Assessment submitted.
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)
X
arulselvamme@gmail.com
NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Cyber Security and Privacy (course)
If already
registered, click
Thank you for taking the Week 10
to check your
payment status
: Assignment 10.
Course Week 10 : Assignment 10
outline Your last recorded submission was on 2025-09-23, 19:45 Due date: 2025-10-01, 23:59 IST.
IST
About
1) ______ is the phenomenon where individuals claim to value privacy, yet in practice, 1 point
NPTEL ()
they trade their personal data for trivial benefits or fail to use measures to protect their privacy.
How does an Privacy Fatigue
NPTEL
Privacy Negligence
online
course Privacy Paradox
work? () Privacy Breach
Week 1 () 2) Which of the following is not true: 1 point
Week 2 () Personally Identifiable Information (PII) refers to any data that can be linked to a specific
individual and used to reveal or misuse their identity
Week 3 () A social security number (SSN) can be considered as a sensitive PII
A person’s medical records can be considered as a non-sensitive PII
Week 4 ()
Non-sensitive PII would not cause significant harm to a person if leaked or stolen
Week 5 ()
3) Which of the following best distinguishes the Right to Privacy from the Right to 1 point
Anonymity?
Week 6 ()
Privacy is about preventing identity disclosure, while anonymity is about protecting
Week 7 () personal information
Privacy ensures control over personal data and how it is shared, while anonymity
Week 8 ()
ensures that actions cannot be traced back to an identifiable individual
Week 9 () Privacy is a technical safeguard, while anonymity is a legal right
Privacy applies only to digital data, while anonymity applies only to physical identity
Week 10 ()
Privacy 4) True or False: Personal data that has been de-identified, encrypted or 1 point
Assessment submitted. pseudonymised, but can be used to re-identify a person, remains personal data and falls within
regulation -
X Part 01 (unit? the scope of the GDPR.
unit=65&lesso
n=118) True
Privacy
False
regulation -
Part 02 (unit? 5) ______ has been defined as the intentional concealment of information. 1 point
unit=65&lesso
n=119) Security
Anonymity
Privacy
regulation - Confidentiality
Part 03 (unit? Secrecy
unit=65&lesso
n=120)
6) British law embraces privacy as _________. 1 point
Lecture
Material - Security
Week 10 Anonymity
(unit?
Confidentiality
unit=65&lesso
n=122) Secrecy
Week 10
7) Which of the statements about pseudonymization is true? 1 point
Feedback
Form:Cyber
Pseudonymization is a technique proposed by frameworks like Privacy by Design offering
Security and
practical substitutes for using the raw data, especially when this data is sensitive
Privacy!! (unit?
unit=65&lesso Various pseudonymization techniques enable you to preserve format or understand the
n=123) original intention for that data
Quiz: Week Pseudonymization methods often maintain the capability to establish connections
10 : between data, which proves beneficial when linking datasets using personal identifiers or
Assignment other sensitive columns
10 All the above
(assessment?
name=173)
8) Differential privacy is: 1 point
DOWNLOAD
A method of probabilistically limiting the amount of information an attacker can gain when
VIDEOS ()
data is released
Text A method for measuring and monitoring the loss of privacy experienced by an individual
Transcripts in a dataset that has been released
() One of the most effective methods for providing individuals in a dataset with plausible
deniability while still performing data analysis
Book () All the above
9) Which of the following statement is not true about k-anonymity? 1 point
k-anonymity is an intuitive and widely used method for modifying data for privacy
protection
For k-anonymity to be achieved, there need to be at least k+1 individuals in the dataset
who share the set of attributes that might become identifying for each individual
Generalization is a method for achieving K-Anonymity
k-anonymity can be provided by using suppression techniques
Assessment submitted.
X 10) Which of the following statements is/are correct ? (Select all that apply. More than 1 point
one answer may be possible)
Privacy-preserving data mining enables the extraction of insights from datasets while
ensuring that the identities of data subjects or confidential information remain undisclosed
Randomization, anonymyzation and encryption are methods of privacy-preserving data
mining.
The goal of privacy-preserving data mining is to develop data mining methods without
increasing the risk of misuse of the data
Privacy-preserving data mining remove irrelevant data before mining
You may submit any number of times before the due date. The final submission will be
considered for grading.
Submit Answers