SlideShare une entreprise Scribd logo
1  sur  12
Done By: Derek Wong Lee Jiang Darren Ho Keeve Tan Philip Chuah
[object Object],[object Object],[object Object],[object Object],Main Theme: Theft
Definition of theft: ,[object Object]
Whose Responsibility? ,[object Object],[object Object],[object Object]
Main Factors: ,[object Object],[object Object],[object Object]
Ways to prevent theft (personal responsibility) ,[object Object],[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (For the thief) ,[object Object],[object Object]
Why we think our proposal will work ? (SMART) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Credits ,[object Object],[object Object]

Contenu connexe

En vedette

Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Annika Bergström
 
Illegal drugs
Illegal drugsIllegal drugs
Illegal drugsscott25gp
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Crime vocabulary
Crime vocabularyCrime vocabulary
Crime vocabularyjanet25
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protectionGrace Fabrero
 
Gender based violence against women
Gender based violence against womenGender based violence against women
Gender based violence against womenJagjit Khosla
 

En vedette (10)

Preventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abusePreventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abuse
 
Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...
 
Illegal drugs
Illegal drugsIllegal drugs
Illegal drugs
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Crime vocabulary
Crime vocabularyCrime vocabulary
Crime vocabulary
 
Drugs
DrugsDrugs
Drugs
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 
Types of speeches
Types of speechesTypes of speeches
Types of speeches
 
Types of the speech
Types of the speechTypes of the speech
Types of the speech
 
Gender based violence against women
Gender based violence against womenGender based violence against women
Gender based violence against women
 

Similaire à Cssp project theft

Personal Security & Safety
Personal Security & Safety Personal Security & Safety
Personal Security & Safety AFOLABI AJAYI
 
What Security Guards Check For When On Patrol
What Security Guards Check For When On PatrolWhat Security Guards Check For When On Patrol
What Security Guards Check For When On Patroltopseowebmaster
 
Steve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteven Siegel
 
Law Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterLaw Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterBenjamin James Davila
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenKenneth Malte
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom responseMartijn Bakker
 
crimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxcrimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxstef983923
 
StreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferStreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferResiliency for Life
 
Aad's proposal power point
Aad's proposal power pointAad's proposal power point
Aad's proposal power pointlesliemv
 
Corporate Travel Security Services Part One
Corporate Travel Security Services   Part OneCorporate Travel Security Services   Part One
Corporate Travel Security Services Part OneJeff Starck
 
Get home safely antihijack tips
Get home safely antihijack tipsGet home safely antihijack tips
Get home safely antihijack tipsAndrea Prelorenzo
 
BYU international security briefing
BYU international security briefingBYU international security briefing
BYU international security briefingbyuintsec
 

Similaire à Cssp project theft (20)

Personal Security & Safety
Personal Security & Safety Personal Security & Safety
Personal Security & Safety
 
What Security Guards Check For When On Patrol
What Security Guards Check For When On PatrolWhat Security Guards Check For When On Patrol
What Security Guards Check For When On Patrol
 
Guide to Safety
Guide to SafetyGuide to Safety
Guide to Safety
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
 
Steve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 Article
 
Law Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterLaw Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active Shooter
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom response
 
crimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxcrimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptx
 
Slu Nstp lecture
Slu Nstp lectureSlu Nstp lecture
Slu Nstp lecture
 
StreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferStreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying Safer
 
Crime prevention
Crime preventionCrime prevention
Crime prevention
 
Corporate Travel Security - Part One
Corporate Travel Security - Part OneCorporate Travel Security - Part One
Corporate Travel Security - Part One
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
 
Aad's proposal power point
Aad's proposal power pointAad's proposal power point
Aad's proposal power point
 
Corporate Travel Security Services Part One
Corporate Travel Security Services   Part OneCorporate Travel Security Services   Part One
Corporate Travel Security Services Part One
 
Get home safely antihijack tips
Get home safely antihijack tipsGet home safely antihijack tips
Get home safely antihijack tips
 
Womens safety Management
Womens safety Management Womens safety Management
Womens safety Management
 
06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx
 
BYU international security briefing
BYU international security briefingBYU international security briefing
BYU international security briefing
 

Dernier

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Dernier (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Cssp project theft

  • 1. Done By: Derek Wong Lee Jiang Darren Ho Keeve Tan Philip Chuah
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.