Design a vulnerability chart to coordinate the various elements of the possible fraud within TJX Companies.

Analyze the internal and external environments of a Specific Organization.
September 7, 2019
Describe and evaluate how Pfizer is allowing employees to be more productive with its PfizerWorks.
September 7, 2019

Design a vulnerability chart to coordinate the various elements of the possible fraud within TJX Companies.

Question Description

OPTION #1: THEFT AND CONCEALMENT INVESTIGATION (FOLLOW ATTACHED APA EXAMPLE)

Read the following case study and respond to the questions that follow: Walker, R. (2013). Maxxed out: TJX Companies and the Largest-Ever Consumer Data Breach. Kellog Case Publishing. Retrieved from https://hbsp.harvard.edu/tu/2f41e106

Assume you are an agent with the Federal Bureau of Investigation (FBI). You just captured the Soup Nazi and have been tasked with spearheading a secondary investigation into TJX Companies’ culpability in the data breach.

  1. Explain in detail how your task force would investigate TJX without alerting them to your new assignment, including how to collect the evidence, and which evidence to target.
  2. Design a vulnerability chart to coordinate the various elements of the possible fraud within TJX Companies.
  3. Include rationale and supporting references for your strategy.

Please submit a paper in a Word document of three to five pages in length, not including the title and reference pages. If you wish to include calculations in support of your response, place them in the form of a table within your paper. Cite at least two resources supporting your responses, other than the course textbook.