Attached. Please let me know if you have any questions or need revisions.1The Effect of Using Multi-Factor Authentication (MFA) to Decrease Attacks on IoTDevices to Improve Cybersecurity in OrganizationsStudent NameInstitutionCourse NameInstructor NameDate2AbstractThere is an increased advancement in technology. This has been heightened by the fact thatpeople can easily access various digital devices. Therefore, companies find the use of the internetof things (IoT) to be a common way of operation for most businesses and people around theworld. The IoT brings great changes to its users in daily life. The challenge is that IoT is an opennetwork that can connect billions of devices and allow these devices to collect data and makedecisions without the intervention of human beings. This poses a major risk of user informationmanipulation and even organizational cybersecurity compromise. To access information, users ofIoT devices must first access these devices. This is done through authentication. Therefore, if theauthentication process is not secure enough, there are high chances of getting the devicescompromised and hence high rates of cyberattacks. It is for this reason that this research aims toinvestigate the effect of using multi-factor authentication (MFA) to decrease cyberattacks on IoTdevices and to improve the cybersecurity of organizations. This study was approached through asystematic literature review. The results indicate that the nature of IoT poses a major securitythreat and that MFA is necessary. The main effect of MFA is that it improves the security oforganizations by ensuring that there is proper identification of the user before being allowedaccess. This research also recommends further research to investigate the effectiveness of MFAin protecting IoT devices.Keywords: multi-factor authentication, MFA, internet of things, IoT, cybersecurity,cyberattacks..3The Effect of Using Multi-Factor Authentication (MFA) to Decrease Attacks on IoTDevices to Improve Cybersecurity in OrganizationsInternet of things (IoT) has become a common way of operation for most businesses andpeople around the world. The technology is increasingly advancing with the IoT bringing greatchanges to its users in daily lives (Farahani et al., 2018; Lu & Xu, 2019). For instance, studying,living, and working all are possible activities that can be integrated with IoT (Lu & Xu, 2019).The environment of IoT is comprised of things such as smart factories, smart homes, and smartbuildings, which continue to remain an essential part of our lives (Lee et al., 2019). The servicesoffered through IoT are delivered over wireless connections to the authorized users. Thechallenge is that this wireless connection is an open channel (Lee et al., 2019). Consequently,IoT becomes open to cyberattacks including impersonation attacks, adversary attacks, privacyinvasions, and replay attacks (Lee et al., 2019). The possibility of cyberattacks on IoT isheightened by the fact that there is a huge number of IoT users, who may get the chance to viewwhat is being sent and received over the open IoT communication channels. There were 4.9billion things in the IoT globally in 2015 (Lu & Xu, 2019). This huge number of things issuggested to be a predictor of security threats. One of the ways to counter cybersecurity incountries is to implement laws and standards that can help achieve a high cybersecurity degree(Lu & Xu, 2019). The challenge is that these laws and standards may not function well if there isno information technology involved.The nature of IoT is that it produces a lot of data. This poses the users at high risk ofcyberattacks (Nieto & Rios, 2019). An ultimate solution to this could be to implement acybersecurity strategy to authenticate the users before they can be allowed to access their data.Indeed, it is reported that for IoT devices to be secure, it is important to have heightened4authentication and access control (Grooby et al., 2019). Currently, the most effective approach toensure high security to the IoT is multi-factor authentication (MFA). MFA is an effective way ofheightening security in the IoT by ensuring users undergo several authentication steps beforebeing allowed to access the services (Kwon et al., 2019). Nonetheless, there is no consolidatingresearch to assess the effect of using MFA on decreasing attacks on IoT devices to improve thecybersecurity of organizations. It is for this reason that the research is done to determine theeffect of using MFA in decreasing attacks on IoT devices to improve cybersecurity.MethodologyThis research was undertaken through a systematic literature review. The importance ofliterature review is that it creates a foundation through which academic inquiries can be made(Xiao & Watson, 2019). In the course of scientific inquiries, it is necessary to only have valid,repeatable, and reliable literature being reviewed. All these factors were considered beforeselecting the research articles to be reviewed for this research.Inclusion CriteriaThe first procedure in the systematic literature review was to establish a criterion for theinclusion of research articles. The IoT and cybersecurity are a dynamic area of research.Therefore, recent articles are an area of concern for …
Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.
Academicwritingcompany.com always strives to give you the best of its services. As a custom essay writing service, we are 100% sure of our services. That is why we ensure that our guarantee of money-back stands, alwaysRead more
The paper that you order at academicwritingcompany.com is 100% original. We ensure that regardless of the position you are, be it with urgent deadlines or hard essays, we give you a paper that is free of plagiarism. We even check our orders with the most advanced anti-plagiarism software in the industry.Read more
The Academicwritingcompany.com thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Academic writing Company requires that the you provide the request within Fifteen (14) days since the completion date and within a period of thirty (30) days for dissertations and research papers.Read more
With Academicwritingcompan.com, your privacy is the most important aspect. First, the academic writing company will never resell your personal information, which include credit cards, to any third party. Not even your lecturer on institution will know that you bought an essay from our academic writing company.Read more
The academic writing company writers know that following essay instructions is the most important part of academic writing. The expert writers will, therefore, work extra hard to ensure that they cooperate with all the requirements without fail. We also count on you to help us provide a better academic paper.Read more