SlideShare une entreprise Scribd logo
1  sur  12
Done By: Derek Wong Lee Jiang Darren Ho Keeve Tan Philip Chuah
[object Object],[object Object],[object Object],[object Object],Main Theme: Theft
Definition of theft: ,[object Object]
Whose Responsibility? ,[object Object],[object Object],[object Object]
Main Factors: ,[object Object],[object Object],[object Object]
Ways to prevent theft (personal responsibility) ,[object Object],[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (For the thief) ,[object Object],[object Object]
Why we think our proposal will work ? (SMART) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Credits ,[object Object],[object Object]

Contenu connexe

En vedette

Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Annika Bergström
 
Illegal drugs
Illegal drugsIllegal drugs
Illegal drugsscott25gp
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Crime vocabulary
Crime vocabularyCrime vocabulary
Crime vocabularyjanet25
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protectionGrace Fabrero
 
Gender based violence against women
Gender based violence against womenGender based violence against women
Gender based violence against womenJagjit Khosla
 

En vedette (10)

Preventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abusePreventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abuse
 
Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...
 
Illegal drugs
Illegal drugsIllegal drugs
Illegal drugs
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Crime vocabulary
Crime vocabularyCrime vocabulary
Crime vocabulary
 
Drugs
DrugsDrugs
Drugs
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 
Types of speeches
Types of speechesTypes of speeches
Types of speeches
 
Types of the speech
Types of the speechTypes of the speech
Types of the speech
 
Gender based violence against women
Gender based violence against womenGender based violence against women
Gender based violence against women
 

Similaire à Cssp project theft

Personal Security & Safety
Personal Security & Safety Personal Security & Safety
Personal Security & Safety AFOLABI AJAYI
 
What Security Guards Check For When On Patrol
What Security Guards Check For When On PatrolWhat Security Guards Check For When On Patrol
What Security Guards Check For When On Patroltopseowebmaster
 
Steve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteven Siegel
 
Law Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterLaw Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterBenjamin James Davila
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenKenneth Malte
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom responseMartijn Bakker
 
crimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxcrimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxstef983923
 
StreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferStreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferResiliency for Life
 
Aad's proposal power point
Aad's proposal power pointAad's proposal power point
Aad's proposal power pointlesliemv
 
Corporate Travel Security Services Part One
Corporate Travel Security Services   Part OneCorporate Travel Security Services   Part One
Corporate Travel Security Services Part OneJeff Starck
 
Get home safely antihijack tips
Get home safely antihijack tipsGet home safely antihijack tips
Get home safely antihijack tipsAndrea Prelorenzo
 
BYU international security briefing
BYU international security briefingBYU international security briefing
BYU international security briefingbyuintsec
 

Similaire à Cssp project theft (20)

Personal Security & Safety
Personal Security & Safety Personal Security & Safety
Personal Security & Safety
 
What Security Guards Check For When On Patrol
What Security Guards Check For When On PatrolWhat Security Guards Check For When On Patrol
What Security Guards Check For When On Patrol
 
Guide to Safety
Guide to SafetyGuide to Safety
Guide to Safety
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
 
Steve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 Article
 
Law Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterLaw Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active Shooter
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom response
 
crimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxcrimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptx
 
Slu Nstp lecture
Slu Nstp lectureSlu Nstp lecture
Slu Nstp lecture
 
StreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferStreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying Safer
 
Crime prevention
Crime preventionCrime prevention
Crime prevention
 
Corporate Travel Security - Part One
Corporate Travel Security - Part OneCorporate Travel Security - Part One
Corporate Travel Security - Part One
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
 
Aad's proposal power point
Aad's proposal power pointAad's proposal power point
Aad's proposal power point
 
Corporate Travel Security Services Part One
Corporate Travel Security Services   Part OneCorporate Travel Security Services   Part One
Corporate Travel Security Services Part One
 
Get home safely antihijack tips
Get home safely antihijack tipsGet home safely antihijack tips
Get home safely antihijack tips
 
Womens safety Management
Womens safety Management Womens safety Management
Womens safety Management
 
06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx
 
BYU international security briefing
BYU international security briefingBYU international security briefing
BYU international security briefing
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Cssp project theft

  • 1. Done By: Derek Wong Lee Jiang Darren Ho Keeve Tan Philip Chuah
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.