WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Evaluating the effectiveness of multi-factor Authentication (MFA) in mitigating cyber attacks

Hamza Musa Musa

Download Paper

Paper Contents

Abstract

As cyber attacks continue to grow in frequency and sophistication, traditional single-factor authentication (SFA) methodsrelying solely on passwordshave become insufficient in securing digital systems. Multi-Factor Authentication (MFA) has emerged as a critical security mechanism by requiring users to present two or more independent credentials, thereby providing a layered defense against credential-based threats. This study evaluates the effectiveness of MFA in mitigating cyber attacks through an in-depth analysis of empirical data, user perception, implementation challenges, and high-profile security breaches from 2020 to 2025. The findings reveal that while MFA significantly reduces account compromise risks and lowers breach-related costs, its effectiveness depends on factors such as the type of authentication used, user compliance, and integration into broader cybersecurity frameworks like Zero Trust Architecture. Usability challenges, particularly in resource-constrained environments, also hinder widespread adoption. The study concludes that MFA, when properly implemented and supported by user education and secure technologies, serves as a cornerstone of contemporary cybersecurity strategy. Recommendations include prioritizing phishing-resistant methods, improving user-centric design, and adopting adaptive, policy-driven authentication practices.1. INTRODUCTIONThe rise of cyber attacks in both frequency and sophistication has rendered traditional security mechanisms, particularly single-factor authentication (SFA) methods such as passwords, increasingly ineffective. As organizations digitize operations and data migrates to cloud environments, the threat landscape continues to evolve, exposing critical vulnerabilities in conventional access control systems. Recent cybersecurity reports indicate that compromised credentials remain one of the most common causes of data breaches worldwide (Verizon, 2023). In many instances, attackers exploit weak, reused, or phished passwords to gain unauthorized access to sensitive systems, often without triggering immediate detection (IBM, 2023).To address these vulnerabilities, Multi-Factor Authentication (MFA) has emerged as a widely endorsed solution. MFA strengthens authentication by requiring users to present at least two of the following factors: something they know (e.g., a password or PIN), something they have (e.g., a smartphone, OTP token, or smart card), and something they are (e.g., biometrics like fingerprint or facial recognition) (NIST, 2017). The rationale behind MFA is to reduce the likelihood that an attacker can obtain all required factors simultaneously, thus providing a layered defense against credential-based intrusions.Global technology firms and security standards bodies have strongly advocated for MFA implementation. Microsoft reported that 99.9% of account compromise incidents could be prevented simply by enabling MFA (Microsoft, 2020). Similarly, Google found that MFA blocked 100% of automated bot attacks and up to 76% of targeted phishing attempts (Grassi, Garcia, & Fenton, 2017). These statistics have prompted regulatory frameworks such as the Payment Card Industry Data Security Standard (PCI DSS) and guidelines from the National Institute of Standards and Technology (NIST) to recommend or mandate the use of MFA in securing access to critical systems and data (PCI SSC, 2022).Despite its efficacy, the adoption of MFA is not without limitations. Several technical and human-centric challenges persist. For example, SMS-based MFA, still widely used, is vulnerable to SIM-swapping, social engineering, and interception attacks (Gupta, Agrawal, & Yamaguchi, 2019). Additionally, usability barriers such as poor user interface design, limited device compatibility, and complex setup processes deter widespread adoption, especially among non-technical users (Alkaldi & Renaud, 2020). Emerging attack strategies like MFA fatigue, in which attackers exploit users by sending repeated MFA push requests until the user unknowingly grants access, have further exposed potential weaknesses in commonly used implementations (Zetter, 2022).Furthermore, the successful deployment of MFA often requires integration with broader cybersecurity frameworks. This includes incorporating Zero Trust Architecture (ZTA), where continuous verification, least privilege access, and contextual risk assessment play crucial roles in securing dynamic, perimeter-less environments (Rose et al., 2020). Without such integration, MFA may function as an isolated security control, unable to address systemic and architectural gaps.Given these evolving dynamics, a comprehensive evaluation of MFAs real-world effectiveness is essential. While the theoretical benefits of MFA are well-documented, its practical deployment, user perception, and resilience against advanced attacks remain under-researched in many contexts, including in developing economies. This study aims to fill that gap by critically assessing MFAs capabilities and limitations through a synthesis of empirical evidence, case studies, and scholarly literature. The goal is to provide insights that can guide organizations in implementing MFA as part of a robust, adaptive cybersecurity strategy.

Copyright

Copyright © 2025 Hamza Musa . This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS50800019961
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us