Zero Trust Explained: Why the “Castle and Moat” Security Model Is Dead