com/bdycb6nm

DOI : https://doi.org/10.38124/ijisrt/25apr1819

Google Scholar

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 15 to 20 days to display the article.


Abstract : Organizations use artificial intelligence more extensively for cybersecurity protection but gain digital security improvements through AI while human security vulnerabilities draw cyber enemy attacks. Zero Trust Architecture (ZTA) serves as the basis for this paper to examine the significant role human beings play in maintaining AI cybersecurity protection. Security measures must emphasize human-focused approaches due to the need to defend against terrorists and auditors, human behavioural irregularities, and social engineering tactics since artificial intelligence cannot entirely control these attacks. The security capabilities of Zero Trust principles reduce human-caused security threats through their combination of verification methods, access control protocols, and privilege access controls. Based on previous studies on cybersecurity awareness, insider threat monitoring, and artificial intelligence threat assessment research, the study created a complete framework that connects ZTA principles with human behavioural information. The authors performed systematic research on published articles and deployed technical systems that identified adaptation barriers that users face in participation alongside difficulties in policy enforcement effectiveness. The paper outlines strategic recommendations to integrate AI systems with Zero Trust principles to increase organizational cybersecurity against threats stemming from human behaviour.

Keywords : AI-Powered Cyber Defences, Zero Trust Architecture, Human Element in Cybersecurity, Cybersecurity Awareness, Insider Threats

References :

  1. Alqahtani, H., & Kavakli-Thorne, M. (2020). Design and evaluation of an augmented reality game for cybersecurity awareness (CybAR). Information (Switzerland), 11(2). https://doi.org/10.3390/info11020121
  2. Alsowail, R. A., & Al-Shehari, T. (2020). Empirical detection techniques of insider threat incidents. IEEE Access, 8, 78385–78402. https://doi.org/10.1109/A CCESS.2020.2989739
  3. Alqahtani, H., & Kavakli-Thorne, M. (2020). Exploring Factors Affecting User’s Cybersecurity Behaviour by Using Mobile Augmented Reality App (CybAR). In ACM International Conference Proceeding Series (pp. 129–135). Association for Computing Machinery. https://doi.org/10.1145/33 84613.3384629
  4. Al-Mhiqani, M. N., Ahmad, R., Abidin, Z. Z., Yassin, W., Hassan, A., Abdulkareem, K. H., … Yunos, Z. (2020, August 1). A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations. Applied Sciences (Switzerland). MDPI AG. https://doi.org/10.3390/app10155208
  5. Amanowicz, M. (2020). Towards building national cybersecurity awareness. International Journal of Electronics and Telecommunications, 66(2), 321–326. https://doi.org/10.24425/ijet.2020.131881
  6. Chuan, T., Lv, Y., Qi, Z., Xie, L., & Guo, W. (2020). An Implementation Method of Zero-trust Architecture. In Journal of Physics: Conference Series (Vol. 1651). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1651/1/012010
  7. Dalal, A. (2020). AI Powered Threat Hunting in SAP and ERP Environments: Proactive Approaches to Cyber Defense. https://dx.doi.org/10.2139/ssrn.5 158251
  8. Doukas, N., Stavroulakis, P., & Bardis, N. (2020). Review of artificial intelligence cyber threat assessment techniques for increased system survivability. In Malware Analysis Using Artificial Intelligence and Deep Learning (pp. 207–222). Springer International Publishing. https://doi.org/10.1 007/978-3-030-62582-5_7
  9. Espinha Gasiba, T., Lechner, U., & Pinto-Albuquerque, M. (2020). Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach. Cybersecurity, 3(1). https://doi.o rg/10.1186/s42400-020-00064-4 Hu, T., Xin, B., Liu, X., Chen, T., Ding, K., & Zhang, X. (2020). Tracking the insider attacker: A blockchain traceability system for insider threats. Sensors (Switzerland), 20(18), 1–18. https://doi.org/10.3390 /s20185297
  10. Kour, R., & Karim, R. (2020). Cybersecurity workforce in railway: its maturity and awareness. Journal of Quality in Maintenance Engineering, 27(3), 453–464. https://doi.org/10.11 08/JQME-07-2020-0059
  11. Kim, A., Oh, J., Ryu, J., & Lee, K. (2020). A review of insider threat detection approaches with IoT perspective. IEEE Access, 8, 78847–78867. https://doi.org/10.1109/ACCESS.2020.2990195
  12. Kurniawan, D., & Mumpuni Arti, R. (2020). Comparative Study of a Cybersecurity Curriculum To Support Digital Transformation in The Public Sector. Iapa Proceedings Conference, 547. https://doi.org/10.30589/proceedings.2020.427
  13. Koroniotis, N., Moustafa, N., Schiliro, F., Gauravaram, P., & Janicke, H. (2020). A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access, 8, 209802–209834. https://doi.org/10.1109/ACCESS.2020.3036728
  14. National Institute of Standards and Technology. (2020). Zero Trust Architecture - NIST Special Publication 800-207. NIST, 49. Retrieved from https://doi.org/10.6028/NIST.SP.800-207
  15. Pham, H. C., Brennan, L., Parker, L., Phan-Le, N. T., Ulhaq, I., Nkhoma, M. Z., & Nhat Nguyen, M. (2020). Enhancing cyber security behavior: an internal social marketing approach. Information and Computer Security, 28(2), 133–159. https://doi.org/ 10.1108/ICS-01-2019-0023
  16. Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. K. R., & Burnap, P. (2020, September 1). Impact and key challenges of insider threats on organizations and critical businesses. Electronics (Switzerland). MDPI AG. https://doi.org/10.3390/electronics9091460
  17. Soni, V. D. (2020). Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA. SSRN Electronic Journal. https://doi.org/10. 2139/ssrn.3624487
  18. Scott et al. (2020). Zero Trust Architecture - NIST Special Publication 800-207. Nist, 49. Retrieved from https://doi.org/10.6028/NIST.SP.800-207
  19. Truong, T. C., Diep, Q. B., & Zelinka, I. (2020). Artificial intelligence in the cyber domain: Offense and defense. Symmetry, 12(3), 410. https://doi.org/10 .3390/sym12030410
  20. Walker-Roberts, S., Hammoudeh, M., Aldabbas, O., Aydin, M., & Dehghantanha, A. (2020). Threats on the horizon: understanding security threats in the era of cyber-physical systems. Journal of Supercomputing, 76(4), 2643–2664. https://doi.org/1 0.1007/s11227-019-03028-9
  21. Yu, N., Tuttle, Z., Thurnau, C. J., & Mireku, E. (2020, April). AI-powered GUI attack and its defensive methods. In Proceedings of the 2020 ACM Southeast Conference (pp. 79-86).
  22. Yao, Q., Wang, Q., Zhang, X., & Fei, J. (2020). Dynamic Access Control and Authorization System based on Zero-trust architecture. In ACM International Conference Proceeding Series (pp. 123–127). Association for Computing Machinery. https://doi.org/10.1145/3437802.3437824
  23. Zahiroh, M. Y. (2020). Cybersecurity Awareness and Digital Skills on Readiness For Change in Digital Banking. Li Falah: Jurnal Studi Ekonomi Dan Bisnis Islam, 5(2), 53. https://doi.org/10.31332/lifalah.v5 i2.2271  https://doi.org/10.1145/3374135.3385270   

Organizations use artificial intelligence more extensively for cybersecurity protection but gain digital security improvements through AI while human security vulnerabilities draw cyber enemy attacks. Zero Trust Architecture (ZTA) serves as the basis for this paper to examine the significant role human beings play in maintaining AI cybersecurity protection. Security measures must emphasize human-focused approaches due to the need to defend against terrorists and auditors, human behavioural irregularities, and social engineering tactics since artificial intelligence cannot entirely control these attacks. The security capabilities of Zero Trust principles reduce human-caused security threats through their combination of verification methods, access control protocols, and privilege access controls. Based on previous studies on cybersecurity awareness, insider threat monitoring, and artificial intelligence threat assessment research, the study created a complete framework that connects ZTA principles with human behavioural information. The authors performed systematic research on published articles and deployed technical systems that identified adaptation barriers that users face in participation alongside difficulties in policy enforcement effectiveness. The paper outlines strategic recommendations to integrate AI systems with Zero Trust principles to increase organizational cybersecurity against threats stemming from human behaviour.

Keywords : AI-Powered Cyber Defences, Zero Trust Architecture, Human Element in Cybersecurity, Cybersecurity Awareness, Insider Threats

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe