100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE & RISK MITIGATION UPDATED QUESTIONS AND ANSWERS 2026

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
29-01-2026
Written in
2025/2026

IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE & RISK MITIGATION UPDATED QUESTIONS AND ANSWERS 2026

Institution
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE
Course
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE
Course
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE

Document information

Uploaded on
January 29, 2026
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Multi-Factor Authentication 1


IT CAPSTONE PROJECT: SECURITY
DESIGN, ARCHITECTURE & RISK
MITIGATION UPDATED QUESTIONS AND
ANSWERS 2026




Multi-Factor Authentication

Western Governors University

IT Capstone Written Project -

C769

,Multi-Factor Authentication 2


Table of Contents

A. Proposal Overview...............................................................................................................................2
A.1 Problem Summary.............................................................................................................................3
A.2 IT Solution........................................................................................................................................3
A.3 Implementation Plan.........................................................................................................................3
B. Review of Other Works and B .1 Relation of Artifacts to Project Development..................................3
Review of work 1.................................................................................................................................4
Review of work 2.................................................................................................................................4
Review of work 3.................................................................................................................................4
Review of work 4.................................................................................................................................4
C. Project Rationale.....................................................................................................................................5
D. Current Project Environment...................................................................................................................5
E. Methodology............................................................................................................................................5
F. Project Goals, Objectives, and Deliverables............................................................................................6
F1. Goals, Objectives, and Deliverables Table.........................................................................................6
F.2 Goals, Objectives, and Deliverables Descriptions..............................................................................7
G. Project Timeline with Milestones.........................................................................................................7
H. Outcome...............................................................................................................................................8
I. References............................................................................................................................................8
Appendix A...............................................................................................................................................10
Title of Appendix.......................................................................................................................................11
Appendix B................................................................................................................................................11
Title of Appendix.......................................................................................................................................12
Appendix C................................................................................................................................................12
Title of Appendix.......................................................................................................................................13
Appendix D...............................................................................................................................................13
Title of Appendix.......................................................................................................................................14

, Multi-Factor Authentication 3


A. Proposal Overview

A.1 Problem Summary

Cybersecurity threats are constantly changing in today's digital environment, putting

sensitive data and organizational assets at serious risk. The compromising of user credentials via

techniques like phishing attempts or attacks using brute force is one of the most frequent

vulnerabilities. These days, traditional password-based authentication techniques are insufficient

to fend off these advanced attacks. Consequently, to reduce the possibility of unwanted access to

systems and data, it is imperative to implement stronger security measures.

A.2 IT Solution

We suggest using multi-factor authentication (MFA) by Microsoft as a solution to this problem.

Before allowing access to a system or application, multi-factor authentication (MFA) requires

users to present two or more pieces of identification. These variables usually consist of three

things: something the person possesses (like a smart card or mobile device), something they

know (like a password), and something they are (like biometric information like fingerprints or

facial recognition).

Even if one factor is compromised, MFA considerably improves an organization's security

posture by implementing numerous layers of authentication and lowering the probability of

unauthorized access. Critical systems and data are protected by this extra security layer against a

variety of cyber threats, including phishing, social engineering, and password theft.



A.3 Implementation Plan

This section should contain the details of an implementation plan. First, provide details

on the different phases. Then, explain how the project will be carried out and why it will be

carried out in that manner. Finally, discuss the plan for implementing the project.
$13.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
YoursSmarttutor

Get to know the seller

Seller avatar
YoursSmarttutor Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 month
Number of followers
0
Documents
417
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions