2021
DOI: 10.3390/electronics10151819
|View full text |Cite
|
Sign up to set email alerts
|

Securing Remote Access to Information Systems of Critical Infrastructure Using Two-Factor Authentication

Abstract: Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user id… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…2FA is used to protect a user's credentials and the resources to which they have access. Single-factor authentication (SFA), in which the user provides only one factor (usually a password), provides a lower level of security than 2FA [ 5 ]. 2FA gives the user a second factor that is either something they have (such as a hardware token or a phone) or something they are (referring to biometrics, such as facial recognition or fingerprint) [ 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…2FA is used to protect a user's credentials and the resources to which they have access. Single-factor authentication (SFA), in which the user provides only one factor (usually a password), provides a lower level of security than 2FA [ 5 ]. 2FA gives the user a second factor that is either something they have (such as a hardware token or a phone) or something they are (referring to biometrics, such as facial recognition or fingerprint) [ 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…It encompasses two types of connections: physical asset connections and information connections. Physical asset interdependency emphasizes the interconnectedness of physical assets with variables that cover the similarity of physical assets and the interconnectedness of CII physical assets through cyber network media (Bruzgiene and Jurgilas, 2021; Espada et al , 2015). The information interdependency element assesses the connections based on data or information usage similarities (Große, 2021).…”
Section: Resultsmentioning
confidence: 99%
“…The electronic system workflow affects the interdependency determination assets and the interconnectedness of CII physical assets through cyber network media (Bruzgiene and Jurgilas, 2021;Espada et al, 2015). The information interdependency element assesses the connections based on data or information usage similarities (Große, 2021).…”
Section: 57mentioning
confidence: 99%
“…In 2019, warnings that cyber threats pose a risk to public welfare, security, and prosperity were published in the National Intelligence Strategy Report of the United States. Those warnings were related to the fact that information technologies are inseparable from critical infrastructures and are widely used by society (Bruzgiene, Jurgilas, 2021). Prospective intruders who persistently attempt to invade a critical infrastructure system, properly implement security policy, adhere to measures, and write the correct security policy are the ones who will determine the successful avoidance of intrusion into the systems.…”
Section: Insights Into Regional Developmentmentioning
confidence: 99%