Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Task 3 ( for SIT 2 8 4 students only ) ( 3 0 marks ) This task is about cyber security vulnerabilities, threats, and
Task for SIT students only marks This task is about cyber security vulnerabilities, threats, and attacks in collaborative mixed reality CMRor say immersive technologies which is gaining popularity in a variety of fields, including gaming, social interaction, design, healthcare, etc. Identify and list some potential threats, weak points, and attack surfaces in the CMR domain. What are some of nontechnical aspects of the attacks in the CMR landscape? List and discuss few nontechnical features of the attacks. How may the cyber risk to CMR be reduced? Discuss high level opinions to mitigate the risk in accordance with the ISOk standard. Answer in words, marks each Task for SIT students only marks The General Data Protection Regulation GDPR is implemented and adopted in the European Union EU since The vast amount of data increased its vulnerability and raised concerns about the protection of personal data. The transborder flow of personal data is inevitable and this has increased the data protection concerns to a great and concerning level. This is the reason that some countries member states of EU pay attention to the transfer of personal data to recipients in the third countries and foresee that such transfers may only be carried out in full compliance with the EU's GDPR regulation. This is a good aspect but at the same time too many restrictions and regulations may impede trade and commerce. Assume that your organisation is a small scale Australianbased, and this is an EU regulation, do you think GDPR applies to you. Explain your answer with an example. Following this in your opinion, what are the key challenges of GDPR poses on your organisation in context of transborder flow of personal data? Explain any challenges in detail.
Task for SIT students only marks
This task is about cyber security vulnerabilities, threats, and attacks in collaborative mixed
reality CMRor say immersive technologies which is gaining popularity in a variety of
fields, including gaming, social interaction, design, healthcare, etc.
Identify and list some potential threats, weak points, and attack surfaces in the CMR
domain.
What are some of nontechnical aspects of the attacks in the CMR landscape? List and
discuss few nontechnical features of the attacks.
How may the cyber risk to CMR be reduced? Discuss high level opinions to mitigate
the risk in accordance with the ISOk standard.
Answer in words, marks each
Task for SIT students only marks
The General Data Protection Regulation GDPR is implemented and adopted in the European
Union EU since The vast amount of data increased its vulnerability and raised
concerns about the protection of personal data. The transborder flow of personal data is
inevitable and this has increased the data protection concerns to a great and concerning level.
This is the reason that some countries member states of EU pay attention to the transfer of
personal data to recipients in the third countries and foresee that such transfers may only be
carried out in full compliance with the EU's GDPR regulation. This is a good aspect but at the
same time too many restrictions and regulations may impede trade and commerce.
Assume that your organisation is a small scale Australianbased, and this is an EU
regulation, do you think GDPR applies to you. Explain your answer with an example.
Following this in your opinion, what are the key challenges of GDPR poses on your
organisation in context of transborder flow of personal data? Explain any challenges
in detail.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started