Authors :
Eniola Akinola Odedina
Volume/Issue :
Volume 10 - 2025, Issue 4 - April
Google Scholar :
https://tinyurl.com/yhwfmcxu
Scribd :
https://tinyurl.com/bdycb6nm
DOI :
https://doi.org/10.38124/ijisrt/25apr1819
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
Organizations use artificial intelligence more extensively for cybersecurity protection but gain digital security
improvements through AI while human security vulnerabilities draw cyber enemy attacks. Zero Trust Architecture (ZTA)
serves as the basis for this paper to examine the significant role human beings play in maintaining AI cybersecurity
protection. Security measures must emphasize human-focused approaches due to the need to defend against terrorists and
auditors, human behavioural irregularities, and social engineering tactics since artificial intelligence cannot entirely
control these attacks. The security capabilities of Zero Trust principles reduce human-caused security threats through
their combination of verification methods, access control protocols, and privilege access controls. Based on previous
studies on cybersecurity awareness, insider threat monitoring, and artificial intelligence threat assessment research, the
study created a complete framework that connects ZTA principles with human behavioural information. The authors
performed systematic research on published articles and deployed technical systems that identified adaptation barriers
that users face in participation alongside difficulties in policy enforcement effectiveness. The paper outlines strategic
recommendations to integrate AI systems with Zero Trust principles to increase organizational cybersecurity against
threats stemming from human behaviour.
Keywords :
AI-Powered Cyber Defences, Zero Trust Architecture, Human Element in Cybersecurity, Cybersecurity Awareness, Insider Threats
References :
- Alqahtani, H., & Kavakli-Thorne, M. (2020). Design and evaluation of an augmented reality game for cybersecurity awareness (CybAR). Information (Switzerland), 11(2). https://doi.org/10.3390/info11020121
- Alsowail, R. A., & Al-Shehari, T. (2020). Empirical detection techniques of insider threat incidents. IEEE Access, 8, 78385–78402. https://doi.org/10.1109/A CCESS.2020.2989739
- Alqahtani, H., & Kavakli-Thorne, M. (2020). Exploring Factors Affecting User’s Cybersecurity Behaviour by Using Mobile Augmented Reality App (CybAR). In ACM International Conference Proceeding Series (pp. 129–135). Association for Computing Machinery. https://doi.org/10.1145/33 84613.3384629
- Al-Mhiqani, M. N., Ahmad, R., Abidin, Z. Z., Yassin, W., Hassan, A., Abdulkareem, K. H., … Yunos, Z. (2020, August 1). A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations. Applied Sciences (Switzerland). MDPI AG. https://doi.org/10.3390/app10155208
- Amanowicz, M. (2020). Towards building national cybersecurity awareness. International Journal of Electronics and Telecommunications, 66(2), 321–326. https://doi.org/10.24425/ijet.2020.131881
- Chuan, T., Lv, Y., Qi, Z., Xie, L., & Guo, W. (2020). An Implementation Method of Zero-trust Architecture. In Journal of Physics: Conference Series (Vol. 1651). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1651/1/012010
- Dalal, A. (2020). AI Powered Threat Hunting in SAP and ERP Environments: Proactive Approaches to Cyber Defense. https://dx.doi.org/10.2139/ssrn.5 158251
- Doukas, N., Stavroulakis, P., & Bardis, N. (2020). Review of artificial intelligence cyber threat assessment techniques for increased system survivability. In Malware Analysis Using Artificial Intelligence and Deep Learning (pp. 207–222). Springer International Publishing. https://doi.org/10.1 007/978-3-030-62582-5_7
- Espinha Gasiba, T., Lechner, U., & Pinto-Albuquerque, M. (2020). Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach. Cybersecurity, 3(1). https://doi.o rg/10.1186/s42400-020-00064-4 Hu, T., Xin, B., Liu, X., Chen, T., Ding, K., & Zhang, X. (2020). Tracking the insider attacker: A blockchain traceability system for insider threats. Sensors (Switzerland), 20(18), 1–18. https://doi.org/10.3390 /s20185297
- Kour, R., & Karim, R. (2020). Cybersecurity workforce in railway: its maturity and awareness. Journal of Quality in Maintenance Engineering, 27(3), 453–464. https://doi.org/10.11 08/JQME-07-2020-0059
- Kim, A., Oh, J., Ryu, J., & Lee, K. (2020). A review of insider threat detection approaches with IoT perspective. IEEE Access, 8, 78847–78867. https://doi.org/10.1109/ACCESS.2020.2990195
- Kurniawan, D., & Mumpuni Arti, R. (2020). Comparative Study of a Cybersecurity Curriculum To Support Digital Transformation in The Public Sector. Iapa Proceedings Conference, 547. https://doi.org/10.30589/proceedings.2020.427
- Koroniotis, N., Moustafa, N., Schiliro, F., Gauravaram, P., & Janicke, H. (2020). A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access, 8, 209802–209834. https://doi.org/10.1109/ACCESS.2020.3036728
- National Institute of Standards and Technology. (2020). Zero Trust Architecture - NIST Special Publication 800-207. NIST, 49. Retrieved from https://doi.org/10.6028/NIST.SP.800-207
- Pham, H. C., Brennan, L., Parker, L., Phan-Le, N. T., Ulhaq, I., Nkhoma, M. Z., & Nhat Nguyen, M. (2020). Enhancing cyber security behavior: an internal social marketing approach. Information and Computer Security, 28(2), 133–159. https://doi.org/ 10.1108/ICS-01-2019-0023
- Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. K. R., & Burnap, P. (2020, September 1). Impact and key challenges of insider threats on organizations and critical businesses. Electronics (Switzerland). MDPI AG. https://doi.org/10.3390/electronics9091460
- Soni, V. D. (2020). Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA. SSRN Electronic Journal. https://doi.org/10. 2139/ssrn.3624487
- Scott et al. (2020). Zero Trust Architecture - NIST Special Publication 800-207. Nist, 49. Retrieved from https://doi.org/10.6028/NIST.SP.800-207
- Truong, T. C., Diep, Q. B., & Zelinka, I. (2020). Artificial intelligence in the cyber domain: Offense and defense. Symmetry, 12(3), 410. https://doi.org/10 .3390/sym12030410
- Walker-Roberts, S., Hammoudeh, M., Aldabbas, O., Aydin, M., & Dehghantanha, A. (2020). Threats on the horizon: understanding security threats in the era of cyber-physical systems. Journal of Supercomputing, 76(4), 2643–2664. https://doi.org/1 0.1007/s11227-019-03028-9
- Yu, N., Tuttle, Z., Thurnau, C. J., & Mireku, E. (2020, April). AI-powered GUI attack and its defensive methods. In Proceedings of the 2020 ACM Southeast Conference (pp. 79-86).
- Yao, Q., Wang, Q., Zhang, X., & Fei, J. (2020). Dynamic Access Control and Authorization System based on Zero-trust architecture. In ACM International Conference Proceeding Series (pp. 123–127). Association for Computing Machinery. https://doi.org/10.1145/3437802.3437824
- Zahiroh, M. Y. (2020). Cybersecurity Awareness and Digital Skills on Readiness For Change in Digital Banking. Li Falah: Jurnal Studi Ekonomi Dan Bisnis Islam, 5(2), 53. https://doi.org/10.31332/lifalah.v5 i2.2271 https://doi.org/10.1145/3374135.3385270
Organizations use artificial intelligence more extensively for cybersecurity protection but gain digital security
improvements through AI while human security vulnerabilities draw cyber enemy attacks. Zero Trust Architecture (ZTA)
serves as the basis for this paper to examine the significant role human beings play in maintaining AI cybersecurity
protection. Security measures must emphasize human-focused approaches due to the need to defend against terrorists and
auditors, human behavioural irregularities, and social engineering tactics since artificial intelligence cannot entirely
control these attacks. The security capabilities of Zero Trust principles reduce human-caused security threats through
their combination of verification methods, access control protocols, and privilege access controls. Based on previous
studies on cybersecurity awareness, insider threat monitoring, and artificial intelligence threat assessment research, the
study created a complete framework that connects ZTA principles with human behavioural information. The authors
performed systematic research on published articles and deployed technical systems that identified adaptation barriers
that users face in participation alongside difficulties in policy enforcement effectiveness. The paper outlines strategic
recommendations to integrate AI systems with Zero Trust principles to increase organizational cybersecurity against
threats stemming from human behaviour.
Keywords :
AI-Powered Cyber Defences, Zero Trust Architecture, Human Element in Cybersecurity, Cybersecurity Awareness, Insider Threats