Enhancing Security in Operational Technology: The Role of Multi-Factor Authentication Against Cyber Threats

Enhancing Security in Operational Technology: The Role of Multi-Factor Authentication Against Cyber Threats

Authors

  • Albandari Alsumayt Saudi Aramco Cybersecurity Chair, Networks and Communications Department, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia https://orcid.org/0000-0002-2137-260X
  • Nahla El-Haggar Computer Science Department, Applied College, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia https://orcid.org/0000-0001-8865-3097
  • Majid Alshammari Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia https://orcid.org/0000-0003-4517-7232
  • Fatemah H. Alghamedy Computer Science Department, Applied College, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia https://orcid.org/0000-0002-8275-2948
  • Zeyad AlFawaer Department of Science Technology and Mathematics, College of Art and Sciences, Lincoln University, Jefferson City, MO, USA https://orcid.org/0000-0001-6164-5812

DOI:

https://doi.org/10.37965/jait.2025.0881

Keywords:

authentication, cybersecurity, IT/OT convergence, MFA, Operational Technology (OT), Airline passenger satisfaction, 2FA

Abstract

As cyber threats continue to increase in sophistication, the security of Operational Technology (OT) environments has become a paramount priority for organizations in various sectors. OT systems, including Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, are vital in the functioning of critical infrastructure but often lack robust security due to legacy security weaknesses. This research discusses the implementation of Multi-Factor Authentication (MFA) as a baseline strategy for enhancing the security of such systems. We recognize the distinct cybersecurity issues of OT environments, especially the use of legacy hardware that does not have contemporary security mechanisms. By suggesting an extensive framework for implementing MFA, this research offers a multi-layered system that incorporates knowledge-based, possession-based, and biometric authentication techniques. We further stress the need for role-based access control, ongoing monitoring, and user training to enhance security mechanisms. Using case studies and real-world examples, we show how MFA can be used to counter unauthorized access and increase system resilience. We present actionable recommendations for organizations wishing to deploy MFA, including mitigation strategies that reduce identified vulnerabilities to acceptable levels for critical infrastructure as a foundation of their cybersecurity approach, with the ultimate goal of safeguarding critical infrastructure and sensitive information in a hyper-connected world. Our research not only adds to the body of knowledge but also acts as a guide to deploying stringent security controls in OT networks.

Author Biographies

Nahla El-Haggar , Computer Science Department, Applied College, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia

Computer Science Department, Applied College

Fatemah H. Alghamedy , Computer Science Department, Applied College, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia

Computer Science Department, Applied College

Zeyad AlFawaer, Department of Science Technology and Mathematics, College of Art and Sciences, Lincoln University, Jefferson City, MO, USA

Department of Science Technology and Mathematics, College of Art and Sciences

Downloads

Published

2025-11-18

How to Cite

Alsumayt, A., El-Haggar , N., Alshammari, M., H. Alghamedy , F., & AlFawaer, Z. (2025). Enhancing Security in Operational Technology: The Role of Multi-Factor Authentication Against Cyber Threats. Journal of Artificial Intelligence and Technology. https://doi.org/10.37965/jait.2025.0881

Issue

Section

Research Articles
Loading...