Worldwide Advertising, Inc. (WAI), a new advertising firm, has hired you as an IT consultant. WAI is
currently hiring staff and establishing two locations, and they also have a need to get their internal IT
services configured. The firm does not yet have an IT staff, but when they do, that staff will take over all
aspects of IT administration.
You are required to supply WAI with a solution that describes the implementation and configuration of
their core IT services. The cost of the implementation is not expected to exceed the company’s budget,
so it does not have to be considered in this solution. WAI wants to implement a solution that will meet
the company’s needs for the next two to three years.
There are several details about WAI that will have an impact on your choices:
1. WAI will start with 300 employees in the following departments:
a. Executives (10 employees) – Manage and run the company
b. Accounts and Sales Department (150 employees) – Perform market research and maintain
accounts
c. Creative, Media, and Production Department (100 employees) – Advertising
d. Human Resources and Finances (30 employees) – Perform HR and financial duties
e. IT (10 employees) – Manage IT for the company
2. WAI will have two sites, one in Los Angeles and one in New York. Most staff will be located in
Los Angeles, with at least one person from each of the departments above located in New York
City.
3. Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be
established between the two sites so that inter‐site traffic can be securely tunneled over the
internet. You may make whatever other assumptions you wish about intra‐ and inter‐site
connectivity.
4. Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is
no need to describe them.
5. Some departments will want their data to remain private from other departments (e.g.,
Finances personnel will not want Production staff to see the company’s financial details). Your
team may make assumptions about how data should be shared or kept private.
6. Assumptions can be made regarding any information not included here; however, all
assumptions should be identified.