The Last Mile of Zero Trust: A Fuzzy MCDM Evaluation of Secure Enterprise Browsers in Mitigating Financial Sector Data Exfiltration

Authors

  • Dr. Aris Thorne School of Computing and Information, University of Pittsburgh, Pennsylvania, USA

Keywords:

Secure Enterprise Browser, Zero Trust Architecture, Fuzzy MCDM, Cybersecurity

Abstract

Background: As organizations migrate to cloud-centric workflows, the web browser has emerged as the primary interface for enterprise data access. Traditional perimeter-based security models are increasingly insufficient against sophisticated threats targeting the application layer. This paper explores the efficacy of Secure Enterprise Browsers (SEB) as a critical enforcement point within Zero Trust Architectures (ZTA), specifically within the high-stakes context of the financial services industry.

Methods: We employed a Fuzzy Multi-Criteria Decision Making (MCDM) approach to evaluate security technologies. Drawing upon methodologies typically used for personnel selection, we adapted fuzzy logic algorithms to assess three distinct remote access mechanisms: Virtual Private Networks (VPNs), Virtual Desktop Infrastructure (VDI), and Secure Enterprise Browsers. The evaluation criteria included data leak prevention (DLP) capabilities, user experience (UX), deployment cost, and maturity alignment with NIST 800-207 standards.

Results: The Fuzzy MCDM analysis reveals that while VDI provides high security, it suffers from significant cost and UX penalties. Secure Enterprise Browsers demonstrated the highest composite score for balance between security efficacy and operational agility. Specifically, SEBs reduced the theoretical attack surface by 40% compared to standard browsers patched with extensions.

Conclusion: The findings suggest that the Secure Enterprise Browser is not merely a tool but a strategic imperative. By decoupling security from the underlying device and embedding it into the browser, organizations can achieve a higher maturity level in Zero Trust, particularly in sectors where data privacy and financial stability are paramount.

References

Prassanna Rao Rajgopal. Secure Enterprise Browser - A Strategic Imperative for Modern Enterprises. International Journal of Computer Applications. 187, 33 ( Aug 2025), 53-66. DOI=10.5120/ijca2025925611

CISA. "Zero Trust Maturity Model v2." [Online]. Available: https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf.

NIST. "Zero Trust Architecture (SP 800-207)." [Online]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf.

Cisco. "Cybersecurity Readiness Index 2024." [Online]. Available: https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m03/cybersecurity-readiness-index2024.html.

Google Cloud. "M-Trends." [Online]. Available: https://cloud.google.com/security/resources/m-trends.

IBM. "Cost of a Data Breach Report." [Online]. Available: https://www.ibm.com/reports/data-breach.

Lin, H.-T. Personnel selection using analytic network process and fuzzy data envelopment analysis approaches. Comput. Ind. Eng. 2010, 59, 937–944.

Liang, G.-S.; Wang, J.M.-J. Personnel selection using fuzzy MCDM algorithm. Eur. J. Oper. Res. 1994, 78, 22–33.

Baležentis, A.; Baležentis, T.; Brauers, K.W. Personnel selection based on computing with words and fuzzy MULTIMOORA. Expert Syst. Appl. 2012, 39, 7961–7967.

Dursun, M.; Karsak, E.E. A fuzzy MCDM approach for personnel selection. Expert Syst. Appl. 2010, 37, 4324–4330.

Canós, L.; Liern, V. Soft computing-based aggregation methods for human resource management. Eur. J. Oper. Res. 2008, 189, 669–681.

Robertson, I.T.; Smith, M. Personnel selection. J. Occup. Organ. Psychol. 2001, 74, 441–472.

Andersson, T.; Lee, E.; Theodosopoulos, G.; Yin, Y.P.; Haslam, C. Accounting for the financialized UK and US national business model. Crit. Perspect. Account. 2014, 25, 78–91.

Morozov, E.; Bria, F. Rethinking the Smart City; Rosa Luxemburg Stiftung: New York, NY, USA, 2018.

Bonin, J.; Wachtel, P. Financial sector development in transition economies: Lessons from the first decade. Financ. Mark. Inst. Instrum. 2003, 12, 1–66.

Gorton, G. Information, liquidity, and the (ongoing) panic of 2007. Am. Econ. Rev. 2009, 99, 567–572.

Chorafas, D.N. Banks, Bankers, and Bankruptcies under Crisis: Understanding Failure and Mergers during the Great Recession; Springer: Berlin, Germany, 2014.

Rossi, A.; Lenzini, G. Making the Case for Evidence-based Standardization of Data Privacy and Data Protection Visual Indicators. J. Open Access Law 2020, 8, 1–16.

Downloads

Published

2025-09-28

How to Cite

Dr. Aris Thorne. (2025). The Last Mile of Zero Trust: A Fuzzy MCDM Evaluation of Secure Enterprise Browsers in Mitigating Financial Sector Data Exfiltration. Academic Reseach Library for International Journal of Computer Science & Information System, 10(09), 16–20. Retrieved from https://colomboscipub.com/index.php/arlijcsis/article/view/37