SlideShare a Scribd company logo
Done By: Derek Wong Lee Jiang Darren Ho Keeve Tan Philip Chuah
[object Object],[object Object],[object Object],[object Object],Main Theme: Theft
Definition of theft: ,[object Object]
Whose Responsibility? ,[object Object],[object Object],[object Object]
Main Factors: ,[object Object],[object Object],[object Object]
Ways to prevent theft (personal responsibility) ,[object Object],[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (personal responsibility) cont. ,[object Object],[object Object]
Ways to prevent theft (For the thief) ,[object Object],[object Object]
Why we think our proposal will work ? (SMART) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Credits ,[object Object],[object Object]

More Related Content

Viewers also liked

Preventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abusePreventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abuse
European Economic and Social Committee - SOC Section
 
Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...
Annika Bergström
 
Illegal drugs
Illegal drugsIllegal drugs
Illegal drugs
scott25gp
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
Crime vocabulary
Crime vocabularyCrime vocabulary
Crime vocabulary
janet25
 
Drugs
DrugsDrugs
Drugs
BigKev
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
Grace Fabrero
 
Types of speeches
Types of speechesTypes of speeches
Types of speeches
Moniba Fatima
 
Types of the speech
Types of the speechTypes of the speech
Types of the speech
suelynmendoza15
 
Gender based violence against women
Gender based violence against womenGender based violence against women
Gender based violence against women
Jagjit Khosla
 

Viewers also liked (10)

Preventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abusePreventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abuse
 
Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...Persuasive techniques in advertising and political speeches & How to write a ...
Persuasive techniques in advertising and political speeches & How to write a ...
 
Illegal drugs
Illegal drugsIllegal drugs
Illegal drugs
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Crime vocabulary
Crime vocabularyCrime vocabulary
Crime vocabulary
 
Drugs
DrugsDrugs
Drugs
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 
Types of speeches
Types of speechesTypes of speeches
Types of speeches
 
Types of the speech
Types of the speechTypes of the speech
Types of the speech
 
Gender based violence against women
Gender based violence against womenGender based violence against women
Gender based violence against women
 

Similar to Cssp project theft

Personal Security & Safety
Personal Security & Safety Personal Security & Safety
Personal Security & Safety
AFOLABI AJAYI
 
What Security Guards Check For When On Patrol
What Security Guards Check For When On PatrolWhat Security Guards Check For When On Patrol
What Security Guards Check For When On Patrol
topseowebmaster
 
Guide to Safety
Guide to SafetyGuide to Safety
Guide to Safety
Lorenzo Clemons
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
Francisco Mateo, CPP, CFE
 
Steve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 Article
Steven Siegel
 
Law Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterLaw Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active Shooter
Benjamin James Davila
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
Kenneth Malte
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom response
Martijn Bakker
 
crimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxcrimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptx
stef983923
 
Slu Nstp lecture
Slu Nstp lectureSlu Nstp lecture
Slu Nstp lecture
Nicasio Jr Casido
 
StreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferStreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying Safer
Resiliency for Life
 
Crime prevention
Crime preventionCrime prevention
Crime prevention
Alecxz Herrera
 
Corporate Travel Security - Part One
Corporate Travel Security - Part OneCorporate Travel Security - Part One
Corporate Travel Security - Part One
Jeff Starck, CPD, CSPM, CHS-II
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
JanMichaelFernandez1
 
Aad's proposal power point
Aad's proposal power pointAad's proposal power point
Aad's proposal power point
lesliemv
 
Corporate Travel Security Services Part One
Corporate Travel Security Services   Part OneCorporate Travel Security Services   Part One
Corporate Travel Security Services Part One
Jeff Starck
 
Get home safely antihijack tips
Get home safely antihijack tipsGet home safely antihijack tips
Get home safely antihijack tips
Andrea Prelorenzo
 
Womens safety Management
Womens safety Management Womens safety Management
Womens safety Management
Sunku Surendra Kumar
 
06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx
JacquelineSicnoy
 
BYU international security briefing
BYU international security briefingBYU international security briefing
BYU international security briefing
byuintsec
 

Similar to Cssp project theft (20)

Personal Security & Safety
Personal Security & Safety Personal Security & Safety
Personal Security & Safety
 
What Security Guards Check For When On Patrol
What Security Guards Check For When On PatrolWhat Security Guards Check For When On Patrol
What Security Guards Check For When On Patrol
 
Guide to Safety
Guide to SafetyGuide to Safety
Guide to Safety
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
 
Steve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 ArticleSteve Siegel CAI Summer 2015 Article
Steve Siegel CAI Summer 2015 Article
 
Law Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active ShooterLaw Enforcement Response to School Hostage/Active Shooter
Law Enforcement Response to School Hostage/Active Shooter
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom response
 
crimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptxcrimeprevention-140115053703-phpapp02.pptx
crimeprevention-140115053703-phpapp02.pptx
 
Slu Nstp lecture
Slu Nstp lectureSlu Nstp lecture
Slu Nstp lecture
 
StreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying SaferStreetWise 2016 Tips on Staying Safer
StreetWise 2016 Tips on Staying Safer
 
Crime prevention
Crime preventionCrime prevention
Crime prevention
 
Corporate Travel Security - Part One
Corporate Travel Security - Part OneCorporate Travel Security - Part One
Corporate Travel Security - Part One
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
 
Aad's proposal power point
Aad's proposal power pointAad's proposal power point
Aad's proposal power point
 
Corporate Travel Security Services Part One
Corporate Travel Security Services   Part OneCorporate Travel Security Services   Part One
Corporate Travel Security Services Part One
 
Get home safely antihijack tips
Get home safely antihijack tipsGet home safely antihijack tips
Get home safely antihijack tips
 
Womens safety Management
Womens safety Management Womens safety Management
Womens safety Management
 
06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx
 
BYU international security briefing
BYU international security briefingBYU international security briefing
BYU international security briefing
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Cssp project theft

  • 1. Done By: Derek Wong Lee Jiang Darren Ho Keeve Tan Philip Chuah
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.