Attackers commonly use stolen login credentials to read protected information or steal the data though it is actually in transit amongst two network products. A zero have confidence in method of network security Traditional firm networks were being centralized, with critical endpoints, details and applications Situated on premises. Network https://ieeexplore.ieee.org/document/9941250