0 Comment

ITS405 Portfolio Project ScenarioWorldwide Advertising, Inc. (WAI), a new advertising firm, has hired you as an IT consultant. WAI is currently hiring staff and establishing two locations, and they also need to get their internal IT services configured. The firm does not yet have an IT staff, but when they do, that staff will take over all aspects of IT administration. You are required to supply WAI with a solution that describes the implementation and configuration of their core IT services. The cost of the implementation is not expected to exceed the company’s budget, so it does not have to be considered in this solution. WAI wants to implement a solution that will meet the company’s needs for the next two to three years.There are several details about WAI that will have an impact on your choices:1. WAI will start with 300 employees in the following departments:a. Executives (10 employees)—Manage and run the companyb. Accounts and Sales Department (150 employees)—Perform market research and maintain accountc. Creative, Media, and Production Department (100 employees)—Advertisingd. Human Resources and Finances (30 employees)—Perform HR and financial duties e. IT (10 employees)—Manage IT for the company.2. WAI will have two sites, one in Los Angeles and one in New York. Most of the staff will be located in Los Angeles, with at least one person from each of the departments (above) located in New York City.3. Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic can be securely tunneled over the internet. You may make whatever other assumptions you wish about intra- and inter-site connectivity.4. Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.5. Some departments will want their data to remain private from other departments (e.g., finance personnel will not want production staff to see the company’s financial details). Your team may make assumptions about how data should be shared or kept private.6. Assumptions can be made regarding any information not included here; however, all assumptions should be identified.