Enhancing Security in Operational Technology: The Role of Multi-Factor Authentication Against Cyber Threats
DOI:
https://doi.org/10.37965/jait.2025.0881Keywords:
authentication, cybersecurity, IT/OT convergence, MFA, Operational Technology (OT), Airline passenger satisfaction, 2FAAbstract
As cyber threats continue to increase in sophistication, the security of Operational Technology (OT) environments has become a paramount priority for organizations in various sectors. OT systems, including Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, are vital in the functioning of critical infrastructure but often lack robust security due to legacy security weaknesses. This research discusses the implementation of Multi-Factor Authentication (MFA) as a baseline strategy for enhancing the security of such systems. We recognize the distinct cybersecurity issues of OT environments, especially the use of legacy hardware that does not have contemporary security mechanisms. By suggesting an extensive framework for implementing MFA, this research offers a multi-layered system that incorporates knowledge-based, possession-based, and biometric authentication techniques. We further stress the need for role-based access control, ongoing monitoring, and user training to enhance security mechanisms. Using case studies and real-world examples, we show how MFA can be used to counter unauthorized access and increase system resilience. We present actionable recommendations for organizations wishing to deploy MFA, including mitigation strategies that reduce identified vulnerabilities to acceptable levels for critical infrastructure as a foundation of their cybersecurity approach, with the ultimate goal of safeguarding critical infrastructure and sensitive information in a hyper-connected world. Our research not only adds to the body of knowledge but also acts as a guide to deploying stringent security controls in OT networks.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.
