100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE & RISK MITIGATION UPDATED QUESTIONS AND ANSWERS 2026

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
29-01-2026
Escrito en
2025/2026

IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE & RISK MITIGATION UPDATED QUESTIONS AND ANSWERS 2026

Institución
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE
Grado
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE
Grado
IT CAPSTONE PROJECT: SECURITY DESIGN, ARCHITECTURE

Información del documento

Subido en
29 de enero de 2026
Número de páginas
18
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Multi-Factor Authentication 1


IT CAPSTONE PROJECT: SECURITY
DESIGN, ARCHITECTURE & RISK
MITIGATION UPDATED QUESTIONS AND
ANSWERS 2026




Multi-Factor Authentication

Western Governors University

IT Capstone Written Project -

C769

,Multi-Factor Authentication 2


Table of Contents

A. Proposal Overview...............................................................................................................................2
A.1 Problem Summary.............................................................................................................................3
A.2 IT Solution........................................................................................................................................3
A.3 Implementation Plan.........................................................................................................................3
B. Review of Other Works and B .1 Relation of Artifacts to Project Development..................................3
Review of work 1.................................................................................................................................4
Review of work 2.................................................................................................................................4
Review of work 3.................................................................................................................................4
Review of work 4.................................................................................................................................4
C. Project Rationale.....................................................................................................................................5
D. Current Project Environment...................................................................................................................5
E. Methodology............................................................................................................................................5
F. Project Goals, Objectives, and Deliverables............................................................................................6
F1. Goals, Objectives, and Deliverables Table.........................................................................................6
F.2 Goals, Objectives, and Deliverables Descriptions..............................................................................7
G. Project Timeline with Milestones.........................................................................................................7
H. Outcome...............................................................................................................................................8
I. References............................................................................................................................................8
Appendix A...............................................................................................................................................10
Title of Appendix.......................................................................................................................................11
Appendix B................................................................................................................................................11
Title of Appendix.......................................................................................................................................12
Appendix C................................................................................................................................................12
Title of Appendix.......................................................................................................................................13
Appendix D...............................................................................................................................................13
Title of Appendix.......................................................................................................................................14

, Multi-Factor Authentication 3


A. Proposal Overview

A.1 Problem Summary

Cybersecurity threats are constantly changing in today's digital environment, putting

sensitive data and organizational assets at serious risk. The compromising of user credentials via

techniques like phishing attempts or attacks using brute force is one of the most frequent

vulnerabilities. These days, traditional password-based authentication techniques are insufficient

to fend off these advanced attacks. Consequently, to reduce the possibility of unwanted access to

systems and data, it is imperative to implement stronger security measures.

A.2 IT Solution

We suggest using multi-factor authentication (MFA) by Microsoft as a solution to this problem.

Before allowing access to a system or application, multi-factor authentication (MFA) requires

users to present two or more pieces of identification. These variables usually consist of three

things: something the person possesses (like a smart card or mobile device), something they

know (like a password), and something they are (like biometric information like fingerprints or

facial recognition).

Even if one factor is compromised, MFA considerably improves an organization's security

posture by implementing numerous layers of authentication and lowering the probability of

unauthorized access. Critical systems and data are protected by this extra security layer against a

variety of cyber threats, including phishing, social engineering, and password theft.



A.3 Implementation Plan

This section should contain the details of an implementation plan. First, provide details

on the different phases. Then, explain how the project will be carried out and why it will be

carried out in that manner. Finally, discuss the plan for implementing the project.
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
YoursSmarttutor

Conoce al vendedor

Seller avatar
YoursSmarttutor Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
Nuevo en Stuvia
Miembro desde
1 mes
Número de seguidores
0
Documentos
417
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes