<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://home.roboticlab.eu/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://home.roboticlab.eu/feed.php">
        <title>Robotic &amp; Microcontroller Educational Knowledgepage - Network of Excellence - en:iot-open:security_and_privacy_in_iot_ume:iot_security</title>
        <description></description>
        <link>https://home.roboticlab.eu/</link>
        <image rdf:resource="https://home.roboticlab.eu/_media/wiki/logo.png" />
       <dc:date>2026-04-04T21:12:14+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/concept_of_information_security_and_its_importance?rev=1595235600&amp;do=diff"/>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/iot_security_protocols?rev=1595235600&amp;do=diff"/>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/malware_detection_in_the_iot?rev=1595235600&amp;do=diff"/>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/security_monitoring_for_the_iot?rev=1595235600&amp;do=diff"/>
                <rdf:li rdf:resource="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/types_of_vulnerabilities_of_iot?rev=1595235600&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://home.roboticlab.eu/_media/wiki/logo.png">
        <title>Robotic & Microcontroller Educational Knowledgepage - Network of Excellence</title>
        <link>https://home.roboticlab.eu/</link>
        <url>https://home.roboticlab.eu/_media/wiki/logo.png</url>
    </image>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/concept_of_information_security_and_its_importance?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Concept of information security and its importance</title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/concept_of_information_security_and_its_importance?rev=1595235600&amp;do=diff</link>
        <description>Concept of information security and its importance

There are two approaches to determination of the concept “information security”:
1. Information security — a status of safety of information resources and protection of legitimate rights of the personality and society in the information sphere.</description>
    </item>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/iot_security_protocols?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title></title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/iot_security_protocols?rev=1595235600&amp;do=diff</link>
        <description>IoT Security Protocols

As it was already repeatedly marked, IoT grows before the eyes, and together with it and the number of problems in the sphere of safety. For support of last, the complex of protocols of security is always necessary for the support of due protection of IoT devices.</description>
    </item>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/malware_detection_in_the_iot?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title></title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/malware_detection_in_the_iot?rev=1595235600&amp;do=diff</link>
        <description>Malware Detection in IoT

In 2016 there was a row of incidents which attracted keen interest in the safety of IoT. Among them, there were record DDoS-attacks against the French hosting provider OVH and Dyn DNS provider of the USA. It is known that these attacks are launched using the massive botnet consisting of routers, IP cameras, printers and other devices.</description>
    </item>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/security_monitoring_for_the_iot?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title></title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/security_monitoring_for_the_iot?rev=1595235600&amp;do=diff</link>
        <description>Monitoring of Vulnerabilities

Monitoring of information security became a more and more comprehensive task. Thanks to trust relationships policies, administrators shall track a considerably large number of devices and platforms. And certainly, also face the growing flow of the devices coming to a network through IoT. Temperature sensors and the connected engines, refrigerating aggregates and modules of energy management – all this as already more than once it was mentioned above, is a source of…</description>
    </item>
    <item rdf:about="https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/types_of_vulnerabilities_of_iot?rev=1595235600&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-20T09:00:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title></title>
        <link>https://home.roboticlab.eu/en/iot-open/security_and_privacy_in_iot_ume/iot_security/types_of_vulnerabilities_of_iot?rev=1595235600&amp;do=diff</link>
        <description>Types of Vulnerabilities of IoT

As it was already told in the previous point, IoT is the problematic platform giving very ample opportunities not only for direct users but also and for violators. As well as by operation with any other information technologies, IoT includes the range of utterly different vulnerabilities, beginning from a human factor (inadvertent errors of maintenance), finishing with shortcomings of the firmware of devices. Indeed, to provide the due protection level, it is nec…</description>
    </item>
</rdf:RDF>
