WGU IT CAPSTONE TASK 2
WRITTEN PROJECT C769 LATEST
GUIDE 2025
Multi-Factor Authentication
Western Governors University
IT Capstone Written Project - C769
5/12/2025
,TUTOR23 RESOURCES
Table of Contents
A. Proposal Overview ................................................................................................................................ 2
A.1 Problem Summary .............................................................................................................................. 3
A.2 IT Solution .......................................................................................................................................... 3
A.3 Implementation Plan ........................................................................................................................... 3
B. Review of Other Works and B .1 Relation of Artifacts to Project Development .................................. 3
Review of work 1 .................................................................................................................................. 4
Review of work 2 .................................................................................................................................. 4
Review of work 3 .................................................................................................................................. 4
Review of work 4 .................................................................................................................................. 4
C. Project Rationale....................................................................................................................................... 5
D. Current Project Environment .................................................................................................................... 5
E. Methodology ............................................................................................................................................. 5
F. Project Goals, Objectives, and Deliverables ............................................................................................. 6
F1. Goals, Objectives, and Deliverables Table.......................................................................................... 6
F.2 Goals, Objectives, and Deliverables Descriptions............................................................................... 7
G. Project Timeline with Milestones .......................................................................................................... 7
H. Outcome ................................................................................................................................................ 8
I. References ............................................................................................................................................. 8
Appendix A ................................................................................................................................................. 10
Title of Appendix ........................................................................................................................................ 11
Appendix B ................................................................................................................................................. 11
Title of Appendix ........................................................................................................................................ 12
Appendix C ................................................................................................................................................. 12
Title of Appendix ........................................................................................................................................ 13
Appendix D ................................................................................................................................................. 13
Title of Appendix ........................................................................................................................................ 14
, TUTOR23 RESOURCES
A. Proposal Overview
A.1 Problem Summary
Cybersecurity threats are constantly changing in today's digital environment, putting
sensitive data and organizational assets at serious risk. The compromising of user credentials via
techniques like phishing attempts or attacks using brute force is one of the most frequent
vulnerabilities. These days, traditional password-based authentication techniques are insufficient
to fend off these advanced attacks. Consequently, to reduce the possibility of unwanted access to
systems and data, it is imperative to implement stronger security measures.
A.2 IT Solution
We suggest using multi-factor authentication (MFA) by Microsoft as a solution to this problem.
Before allowing access to a system or application, multi-factor authentication (MFA) requires
users to present two or more pieces of identification. These variables usually consist of three
things: something the person possesses (like a smart card or mobile device), something they
know (like a password), and something they are (like biometric information like fingerprints or
facial recognition).
Even if one factor is compromised, MFA considerably improves an organization's security
posture by implementing numerous layers of authentication and lowering the probability of
unauthorized access. Critical systems and data are protected by this extra security layer against a
variety of cyber threats, including phishing, social engineering, and password theft.
A.3 Implementation Plan
This section should contain the details of an implementation plan. First, provide details
on the different phases. Then, explain how the project will be carried out and why it will be
carried out in that manner. Finally, discuss the plan for implementing the project.