1. [1] I. Odun-Ayo, O. Ajayi, and S. Misra, “Cloud computing security: Issues and developments,” Proc. World Congress on Engineering 2018 (WCE), London, U.K., vol.1, pp.175-181, July 2018.
2. [2] G. Kumar, “A review on data protection of cloud computing security, benefits, risks and suggestions,” United International Journal for Research & Technology (UIJRT), vol.1, no.2, pp.26-34, 2019.
3. [3] A. Deshpande, “A study on rapid adoption of zero trust network architectures by global organizations due to COVID-19 pandemic,” New Visions in Science and Technology, vol.1, ed. S.M. Lawan, pp.26-33, B P International, India, 2021. 10.9734/bpi/nvst/v1/3640f
4. [4] G. Sorrentino, “The human variable: Designing a security strategy for a future in flux,” Cyber Security: A Peer-Reviewed Journal, vol.5, no.1, pp.6-12, 2021.
5. [5] A. Deshpande, “Relevance of zero trust network architecture amidts and it's rapid adoption amidts work from home enforced by COVID-19,” Psychology and Education Journal, vol.58, no.1, pp.5672-5677, 2021. 10.17762/pae.v58i1.2190