[{"data":1,"prerenderedAt":4343},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-bcm":1626,"course-stats-imork":2118,"course-topics-imork":2122,"backlinks-bcm":4310,"related-bcm":4336},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2117},{"id":1628,"title":1629,"body":1630,"course":659,"courses":2101,"created":660,"description":641,"extension":661,"meta":2102,"navigation":664,"path":2103,"seo":2104,"sources":2105,"stem":2108,"tags":2109,"type":2115,"updated":677,"__hash__":2116},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":1631,"toc":2088},[1632,1635,1644,1647,1651,1745,1749,1803,1807,1830,1834,1923,1927,1930,1934,2011,2015,2041,2045,2065,2074],[12,1633,1629],{"id":1634},"bcm-řízení-kontinuity-činnosti",[724,1636,1637],{},[1638,1639],"img",{"alt":1640,"className":1641,"src":1643},"bcm-rpo-rto",[210,1642],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,1645,1646],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,1648,1650],{"id":1649},"klíčové-pojmy","Klíčové pojmy",[16,1652,1653,1666],{},[19,1654,1655],{},[22,1656,1657,1660,1663],{},[25,1658,1659],{},"Pojem",[25,1661,1662],{},"Anglicky",[25,1664,1665],{},"Popis",[30,1667,1668,1681,1693,1706,1719,1732],{},[22,1669,1670,1675,1678],{},[35,1671,1672],{},[38,1673,1674],{},"BCMS",[35,1676,1677],{},"Business Continuity Management System",[35,1679,1680],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,1682,1683,1687,1690],{},[35,1684,1685],{},[38,1686,384],{},[35,1688,1689],{},"Business Continuity Management",[35,1691,1692],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,1694,1695,1700,1703],{},[35,1696,1697],{},[38,1698,1699],{},"BIA",[35,1701,1702],{},"Business Impact Analysis",[35,1704,1705],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,1707,1708,1713,1716],{},[35,1709,1710],{},[38,1711,1712],{},"MBCO",[35,1714,1715],{},"Minimum Business Continuity Objective",[35,1717,1718],{},"Minimální přijatelná úroveň služeb",[22,1720,1721,1726,1729],{},[35,1722,1723],{},[38,1724,1725],{},"RPO",[35,1727,1728],{},"Recovery Point Objective",[35,1730,1731],{},"Do jakého bodu v minulosti lze obnovit data",[22,1733,1734,1739,1742],{},[35,1735,1736],{},[38,1737,1738],{},"RTO",[35,1740,1741],{},"Recovery Time Objective",[35,1743,1744],{},"Čas potřebný pro obnovu provozu",[115,1746,1748],{"id":1747},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,1750,1751,1761],{},[19,1752,1753],{},[22,1754,1755,1758],{},[25,1756,1757],{},"Fáze",[25,1759,1760],{},"Obsah",[30,1762,1763,1773,1783,1793],{},[22,1764,1765,1770],{},[35,1766,1767],{},[38,1768,1769],{},"Plan",[35,1771,1772],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,1774,1775,1780],{},[35,1776,1777],{},[38,1778,1779],{},"Do",[35,1781,1782],{},"Strategie kontinuity, implementace plánů, cvičení",[22,1784,1785,1790],{},[35,1786,1787],{},[38,1788,1789],{},"Check",[35,1791,1792],{},"Monitoring, audit, přezkoumání managementem",[22,1794,1795,1800],{},[35,1796,1797],{},[38,1798,1799],{},"Act",[35,1801,1802],{},"Nápravná opatření, neustálé zlepšování",[115,1804,1806],{"id":1805},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,1808,1809,1812,1815,1818,1821,1824,1827],{},[123,1810,1811],{},"Kap. 4 — kontext organizace",[123,1813,1814],{},"Kap. 5 — vedení (leadership)",[123,1816,1817],{},"Kap. 6 — plánování (BIA, rizika)",[123,1819,1820],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,1822,1823],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,1825,1826],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,1828,1829],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,1831,1833],{"id":1832},"analýza-steeple","Analýza STEEPLE",[16,1835,1836,1846],{},[19,1837,1838],{},[22,1839,1840,1843],{},[25,1841,1842],{},"Faktor",[25,1844,1845],{},"Oblast",[30,1847,1848,1859,1870,1881,1891,1902,1913],{},[22,1849,1850,1856],{},[35,1851,1852,1855],{},[38,1853,1854],{},"S","ociální",[35,1857,1858],{},"Zaměstnanost, bezpečnost, komunity",[22,1860,1861,1867],{},[35,1862,1863,1866],{},[38,1864,1865],{},"T","echnologický",[35,1868,1869],{},"Závislost na technologiích",[22,1871,1872,1878],{},[35,1873,1874,1877],{},[38,1875,1876],{},"E","konomický",[35,1879,1880],{},"Ekonomická situace, finanční instituce",[22,1882,1883,1888],{},[35,1884,1885,1887],{},[38,1886,1876],{},"tický",[35,1889,1890],{},"Podnikatelská etika, média, veřejnost",[22,1892,1893,1899],{},[35,1894,1895,1898],{},[38,1896,1897],{},"P","olitický",[35,1900,1901],{},"Politický systém, hrozba nepokojů",[22,1903,1904,1910],{},[35,1905,1906,1909],{},[38,1907,1908],{},"L","egislativní",[35,1911,1912],{},"Předpisy, zákony",[22,1914,1915,1920],{},[35,1916,1917,1919],{},[38,1918,1876],{},"nvironmentální",[35,1921,1922],{},"Životní prostředí, přírodní hrozby",[115,1924,1926],{"id":1925},"disaster-recovery-dr","Disaster Recovery (DR)",[724,1928,1929],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,1931,1933],{"id":1932},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,1935,1936,1945],{},[19,1937,1938],{},[22,1939,1940,1943],{},[25,1941,1942],{},"Tier",[25,1944,1665],{},[30,1946,1947,1955,1963,1971,1979,1987,1995,2003],{},[22,1948,1949,1952],{},[35,1950,1951],{},"0",[35,1953,1954],{},"Žádná off-site data",[22,1956,1957,1960],{},[35,1958,1959],{},"1",[35,1961,1962],{},"Fyzická záloha + cold site",[22,1964,1965,1968],{},[35,1966,1967],{},"2",[35,1969,1970],{},"Fyzická záloha + hot site",[22,1972,1973,1976],{},[35,1974,1975],{},"3",[35,1977,1978],{},"Elektronický trezor (electronic vaulting)",[22,1980,1981,1984],{},[35,1982,1983],{},"4",[35,1985,1986],{},"Point-in-time recovery",[22,1988,1989,1992],{},[35,1990,1991],{},"5",[35,1993,1994],{},"Two-site commit (kontinuální přenos)",[22,1996,1997,2000],{},[35,1998,1999],{},"6",[35,2001,2002],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2004,2005,2008],{},[35,2006,2007],{},"7",[35,2009,2010],{},"Automatizovaná obnova (AI monitoring)",[198,2012,2014],{"id":2013},"cloud-dr","Cloud DR",[120,2016,2017,2023,2029,2035],{},[123,2018,2019,2022],{},[38,2020,2021],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2024,2025,2028],{},[38,2026,2027],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2030,2031,2034],{},[38,2032,2033],{},"Hot DR"," — paralelní řešení v tandemu",[123,2036,2037,2040],{},[38,2038,2039],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2042,2044],{"id":2043},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2046,2047,2053,2059],{},[123,2048,2049,2052],{},[207,2050,140],{"className":2051,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2054,2055,2058],{},[207,2056,569],{"className":2057,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2060,2061,2064],{},[207,2062,578],{"className":2063,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2066,2068,2069],{"id":2067},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2070,43],{"className":2071,"dataFsResolvedFilePath":2072,"href":2073},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2075,2076,2082],{},[123,2077,2078],{},[207,2079,2081],{"className":2080,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2083,2084],{},[207,2085,2087],{"className":2086,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2089},[2090,2091,2092,2093,2094,2098,2099],{"id":1649,"depth":642,"text":1650},{"id":1747,"depth":642,"text":1748},{"id":1805,"depth":642,"text":1806},{"id":1832,"depth":642,"text":1833},{"id":1925,"depth":642,"text":1926,"children":2095},[2096,2097],{"id":1932,"depth":649,"text":1933},{"id":2013,"depth":649,"text":2014},{"id":2043,"depth":642,"text":2044},{"id":2067,"depth":642,"text":2100},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":1629,"description":641},[2106,2107],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2110,2111,2112,2113,2114],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI","topics",{"zapisku":1624,"topics":2119,"summaries":2120,"outputs":2121},6,35,0,[2123,2484,2983,3433,3713,4063],{"id":1628,"title":1629,"body":2124,"course":659,"courses":2479,"created":660,"description":641,"extension":661,"meta":2480,"navigation":664,"path":2103,"seo":2481,"sources":2482,"stem":2108,"tags":2483,"type":2115,"updated":677,"__hash__":2116},{"type":9,"value":2125,"toc":2467},[2126,2128,2133,2135,2137,2211,2213,2257,2259,2275,2277,2345,2347,2349,2351,2411,2413,2431,2433,2450,2455],[12,2127,1629],{"id":1634},[724,2129,2130],{},[1638,2131],{"alt":1640,"className":2132,"src":1643},[210,1642],[724,2134,1646],{},[115,2136,1650],{"id":1649},[16,2138,2139,2149],{},[19,2140,2141],{},[22,2142,2143,2145,2147],{},[25,2144,1659],{},[25,2146,1662],{},[25,2148,1665],{},[30,2150,2151,2161,2171,2181,2191,2201],{},[22,2152,2153,2157,2159],{},[35,2154,2155],{},[38,2156,1674],{},[35,2158,1677],{},[35,2160,1680],{},[22,2162,2163,2167,2169],{},[35,2164,2165],{},[38,2166,384],{},[35,2168,1689],{},[35,2170,1692],{},[22,2172,2173,2177,2179],{},[35,2174,2175],{},[38,2176,1699],{},[35,2178,1702],{},[35,2180,1705],{},[22,2182,2183,2187,2189],{},[35,2184,2185],{},[38,2186,1712],{},[35,2188,1715],{},[35,2190,1718],{},[22,2192,2193,2197,2199],{},[35,2194,2195],{},[38,2196,1725],{},[35,2198,1728],{},[35,2200,1731],{},[22,2202,2203,2207,2209],{},[35,2204,2205],{},[38,2206,1738],{},[35,2208,1741],{},[35,2210,1744],{},[115,2212,1748],{"id":1747},[16,2214,2215,2223],{},[19,2216,2217],{},[22,2218,2219,2221],{},[25,2220,1757],{},[25,2222,1760],{},[30,2224,2225,2233,2241,2249],{},[22,2226,2227,2231],{},[35,2228,2229],{},[38,2230,1769],{},[35,2232,1772],{},[22,2234,2235,2239],{},[35,2236,2237],{},[38,2238,1779],{},[35,2240,1782],{},[22,2242,2243,2247],{},[35,2244,2245],{},[38,2246,1789],{},[35,2248,1792],{},[22,2250,2251,2255],{},[35,2252,2253],{},[38,2254,1799],{},[35,2256,1802],{},[115,2258,1806],{"id":1805},[120,2260,2261,2263,2265,2267,2269,2271,2273],{},[123,2262,1811],{},[123,2264,1814],{},[123,2266,1817],{},[123,2268,1820],{},[123,2270,1823],{},[123,2272,1826],{},[123,2274,1829],{},[115,2276,1833],{"id":1832},[16,2278,2279,2287],{},[19,2280,2281],{},[22,2282,2283,2285],{},[25,2284,1842],{},[25,2286,1845],{},[30,2288,2289,2297,2305,2313,2321,2329,2337],{},[22,2290,2291,2295],{},[35,2292,2293,1855],{},[38,2294,1854],{},[35,2296,1858],{},[22,2298,2299,2303],{},[35,2300,2301,1866],{},[38,2302,1865],{},[35,2304,1869],{},[22,2306,2307,2311],{},[35,2308,2309,1877],{},[38,2310,1876],{},[35,2312,1880],{},[22,2314,2315,2319],{},[35,2316,2317,1887],{},[38,2318,1876],{},[35,2320,1890],{},[22,2322,2323,2327],{},[35,2324,2325,1898],{},[38,2326,1897],{},[35,2328,1901],{},[22,2330,2331,2335],{},[35,2332,2333,1909],{},[38,2334,1908],{},[35,2336,1912],{},[22,2338,2339,2343],{},[35,2340,2341,1919],{},[38,2342,1876],{},[35,2344,1922],{},[115,2346,1926],{"id":1925},[724,2348,1929],{},[198,2350,1933],{"id":1932},[16,2352,2353,2361],{},[19,2354,2355],{},[22,2356,2357,2359],{},[25,2358,1942],{},[25,2360,1665],{},[30,2362,2363,2369,2375,2381,2387,2393,2399,2405],{},[22,2364,2365,2367],{},[35,2366,1951],{},[35,2368,1954],{},[22,2370,2371,2373],{},[35,2372,1959],{},[35,2374,1962],{},[22,2376,2377,2379],{},[35,2378,1967],{},[35,2380,1970],{},[22,2382,2383,2385],{},[35,2384,1975],{},[35,2386,1978],{},[22,2388,2389,2391],{},[35,2390,1983],{},[35,2392,1986],{},[22,2394,2395,2397],{},[35,2396,1991],{},[35,2398,1994],{},[22,2400,2401,2403],{},[35,2402,1999],{},[35,2404,2002],{},[22,2406,2407,2409],{},[35,2408,2007],{},[35,2410,2010],{},[198,2412,2014],{"id":2013},[120,2414,2415,2419,2423,2427],{},[123,2416,2417,2022],{},[38,2418,2021],{},[123,2420,2421,2028],{},[38,2422,2027],{},[123,2424,2425,2034],{},[38,2426,2033],{},[123,2428,2429,2040],{},[38,2430,2039],{},[115,2432,2044],{"id":2043},[120,2434,2435,2440,2445],{},[123,2436,2437,2052],{},[207,2438,140],{"className":2439,"dataFsResolvedFilePath":559,"href":560},[210],[123,2441,2442,2058],{},[207,2443,569],{"className":2444,"dataFsResolvedFilePath":567,"href":568},[210],[123,2446,2447,2064],{},[207,2448,578],{"className":2449,"dataFsResolvedFilePath":576,"href":577},[210],[115,2451,2068,2452],{"id":2067},[207,2453,43],{"className":2454,"dataFsResolvedFilePath":2072,"href":2073},[210],[120,2456,2457,2462],{},[123,2458,2459],{},[207,2460,2081],{"className":2461,"dataFsResolvedFilePath":382,"href":383},[210],[123,2463,2464],{},[207,2465,2087],{"className":2466,"dataFsResolvedFilePath":391,"href":392},[210],{"title":641,"searchDepth":642,"depth":642,"links":2468},[2469,2470,2471,2472,2473,2477,2478],{"id":1649,"depth":642,"text":1650},{"id":1747,"depth":642,"text":1748},{"id":1805,"depth":642,"text":1806},{"id":1832,"depth":642,"text":1833},{"id":1925,"depth":642,"text":1926,"children":2474},[2475,2476],{"id":1932,"depth":649,"text":1933},{"id":2013,"depth":649,"text":2014},{"id":2043,"depth":642,"text":2044},{"id":2067,"depth":642,"text":2100},[658],{},{"title":1629,"description":641},[2106,2107],[658,2110,2111,2112,2113,2114],{"id":2485,"title":2486,"body":2487,"course":659,"courses":2970,"created":660,"description":641,"extension":661,"meta":2971,"navigation":664,"path":2972,"seo":2973,"sources":2974,"stem":2977,"tags":2978,"type":2115,"updated":677,"__hash__":2982},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2488,"toc":2955},[2489,2492,2499,2506,2509,2513,2580,2584,2588,2647,2651,2671,2675,2679,2780,2784,2807,2811,2833,2837,2844,2900,2902,2933,2938],[12,2490,2486],{"id":2491},"isms-systém-řízení-bezpečnosti-informací",[724,2493,2494],{},[1638,2495],{"alt":2496,"className":2497,"src":2498},"isms-pdca-cyklus",[210,1642],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2500,2501],{},[1638,2502],{"alt":2503,"className":2504,"src":2505},"isms-oborova-mapa",[210,1642],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2507,2508],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2510,2512],{"id":2511},"základní-pilíře","Základní pilíře",[16,2514,2515,2526],{},[19,2516,2517],{},[22,2518,2519,2522,2524],{},[25,2520,2521],{},"Pilíř",[25,2523,1662],{},[25,2525,1665],{},[30,2527,2528,2541,2554,2567],{},[22,2529,2530,2535,2538],{},[35,2531,2532],{},[38,2533,2534],{},"Důvěrnost",[35,2536,2537],{},"Confidentiality",[35,2539,2540],{},"Přístup pouze oprávněným osobám",[22,2542,2543,2548,2551],{},[35,2544,2545],{},[38,2546,2547],{},"Integrita",[35,2549,2550],{},"Integrity",[35,2552,2553],{},"Ochrana před neoprávněnou změnou",[22,2555,2556,2561,2564],{},[35,2557,2558],{},[38,2559,2560],{},"Dostupnost",[35,2562,2563],{},"Availability",[35,2565,2566],{},"Systémy a data dostupné v potřebný čas",[22,2568,2569,2574,2577],{},[35,2570,2571],{},[38,2572,2573],{},"Nepopiratelnost",[35,2575,2576],{},"Non-repudiation",[35,2578,2579],{},"Prokázání autorství akce",[115,2581,2583],{"id":2582},"normativní-rámec","Normativní rámec",[198,2585,2587],{"id":2586},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2589,2590,2596,2602,2613,2619,2629,2638],{},[123,2591,2592,2595],{},[38,2593,2594],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2597,2598,2601],{},[38,2599,2600],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2603,2604,2607,2608,2612],{},[38,2605,2606],{},"ISO\u002FIEC 27005"," — ",[207,2609,2611],{"className":2610,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2614,2615,2618],{},[38,2616,2617],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2620,2621,2624,2625],{},[38,2622,2623],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2626,2628],{"className":2627,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2630,2631,2624,2634],{},[38,2632,2633],{},"ISO\u002FIEC 27019",[207,2635,2637],{"className":2636,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2639,2640,2624,2643],{},[38,2641,2642],{},"ISO\u002FIEC 27799",[207,2644,2646],{"className":2645,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2648,2650],{"id":2649},"další-rámce","Další rámce",[120,2652,2653,2659,2665],{},[123,2654,2655,2658],{},[38,2656,2657],{},"NIST"," — americké standardy (SP 800 řada)",[123,2660,2661,2664],{},[38,2662,2663],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2666,2667,2670],{},[38,2668,2669],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2672,2674],{"id":2673},"governance-řízení","Governance (řízení)",[198,2676,2678],{"id":2677},"bezpečnostní-role","Bezpečnostní role",[16,2680,2681,2693],{},[19,2682,2683],{},[22,2684,2685,2688,2690],{},[25,2686,2687],{},"Role",[25,2689,40],{},[25,2691,2692],{},"Odpovědnost",[30,2694,2695,2706,2717,2728,2739,2750,2760,2770],{},[22,2696,2697,2700,2703],{},[35,2698,2699],{},"Chief Information Officer",[35,2701,2702],{},"CIO",[35,2704,2705],{},"Celkové řízení ICT",[22,2707,2708,2711,2714],{},[35,2709,2710],{},"Chief Information Security Officer",[35,2712,2713],{},"CISO",[35,2715,2716],{},"Řízení informační bezpečnosti",[22,2718,2719,2722,2725],{},[35,2720,2721],{},"Chief Technology Officer",[35,2723,2724],{},"CTO",[35,2726,2727],{},"Technologická strategie",[22,2729,2730,2733,2736],{},[35,2731,2732],{},"IS Security Officer",[35,2734,2735],{},"ISSO",[35,2737,2738],{},"Bezpečnost IS",[22,2740,2741,2744,2747],{},[35,2742,2743],{},"Manažer KB",[35,2745,2746],{},"—",[35,2748,2749],{},"Odpovědný za ISMS",[22,2751,2752,2755,2757],{},[35,2753,2754],{},"Architekt KB",[35,2756,2746],{},[35,2758,2759],{},"Návrh a implementace opatření",[22,2761,2762,2765,2767],{},[35,2763,2764],{},"Auditor KB",[35,2766,2746],{},[35,2768,2769],{},"Provádění auditů",[22,2771,2772,2775,2777],{},[35,2773,2774],{},"Garant aktiva",[35,2776,2746],{},[35,2778,2779],{},"Rozvoj, použití a bezpečnost aktiva",[198,2781,2783],{"id":2782},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,2785,2786,2792,2801],{},[123,2787,2788,2791],{},[38,2789,2790],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,2793,2794,2797,2798],{},[38,2795,2796],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,2799,240],{"className":2800,"dataFsResolvedFilePath":585,"href":586},[210],[123,2802,2803,2806],{},[38,2804,2805],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,2808,2810],{"id":2809},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,2812,2813,2818,2823,2828],{},[123,2814,2815,2817],{},[38,2816,1769],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,2819,2820,2822],{},[38,2821,1779],{}," — implementace opatření, řízení rizik",[123,2824,2825,2827],{},[38,2826,1789],{}," — monitorování, audit, přezkoumání",[123,2829,2830,2832],{},[38,2831,1799],{}," — nápravná opatření, neustálé zlepšování",[115,2834,2836],{"id":2835},"oborová-řešení-isms","Oborová řešení ISMS",[724,2838,2839,2840,2843],{},"Kurz ",[207,2841,43],{"className":2842,"dataFsResolvedFilePath":2072,"href":2073},[210]," pokrývá ISMS specifika pro:",[120,2845,2846,2852,2858,2865,2871,2878,2884,2890,2895],{},[123,2847,2848],{},[207,2849,2851],{"className":2850,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,2853,2854,2857],{},[207,2855,282],{"className":2856,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,2859,2860,2864],{},[207,2861,2863],{"className":2862,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,2866,2867,2870],{},[207,2868,300],{"className":2869,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,2872,2873,2877],{},[207,2874,2876],{"className":2875,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,2879,2880,2883],{},[207,2881,318],{"className":2882,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,2885,2886,2889],{},[207,2887,327],{"className":2888,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,2891,2892],{},[207,2893,336],{"className":2894,"dataFsResolvedFilePath":334,"href":335},[210],[123,2896,2897],{},[207,2898,273],{"className":2899,"dataFsResolvedFilePath":271,"href":272},[210],[115,2901,2044],{"id":2043},[120,2903,2904,2910,2915,2921,2927],{},[123,2905,2906,2909],{},[207,2907,569],{"className":2908,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,2911,2912,587],{},[207,2913,240],{"className":2914,"dataFsResolvedFilePath":585,"href":586},[210],[123,2916,2917,2920],{},[207,2918,384],{"className":2919,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,2922,2923,2926],{},[207,2924,578],{"className":2925,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,2928,2929,2932],{},[207,2930,369],{"className":2931,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,2934,2068,2935],{"id":2067},[207,2936,43],{"className":2937,"dataFsResolvedFilePath":2072,"href":2073},[210],[120,2939,2940,2945,2950],{},[123,2941,2942],{},[207,2943,222],{"className":2944,"dataFsResolvedFilePath":220,"href":221},[210],[123,2946,2947],{},[207,2948,249],{"className":2949,"dataFsResolvedFilePath":247,"href":248},[210],[123,2951,2952],{},[207,2953,231],{"className":2954,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":2956},[2957,2958,2962,2966,2967,2968,2969],{"id":2511,"depth":642,"text":2512},{"id":2582,"depth":642,"text":2583,"children":2959},[2960,2961],{"id":2586,"depth":649,"text":2587},{"id":2649,"depth":649,"text":2650},{"id":2673,"depth":642,"text":2674,"children":2963},[2964,2965],{"id":2677,"depth":649,"text":2678},{"id":2782,"depth":649,"text":2783},{"id":2809,"depth":642,"text":2810},{"id":2835,"depth":642,"text":2836},{"id":2043,"depth":642,"text":2044},{"id":2067,"depth":642,"text":2100},[658],{},"\u002Ftopics\u002Fisms",{"title":2486,"description":641},[2975,2976,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,2979,2980,672,2981],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":2984,"title":578,"body":2985,"course":659,"courses":3418,"created":660,"description":641,"extension":661,"meta":3419,"navigation":664,"path":3420,"seo":3421,"sources":3422,"stem":3425,"tags":3426,"type":2115,"updated":677,"__hash__":3432},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":2986,"toc":3404},[2987,2990,2997,3004,3008,3046,3050,3054,3096,3100,3107,3110,3136,3140,3157,3161,3192,3196,3264,3268,3271,3288,3292,3330,3332,3369,3374],[12,2988,578],{"id":2989},"kybernetická-bezpečnost",[724,2991,2992],{},[1638,2993],{"alt":2994,"className":2995,"src":2996},"kb-defense-in-depth",[210,1642],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,2998,2999,3000,3003],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3001,140],{"className":3002,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3005,3007],{"id":3006},"základní-pojmy","Základní pojmy",[120,3009,3010,3016,3022,3028,3034,3040],{},[123,3011,3012,3015],{},[38,3013,3014],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3017,3018,3021],{},[38,3019,3020],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3023,3024,3027],{},[38,3025,3026],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3029,3030,3033],{},[38,3031,3032],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3035,3036,3039],{},[38,3037,3038],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3041,3042,3045],{},[38,3043,3044],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3047,3049],{"id":3048},"typy-útoků","Typy útoků",[198,3051,3053],{"id":3052},"podle-cílení","Podle cílení",[16,3055,3056,3068],{},[19,3057,3058],{},[22,3059,3060,3063,3065],{},[25,3061,3062],{},"Typ",[25,3064,1665],{},[25,3066,3067],{},"Cíl",[30,3069,3070,3083],{},[22,3071,3072,3077,3080],{},[35,3073,3074],{},[38,3075,3076],{},"Plošný",[35,3078,3079],{},"Útočníkovi je jedno, kdo je obětí",[35,3081,3082],{},"Botnety, spam, ransomware",[22,3084,3085,3090,3093],{},[35,3086,3087],{},[38,3088,3089],{},"Cílený (APT)",[35,3091,3092],{},"Soustředěná pozornost na konkrétní cíl",[35,3094,3095],{},"Špionáž, sabotáž, krádež dat",[198,3097,3099],{"id":3098},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3101,3102],{},[1638,3103],{"alt":3104,"className":3105,"src":3106},"apt-faze-utoku",[210,1642],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3108,3109],{},"4 fáze:",[152,3111,3112,3118,3124,3130],{},[123,3113,3114,3117],{},[38,3115,3116],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3119,3120,3123],{},[38,3121,3122],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3125,3126,3129],{},[38,3127,3128],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3131,3132,3135],{},[38,3133,3134],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3137,3139],{"id":3138},"základní-vektory-útoku","Základní vektory útoku",[120,3141,3142,3145,3148,3151,3154],{},[123,3143,3144],{},"Email s přílohou (spear phishing)",[123,3146,3147],{},"Trojanizované aplikace",[123,3149,3150],{},"Drive-by download (webové exploity)",[123,3152,3153],{},"Výměnná média (BadUSB)",[123,3155,3156],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3158,3160],{"id":3159},"software-útoky","Software útoky",[120,3162,3163,3169,3175,3181,3186],{},[123,3164,3165,3168],{},[38,3166,3167],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3170,3171,3174],{},[38,3172,3173],{},"Viry"," — poškození HW\u002FSW",[123,3176,3177,3180],{},[38,3178,3179],{},"Trojské koně"," — skrytá funkčnost",[123,3182,3183,3185],{},[38,3184,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3187,3188,3191],{},[38,3189,3190],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3193,3195],{"id":3194},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3197,3198,3210],{},[19,3199,3200],{},[22,3201,3202,3205,3207],{},[25,3203,3204],{},"Útok",[25,3206,3067],{},[25,3208,3209],{},"Efekt",[30,3211,3212,3223,3233,3244,3254],{},[22,3213,3214,3217,3220],{},[35,3215,3216],{},"Content Spoofing",[35,3218,3219],{},"Klient",[35,3221,3222],{},"Ztráta přihlašovacích údajů",[22,3224,3225,3228,3230],{},[35,3226,3227],{},"XSS",[35,3229,3219],{},[35,3231,3232],{},"Přístup k cookies",[22,3234,3235,3238,3241],{},[35,3236,3237],{},"SQL Injection",[35,3239,3240],{},"Server",[35,3242,3243],{},"Neoprávněný přístup do DB",[22,3245,3246,3249,3251],{},[35,3247,3248],{},"DoS\u002FDDoS",[35,3250,3240],{},[35,3252,3253],{},"Nedostupnost služby",[22,3255,3256,3259,3261],{},[35,3257,3258],{},"Path Traversal",[35,3260,3240],{},[35,3262,3263],{},"Přístup k souborům",[115,3265,3267],{"id":3266},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3269,3270],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3272,3273,3276,3279,3282,3285],{},[123,3274,3275],{},"Vydávání se za právníka",[123,3277,3278],{},"Podvod na CEO",[123,3280,3281],{},"Krádež dat (personální oddělení)",[123,3283,3284],{},"Kompromitace účtu",[123,3286,3287],{},"Falešné faktury",[115,3289,3291],{"id":3290},"obranné-technologie","Obranné technologie",[120,3293,3294,3300,3306,3312,3318,3324],{},[123,3295,3296,3299],{},[38,3297,3298],{},"NAC"," — řízení přístupu k síti",[123,3301,3302,3305],{},[38,3303,3304],{},"IDS"," — detekce průniku (pasivní)",[123,3307,3308,3311],{},[38,3309,3310],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3313,3314,3317],{},[38,3315,3316],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3319,3320,3323],{},[38,3321,3322],{},"DLP"," — prevence úniku dat",[123,3325,3326,3329],{},[38,3327,3328],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3331,2044],{"id":2043},[120,3333,3334,3340,3346,3352,3363],{},[123,3335,3336,3339],{},[207,3337,140],{"className":3338,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3341,3342,3345],{},[207,3343,569],{"className":3344,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3347,3348,3351],{},[207,3349,240],{"className":3350,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3353,3354,3357,3358,3362],{},[207,3355,384],{"className":3356,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3359,3361],{"className":3360,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3364,3365,3368],{},[207,3366,369],{"className":3367,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3370,2068,3371],{"id":2067},[207,3372,43],{"className":3373,"dataFsResolvedFilePath":2072,"href":2073},[210],[120,3375,3376,3382,3387,3392,3397],{},[123,3377,3378],{},[207,3379,3381],{"className":3380,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3383,3384],{},[207,3385,417],{"className":3386,"dataFsResolvedFilePath":415,"href":416},[210],[123,3388,3389],{},[207,3390,351],{"className":3391,"dataFsResolvedFilePath":349,"href":350},[210],[123,3393,3394],{},[207,3395,426],{"className":3396,"dataFsResolvedFilePath":424,"href":425},[210],[123,3398,3399],{},[207,3400,458],{"className":3401,"dataFsResolvedFilePath":3402,"href":3403},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3405},[3406,3407,3413,3414,3415,3416,3417],{"id":3006,"depth":642,"text":3007},{"id":3048,"depth":642,"text":3049,"children":3408},[3409,3410,3411,3412],{"id":3052,"depth":649,"text":3053},{"id":3098,"depth":649,"text":3099},{"id":3138,"depth":649,"text":3139},{"id":3159,"depth":649,"text":3160},{"id":3194,"depth":642,"text":3195},{"id":3266,"depth":642,"text":3267},{"id":3290,"depth":642,"text":3291},{"id":2043,"depth":642,"text":2044},{"id":2067,"depth":642,"text":2100},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3423,3424,2975],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3427,3428,3429,3430,3431],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3434,"title":369,"body":3435,"course":659,"courses":3696,"created":660,"description":641,"extension":661,"meta":3697,"navigation":664,"path":3698,"seo":3699,"sources":3700,"stem":3704,"tags":3705,"type":2115,"updated":677,"__hash__":3712},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3436,"toc":3682},[3437,3440,3447,3450,3454,3514,3518,3522,3533,3537,3548,3552,3560,3564,3575,3579,3584,3588,3599,3603,3623,3625,3657,3662],[12,3438,369],{"id":3439},"ochrana-dat",[724,3441,3442],{},[1638,3443],{"alt":3444,"className":3445,"src":3446},"ochrana-dat-technologie",[210,1642],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3448,3449],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3451,3453],{"id":3452},"formy-zneužití-dat","Formy zneužití dat",[16,3455,3456,3465],{},[19,3457,3458],{},[22,3459,3460,3463],{},[25,3461,3462],{},"Forma",[25,3464,1665],{},[30,3466,3467,3474,3482,3490,3498,3506],{},[22,3468,3469,3472],{},[35,3470,3471],{},"Zašifrování",[35,3473,435],{},[22,3475,3476,3479],{},[35,3477,3478],{},"Zveřejnění",[35,3480,3481],{},"Double ransomware",[22,3483,3484,3487],{},[35,3485,3486],{},"Odposlech",[35,3488,3489],{},"Pasivní sběr dat",[22,3491,3492,3495],{},[35,3493,3494],{},"Krádež",[35,3496,3497],{},"Cílená exfiltrace",[22,3499,3500,3503],{},[35,3501,3502],{},"Krádež dodavatelského řetězce",[35,3504,3505],{},"Triple ransomware",[22,3507,3508,3511],{},[35,3509,3510],{},"Prodej",[35,3512,3513],{},"Darknet marketplace",[115,3515,3517],{"id":3516},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3519,3521],{"id":3520},"nac-network-access-control","NAC (Network Access Control)",[120,3523,3524,3527,3530],{},[123,3525,3526],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3528,3529],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3531,3532],{},"Ekvivalenty: MDM, BYOD",[198,3534,3536],{"id":3535},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3538,3539,3542,3545],{},[123,3540,3541],{},"Monitoruje síťový provoz, generuje alerty",[123,3543,3544],{},"Pasivní systém — nezasahuje do provozu",[123,3546,3547],{},"Signaturová a anomální detekce",[198,3549,3551],{"id":3550},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3553,3554,3557],{},[123,3555,3556],{},"Aktivní systém — blokuje škodlivý provoz",[123,3558,3559],{},"Zařazen přímo do síťové cesty (in-line)",[198,3561,3563],{"id":3562},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3565,3566,3569,3572],{},[123,3567,3568],{},"Centralizovaná správa bezpečnostních logů",[123,3570,3571],{},"Sběr s agentem i bez agenta",[123,3573,3574],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3576,3578],{"id":3577},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3580,3581],{},[123,3582,3583],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3585,3587],{"id":3586},"šifrování","Šifrování",[120,3589,3590,3593,3596],{},[123,3591,3592],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3594,3595],{},"RSA (2048+ bit), DSS",[123,3597,3598],{},"SHA-256, SHA-1",[115,3600,3602],{"id":3601},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3604,3605,3611,3617,3620],{},[123,3606,3607,3610],{},[38,3608,3609],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3612,3613,3616],{},[38,3614,3615],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3618,3619],{},"Transportní a tunelovací režim",[123,3621,3622],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3624,2044],{"id":2043},[120,3626,3627,3633,3639,3645,3651],{},[123,3628,3629,3632],{},[207,3630,140],{"className":3631,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3634,3635,3638],{},[207,3636,578],{"className":3637,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3640,3641,3644],{},[207,3642,569],{"className":3643,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3646,3647,3650],{},[207,3648,351],{"className":3649,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3652,3653,3656],{},[207,3654,360],{"className":3655,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3658,2068,3659],{"id":2067},[207,3660,43],{"className":3661,"dataFsResolvedFilePath":2072,"href":2073},[210],[120,3663,3664,3670,3676],{},[123,3665,3666],{},[207,3667,3669],{"className":3668,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3671,3672],{},[207,3673,3675],{"className":3674,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3677,3678],{},[207,3679,3681],{"className":3680,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3683},[3684,3685,3693,3694,3695],{"id":3452,"depth":642,"text":3453},{"id":3516,"depth":642,"text":3517,"children":3686},[3687,3688,3689,3690,3691,3692],{"id":3520,"depth":649,"text":3521},{"id":3535,"depth":649,"text":3536},{"id":3550,"depth":649,"text":3551},{"id":3562,"depth":649,"text":3563},{"id":3577,"depth":649,"text":3578},{"id":3586,"depth":649,"text":3587},{"id":3601,"depth":642,"text":3602},{"id":2043,"depth":642,"text":2044},{"id":2067,"depth":642,"text":2100},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3701,3702,3703],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3439,3706,3707,3708,3709,3710,3711],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3714,"title":569,"body":3715,"course":659,"courses":4050,"created":660,"description":641,"extension":661,"meta":4051,"navigation":664,"path":4052,"seo":4053,"sources":4054,"stem":4055,"tags":4056,"type":2115,"updated":677,"__hash__":4062},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3716,"toc":4039},[3717,3720,3727,3734,3738,3802,3806,3856,3860,3865,3884,3888,3891,3895,3909,3913,3941,3945,3994,3996,4021,4026],[12,3718,569],{"id":3719},"řízení-rizik",[724,3721,3722],{},[1638,3723],{"alt":3724,"className":3725,"src":3726},"rizeni-rizik-proces",[210,1642],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3728,3729,3730,3733],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3731,140],{"className":3732,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3735,3737],{"id":3736},"normativní-základ","Normativní základ",[16,3739,3740,3750],{},[19,3741,3742],{},[22,3743,3744,3747],{},[25,3745,3746],{},"Norma",[25,3748,3749],{},"Zaměření",[30,3751,3752,3762,3772,3782,3792],{},[22,3753,3754,3759],{},[35,3755,3756],{},[38,3757,3758],{},"ISO 31000:2019",[35,3760,3761],{},"Obecné smrnice pro management rizik",[22,3763,3764,3769],{},[35,3765,3766],{},[38,3767,3768],{},"ISO 31010:2020",[35,3770,3771],{},"Techniky posuzování rizik",[22,3773,3774,3779],{},[35,3775,3776],{},[38,3777,3778],{},"ISO\u002FIEC 27005:2019",[35,3780,3781],{},"Řízení rizik bezpečnosti informací",[22,3783,3784,3789],{},[35,3785,3786],{},[38,3787,3788],{},"NIST SP 800-30",[35,3790,3791],{},"Průvodce hodnocením rizik",[22,3793,3794,3799],{},[35,3795,3796],{},[38,3797,3798],{},"NIST SP 800-39",[35,3800,3801],{},"Proces řízení bezpečnostních rizik",[115,3803,3805],{"id":3804},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,3807,3808,3814,3820,3826,3832,3838,3844,3850],{},[123,3809,3810,3813],{},[38,3811,3812],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,3815,3816,3819],{},[38,3817,3818],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,3821,3822,3825],{},[38,3823,3824],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,3827,3828,3831],{},[38,3829,3830],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,3833,3834,3837],{},[38,3835,3836],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,3839,3840,3843],{},[38,3841,3842],{},"Akceptace rizik"," — formální rozhodnutí",[123,3845,3846,3849],{},[38,3847,3848],{},"Komunikace"," — sdílení informací o rizicích",[123,3851,3852,3855],{},[38,3853,3854],{},"Monitorování"," — průběžné přezkoumávání",[115,3857,3859],{"id":3858},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,3861,3862],{},[38,3863,3864],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,3866,3867,3873,3878],{},[123,3868,3869,3872],{},[38,3870,3871],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,3874,3875,3877],{},[38,3876,3026],{}," — slabé místo aktiva (stupnice 1–5)",[123,3879,3880,3883],{},[38,3881,3882],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,3885,3887],{"id":3886},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,3889,3890],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,3892,3894],{"id":3893},"klíčové-dokumenty","Klíčové dokumenty",[120,3896,3897,3903],{},[123,3898,3899,3902],{},[38,3900,3901],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,3904,3905,3908],{},[38,3906,3907],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,3910,3912],{"id":3911},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,3914,3915,3921,3926,3931,3936],{},[123,3916,3917,3920],{},[38,3918,3919],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,3922,3923,3925],{},[38,3924,2743],{}," — odpovědný za ISMS",[123,3927,3928,3930],{},[38,3929,2754],{}," — návrh a implementace opatření",[123,3932,3933,3935],{},[38,3934,2764],{}," — provádění auditů",[123,3937,3938,3940],{},[38,3939,2774],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,3942,3944],{"id":3943},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,3946,3947,3959],{},[19,3948,3949],{},[22,3950,3951,3954,3956],{},[25,3952,3953],{},"Úroveň",[25,3955,3749],{},[25,3957,3958],{},"Typ rizika",[30,3960,3961,3972,3983],{},[22,3962,3963,3966,3969],{},[35,3964,3965],{},"Stupeň 1",[35,3967,3968],{},"Organizace",[35,3970,3971],{},"Strategické riziko",[22,3973,3974,3977,3980],{},[35,3975,3976],{},"Stupeň 2",[35,3978,3979],{},"Poslání\u002Fobchodní procesy",[35,3981,3982],{},"Taktické riziko",[22,3984,3985,3988,3991],{},[35,3986,3987],{},"Stupeň 3",[35,3989,3990],{},"Informační systémy",[35,3992,3993],{},"Operační riziko",[115,3995,2044],{"id":2043},[120,3997,3998,4004,4010,4016],{},[123,3999,4000,4003],{},[207,4001,140],{"className":4002,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4005,4006,4009],{},[207,4007,384],{"className":4008,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4011,4012,4015],{},[207,4013,393],{"className":4014,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4017,4018,3638],{},[207,4019,578],{"className":4020,"dataFsResolvedFilePath":576,"href":577},[210],[115,4022,2068,4023],{"id":2067},[207,4024,43],{"className":4025,"dataFsResolvedFilePath":2072,"href":2073},[210],[120,4027,4028,4034],{},[123,4029,4030],{},[207,4031,4033],{"className":4032,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4035,4036],{},[207,4037,222],{"className":4038,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4040},[4041,4042,4043,4044,4045,4046,4047,4048,4049],{"id":3736,"depth":642,"text":3737},{"id":3804,"depth":642,"text":3805},{"id":3858,"depth":642,"text":3859},{"id":3886,"depth":642,"text":3887},{"id":3893,"depth":642,"text":3894},{"id":3911,"depth":642,"text":3912},{"id":3943,"depth":642,"text":3944},{"id":2043,"depth":642,"text":2044},{"id":2067,"depth":642,"text":2100},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[2976,2975],"topics\u002Frizeni-rizik",[658,4057,4058,4059,4060,4061],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4064,"title":4065,"body":4066,"course":659,"courses":4297,"created":660,"description":641,"extension":661,"meta":4298,"navigation":664,"path":4299,"seo":4300,"sources":4301,"stem":4303,"tags":4304,"type":2115,"updated":677,"__hash__":4309},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4067,"toc":4289},[4068,4071,4078,4081,4085,4184,4188,4223,4227,4247,4251,4254,4256,4276,4281],[12,4069,4065],{"id":4070},"sae-budování-bezpečnostního-povědomí",[724,4072,4073],{},[1638,4074],{"alt":4075,"className":4076,"src":4077},"sae-pyramida",[210,1642],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4079,4080],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4082,4084],{"id":4083},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4086,4087,4104],{},[19,4088,4089],{},[22,4090,4091,4093,4096,4098,4101],{},[25,4092,3953],{},[25,4094,4095],{},"Příznak",[25,4097,3067],{},[25,4099,4100],{},"Metody",[25,4102,4103],{},"Časový rámec",[30,4105,4106,4126,4146,4166],{},[22,4107,4108,4114,4117,4120,4123],{},[35,4109,4110,4113],{},[38,4111,4112],{},"Awareness"," (povědomí)",[35,4115,4116],{},"„Co\"",[35,4118,4119],{},"Rozpoznávání",[35,4121,4122],{},"Média, videa, plakáty",[35,4124,4125],{},"Krátkodobý",[22,4127,4128,4134,4137,4140,4143],{},[35,4129,4130,4133],{},[38,4131,4132],{},"Training"," (výcvik)",[35,4135,4136],{},"„Jak\"",[35,4138,4139],{},"Dovednosti",[35,4141,4142],{},"Přednášky, případovky, cvičení",[35,4144,4145],{},"Střednědobý",[22,4147,4148,4154,4157,4160,4163],{},[35,4149,4150,4153],{},[38,4151,4152],{},"Education"," (vzdělávání)",[35,4155,4156],{},"„Proč\"",[35,4158,4159],{},"Porozumění",[35,4161,4162],{},"Semináře, diskuze, výzkum",[35,4164,4165],{},"Dlouhodobý",[22,4167,4168,4173,4175,4178,4181],{},[35,4169,4170],{},[38,4171,4172],{},"Professional Development",[35,4174,2746],{},[35,4176,4177],{},"Profesní rozvoj",[35,4179,4180],{},"Certifikace, konference",[35,4182,4183],{},"Průběžný",[115,4185,4187],{"id":4186},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4189,4190,4193,4196,4199,4202,4205,4208,4211,4214,4217,4220],{},[123,4191,4192],{},"Role a odpovědnosti v programu",[123,4194,4195],{},"Stanovení cílů pro každou fázi",[123,4197,4198],{},"Rozdělení uživatelů (analýza)",[123,4200,4201],{},"Vytvoření školících materiálů dle skupin",[123,4203,4204],{},"Určení cíle pro každou skupinu",[123,4206,4207],{},"Témata pro každou relaci\u002Fkurz",[123,4209,4210],{},"Metody nasazení (metodiky)",[123,4212,4213],{},"Dokumentace a zpětná vazba",[123,4215,4216],{},"Vyhodnocení a aktualizace materiálů",[123,4218,4219],{},"Četnost opakování",[123,4221,4222],{},"Kalkulace",[115,4224,4226],{"id":4225},"modely-řízení","Modely řízení",[120,4228,4229,4235,4241],{},[123,4230,4231,4234],{},[38,4232,4233],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4236,4237,4240],{},[38,4238,4239],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4242,4243,4246],{},[38,4244,4245],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4248,4250],{"id":4249},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4252,4253],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4255,2044],{"id":2043},[120,4257,4258,4264,4270],{},[123,4259,4260,4263],{},[207,4261,140],{"className":4262,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4265,4266,4269],{},[207,4267,578],{"className":4268,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4271,4272,4275],{},[207,4273,569],{"className":4274,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4277,2068,4278],{"id":2067},[207,4279,43],{"className":4280,"dataFsResolvedFilePath":2072,"href":2073},[210],[120,4282,4283],{},[123,4284,4285],{},[207,4286,4288],{"className":4287,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4290},[4291,4292,4293,4294,4295,4296],{"id":4083,"depth":642,"text":4084},{"id":4186,"depth":642,"text":4187},{"id":4225,"depth":642,"text":4226},{"id":4249,"depth":642,"text":4250},{"id":2043,"depth":642,"text":2044},{"id":2067,"depth":642,"text":2100},[658],{},"\u002Ftopics\u002Fsae",{"title":4065,"description":641},[4302],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4305,4306,4307,4060,4308],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4311,4313,4317,4321,4325,4329,4332,4334],{"slug":658,"path":2073,"title":7,"snippet":4312},"… á bezpečnost]] — hrozby, útoky, obrana - SAE — budování bezpečnostního povědomí - \u003C\u003Cbcm>> — řízení kontinuity činnosti - Ochrana dat — technologická řešení ochrany …",{"slug":4314,"path":467,"title":4315,"snippet":4316},"imork-nemocnice","Případovka: Kybernetické útoky na české nemocnice","… oborový kontext - Kybernetická bezpečnost — ransomware, APT - \u003C\u003Cbcm>> \u002F DR — obnova po havárii - Řízení rizik — ekonomické srovná …",{"slug":4318,"path":434,"title":4319,"snippet":4320},"imork-ransomware","Ransomware — komplexní případová studie","… — APT skupiny provozující RaaS - TOR síť — distribuce ransomware přes Tor - \u003C\u003Cbcm>> — plán kontinuity po ransomware útoku - ISMS — preventivní bezpečnostní opatření …",{"slug":4322,"path":443,"title":4323,"snippet":4324},"imork-rizeny-hacking","Řízený hacking — Advanced Persistent Threat (APT)","… ork-tor|TOR síť]] — anonymizace útočníků - Ochrana dat — cíl exfiltrace - \u003C\u003Cbcm>> — kontinuita po APT kompromitaci",{"slug":4326,"path":425,"title":4327,"snippet":4328},"imork-sitove-utoky","Síťové útoky — komplexní přehled","… anonymizace útočníků - Ransomware — Ryuk jako koncová fáze řetězce - \u003C\u003Cbcm>> — obnova po úspěšném útoku (případ Benešov) - Ochrana dat — prevence únik …",{"slug":4330,"path":281,"title":174,"snippet":4331},"imork-zdravotnictvi","… ictví ## Ransomware a BCM Prevence ransomwarových útoků ve zdravotnictví zahrnuje: - **\u003C\u003Cbcm>>** (Business Continuity Management) — zajištění kontinuity provozu - **SAE** (Security Awa …",{"slug":671,"path":560,"title":2486,"snippet":4333},"… ik|Řízení rizik]] — jádro ISMS procesu - SAE — budování bezpečnostního povědomí - \u003C\u003Cbcm>> — kontinuita činnosti - Kybernetická bezpečnost — širší konte …",{"slug":673,"path":577,"title":578,"snippet":4335},"… ] — hodnocení hrozeb a zranitelností - SAE — budování povědomí jako obrana č. 1 - \u003C\u003Cbcm>> \u002F DR — reakce na incidenty a obnova - Ochrana dat — technolo …",[4337,4341],{"slug":4338,"title":4339,"path":383,"sharedTags":4340},"imork-bcm","Business Continuity Management (BCM)",5,{"slug":4342,"title":1926,"path":392,"sharedTags":642},"imork-dr",1777154952445]