An organization wants to enhance security by requiring authentication and authorization from users and devices attempting to access resources, both within and outside the network perimeter. Which security model should the organization adopt to achieve this?
Network Segmentation Model
Password-based Security Model
Role-based Access Control Model
Zero Trust Model