0% found this document useful (0 votes)
84 views3 pages

Cyber Security and Privacy - Week10

Uploaded by

JAI SAHOTA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
84 views3 pages

Cyber Security and Privacy - Week10

Uploaded by

JAI SAHOTA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
(04/10/2029, 1857 ® (cyber Securty and Privacy -- Unit 11- Week 10 [email protected] (https://swayam.gov.in) (nips itewayam gov nine detasiNPTEL) NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Cyber Security and Privacy (course) aov_vr I already registered, click to check your payment status Course outline How does an NPTEL online course work? 0 Week 1 () Wook 2 () Week 3 () Week 4() Week 5 () Week 6 () Week 7 () Thank you for taking the Week 10: Assignment 10. Week 10: Assignment 10 Your last recorded submission was on 2023-10-04, 18:57 IST Due date: 2023-10-04, 23:59 IST. 41) GDPR makes provisions for the individual member states to add their own exemptions 1 point Ome OFalse 2) The GOPR introduces a new data protection principle that requires organizations to 1 point © demonstrate compliance withthe principles © optional compliance withthe privacy regulation O flexibility to report data protection breaches: © aceopt data breaches 3). In which of these circumstances could a data subject exercise their ight to be 1 point forgotten? O Where they have withdrawn consent for data processing O where the data is no longer necessary forthe purposes for which it was collected Owihere erasure is necessary to comply with legal obligation @atare true Oaliare false 4) According to GDPR a group of companies or public authorities may appoint a single 1 point data protection officer to represent them all hitpssfontinecourses.npel ac ininoc23_cs127lunkunit=s68assessment=$1 18 04/10/2029, 1857 Assossniaetsitthitted x Week 9 () Week 10 () Privacy regulation - Part 01 (unit? Privacy regulation - Part 02 (unit? Privacy regulation - Part 03 (unit? nit=658lesson =120) Lecture Material - Week 10 (unit? © Quiz: Week 10: Assignment 10 (assessment? name=51) (© Week 10 Feedback Form Cyber Security and Privacy (unit? Week 11 () DOWNLOAD VIDEOS () Live session 0 (cyber Securty and Privacy -- Unit 11- Wesk 10 Owe OFalse 5) describing the patterns of groups within the dataset while withholding information about individuals inthe dataset. - jg a system for publicly sharing information about a dataset by 1 point O Differential privacy (DP) O Privacy calculus © privacy paradox O Privacy theory 6) Arelease of data is said to have the k-anonymity property ifthe information for each 1 point person contained in the release cannot be distinguished from at individuals whose information also appears in the release @least k-1 Oleast k+1 Oleast k +41 Oleast kt 7) Consider the following diagram: 2 points b= In the First wave of the economic theory of privacy, work did not consist of formal economic models, but rather general when personal information is protected, thereby making potentially useful information unavailable to the marketplace Choose the correct answer: around the value or the damage that individuals, and society, may incur O information privacy © economic arguments Oeconomic value bitpssiontinecourses.nptel ac ininoc23_ cs 127/unkunit=858assessment=$1 218 04/10/2029, 1857 Assessment submitted x (cyber Securty and Privacy -- Unit 11- Wesk 10 O economic benefit 8) The economics of privacy concems the tradeoffs associated with the balancing of spheres between individuals, organizations, and governments, ® public and private O internal and external Oltow and high O incvidual vs group 9) The goal of privacy-preserving data mining is to develop data mining methods without 1 point increasing the risk of misuse of the O privacy. @aata O anonymity O Privacy-related content O database 10) is a dichotomy between a person's intention to protect their online 1 point privacy versus how they actually behave online and as a result compromise their privacy © Privacy paradox O privacy caloulis O itterental calculus O Coherentism 41) The personal data that has been de-identified, butcanbeusedtore- 1 point identify a person remains personal data and falls within the scope of the GDPR. ® pseudonymized O decrypted Oanonymize OSecrete ‘You may submit any number of times before the due date. The final submission will be considered for grading, bitpssiontinecourses.npel ac ininoc23_ cs 127lunkunit=s68assessment=$1 ais

You might also like