Zero Trust Architecture: Understanding the Importance of Zero Trust - Part 1