<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://home.roboticlab.eu/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://home.roboticlab.eu/feed.php">
        <title>Robotic &amp; Microcontroller Educational Knowledgepage - Network of Excellence - en:iot-open:security_and_privacy_in_iot_ume</title>
        <description></description>
        <link>https://home.roboticlab.eu/</link>
        <image rdf:resource="https://home.roboticlab.eu/_media/wiki/logo.png" />
       <dc:date>2026-04-05T12:13:02+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_privacy?rev=1595235600&amp;do=diff"/>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security?rev=1595235600&amp;do=diff"/>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/questions_on_the_chapter?rev=1595235600&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://home.roboticlab.eu/_media/wiki/logo.png">
        <title>Robotic & Microcontroller Educational Knowledgepage - Network of Excellence</title>
        <link>https://home.roboticlab.eu/</link>
        <url>https://home.roboticlab.eu/_media/wiki/logo.png</url>
    </image>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_privacy?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title></title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_privacy?rev=1595235600&amp;do=diff</link>
        <description>IoT Privacy

Protecting consumer privacy becomes increasingly tricky as the IoT becomes more prevalent. More devices are connected to different types of devices and this increase in connectivity and data collection results in less control. Both controls of data and control of the very devices that are connected are at stake.</description>
    </item>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title></title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security?rev=1595235600&amp;do=diff</link>
        <description>IoT Security and Privacy

 Concept of information security and its importance. 

There are two approaches to the determination of the concept of “information security”:

	*  Information security – the status of the safety of information resources and the protection of the legitimate rights of the personality and society in the information sphere.</description>
    </item>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/questions_on_the_chapter?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Questions on the chapter</title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/questions_on_the_chapter?rev=1595235600&amp;do=diff</link>
        <description>Questions on the chapter

IoT security control questions

1. Name three aspects of information security

Confidentiality, integrity and availability

2. What is the information security risk?

The risk of information security is the possibility that a threat will exploit the vulnerability of an asset or group of assets to cause damage to an organization.</description>
    </item>
</rdf:RDF>
