100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU IT CAPSTONE TASK 2 WRITTEN PROJECT C769 LATEST GUIDE 2025

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
09-03-2025
Written in
2024/2025

WGU IT CAPSTONE TASK 2 WRITTEN PROJECT C769 LATEST GUIDE 2025 Multi-Factor Authentication Western Governors University IT Capstone Written Project - C769 5/12/2025 TUTOR23 RESOURCES Table of Contents A. Proposal Overview ................................................................................................................................ 2 A.1 Problem Summary.............................................................................................................................. 3 A.2 IT Solution.......................................................................................................................................... 3 A.3 Implementation Plan........................................................................................................................... 3 B. Review of Other Works and B .1 Relation of Artifacts to Project Development .................................. 3 Review of work 1.................................................................................................................................. 4 Review of work 2.................................................................................................................................. 4 Review of work 3.................................................................................................................................. 4 Review of work 4.................................................................................................................................. 4 C. Project Rationale....................................................................................................................................... 5 D. Current Project Environment.................................................................................................................... 5 E. Methodology............................................................................................................................................. 5 F. Project Goals, Objectives, and Deliverables ............................................................................................. 6 F1. Goals, Objectives, and Deliverables Table.......................................................................................... 6 F.2 Goals, Objectives, and Deliverables Descriptions............................................................................... 7 G. Project Timeline with Milestones.......................................................................................................... 7 H. Outcome ................................................................................................................................................ 8 I. References............................................................................................................................................. 8 Appendix A................................................................................................................................................. 10 Title of Appendix ........................................................................................................................................ 11 Appendix B................................................................................................................................................. 11 Title of Appendix ........................................................................................................................................ 12 Appendix C................................................................................................................................................. 12 Title of Appendix ........................................................................................................................................ 13 Appendix D................................................................................................................................................. 13 Title of Appendix ........................................................................................................................................ 14 TUTOR23 RESOURCES A. Proposal Overview A.1 Problem Summary Cybersecurity threats are constantly changing in today's digital environment, putting sensitive data and organizational assets at serious risk. The compromising of user credentials via techniques like phishing attempts or attacks using brute force is one of the most frequent vulnerabilities. These days, traditional password-based authentication techniques are insufficient to fend off these advanced attacks. Consequently, to reduce the possibility of unwanted access to systems and data, it is imperative to implement stronger security measures. A.2 IT Solution We suggest using multi-factor authentication (MFA) by Microsoft as a solution to this problem. Before allowing access to a system or application, multi-factor authentication (MFA) requires users to present two or more pieces of identification. These variables usually consist of three things: something the person possesses (like a smart card or mobile device), something they know (like a password), and something they are (like biometric information like fingerprints or facial recognition). Even if one factor is compromised, MFA considerably improves an organization's security posture by implementing numerous layers of authentication and lowering the probability of unauthorized access. Critical systems and data are protected by this extra security layer against a variety of cyber threats, including phishing, social engineering, and pa

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
March 9, 2025
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

TUTOR23 RESOURCES



WGU IT CAPSTONE TASK 2

WRITTEN PROJECT C769 LATEST

GUIDE 2025
Multi-Factor Authentication

Western Governors University

IT Capstone Written Project - C769

5/12/2025

,TUTOR23 RESOURCES


Table of Contents

A. Proposal Overview ................................................................................................................................ 2
A.1 Problem Summary .............................................................................................................................. 3
A.2 IT Solution .......................................................................................................................................... 3
A.3 Implementation Plan ........................................................................................................................... 3
B. Review of Other Works and B .1 Relation of Artifacts to Project Development .................................. 3
Review of work 1 .................................................................................................................................. 4
Review of work 2 .................................................................................................................................. 4
Review of work 3 .................................................................................................................................. 4
Review of work 4 .................................................................................................................................. 4
C. Project Rationale....................................................................................................................................... 5
D. Current Project Environment .................................................................................................................... 5
E. Methodology ............................................................................................................................................. 5
F. Project Goals, Objectives, and Deliverables ............................................................................................. 6
F1. Goals, Objectives, and Deliverables Table.......................................................................................... 6
F.2 Goals, Objectives, and Deliverables Descriptions............................................................................... 7
G. Project Timeline with Milestones .......................................................................................................... 7
H. Outcome ................................................................................................................................................ 8
I. References ............................................................................................................................................. 8
Appendix A ................................................................................................................................................. 10
Title of Appendix ........................................................................................................................................ 11
Appendix B ................................................................................................................................................. 11
Title of Appendix ........................................................................................................................................ 12
Appendix C ................................................................................................................................................. 12
Title of Appendix ........................................................................................................................................ 13
Appendix D ................................................................................................................................................. 13
Title of Appendix ........................................................................................................................................ 14

, TUTOR23 RESOURCES


A. Proposal Overview

A.1 Problem Summary

Cybersecurity threats are constantly changing in today's digital environment, putting

sensitive data and organizational assets at serious risk. The compromising of user credentials via

techniques like phishing attempts or attacks using brute force is one of the most frequent

vulnerabilities. These days, traditional password-based authentication techniques are insufficient

to fend off these advanced attacks. Consequently, to reduce the possibility of unwanted access to

systems and data, it is imperative to implement stronger security measures.

A.2 IT Solution

We suggest using multi-factor authentication (MFA) by Microsoft as a solution to this problem.

Before allowing access to a system or application, multi-factor authentication (MFA) requires

users to present two or more pieces of identification. These variables usually consist of three

things: something the person possesses (like a smart card or mobile device), something they

know (like a password), and something they are (like biometric information like fingerprints or

facial recognition).

Even if one factor is compromised, MFA considerably improves an organization's security

posture by implementing numerous layers of authentication and lowering the probability of

unauthorized access. Critical systems and data are protected by this extra security layer against a

variety of cyber threats, including phishing, social engineering, and password theft.



A.3 Implementation Plan

This section should contain the details of an implementation plan. First, provide details

on the different phases. Then, explain how the project will be carried out and why it will be

carried out in that manner. Finally, discuss the plan for implementing the project.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
lectdenis Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2042
Member since
4 year
Number of followers
1588
Documents
6230
Last sold
4 hours ago
online tutor

FOR THE BEST ASSIGNMENTS AND HOMEWORKS ,TO HELP AND TUTORING ALL KIND OF EXAMS

3.7

289 reviews

5
128
4
48
3
47
2
18
1
48

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions