SlideShare a Scribd company logo
1 of 45
Cyber Fear
Obstacle to information sharing
Dubai 10th April, 2018, Dubai, UAE
Jorge Sebastiao, CISSP
CTO Eco-system
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge
Disclaimer & Copyright
• Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any
comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended
for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior
consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor
Huawei can be held responsible for any decision made on the basis of the information cited.
• The content of this presentation is based on information gathered in good faith from both primary and
secondary sources and is believed to be correct at the time of publication. The author can however provide no
guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions
taken that subsequently prove incorrect.
• The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim
that these comprise the only practices to be followed. The readers are urged to make informed decisions in their
usage.
• The information presented in this presentation is not intended to be, and should not be construed as, an offer to
sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will
be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized
offering documents and related disclosure schedules or similar disclosure documentation.
• All logos and brand names belong to their respective owners and we do not claim any relationship or association,
implied or otherwise, with them.
• Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly.
• Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is
regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate
the same to author.
• Any omissions, in terms of attribution, may be due to an error of author and not intentional.
Airport Security files
found on the street
Using free Hotel Wifi
Doctors using snapchat
to send medical files
Equifax 1 Billion users
personal info leaked
CEO send 23,000 Private
keys via email
Bad VPN Tracking
1.4Billion Passwords
Mobile keyboard leaks
31 Millions Users
Facebook Scandal 85Million Profiles
#DeleteFacebook
Facebook Eroding Data Policy
Facebook Eroding Data Policy
Facebook Eroding Data Policy
Facebook Eroding Data Policy
Facebook Eroding Data Policy
Facebook Eroding Data Policy
Facebook Eroding Data Policy
Facebook Eroding Data Policy
Facebook Data Scraping
Facebook Terrorism Justified
Chrome Is Scanning Your
Files, & People Are Freaking
Out
Worried about what Facebook
knows? Check out Google
Google the right to be
forgotten
Google
tracking
when off the
grid
and
not sharing
location…
Google 46Billion data
points predict Medical
AI & Security Skynet China
AI Deep Voice 3.7 Sec
Clone your voice
AI DeepFake can
replace any face on any
Video
IoT Data Sharing
Your SmartTV is listening
Fitness tracking and
location of US secret bases
Cops don’t need warrant
for autonomous car data
Outdated Assumptions?
Effective Countermeasures
Right Risk Appetite?
Awareness Effectiveness
Awareness - Changing Behavior
Will do it?
B =
BEHAVIOR
Want
to do it?
M
MOTIVATION
Ability to
do it?
ABILITY
T
TRIGGER
A
All 3 for behavior change
Final Goal Is
Total Integrated Security
With Awareness
Information
Security
Management
IoT, Device
Security
Management
Education
Training
Awareness
A6 – Process
Business Risk
Controls
Maturity
Have I shared too much?
Should I be scared
Everyone as a plan until they
get hit
Mike Tyson
Jorge Sebastiao, CISSP
CTO Eco-system
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge

More Related Content

Similar to Cyber Fear: Information Sharing Obstacle

CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2Jorge Sebastiao
 
Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"Jorge Sebastiao
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Jorge Sebastiao
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityJorge Sebastiao
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?Jorge Sebastiao
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsJorge Sebastiao
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasJorge Sebastiao
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH editionJorge Sebastiao
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Jorge Sebastiao
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Jorge Sebastiao
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionMichael Klein
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesLiberteks
 
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docx
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docxSocial Media in a Law Enforcement WorkplaceClarissa N. Iverson.docx
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docxrosemariebrayshaw
 
Juliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspectenJuliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspectenHans Hoornstra
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Designing for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, PortugalDesigning for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, PortugalAndreas Woelk
 
Example Of A Hypothesis In A Rese. Online assignment writing service.
Example Of A Hypothesis In A Rese. Online assignment writing service.Example Of A Hypothesis In A Rese. Online assignment writing service.
Example Of A Hypothesis In A Rese. Online assignment writing service.Tara Daly
 
7 Key Metrics In Measuring Content Effectiveness
7 Key Metrics In Measuring Content Effectiveness7 Key Metrics In Measuring Content Effectiveness
7 Key Metrics In Measuring Content EffectivenessSearch Engine Journal
 
Tweens Presentation
Tweens PresentationTweens Presentation
Tweens Presentationsharon7111
 

Similar to Cyber Fear: Information Sharing Obstacle (20)

CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2
 
Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber security
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threats
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and Gas
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global Edition
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for Dummies
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docx
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docxSocial Media in a Law Enforcement WorkplaceClarissa N. Iverson.docx
Social Media in a Law Enforcement WorkplaceClarissa N. Iverson.docx
 
Juliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspectenJuliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspecten
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Designing for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, PortugalDesigning for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, Portugal
 
Example Of A Hypothesis In A Rese. Online assignment writing service.
Example Of A Hypothesis In A Rese. Online assignment writing service.Example Of A Hypothesis In A Rese. Online assignment writing service.
Example Of A Hypothesis In A Rese. Online assignment writing service.
 
7 Key Metrics In Measuring Content Effectiveness
7 Key Metrics In Measuring Content Effectiveness7 Key Metrics In Measuring Content Effectiveness
7 Key Metrics In Measuring Content Effectiveness
 
Tweens Presentation
Tweens PresentationTweens Presentation
Tweens Presentation
 

More from Jorge Sebastiao

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchainJorge Sebastiao
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3Jorge Sebastiao
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startupsJorge Sebastiao
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3Jorge Sebastiao
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0Jorge Sebastiao
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart CityJorge Sebastiao
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0Jorge Sebastiao
 
Togaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction OverviewTogaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction OverviewJorge Sebastiao
 
Protecting cloud computing using big data v11
Protecting cloud computing using big data v11Protecting cloud computing using big data v11
Protecting cloud computing using big data v11Jorge Sebastiao
 
National Cyber Security Crypto Program
National Cyber Security Crypto ProgramNational Cyber Security Crypto Program
National Cyber Security Crypto ProgramJorge Sebastiao
 
Plan Cyber Security Division v11
Plan Cyber Security Division v11Plan Cyber Security Division v11
Plan Cyber Security Division v11Jorge Sebastiao
 
Manager Services Strategy
Manager Services StrategyManager Services Strategy
Manager Services StrategyJorge Sebastiao
 
ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14Jorge Sebastiao
 

More from Jorge Sebastiao (13)

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startups
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart City
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0
 
Togaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction OverviewTogaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction Overview
 
Protecting cloud computing using big data v11
Protecting cloud computing using big data v11Protecting cloud computing using big data v11
Protecting cloud computing using big data v11
 
National Cyber Security Crypto Program
National Cyber Security Crypto ProgramNational Cyber Security Crypto Program
National Cyber Security Crypto Program
 
Plan Cyber Security Division v11
Plan Cyber Security Division v11Plan Cyber Security Division v11
Plan Cyber Security Division v11
 
Manager Services Strategy
Manager Services StrategyManager Services Strategy
Manager Services Strategy
 
ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14ICT Cyber Security Forensic`and partnership v14
ICT Cyber Security Forensic`and partnership v14
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Cyber Fear: Information Sharing Obstacle