[{"data":1,"prerenderedAt":5490},["ShallowReactive",2],{"courses-with-stats":3,"all-tag-counts":24,"wiki-gdpr":1003,"course-stats-imork":1794,"course-topics-imork":1796,"backlinks-gdpr":5464,"related-gdpr":5482},[4,8,12,16,20],{"slug":5,"title":6,"count":7},"imork","Management oborových řešení (ImorK)",43,{"slug":9,"title":10,"count":11},"imek","Matematická ekonomie (ImeK)",22,{"slug":13,"title":14,"count":15},"mikk","Mikroekonomie 2 (mikK)",31,{"slug":17,"title":18,"count":19},"ipmrk","Pokročilé metody v rozhodování (IpmrK)",24,{"slug":21,"title":22,"count":23},"irmank","Risk management (IrmanK)",30,[25,27,30,32,33,34,36,39,42,44,46,49,51,54,56,59,61,63,65,67,69,71,74,76,78,80,82,84,86,88,90,92,94,96,98,101,103,105,107,109,111,113,115,117,119,121,123,125,127,129,131,133,135,137,139,141,143,146,148,150,152,154,156,158,160,162,164,166,168,170,172,174,176,178,180,182,184,186,188,190,192,194,196,198,200,202,204,206,208,210,212,214,216,218,220,222,224,226,228,230,232,234,236,238,240,242,244,246,248,250,252,254,256,258,260,262,264,266,268,270,272,274,276,278,280,282,284,286,288,290,292,294,296,298,300,302,304,306,308,310,312,314,316,318,320,322,324,326,328,330,332,334,336,338,340,342,344,346,348,350,352,355,357,359,361,363,365,367,369,371,373,375,377,379,381,383,385,387,389,391,393,395,397,399,401,403,405,407,409,411,413,415,417,419,421,423,425,427,429,431,433,435,437,439,441,443,445,447,449,451,453,455,457,459,461,463,465,467,469,471,473,475,477,479,481,483,485,487,489,491,493,495,497,499,501,503,505,507,509,511,513,515,517,519,521,523,525,527,529,531,533,535,537,539,541,543,545,547,549,551,553,555,557,559,561,563,565,567,569,571,573,575,577,579,581,583,585,587,589,591,593,595,597,599,601,603,605,607,609,611,613,615,617,619,621,623,625,627,629,631,633,635,637,639,641,643,645,647,649,651,653,655,657,659,661,663,665,667,669,671,673,675,677,679,681,683,685,687,689,691,693,695,697,699,701,703,705,707,709,711,713,715,717,719,721,723,725,727,729,731,733,735,737,739,741,743,745,747,749,751,753,755,757,759,761,763,765,767,769,771,773,775,777,779,781,783,785,787,789,791,793,795,797,799,801,803,805,807,809,811,813,815,817,819,821,823,825,827,829,831,833,835,837,839,841,843,845,847,849,851,853,855,857,859,861,863,865,867,869,871,873,875,877,879,881,883,885,887,889,891,893,895,897,899,901,903,905,907,909,911,913,915,917,919,921,923,925,927,929,931,933,935,937,939,941,943,945,947,949,951,953,955,957,959,961,963,965,967,969,971,973,975,977,979,981,983,985,987,989,991,993,995,997,999,1001],{"tag":5,"count":26},44,{"tag":28,"count":29},"mikroekonomie",33,{"tag":13,"count":31},32,{"tag":21,"count":15},{"tag":17,"count":19},{"tag":9,"count":35},23,{"tag":37,"count":38},"isms",15,{"tag":40,"count":41},"neuronove-site",8,{"tag":43,"count":41},"oligopol",{"tag":45,"count":41},"optimalizace",{"tag":47,"count":48},"nist",7,{"tag":50,"count":48},"riziko",{"tag":52,"count":53},"fuzzy",6,{"tag":55,"count":53},"makroekonomie",{"tag":57,"count":58},"behavior",5,{"tag":60,"count":58},"geneticke-algoritmy",{"tag":62,"count":58},"kyberneticka-bezpecnost",{"tag":64,"count":58},"lagrange",{"tag":66,"count":58},"lewin",{"tag":68,"count":58},"mapa-rizik",{"tag":70,"count":58},"ochrana-dat",{"tag":72,"count":73},"apt",4,{"tag":75,"count":73},"cenova-diskriminace",{"tag":77,"count":73},"chaos",{"tag":79,"count":73},"cpm-pert",{"tag":81,"count":73},"datamining",{"tag":83,"count":73},"elasticita",{"tag":85,"count":73},"evolucni-algoritmy",{"tag":87,"count":73},"monopol",{"tag":89,"count":73},"npv",{"tag":91,"count":73},"oborova-reseni",{"tag":93,"count":73},"predikce",{"tag":95,"count":73},"sifrovani",{"tag":97,"count":73},"uzitecnost",{"tag":99,"count":100},"backpropagation",3,{"tag":102,"count":100},"cobb-douglas",{"tag":104,"count":100},"delphi",{"tag":106,"count":100},"derivace",{"tag":108,"count":100},"gdpr",{"tag":110,"count":100},"governance",{"tag":112,"count":100},"indiferencni-krivky",{"tag":114,"count":100},"informacni-bezpecnost",{"tag":116,"count":100},"integral",{"tag":118,"count":100},"is-lm",{"tag":120,"count":100},"iso-31000",{"tag":122,"count":100},"kaizen",{"tag":124,"count":100},"klastrovani",{"tag":126,"count":100},"koluze",{"tag":128,"count":100},"matlab",{"tag":130,"count":100},"multiplikator",{"tag":132,"count":100},"phishing",{"tag":134,"count":100},"poptavka-nabidka",{"tag":136,"count":100},"prednaska",{"tag":138,"count":100},"ransomware",{"tag":140,"count":100},"vzorce",{"tag":142,"count":100},"zdravotnictvi",{"tag":144,"count":145},"5g",2,{"tag":147,"count":145},"aco",{"tag":149,"count":145},"akreditiv",{"tag":151,"count":145},"anfis",{"tag":153,"count":145},"apriori",{"tag":155,"count":145},"atraktory",{"tag":157,"count":145},"autentizace",{"tag":159,"count":145},"bcm",{"tag":161,"count":145},"bec",{"tag":163,"count":145},"bertrand",{"tag":165,"count":145},"bezpecnostni-povedomi",{"tag":167,"count":145},"bia",{"tag":169,"count":145},"box-jenkins",{"tag":171,"count":145},"cournot",{"tag":173,"count":145},"crisp-dm",{"tag":175,"count":145},"cyert-march",{"tag":177,"count":145},"diferencial",{"tag":179,"count":145},"disaster-recovery",{"tag":181,"count":145},"dlp",{"tag":183,"count":145},"doyle",{"tag":185,"count":145},"dualita",{"tag":187,"count":145},"duchodova-elasticita",{"tag":189,"count":145},"ehealth",{"tag":191,"count":145},"energetika",{"tag":193,"count":145},"enisa",{"tag":195,"count":145},"expertni-systemy",{"tag":197,"count":145},"exportni-financovani",{"tag":199,"count":145},"faktoring",{"tag":201,"count":145},"fmincon",{"tag":203,"count":145},"fraktaly",{"tag":205,"count":145},"funkce-clenstvi",{"tag":207,"count":145},"ga",{"tag":209,"count":145},"glosar",{"tag":211,"count":145},"gnp",{"tag":213,"count":145},"hicks",{"tag":215,"count":145},"hurst",{"tag":217,"count":145},"inference",{"tag":219,"count":145},"iot",{"tag":221,"count":145},"iso-22301",{"tag":223,"count":145},"iso-27000",{"tag":225,"count":145},"iso-27005",{"tag":227,"count":145},"iso-27701",{"tag":229,"count":145},"izokvanty",{"tag":231,"count":145},"kniha",{"tag":233,"count":145},"kontinuita-cinnosti",{"tag":235,"count":145},"kriticka-infrastruktura",{"tag":237,"count":145},"kriticke-faktory",{"tag":239,"count":145},"krizeni",{"tag":241,"count":145},"krizova-elasticita",{"tag":243,"count":145},"link-analyza",{"tag":245,"count":145},"linprog",{"tag":247,"count":145},"logisticka-funkce",{"tag":249,"count":145},"malware",{"tag":251,"count":145},"metaheuristiky",{"tag":253,"count":145},"mobilni-bezpecnost",{"tag":255,"count":145},"monopolisticka-konkurence",{"tag":257,"count":145},"motyli-efekt",{"tag":259,"count":145},"mrs",{"tag":261,"count":145},"mrts",{"tag":263,"count":145},"mrtva-vaha",{"tag":265,"count":145},"mutace",{"tag":267,"count":145},"narodni-duchod",{"tag":269,"count":145},"nash",{"tag":271,"count":145},"nukib",{"tag":273,"count":145},"osint",{"tag":275,"count":145},"owasp",{"tag":277,"count":145},"perceptron",{"tag":279,"count":145},"pii",{"tag":281,"count":145},"pravidla",{"tag":283,"count":145},"prebytek",{"tag":285,"count":145},"predterminy",{"tag":287,"count":145},"prehled",{"tag":289,"count":145},"privacy-by-design",{"tag":291,"count":145},"produkce",{"tag":293,"count":145},"pso",{"tag":295,"count":145},"redukce",{"tag":297,"count":145},"retence",{"tag":299,"count":145},"rizeni-rizik",{"tag":301,"count":145},"rovnovaha",{"tag":303,"count":145},"rozhodovaci-stromy",{"tag":305,"count":145},"ryuk",{"tag":307,"count":145},"sae",{"tag":309,"count":145},"selekce",{"tag":311,"count":145},"siem",{"tag":313,"count":145},"sigma",{"tag":315,"count":145},"simon",{"tag":317,"count":145},"simulated-annealing",{"tag":319,"count":145},"sitova-analyza",{"tag":321,"count":145},"skoleni",{"tag":323,"count":145},"slutsky",{"tag":325,"count":145},"smart-grid",{"tag":327,"count":145},"soma",{"tag":329,"count":145},"spotrebitel",{"tag":331,"count":145},"stackelberg",{"tag":333,"count":145},"sylabus",{"tag":335,"count":145},"tabu-search",{"tag":337,"count":145},"ucelova-funkce",{"tag":339,"count":145},"uceni",{"tag":341,"count":145},"volatilita",{"tag":343,"count":145},"witness-miner",{"tag":345,"count":145},"zdaneni",{"tag":347,"count":145},"zkouska",{"tag":349,"count":145},"zkousky",{"tag":351,"count":145},"zmena",{"tag":353,"count":354},"agent-zmeny",1,{"tag":356,"count":354},"ai",{"tag":358,"count":354},"aktivacni-funkce",{"tag":360,"count":354},"alternativni-cile",{"tag":362,"count":354},"analyza",{"tag":364,"count":354},"analyza-rizik",{"tag":366,"count":354},"anonymizace",{"tag":368,"count":354},"aplikacni-portfolio",{"tag":370,"count":354},"automotive",{"tag":372,"count":354},"bandwagon",{"tag":374,"count":354},"banky",{"tag":376,"count":354},"baumol",{"tag":378,"count":354},"bcmaas",{"tag":380,"count":354},"bez-recourse",{"tag":382,"count":354},"bezpecnost",{"tag":384,"count":354},"biometrika",{"tag":386,"count":354},"blockchain",{"tag":388,"count":354},"body-zvratu",{"tag":390,"count":354},"bot",{"tag":392,"count":354},"botnet",{"tag":394,"count":354},"buchta",{"tag":396,"count":354},"buffett",{"tag":398,"count":354},"bundling",{"tag":400,"count":354},"can-bus",{"tag":402,"count":354},"cash-flow",{"tag":404,"count":354},"casove-rady",{"tag":406,"count":354},"cenova-elasticita",{"tag":408,"count":354},"cenova-konkurence",{"tag":410,"count":354},"cenova-tuhost",{"tag":412,"count":354},"cenovy-vudce",{"tag":414,"count":354},"ces",{"tag":416,"count":354},"ceteris-paribus",{"tag":418,"count":354},"chamberlin",{"tag":420,"count":354},"ciste-spekulativni",{"tag":422,"count":354},"citlivostni-analyza",{"tag":424,"count":354},"cloud",{"tag":426,"count":354},"cmmc",{"tag":428,"count":354},"cobweb",{"tag":430,"count":354},"common-criteria",{"tag":432,"count":354},"cs",{"tag":434,"count":354},"cve",{"tag":436,"count":354},"dane",{"tag":438,"count":354},"danove-bremeno",{"tag":440,"count":354},"darknet",{"tag":442,"count":354},"data-diodes",{"tag":444,"count":354},"ddos",{"tag":446,"count":354},"debt-netting",{"tag":448,"count":354},"deep-learning",{"tag":450,"count":354},"defuzzifikace",{"tag":452,"count":354},"dekompozice",{"tag":454,"count":354},"deming",{"tag":456,"count":354},"desatero",{"tag":458,"count":354},"detail-predmetu",{"tag":460,"count":354},"deterministicke-modely",{"tag":462,"count":354},"digitalni-identita",{"tag":464,"count":354},"digitalni-stopa",{"tag":466,"count":354},"diverzifikace",{"tag":468,"count":354},"dkim",{"tag":470,"count":354},"dlt",{"tag":472,"count":354},"dmarc",{"tag":474,"count":354},"dodavatelska",{"tag":476,"count":354},"dokumenty",{"tag":478,"count":354},"doprava",{"tag":480,"count":354},"dora",{"tag":482,"count":354},"dos",{"tag":484,"count":354},"dostupnost",{"tag":486,"count":354},"dpia",{"tag":488,"count":354},"dr",{"tag":490,"count":354},"draas",{"tag":492,"count":354},"duopol",{"tag":494,"count":354},"dynamicke-staticke",{"tag":496,"count":354},"efqm",{"tag":498,"count":354},"ehr",{"tag":500,"count":354},"eidas",{"tag":502,"count":354},"ekonomie",{"tag":504,"count":354},"elektronicka-preskripce",{"tag":506,"count":354},"email",{"tag":508,"count":354},"emotet",{"tag":510,"count":354},"emv",{"tag":512,"count":354},"endogenni",{"tag":514,"count":354},"engel",{"tag":516,"count":354},"eu",{"tag":518,"count":354},"euler",{"tag":520,"count":354},"excel",{"tag":522,"count":354},"exogenni",{"tag":524,"count":354},"exploit",{"tag":526,"count":354},"extremy",{"tag":528,"count":354},"factory-support",{"tag":530,"count":354},"fancy-bear",{"tag":532,"count":354},"fel-expert",{"tag":534,"count":354},"force-field",{"tag":536,"count":354},"forfaiting",{"tag":538,"count":354},"fuzzy-system",{"tag":540,"count":354},"fyzicky-utok",{"tag":542,"count":354},"geograficka",{"tag":544,"count":354},"giffen",{"tag":546,"count":354},"hdd",{"tag":548,"count":354},"hedging",{"tag":550,"count":354},"hesla",{"tag":552,"count":354},"hhi",{"tag":554,"count":354},"hipaa",{"tag":556,"count":354},"hodnoceni",{"tag":558,"count":354},"hodnoceni-rizik",{"tag":560,"count":354},"horizontalni",{"tag":562,"count":354},"hotelling",{"tag":564,"count":354},"hybridni-system",{"tag":566,"count":354},"iam",{"tag":568,"count":354},"icc",{"tag":570,"count":354},"identifikace",{"tag":572,"count":354},"ids",{"tag":574,"count":354},"iec-61850",{"tag":576,"count":354},"iec-62351",{"tag":578,"count":354},"implicitni-funkce",{"tag":580,"count":354},"incident-management",{"tag":582,"count":354},"incident-response",{"tag":584,"count":354},"info",{"tag":586,"count":354},"informacni-valka",{"tag":588,"count":354},"inovace",{"tag":590,"count":354},"integraly",{"tag":592,"count":354},"internet",{"tag":594,"count":354},"intervence",{"tag":596,"count":354},"intervencni-strategie",{"tag":598,"count":354},"intlinprog",{"tag":600,"count":354},"investice",{"tag":602,"count":354},"investicni-rozhodovani",{"tag":604,"count":354},"ips",{"tag":606,"count":354},"ipsec",{"tag":608,"count":354},"irr",{"tag":610,"count":354},"is-it-strategie",{"tag":612,"count":354},"iso-11898",{"tag":614,"count":354},"iso-27001",{"tag":616,"count":354},"iso-27002",{"tag":618,"count":354},"iso-27011",{"tag":620,"count":354},"iso-27799",{"tag":622,"count":354},"isp",{"tag":624,"count":354},"kalkul",{"tag":626,"count":354},"kampus",{"tag":628,"count":354},"kartel",{"tag":630,"count":354},"katalog-rizik",{"tag":632,"count":354},"klasifikace",{"tag":634,"count":354},"klasifikace-rizik",{"tag":636,"count":354},"knapsack",{"tag":638,"count":354},"koeficient-variace",{"tag":640,"count":354},"komparativni-statika",{"tag":642,"count":354},"koncentrace",{"tag":644,"count":354},"kriticka-analyza",{"tag":646,"count":354},"kriticka-cesta",{"tag":648,"count":354},"kriticka-zona",{"tag":650,"count":354},"krizove-rizeni",{"tag":652,"count":354},"kryptografie",{"tag":654,"count":354},"kupon",{"tag":656,"count":354},"kursove-riziko",{"tag":658,"count":354},"kyberneticka-hygiena",{"tag":660,"count":354},"kyberprostor",{"tag":662,"count":354},"leasing",{"tag":664,"count":354},"lerner",{"tag":666,"count":354},"letter-of-credit",{"tag":668,"count":354},"lidske-zdroje",{"tag":670,"count":354},"linearni-programovani",{"tag":672,"count":354},"literatura",{"tag":674,"count":354},"lorenz",{"tag":676,"count":354},"manazerske-modely",{"tag":678,"count":354},"markup",{"tag":680,"count":354},"marshall",{"tag":682,"count":354},"maurer",{"tag":684,"count":354},"maximalizace-zisku",{"tag":686,"count":354},"mcfarlan",{"tag":688,"count":354},"mckinsey-7s",{"tag":690,"count":354},"mcn",{"tag":692,"count":354},"mereni-rizika",{"tag":694,"count":354},"mezni-naklady",{"tag":696,"count":354},"mezni-uzitecnost",{"tag":698,"count":354},"meznik",{"tag":700,"count":354},"mica",{"tag":702,"count":354},"minimalizace-vydaju",{"tag":704,"count":354},"mitm",{"tag":706,"count":354},"mobilni-platby",{"tag":708,"count":354},"model",{"tag":710,"count":354},"model-hrozeb",{"tag":712,"count":354},"modely",{"tag":714,"count":354},"monopson",{"tag":716,"count":354},"mpc",{"tag":718,"count":354},"mpl-apl",{"tag":720,"count":354},"mps",{"tag":722,"count":354},"mr-tr",{"tag":724,"count":354},"mrcs",{"tag":726,"count":354},"mzdova-diskriminace",{"tag":728,"count":354},"nabidka",{"tag":730,"count":354},"nabidka-firmy",{"tag":732,"count":354},"nac",{"tag":734,"count":354},"naklady",{"tag":736,"count":354},"ncpi",{"tag":738,"count":354},"ncss",{"tag":740,"count":354},"nejistota",{"tag":742,"count":354},"nemocnice",{"tag":744,"count":354},"neurcity",{"tag":746,"count":354},"neuspesny-manazer",{"tag":748,"count":354},"nfc",{"tag":750,"count":354},"ngn",{"tag":752,"count":354},"nistir-7628",{"tag":754,"count":354},"nistir-8374",{"tag":756,"count":354},"non-recourse",{"tag":758,"count":354},"normy",{"tag":760,"count":354},"nsa",{"tag":762,"count":354},"odhad-poptavky",{"tag":764,"count":354},"odpor",{"tag":766,"count":354},"ofenzivni-rizeni",{"tag":768,"count":354},"omezeni",{"tag":770,"count":354},"opec",{"tag":772,"count":354},"operacni-vyzkum",{"tag":774,"count":354},"optimalizace-spotrebitele",{"tag":776,"count":354},"pacs",{"tag":778,"count":354},"parcialni-derivace",{"tag":780,"count":354},"pcc",{"tag":782,"count":354},"pci-dss",{"tag":784,"count":354},"penetracni-testy",{"tag":786,"count":354},"peters-waterman",{"tag":788,"count":354},"pgp",{"tag":790,"count":354},"platby",{"tag":792,"count":354},"plc",{"tag":794,"count":354},"podnikatelske-riziko",{"tag":796,"count":354},"pohledavky",{"tag":798,"count":354},"pojisteni",{"tag":800,"count":354},"polaroid",{"tag":802,"count":354},"poptavka",{"tag":804,"count":354},"poptavka-spotrebitele",{"tag":806,"count":354},"postoj-k-riziku",{"tag":808,"count":354},"posun-krivek",{"tag":810,"count":354},"preference",{"tag":812,"count":354},"prenos",{"tag":814,"count":354},"prijatelna-zona",{"tag":816,"count":354},"prijem",{"tag":818,"count":354},"prijem-naklady-zisk",{"tag":820,"count":354},"priklady",{"tag":822,"count":354},"primitivni-funkce",{"tag":824,"count":354},"priprava",{"tag":826,"count":354},"prirozeny-monopol",{"tag":828,"count":354},"privilegovane-ucty",{"tag":830,"count":354},"produkcni-funkce",{"tag":832,"count":354},"prognoza",{"tag":834,"count":354},"prognozovani",{"tag":836,"count":354},"projekt",{"tag":838,"count":354},"projektove-rizeni",{"tag":840,"count":354},"ps",{"tag":842,"count":354},"raas",{"tag":844,"count":354},"reakcni-krivka",{"tag":846,"count":354},"recourse",{"tag":848,"count":354},"reference",{"tag":850,"count":354},"regulace",{"tag":852,"count":354},"reseni",{"tag":854,"count":354},"rozmrazeni",{"tag":856,"count":354},"rozpoctove-omezeni",{"tag":858,"count":354},"rpo",{"tag":860,"count":354},"rto",{"tag":862,"count":354},"samostatna-prace",{"tag":864,"count":354},"satisficing",{"tag":866,"count":354},"scada",{"tag":868,"count":354},"scoring",{"tag":870,"count":354},"shephard",{"tag":872,"count":354},"sim",{"tag":874,"count":354},"sitove-utoky",{"tag":876,"count":354},"slovnik",{"tag":878,"count":354},"sniffing",{"tag":880,"count":354},"snizovani-rizika",{"tag":882,"count":354},"socialni-inzenyrstvi",{"tag":884,"count":354},"soukromi",{"tag":886,"count":354},"spf",{"tag":888,"count":354},"spolehlivost",{"tag":890,"count":354},"sponzor",{"tag":892,"count":354},"spoofing",{"tag":894,"count":354},"srovnani",{"tag":896,"count":354},"ssl",{"tag":898,"count":354},"strategicke",{"tag":900,"count":354},"strategie",{"tag":902,"count":354},"supply-chain",{"tag":904,"count":354},"sweezy",{"tag":906,"count":354},"taktiky",{"tag":908,"count":354},"tc-z-mc",{"tag":910,"count":354},"telekomunikace",{"tag":912,"count":354},"telemedicina",{"tag":914,"count":354},"teorie-her",{"tag":916,"count":354},"tisax",{"tag":918,"count":354},"tls",{"tag":920,"count":354},"tokenizace",{"tag":922,"count":354},"tor",{"tag":924,"count":354},"tr-z-mr",{"tag":926,"count":354},"trenovani",{"tag":928,"count":354},"trh-penez",{"tag":930,"count":354},"trh-prace",{"tag":932,"count":354},"trh-zbozi",{"tag":934,"count":354},"tsp",{"tag":936,"count":354},"two-part-tariff",{"tag":938,"count":354},"univerzity",{"tag":940,"count":354},"urcity",{"tag":942,"count":354},"urokova-mira",{"tag":944,"count":354},"utoky",{"tag":946,"count":354},"uvod-do-matematicke-ekonomie",{"tag":948,"count":354},"vazane-extremy",{"tag":950,"count":354},"veblen",{"tag":952,"count":354},"vertikalni",{"tag":954,"count":354},"vezno-dilema",{"tag":956,"count":354},"vicevrstve-site",{"tag":958,"count":354},"vnm",{"tag":960,"count":354},"vodni-elektrarna",{"tag":962,"count":354},"volne-extremy",{"tag":964,"count":354},"vs",{"tag":966,"count":354},"vyhodnoceni",{"tag":968,"count":354},"vykupne",{"tag":970,"count":354},"vyrobce",{"tag":972,"count":354},"vyvarovani",{"tag":974,"count":354},"vzor",{"tag":976,"count":354},"walton",{"tag":978,"count":354},"wannacry",{"tag":980,"count":354},"ward",{"tag":982,"count":354},"web",{"tag":984,"count":354},"wifi",{"tag":986,"count":354},"williamson",{"tag":988,"count":354},"wormgpt",{"tag":990,"count":354},"xml-security",{"tag":992,"count":354},"zalomena-poptavka",{"tag":994,"count":354},"zamestnanecka-firma",{"tag":996,"count":354},"zavazna-zona",{"tag":998,"count":354},"zeleznice",{"tag":1000,"count":354},"zisk",{"tag":1002,"count":354},"zranitelnost",{"page":1004,"collection":1793},{"id":1005,"title":1006,"body":1007,"course":1774,"courses":1775,"created":1776,"description":1777,"extension":1778,"meta":1779,"navigation":1780,"path":1781,"seo":1782,"sources":1783,"stem":1789,"tags":1790,"type":1791,"updated":1776,"__hash__":1792},"topics\u002Ftopics\u002Fgdpr.md","GDPR — Obecné nařízení o ochraně osobních údajů",{"type":1008,"value":1009,"toc":1753},"minimark",[1010,1014,1030,1077,1082,1196,1200,1240,1247,1251,1254,1292,1296,1346,1350,1353,1358,1369,1373,1417,1421,1438,1442,1463,1467,1518,1522,1525,1539,1543,1562,1566,1633,1637,1663,1670,1707,1711],[1011,1012,1006],"h1",{"id":1013},"gdpr-obecné-nařízení-o-ochraně-osobních-údajů",[1015,1016,1017,1021,1022,1025,1026,1029],"p",{},[1018,1019,1020],"strong",{},"Nařízení Evropského parlamentu a Rady (EU) 2016\u002F679"," — General Data Protection Regulation. Účinnost od ",[1018,1023,1024],{},"25. května 2018"," ve všech členských státech EU bez nutnosti transpozice. Pro Českou republiku doplněno ",[1018,1027,1028],{},"zákonem č. 110\u002F2019 Sb."," o zpracování osobních údajů.",[1015,1031,1032,1033,1041,1042,1048,1049,1055,1056,1062,1063,1069,1070,1076],{},"GDPR je v kurzu ",[1034,1035,1040],"a",{"className":1036,"dataFsResolvedFilePath":1038,"href":1039},[1037],"wikilink","courses\u002Fimork.md","\u002Fwiki\u002Fimork","ImorK"," napříč více oblastmi: legislativní rámec ",[1034,1043,1047],{"className":1044,"dataFsResolvedFilePath":1045,"href":1046},[1037],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat","ochrany dat",", povinný kontext pro ",[1034,1050,1054],{"className":1051,"dataFsResolvedFilePath":1052,"href":1053},[1037],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","zdravotnická data",", ",[1034,1057,1061],{"className":1058,"dataFsResolvedFilePath":1059,"href":1060},[1037],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","platební údaje"," a ",[1034,1064,1068],{"className":1065,"dataFsResolvedFilePath":1066,"href":1067},[1037],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," služby, a operační rámec definovaný v ",[1034,1071,1075],{"className":1072,"dataFsResolvedFilePath":1073,"href":1074},[1037],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","případové studii o krádeži dat"," (DPIA, Privacy by Design, ISO 27701).",[1078,1079,1081],"h2",{"id":1080},"klíčové-pojmy","Klíčové pojmy",[1083,1084,1085,1101],"table",{},[1086,1087,1088],"thead",{},[1089,1090,1091,1095,1098],"tr",{},[1092,1093,1094],"th",{},"Pojem",[1092,1096,1097],{},"Anglicky",[1092,1099,1100],{},"Definice",[1102,1103,1104,1118,1131,1144,1157,1170,1183],"tbody",{},[1089,1105,1106,1112,1115],{},[1107,1108,1109],"td",{},[1018,1110,1111],{},"Osobní údaj",[1107,1113,1114],{},"Personal data",[1107,1116,1117],{},"Jakákoli informace identifikující nebo umožňující identifikaci žijící fyzické osoby",[1089,1119,1120,1125,1128],{},[1107,1121,1122],{},[1018,1123,1124],{},"Zvláštní kategorie",[1107,1126,1127],{},"Special category",[1107,1129,1130],{},"Citlivá data: zdraví, biometrika, etnicita, sexuální orientace, politické názory, náboženství, členství v odborech",[1089,1132,1133,1138,1141],{},[1107,1134,1135],{},[1018,1136,1137],{},"Subjekt údajů",[1107,1139,1140],{},"Data subject",[1107,1142,1143],{},"Fyzická osoba, k níž se osobní údaje vztahují",[1089,1145,1146,1151,1154],{},[1107,1147,1148],{},[1018,1149,1150],{},"Správce",[1107,1152,1153],{},"Controller",[1107,1155,1156],{},"Subjekt, který určuje účely a prostředky zpracování",[1089,1158,1159,1164,1167],{},[1107,1160,1161],{},[1018,1162,1163],{},"Zpracovatel",[1107,1165,1166],{},"Processor",[1107,1168,1169],{},"Subjekt zpracovávající osobní údaje na pokyn správce",[1089,1171,1172,1177,1180],{},[1107,1173,1174],{},[1018,1175,1176],{},"DPO",[1107,1178,1179],{},"Data Protection Officer",[1107,1181,1182],{},"Pověřenec pro ochranu osobních údajů — povinný pro orgány veřejné moci a velké zpracovatele",[1089,1184,1185,1190,1193],{},[1107,1186,1187],{},[1018,1188,1189],{},"PII",[1107,1191,1192],{},"Personally Identifiable Information",[1107,1194,1195],{},"Pojem z NIST SP 800-122; v EU se používá ekvivalentní „osobní údaj\"",[1078,1197,1199],{"id":1198},"šest-zásad-zpracování-čl-5","Šest zásad zpracování (čl. 5)",[1201,1202,1203,1210,1216,1222,1228,1234],"ol",{},[1204,1205,1206,1209],"li",{},[1018,1207,1208],{},"Zákonnost, korektnost, transparentnost"," (lawfulness, fairness, transparency)",[1204,1211,1212,1215],{},[1018,1213,1214],{},"Účelové omezení"," (purpose limitation) — sběr pouze pro stanovené účely",[1204,1217,1218,1221],{},[1018,1219,1220],{},"Minimalizace údajů"," (data minimisation) — jen nezbytné údaje",[1204,1223,1224,1227],{},[1018,1225,1226],{},"Přesnost"," (accuracy) — udržovat aktuální, opravovat nepřesné",[1204,1229,1230,1233],{},[1018,1231,1232],{},"Omezení uložení"," (storage limitation) — uchovávat ne déle než nutné",[1204,1235,1236,1239],{},[1018,1237,1238],{},"Integrita a důvěrnost"," (integrity, confidentiality) — bezpečnost zpracování",[1015,1241,1242,1243,1246],{},"Sedmá zásada ",[1018,1244,1245],{},"odpovědnost"," (accountability, čl. 5 odst. 2) — správce musí být schopen svůj soulad doložit.",[1078,1248,1250],{"id":1249},"šest-právních-titulů-čl-6","Šest právních titulů (čl. 6)",[1015,1252,1253],{},"Zpracování je zákonné jen, je-li založeno na jednom ze šesti důvodů:",[1201,1255,1256,1262,1268,1274,1280,1286],{},[1204,1257,1258,1261],{},[1018,1259,1260],{},"Souhlas"," subjektu údajů",[1204,1263,1264,1267],{},[1018,1265,1266],{},"Plnění smlouvy"," se subjektem",[1204,1269,1270,1273],{},[1018,1271,1272],{},"Zákonná povinnost"," správce",[1204,1275,1276,1279],{},[1018,1277,1278],{},"Životně důležité zájmy"," subjektu nebo jiné osoby",[1204,1281,1282,1285],{},[1018,1283,1284],{},"Veřejný zájem"," nebo výkon veřejné moci",[1204,1287,1288,1291],{},[1018,1289,1290],{},"Oprávněné zájmy"," správce (s testem proporcionality)",[1078,1293,1295],{"id":1294},"práva-subjektů-údajů-čl-1522","Práva subjektů údajů (čl. 15–22)",[1297,1298,1299,1305,1311,1317,1323,1328,1334,1340],"ul",{},[1204,1300,1301,1304],{},[1018,1302,1303],{},"Právo na informace"," — kdo, proč, na základě čeho, jak dlouho zpracovává",[1204,1306,1307,1310],{},[1018,1308,1309],{},"Právo na přístup"," k osobním údajům",[1204,1312,1313,1316],{},[1018,1314,1315],{},"Právo na opravu"," nepřesných údajů",[1204,1318,1319,1322],{},[1018,1320,1321],{},"Právo na výmaz"," („right to be forgotten\", čl. 17)",[1204,1324,1325],{},[1018,1326,1327],{},"Právo na omezení zpracování",[1204,1329,1330,1333],{},[1018,1331,1332],{},"Právo na přenositelnost údajů"," ke konkurenci (čl. 20)",[1204,1335,1336,1339],{},[1018,1337,1338],{},"Právo vznést námitku"," proti zpracování",[1204,1341,1342,1345],{},[1018,1343,1344],{},"Právo nebýt předmětem automatizovaného rozhodování"," vč. profilování (čl. 22)",[1078,1347,1349],{"id":1348},"dpia-data-protection-impact-assessment-čl-35","DPIA — Data Protection Impact Assessment (čl. 35)",[1015,1351,1352],{},"Posouzení vlivu na ochranu osobních údajů — povinné, pokud zpracování pravděpodobně způsobí vysoké riziko pro práva a svobody subjektů.",[1354,1355,1357],"h3",{"id":1356},"kdy-je-dpia-povinná","Kdy je DPIA povinná",[1297,1359,1360,1363,1366],{},[1204,1361,1362],{},"Systematické a rozsáhlé hodnocení osobních aspektů (profilování)",[1204,1364,1365],{},"Rozsáhlé zpracování zvláštních kategorií údajů",[1204,1367,1368],{},"Rozsáhlé sledování veřejně přístupných míst (kamery v ulicích, MHD)",[1354,1370,1372],{"id":1371},"tři-analýzy-dpia-per-iso-27701","Tři analýzy DPIA (per ISO 27701)",[1083,1374,1375,1385],{},[1086,1376,1377],{},[1089,1378,1379,1382],{},[1092,1380,1381],{},"Analýza",[1092,1383,1384],{},"Zaměření",[1102,1386,1387,1397,1407],{},[1089,1388,1389,1394],{},[1107,1390,1391],{},[1018,1392,1393],{},"DPIA",[1107,1395,1396],{},"Posouzení dopadu na svobody a práva osob (čl. 35 GDPR)",[1089,1398,1399,1404],{},[1107,1400,1401],{},[1018,1402,1403],{},"Datová",[1107,1405,1406],{},"Význam dat, vazby, identifikace osobních a citlivých dat",[1089,1408,1409,1414],{},[1107,1410,1411],{},[1018,1412,1413],{},"Procesní",[1107,1415,1416],{},"Kdo a jak přistupuje k osobním datům, automatizované zpracování",[1354,1418,1420],{"id":1419},"pět-kroků-hodnocení-rizik","Pět kroků hodnocení rizik",[1201,1422,1423,1426,1429,1432,1435],{},[1204,1424,1425],{},"Definice operace zpracování a kontextu",[1204,1427,1428],{},"Pochopení a hodnocení dopadu (CIA)",[1204,1430,1431],{},"Definice hrozeb a hodnocení pravděpodobnosti",[1204,1433,1434],{},"Vyhodnocení rizika (matice pravděpodobnost × dopad)",[1204,1436,1437],{},"Výběr bezpečnostních opatření",[1078,1439,1441],{"id":1440},"privacy-by-design-privacy-by-default-čl-25","Privacy by Design & Privacy by Default (čl. 25)",[1297,1443,1444,1450,1456],{},[1204,1445,1446,1449],{},[1018,1447,1448],{},"Privacy by Design"," — proaktivní zahrnutí ochrany od počátku návrhu systému; ochrana zabudovaná do architektury, ne dolepovaná",[1204,1451,1452,1455],{},[1018,1453,1454],{},"Privacy by Default"," — výchozí nastavení musí chránit; ověření účelu, rozsahu, sdílení a možností anonymizace před zpracováním",[1204,1457,1458,1459,1462],{},"Orientace na ",[1018,1460,1461],{},"subjekt údajů"," — analýza rizik z pohledu jednotlivce, ne organizace",[1078,1464,1466],{"id":1465},"oznamovací-povinnost-při-porušení-zabezpečení-čl-3334","Oznamovací povinnost při porušení zabezpečení (čl. 33–34)",[1083,1468,1469,1482],{},[1086,1470,1471],{},[1089,1472,1473,1476,1479],{},[1092,1474,1475],{},"Příjemce",[1092,1477,1478],{},"Lhůta",[1092,1480,1481],{},"Podmínka",[1102,1483,1484,1501],{},[1089,1485,1486,1492,1498],{},[1107,1487,1488,1491],{},[1018,1489,1490],{},"Dozorový úřad"," (ÚOOÚ v ČR)",[1107,1493,1494,1497],{},[1018,1495,1496],{},"72 hodin"," od zjištění",[1107,1499,1500],{},"Vždy, pokud existuje pravděpodobnost rizika pro subjekty",[1089,1502,1503,1508,1511],{},[1107,1504,1505],{},[1018,1506,1507],{},"Subjekty údajů",[1107,1509,1510],{},"Bez zbytečného odkladu",[1107,1512,1513,1514,1517],{},"Pokud existuje ",[1018,1515,1516],{},"vysoké"," riziko pro jejich práva",[1078,1519,1521],{"id":1520},"sankce-čl-83","Sankce (čl. 83)",[1015,1523,1524],{},"Pokuty ve dvou pásmech:",[1297,1526,1527,1533],{},[1204,1528,1529,1532],{},[1018,1530,1531],{},"Až 10 mil. EUR nebo 2 % celosvětového ročního obratu"," (vyšší z obou) — porušení procesních povinností (DPO, smlouva se zpracovatelem, oznámení porušení, DPIA)",[1204,1534,1535,1538],{},[1018,1536,1537],{},"Až 20 mil. EUR nebo 4 % celosvětového ročního obratu"," — porušení zásad zpracování, práv subjektů, podmínek souhlasu, předávání mimo EU",[1078,1540,1542],{"id":1541},"isoiec-27701-pims","ISO\u002FIEC 27701 — PIMS",[1015,1544,1545,1546,1549,1550,1553,1554,1557,1558,1561],{},"Privacy Information Management System — rozšíření ISO 27001\u002F27002 o správu osobních informací. První vydání ",[1018,1547,1548],{},"2019",", aktuální vydání ",[1018,1551,1552],{},"2025",". Mapuje požadavky GDPR na konkrétní opatření a slouží jako certifikovatelný průvodce souladem. Zavádí DPIA, datovou a procesní analýzu jako standardní postupy. Detail v ",[1034,1555,1075],{"className":1556,"dataFsResolvedFilePath":1073,"href":1074},[1037]," a v hub topiku ",[1034,1559,70],{"className":1560,"dataFsResolvedFilePath":1045,"href":1046},[1037],".",[1078,1563,1565],{"id":1564},"vztah-k-dalším-normám-a-regulacím","Vztah k dalším normám a regulacím",[1297,1567,1568,1574,1580,1586,1605,1611,1623],{},[1204,1569,1570,1573],{},[1018,1571,1572],{},"NIST SP 800-122"," (2010) — Guide to Protecting PII Confidentiality (americký analog)",[1204,1575,1576,1579],{},[1018,1577,1578],{},"NISTIR 8062"," (2017) — Privacy Engineering and Risk Management",[1204,1581,1582,1585],{},[1018,1583,1584],{},"FIPP"," — Fair Information Practice Principles (univerzální zásady, předchůdce GDPR)",[1204,1587,1588,1591,1592,1595,1596,1599,1600,1604],{},[1018,1589,1590],{},"eIDAS"," (nařízení EU 910\u002F2014, novelizováno ",[1018,1593,1594],{},"nařízením (EU) 2024\u002F1183 — „eIDAS 2.0\"",", v účinnosti od května 2024) — elektronická identifikace a služby vytvářející důvěru; eIDAS 2.0 zavádí ",[1018,1597,1598],{},"evropskou peněženku digitální identity (EUDI Wallet)",". Doplňuje GDPR pro digitální identitu (viz ",[1034,1601,1603],{"className":1602,"dataFsResolvedFilePath":1045,"href":1046},[1037],"Ochrana dat",")",[1204,1606,1607,1610],{},[1018,1608,1609],{},"NIS2"," (směrnice 2022\u002F2555) — kybernetická bezpečnost, povinnosti hlášení překrývají GDPR čl. 33",[1204,1612,1613,1616,1617],{},[1018,1614,1615],{},"DORA"," (nařízení EU 2022\u002F2554) — finanční sektor, viz ",[1034,1618,1622],{"className":1619,"dataFsResolvedFilePath":1620,"href":1621},[1037],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor",[1204,1624,1625,1628,1629],{},[1018,1626,1627],{},"HIPAA"," (USA) — americký analog pro zdravotnictví, viz ",[1034,1630,1632],{"className":1631,"dataFsResolvedFilePath":1052,"href":1053},[1037],"Zdravotnictví",[1078,1634,1636],{"id":1635},"předávání-údajů-mimo-eu-kap-v-gdpr","Předávání údajů mimo EU (kap. V GDPR)",[1297,1638,1639,1645,1651,1657],{},[1204,1640,1641,1644],{},[1018,1642,1643],{},"Adekvátní rozhodnutí Komise"," — země s odpovídající úrovní ochrany: Andorra, Argentina, Brazílie, Faerské ostrovy, Guernsey, Isle of Man, Izrael, Japonsko, Jersey, Jižní Korea, Kanada (komerční subjekty), Nový Zéland, Spojené království, Švýcarsko, Uruguay, USA (EU-US Data Privacy Framework)",[1204,1646,1647,1650],{},[1018,1648,1649],{},"Standardní smluvní doložky"," (SCC) — od 2021 nová verze po Schrems II",[1204,1652,1653,1656],{},[1018,1654,1655],{},"Závazná podniková pravidla"," (BCR) pro nadnárodní skupiny",[1204,1658,1659,1662],{},[1018,1660,1661],{},"Výjimky"," — výslovný souhlas, plnění smlouvy, životně důležité zájmy",[1078,1664,1666,1667],{"id":1665},"aplikační-oblasti-v-kurzu-imork","Aplikační oblasti v kurzu ",[1034,1668,1040],{"className":1669,"dataFsResolvedFilePath":1038,"href":1039},[1037],[1297,1671,1672,1678,1684,1691,1700],{},[1204,1673,1674,1677],{},[1034,1675,1632],{"className":1676,"dataFsResolvedFilePath":1052,"href":1053},[1037]," — zvláštní kategorie (zdravotní data); ISO 27799 + GDPR",[1204,1679,1680,1683],{},[1034,1681,1068],{"className":1682,"dataFsResolvedFilePath":1066,"href":1067},[1037]," — soulad s legislativou jako jeden ze tří pilířů důvěryhodnosti elektronického zdravotnictví",[1204,1685,1686,1690],{},[1034,1687,1689],{"className":1688,"dataFsResolvedFilePath":1059,"href":1060},[1037],"Bezpečnost plateb"," — platební údaje a PCI DSS v kombinaci s GDPR",[1204,1692,1693,1699],{},[1034,1694,1698],{"className":1695,"dataFsResolvedFilePath":1696,"href":1697},[1037],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — soulad s GDPR jako cíl bezpečnostní politiky univerzity",[1204,1701,1702,1706],{},[1034,1703,1705],{"className":1704,"dataFsResolvedFilePath":1073,"href":1074},[1037],"Krádež dat"," — provozní implementace GDPR přes ISO 27701, DPIA, Privacy by Design",[1078,1708,1710],{"id":1709},"související-stránky","Související stránky",[1297,1712,1713,1719,1728,1737,1744],{},[1204,1714,1715,1718],{},[1034,1716,1603],{"className":1717,"dataFsResolvedFilePath":1045,"href":1046},[1037]," — technologická vrstva (DLP, šifrování, anonymizace)",[1204,1720,1721,1727],{},[1034,1722,1726],{"className":1723,"dataFsResolvedFilePath":1724,"href":1725},[1037],"topics\u002Fisms.md","\u002Fwiki\u002Fisms","ISMS"," — manažerský rámec, ISO 27701 jako rozšíření 27001",[1204,1729,1730,1736],{},[1034,1731,1735],{"className":1732,"dataFsResolvedFilePath":1733,"href":1734},[1037],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — DPIA jako analýza rizik z pohledu subjektů údajů",[1204,1738,1739,1743],{},[1034,1740,1742],{"className":1741,"dataFsResolvedFilePath":1073,"href":1074},[1037],"Krádež dat — případová studie"," — primární zdroj operačního výkladu",[1204,1745,1746,1752],{},[1034,1747,1751],{"className":1748,"dataFsResolvedFilePath":1749,"href":1750},[1037],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — PII a digitální stopa",{"title":1754,"searchDepth":145,"depth":145,"links":1755},"",[1756,1757,1758,1759,1760,1765,1766,1767,1768,1769,1770,1771,1773],{"id":1080,"depth":145,"text":1081},{"id":1198,"depth":145,"text":1199},{"id":1249,"depth":145,"text":1250},{"id":1294,"depth":145,"text":1295},{"id":1348,"depth":145,"text":1349,"children":1761},[1762,1763,1764],{"id":1356,"depth":100,"text":1357},{"id":1371,"depth":100,"text":1372},{"id":1419,"depth":100,"text":1420},{"id":1440,"depth":145,"text":1441},{"id":1465,"depth":145,"text":1466},{"id":1520,"depth":145,"text":1521},{"id":1541,"depth":145,"text":1542},{"id":1564,"depth":145,"text":1565},{"id":1635,"depth":145,"text":1636},{"id":1665,"depth":145,"text":1772},"Aplikační oblasti v kurzu ImorK",{"id":1709,"depth":145,"text":1710},null,[5],"2026-05-04","Nařízení Evropského parlamentu a Rady (EU) 2016\u002F679 — General Data Protection Regulation. Účinnost od 25. května 2018 ve všech členských státech EU bez nutnosti transpozice. Pro Českou republiku doplněno zákonem č. 110\u002F2019 Sb. o zpracování osobních údajů.","md",{},true,"\u002Ftopics\u002Fgdpr",{"title":1006,"description":1777},[1784,1785,1786,1787,1788],"raw\u002Fimork\u002F2109 VUT_Bezp Případovka Krádež dat_2020.pdf","raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2105 VUT_Bezp_Případovka eHealth_2021.pdf","raw\u002Fimork\u002F2204 VUT_Bezp_Případovka Payment_2022.pdf","raw\u002Fimork\u002F2004 VUT_Bezp akademici-2021.pdf","topics\u002Fgdpr",[5,108,70,279,486,227,289],"topic","M4sDZtUlYB9tZD2S8vr1U1cLByMC2HCaUhLokavtRLk","topics",{"zapisku":7,"topics":48,"summaries":1795,"outputs":145},34,[1797,2551,3068,3592,4142,4668,5165],{"id":1798,"title":1799,"body":1800,"course":1774,"courses":2540,"created":2541,"description":1754,"extension":1778,"meta":2542,"navigation":1780,"path":2543,"seo":2544,"sources":2545,"stem":2548,"tags":2549,"type":1791,"updated":1776,"__hash__":2550},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":1008,"value":1801,"toc":2513},[1802,1805,1814,1817,1819,1912,1916,1970,1974,1997,2001,2090,2094,2098,2112,2116,2138,2142,2162,2166,2170,2196,2200,2226,2230,2234,2244,2248,2291,2302,2306,2312,2329,2336,2340,2343,2346,2352,2356,2359,2363,2440,2444,2470,2472],[1011,1803,1799],{"id":1804},"bcm-řízení-kontinuity-činnosti",[1015,1806,1807],{},[1808,1809],"img",{"alt":1810,"className":1811,"src":1813},"bcm-rpo-rto",[1037,1812],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[1015,1815,1816],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[1078,1818,1081],{"id":1080},[1083,1820,1821,1832],{},[1086,1822,1823],{},[1089,1824,1825,1827,1829],{},[1092,1826,1094],{},[1092,1828,1097],{},[1092,1830,1831],{},"Popis",[1102,1833,1834,1847,1860,1873,1886,1899],{},[1089,1835,1836,1841,1844],{},[1107,1837,1838],{},[1018,1839,1840],{},"BCMS",[1107,1842,1843],{},"Business Continuity Management System",[1107,1845,1846],{},"Plánovaný, kontinuální a dokumentovaný systém",[1089,1848,1849,1854,1857],{},[1107,1850,1851],{},[1018,1852,1853],{},"BCM",[1107,1855,1856],{},"Business Continuity Management",[1107,1858,1859],{},"Činnost identifikující dopady a zajišťující kontinuitu",[1089,1861,1862,1867,1870],{},[1107,1863,1864],{},[1018,1865,1866],{},"BIA",[1107,1868,1869],{},"Business Impact Analysis",[1107,1871,1872],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[1089,1874,1875,1880,1883],{},[1107,1876,1877],{},[1018,1878,1879],{},"MBCO",[1107,1881,1882],{},"Minimum Business Continuity Objective",[1107,1884,1885],{},"Minimální přijatelná úroveň služeb",[1089,1887,1888,1893,1896],{},[1107,1889,1890],{},[1018,1891,1892],{},"RPO",[1107,1894,1895],{},"Recovery Point Objective",[1107,1897,1898],{},"Do jakého bodu v minulosti lze obnovit data",[1089,1900,1901,1906,1909],{},[1107,1902,1903],{},[1018,1904,1905],{},"RTO",[1107,1907,1908],{},"Recovery Time Objective",[1107,1910,1911],{},"Čas potřebný pro obnovu provozu",[1078,1913,1915],{"id":1914},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[1083,1917,1918,1928],{},[1086,1919,1920],{},[1089,1921,1922,1925],{},[1092,1923,1924],{},"Fáze",[1092,1926,1927],{},"Obsah",[1102,1929,1930,1940,1950,1960],{},[1089,1931,1932,1937],{},[1107,1933,1934],{},[1018,1935,1936],{},"Plan",[1107,1938,1939],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[1089,1941,1942,1947],{},[1107,1943,1944],{},[1018,1945,1946],{},"Do",[1107,1948,1949],{},"Strategie kontinuity, implementace plánů, cvičení",[1089,1951,1952,1957],{},[1107,1953,1954],{},[1018,1955,1956],{},"Check",[1107,1958,1959],{},"Monitoring, audit, přezkoumání managementem",[1089,1961,1962,1967],{},[1107,1963,1964],{},[1018,1965,1966],{},"Act",[1107,1968,1969],{},"Nápravná opatření, neustálé zlepšování",[1078,1971,1973],{"id":1972},"iso-223012019-struktura","ISO 22301:2019 — struktura",[1297,1975,1976,1979,1982,1985,1988,1991,1994],{},[1204,1977,1978],{},"Kap. 4 — kontext organizace",[1204,1980,1981],{},"Kap. 5 — vedení (leadership)",[1204,1983,1984],{},"Kap. 6 — plánování (BIA, rizika)",[1204,1986,1987],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[1204,1989,1990],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[1204,1992,1993],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[1204,1995,1996],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[1078,1998,2000],{"id":1999},"analýza-steeple","Analýza STEEPLE",[1083,2002,2003,2013],{},[1086,2004,2005],{},[1089,2006,2007,2010],{},[1092,2008,2009],{},"Faktor",[1092,2011,2012],{},"Oblast",[1102,2014,2015,2026,2037,2048,2058,2069,2080],{},[1089,2016,2017,2023],{},[1107,2018,2019,2022],{},[1018,2020,2021],{},"S","ociální",[1107,2024,2025],{},"Zaměstnanost, bezpečnost, komunity",[1089,2027,2028,2034],{},[1107,2029,2030,2033],{},[1018,2031,2032],{},"T","echnologický",[1107,2035,2036],{},"Závislost na technologiích",[1089,2038,2039,2045],{},[1107,2040,2041,2044],{},[1018,2042,2043],{},"E","konomický",[1107,2046,2047],{},"Ekonomická situace, finanční instituce",[1089,2049,2050,2055],{},[1107,2051,2052,2054],{},[1018,2053,2043],{},"tický",[1107,2056,2057],{},"Podnikatelská etika, média, veřejnost",[1089,2059,2060,2066],{},[1107,2061,2062,2065],{},[1018,2063,2064],{},"P","olitický",[1107,2067,2068],{},"Politický systém, hrozba nepokojů",[1089,2070,2071,2077],{},[1107,2072,2073,2076],{},[1018,2074,2075],{},"L","egislativní",[1107,2078,2079],{},"Předpisy, zákony",[1089,2081,2082,2087],{},[1107,2083,2084,2086],{},[1018,2085,2043],{},"nvironmentální",[1107,2088,2089],{},"Životní prostředí, přírodní hrozby",[1078,2091,2093],{"id":2092},"bia-business-impact-analysis","BIA (Business Impact Analysis)",[1354,2095,2097],{"id":2096},"dva-způsoby-provedení","Dva způsoby provedení",[1201,2099,2100,2106],{},[1204,2101,2102,2105],{},[1018,2103,2104],{},"Bottom-up"," — sběr od provozních manažerů směrem nahoru; detailní znalost procesů, ale časově náročné.",[1204,2107,2108,2111],{},[1018,2109,2110],{},"Top-down"," — od vyššího managementu; rychlejší, ale může opomenout provozní detaily.",[1354,2113,2115],{"id":2114},"principy-bia","Principy BIA",[1297,2117,2118,2132],{},[1204,2119,1458,2120,2123,2124,2128,2129,1561],{},[1018,2121,2122],{},"dopad",", ne na příčinu — nezkoumá ",[2125,2126,2127],"em",{},"co se stane",", ale ",[2125,2130,2131],{},"jaké budou následky",[1204,2133,2134,2137],{},[1018,2135,2136],{},"Kalendář klíčových ročních událostí"," — identifikuje období se zvýšenou kritičností (uzávěrky, sezónní špičky).",[1078,2139,2141],{"id":2140},"mapování-procesů","Mapování procesů",[1297,2143,2144,2150,2156],{},[1204,2145,2146,2149],{},[1018,2147,2148],{},"Víceúrovňové mapování"," — od strategických procesů po operativní detaily.",[1204,2151,2152,2155],{},[1018,2153,2154],{},"Identifikace zdrojů"," — lidé, technologie, prostory, dodavatelé potřební pro každý proces.",[1204,2157,2158,2161],{},[1018,2159,2160],{},"SPoF"," (Single Point of Failure) — identifikace jediných bodů selhání, jejichž výpadek zastaví celý proces.",[1078,2163,2165],{"id":2164},"strategie-kontinuity","Strategie kontinuity",[1354,2167,2169],{"id":2168},"_4-kroky-strategie","4 kroky strategie",[1201,2171,2172,2178,2184,2190],{},[1204,2173,2174,2177],{},[1018,2175,2176],{},"Reakce na incident"," — okamžitá odezva, aktivace krizového řízení.",[1204,2179,2180,2183],{},[1018,2181,2182],{},"Obnova kritických činností"," — prioritní obnovení klíčových procesů dle BIA.",[1204,2185,2186,2189],{},[1018,2187,2188],{},"Vztahy se stakeholdery"," — komunikace se zainteresovanými stranami.",[1204,2191,2192,2195],{},[1018,2193,2194],{},"Nekritické činnosti"," — postupná obnova ostatních procesů.",[1354,2197,2199],{"id":2198},"_4-scénáře-narušení","4 scénáře narušení",[1201,2201,2202,2208,2214,2220],{},[1204,2203,2204,2207],{},[1018,2205,2206],{},"Zamezení přístupu"," — nedostupnost budov\u002Fprostor (požár, povodeň).",[1204,2209,2210,2213],{},[1018,2211,2212],{},"Nedostatek pracovníků"," — pandemie, hromadná absence.",[1204,2215,2216,2219],{},[1018,2217,2218],{},"Selhání technologie"," — výpadek ICT, kybernetický útok.",[1204,2221,2222,2225],{},[1018,2223,2224],{},"Selhání dodavatele"," — přerušení dodavatelského řetězce.",[1078,2227,2229],{"id":2228},"implementace-plánů","Implementace plánů",[1354,2231,2233],{"id":2232},"obsah-plánu-kontinuity","Obsah plánu kontinuity",[1015,2235,2236,2237,2240,2241,1561],{},"Účel a rozsah, role a odpovědnosti, aktivační kritéria, ",[1018,2238,2239],{},"DRP"," (Disaster Recovery Plan) pro IT infrastrukturu, kontaktní seznamy, priority obnovy dle BIA. Dlouhodobá obnova je řízena jako ",[1018,2242,2243],{},"samostatný projekt",[1078,2245,2247],{"id":2246},"testování-bcm","Testování BCM",[1083,2249,2250,2259],{},[1086,2251,2252],{},[1089,2253,2254,2257],{},[1092,2255,2256],{},"Forma",[1092,2258,1831],{},[1102,2260,2261,2271,2281],{},[1089,2262,2263,2268],{},[1107,2264,2265],{},[1018,2266,2267],{},"Tabletop review",[1107,2269,2270],{},"Teoretické procházení scénářů",[1089,2272,2273,2278],{},[1107,2274,2275],{},[1018,2276,2277],{},"Walkthrough",[1107,2279,2280],{},"Krokové ověření postupů s účastníky",[1089,2282,2283,2288],{},[1107,2284,2285],{},[1018,2286,2287],{},"Full exercise",[1107,2289,2290],{},"Simulace reálného incidentu",[1015,2292,2293,2294,2297,2298,2301],{},"Zásady: ",[1018,2295,2296],{},"neočekávané testy"," pro ověření reálné připravenosti; v krizové situaci ",[1018,2299,2300],{},"direktivní řízení pod tlakem"," (centralizované rozhodování).",[1078,2303,2305],{"id":2304},"vkb-vyhláška-o-kybernetické-bezpečnosti","VKB — Vyhláška o kybernetické bezpečnosti",[1015,2307,2308,2311],{},[1018,2309,2310],{},"§15 vyhlášky č. 82\u002F2018 Sb."," vyžaduje:",[1297,2313,2314,2319,2324],{},[1204,2315,2316,2318],{},[1018,2317,1879],{}," — minimální úroveň služeb pro kontinuitu",[1204,2320,2321,2323],{},[1018,2322,1905],{}," — maximální přípustná doba výpadku",[1204,2325,2326,2328],{},[1018,2327,1892],{}," — maximální přípustná ztráta dat",[1015,2330,2331,2332,2335],{},"Příloha č. 5, bod ",[1018,2333,2334],{},"1.23 Politika řízení kontinuity"," — požadavky na dokumentaci a řízení BCM.",[1078,2337,2339],{"id":2338},"isoiec-270312025","ISO\u002FIEC 27031:2025",[1015,2341,2342],{},"Připravenost ICT pro kontinuitu podnikání — propojení mezi kritickou infrastrukturou a BCMS. Aktuální vydání 2025 (první 2011, dlouho jediné, novelizace 2025).",[1078,2344,2345],{"id":378},"BCMaaS",[1015,2347,2348,2351],{},[1018,2349,2350],{},"BCM as a Service"," — cloudový model poskytování BCM, outsourcing plánování a řízení kontinuity, vhodný zejména pro menší organizace bez vlastních kapacit.",[1078,2353,2355],{"id":2354},"disaster-recovery-dr","Disaster Recovery (DR)",[1015,2357,2358],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[1354,2360,2362],{"id":2361},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[1083,2364,2365,2374],{},[1086,2366,2367],{},[1089,2368,2369,2372],{},[1092,2370,2371],{},"Tier",[1092,2373,1831],{},[1102,2375,2376,2384,2392,2400,2408,2416,2424,2432],{},[1089,2377,2378,2381],{},[1107,2379,2380],{},"0",[1107,2382,2383],{},"Žádná off-site data",[1089,2385,2386,2389],{},[1107,2387,2388],{},"1",[1107,2390,2391],{},"Fyzická záloha + cold site",[1089,2393,2394,2397],{},[1107,2395,2396],{},"2",[1107,2398,2399],{},"Fyzická záloha + hot site",[1089,2401,2402,2405],{},[1107,2403,2404],{},"3",[1107,2406,2407],{},"Elektronický trezor (electronic vaulting)",[1089,2409,2410,2413],{},[1107,2411,2412],{},"4",[1107,2414,2415],{},"Point-in-time recovery",[1089,2417,2418,2421],{},[1107,2419,2420],{},"5",[1107,2422,2423],{},"Two-site commit (kontinuální přenos)",[1089,2425,2426,2429],{},[1107,2427,2428],{},"6",[1107,2430,2431],{},"Minimální až nulová ztráta dat (zrcadlení)",[1089,2433,2434,2437],{},[1107,2435,2436],{},"7",[1107,2438,2439],{},"Automatizovaná obnova (AI monitoring)",[1354,2441,2443],{"id":2442},"cloud-dr","Cloud DR",[1297,2445,2446,2452,2458,2464],{},[1204,2447,2448,2451],{},[1018,2449,2450],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[1204,2453,2454,2457],{},[1018,2455,2456],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[1204,2459,2460,2463],{},[1018,2461,2462],{},"Hot DR"," — paralelní řešení v tandemu",[1204,2465,2466,2469],{},[1018,2467,2468],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[1078,2471,1710],{"id":1709},[1297,2473,2474,2480,2486,2495,2504],{},[1204,2475,2476,2479],{},[1034,2477,1726],{"className":2478,"dataFsResolvedFilePath":1724,"href":1725},[1037]," — BCM jako součást bezpečnostního systému",[1204,2481,2482,2485],{},[1034,2483,1735],{"className":2484,"dataFsResolvedFilePath":1733,"href":1734},[1037]," — krizové plány pro zbytková rizika",[1204,2487,2488,2494],{},[1034,2489,2493],{"className":2490,"dataFsResolvedFilePath":2491,"href":2492},[1037],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — reakce na incidenty",[1204,2496,2497,2503],{},[1034,2498,2502],{"className":2499,"dataFsResolvedFilePath":2500,"href":2501},[1037],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","Záznam přednášky BCM"," — bibliografická karta zdroje",[1204,2505,2506,2512],{},[1034,2507,2511],{"className":2508,"dataFsResolvedFilePath":2509,"href":2510},[1037],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery — záznam přednášky"," — DR detail",{"title":1754,"searchDepth":145,"depth":145,"links":2514},[2515,2516,2517,2518,2519,2523,2524,2528,2531,2532,2533,2534,2535,2539],{"id":1080,"depth":145,"text":1081},{"id":1914,"depth":145,"text":1915},{"id":1972,"depth":145,"text":1973},{"id":1999,"depth":145,"text":2000},{"id":2092,"depth":145,"text":2093,"children":2520},[2521,2522],{"id":2096,"depth":100,"text":2097},{"id":2114,"depth":100,"text":2115},{"id":2140,"depth":145,"text":2141},{"id":2164,"depth":145,"text":2165,"children":2525},[2526,2527],{"id":2168,"depth":100,"text":2169},{"id":2198,"depth":100,"text":2199},{"id":2228,"depth":145,"text":2229,"children":2529},[2530],{"id":2232,"depth":100,"text":2233},{"id":2246,"depth":145,"text":2247},{"id":2304,"depth":145,"text":2305},{"id":2338,"depth":145,"text":2339},{"id":378,"depth":145,"text":2345},{"id":2354,"depth":145,"text":2355,"children":2536},[2537,2538],{"id":2361,"depth":100,"text":2362},{"id":2442,"depth":100,"text":2443},{"id":1709,"depth":145,"text":1710},[5],"2026-04-12",{},"\u002Ftopics\u002Fbcm",{"title":1799,"description":1754},[2546,2547],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[5,159,233,221,167,179],"rJjmVpDFUwXpFJbeYeMpWko7IyhV7LFx3l9BUUkj0VY",{"id":1005,"title":1006,"body":2552,"course":1774,"courses":3063,"created":1776,"description":1777,"extension":1778,"meta":3064,"navigation":1780,"path":1781,"seo":3065,"sources":3066,"stem":1789,"tags":3067,"type":1791,"updated":1776,"__hash__":1792},{"type":1008,"value":2553,"toc":3044},[2554,2556,2564,2584,2586,2670,2672,2698,2702,2704,2706,2732,2734,2768,2770,2772,2774,2782,2784,2820,2822,2834,2836,2850,2852,2890,2892,2894,2904,2906,2918,2920,2963,2965,2983,2988,3015,3017],[1011,2555,1006],{"id":1013},[1015,2557,2558,1021,2560,1025,2562,1029],{},[1018,2559,1020],{},[1018,2561,1024],{},[1018,2563,1028],{},[1015,2565,1032,2566,1041,2569,1048,2572,1055,2575,1062,2578,1069,2581,1076],{},[1034,2567,1040],{"className":2568,"dataFsResolvedFilePath":1038,"href":1039},[1037],[1034,2570,1047],{"className":2571,"dataFsResolvedFilePath":1045,"href":1046},[1037],[1034,2573,1054],{"className":2574,"dataFsResolvedFilePath":1052,"href":1053},[1037],[1034,2576,1061],{"className":2577,"dataFsResolvedFilePath":1059,"href":1060},[1037],[1034,2579,1068],{"className":2580,"dataFsResolvedFilePath":1066,"href":1067},[1037],[1034,2582,1075],{"className":2583,"dataFsResolvedFilePath":1073,"href":1074},[1037],[1078,2585,1081],{"id":1080},[1083,2587,2588,2598],{},[1086,2589,2590],{},[1089,2591,2592,2594,2596],{},[1092,2593,1094],{},[1092,2595,1097],{},[1092,2597,1100],{},[1102,2599,2600,2610,2620,2630,2640,2650,2660],{},[1089,2601,2602,2606,2608],{},[1107,2603,2604],{},[1018,2605,1111],{},[1107,2607,1114],{},[1107,2609,1117],{},[1089,2611,2612,2616,2618],{},[1107,2613,2614],{},[1018,2615,1124],{},[1107,2617,1127],{},[1107,2619,1130],{},[1089,2621,2622,2626,2628],{},[1107,2623,2624],{},[1018,2625,1137],{},[1107,2627,1140],{},[1107,2629,1143],{},[1089,2631,2632,2636,2638],{},[1107,2633,2634],{},[1018,2635,1150],{},[1107,2637,1153],{},[1107,2639,1156],{},[1089,2641,2642,2646,2648],{},[1107,2643,2644],{},[1018,2645,1163],{},[1107,2647,1166],{},[1107,2649,1169],{},[1089,2651,2652,2656,2658],{},[1107,2653,2654],{},[1018,2655,1176],{},[1107,2657,1179],{},[1107,2659,1182],{},[1089,2661,2662,2666,2668],{},[1107,2663,2664],{},[1018,2665,1189],{},[1107,2667,1192],{},[1107,2669,1195],{},[1078,2671,1199],{"id":1198},[1201,2673,2674,2678,2682,2686,2690,2694],{},[1204,2675,2676,1209],{},[1018,2677,1208],{},[1204,2679,2680,1215],{},[1018,2681,1214],{},[1204,2683,2684,1221],{},[1018,2685,1220],{},[1204,2687,2688,1227],{},[1018,2689,1226],{},[1204,2691,2692,1233],{},[1018,2693,1232],{},[1204,2695,2696,1239],{},[1018,2697,1238],{},[1015,2699,1242,2700,1246],{},[1018,2701,1245],{},[1078,2703,1250],{"id":1249},[1015,2705,1253],{},[1201,2707,2708,2712,2716,2720,2724,2728],{},[1204,2709,2710,1261],{},[1018,2711,1260],{},[1204,2713,2714,1267],{},[1018,2715,1266],{},[1204,2717,2718,1273],{},[1018,2719,1272],{},[1204,2721,2722,1279],{},[1018,2723,1278],{},[1204,2725,2726,1285],{},[1018,2727,1284],{},[1204,2729,2730,1291],{},[1018,2731,1290],{},[1078,2733,1295],{"id":1294},[1297,2735,2736,2740,2744,2748,2752,2756,2760,2764],{},[1204,2737,2738,1304],{},[1018,2739,1303],{},[1204,2741,2742,1310],{},[1018,2743,1309],{},[1204,2745,2746,1316],{},[1018,2747,1315],{},[1204,2749,2750,1322],{},[1018,2751,1321],{},[1204,2753,2754],{},[1018,2755,1327],{},[1204,2757,2758,1333],{},[1018,2759,1332],{},[1204,2761,2762,1339],{},[1018,2763,1338],{},[1204,2765,2766,1345],{},[1018,2767,1344],{},[1078,2769,1349],{"id":1348},[1015,2771,1352],{},[1354,2773,1357],{"id":1356},[1297,2775,2776,2778,2780],{},[1204,2777,1362],{},[1204,2779,1365],{},[1204,2781,1368],{},[1354,2783,1372],{"id":1371},[1083,2785,2786,2794],{},[1086,2787,2788],{},[1089,2789,2790,2792],{},[1092,2791,1381],{},[1092,2793,1384],{},[1102,2795,2796,2804,2812],{},[1089,2797,2798,2802],{},[1107,2799,2800],{},[1018,2801,1393],{},[1107,2803,1396],{},[1089,2805,2806,2810],{},[1107,2807,2808],{},[1018,2809,1403],{},[1107,2811,1406],{},[1089,2813,2814,2818],{},[1107,2815,2816],{},[1018,2817,1413],{},[1107,2819,1416],{},[1354,2821,1420],{"id":1419},[1201,2823,2824,2826,2828,2830,2832],{},[1204,2825,1425],{},[1204,2827,1428],{},[1204,2829,1431],{},[1204,2831,1434],{},[1204,2833,1437],{},[1078,2835,1441],{"id":1440},[1297,2837,2838,2842,2846],{},[1204,2839,2840,1449],{},[1018,2841,1448],{},[1204,2843,2844,1455],{},[1018,2845,1454],{},[1204,2847,1458,2848,1462],{},[1018,2849,1461],{},[1078,2851,1466],{"id":1465},[1083,2853,2854,2864],{},[1086,2855,2856],{},[1089,2857,2858,2860,2862],{},[1092,2859,1475],{},[1092,2861,1478],{},[1092,2863,1481],{},[1102,2865,2866,2878],{},[1089,2867,2868,2872,2876],{},[1107,2869,2870,1491],{},[1018,2871,1490],{},[1107,2873,2874,1497],{},[1018,2875,1496],{},[1107,2877,1500],{},[1089,2879,2880,2884,2886],{},[1107,2881,2882],{},[1018,2883,1507],{},[1107,2885,1510],{},[1107,2887,1513,2888,1517],{},[1018,2889,1516],{},[1078,2891,1521],{"id":1520},[1015,2893,1524],{},[1297,2895,2896,2900],{},[1204,2897,2898,1532],{},[1018,2899,1531],{},[1204,2901,2902,1538],{},[1018,2903,1537],{},[1078,2905,1542],{"id":1541},[1015,2907,1545,2908,1549,2910,1553,2912,1557,2915,1561],{},[1018,2909,1548],{},[1018,2911,1552],{},[1034,2913,1075],{"className":2914,"dataFsResolvedFilePath":1073,"href":1074},[1037],[1034,2916,70],{"className":2917,"dataFsResolvedFilePath":1045,"href":1046},[1037],[1078,2919,1565],{"id":1564},[1297,2921,2922,2926,2930,2934,2945,2949,2956],{},[1204,2923,2924,1573],{},[1018,2925,1572],{},[1204,2927,2928,1579],{},[1018,2929,1578],{},[1204,2931,2932,1585],{},[1018,2933,1584],{},[1204,2935,2936,1591,2938,1595,2940,1599,2942,1604],{},[1018,2937,1590],{},[1018,2939,1594],{},[1018,2941,1598],{},[1034,2943,1603],{"className":2944,"dataFsResolvedFilePath":1045,"href":1046},[1037],[1204,2946,2947,1610],{},[1018,2948,1609],{},[1204,2950,2951,1616,2953],{},[1018,2952,1615],{},[1034,2954,1622],{"className":2955,"dataFsResolvedFilePath":1620,"href":1621},[1037],[1204,2957,2958,1628,2960],{},[1018,2959,1627],{},[1034,2961,1632],{"className":2962,"dataFsResolvedFilePath":1052,"href":1053},[1037],[1078,2964,1636],{"id":1635},[1297,2966,2967,2971,2975,2979],{},[1204,2968,2969,1644],{},[1018,2970,1643],{},[1204,2972,2973,1650],{},[1018,2974,1649],{},[1204,2976,2977,1656],{},[1018,2978,1655],{},[1204,2980,2981,1662],{},[1018,2982,1661],{},[1078,2984,1666,2985],{"id":1665},[1034,2986,1040],{"className":2987,"dataFsResolvedFilePath":1038,"href":1039},[1037],[1297,2989,2990,2995,3000,3005,3010],{},[1204,2991,2992,1677],{},[1034,2993,1632],{"className":2994,"dataFsResolvedFilePath":1052,"href":1053},[1037],[1204,2996,2997,1683],{},[1034,2998,1068],{"className":2999,"dataFsResolvedFilePath":1066,"href":1067},[1037],[1204,3001,3002,1690],{},[1034,3003,1689],{"className":3004,"dataFsResolvedFilePath":1059,"href":1060},[1037],[1204,3006,3007,1699],{},[1034,3008,1698],{"className":3009,"dataFsResolvedFilePath":1696,"href":1697},[1037],[1204,3011,3012,1706],{},[1034,3013,1705],{"className":3014,"dataFsResolvedFilePath":1073,"href":1074},[1037],[1078,3016,1710],{"id":1709},[1297,3018,3019,3024,3029,3034,3039],{},[1204,3020,3021,1718],{},[1034,3022,1603],{"className":3023,"dataFsResolvedFilePath":1045,"href":1046},[1037],[1204,3025,3026,1727],{},[1034,3027,1726],{"className":3028,"dataFsResolvedFilePath":1724,"href":1725},[1037],[1204,3030,3031,1736],{},[1034,3032,1735],{"className":3033,"dataFsResolvedFilePath":1733,"href":1734},[1037],[1204,3035,3036,1743],{},[1034,3037,1742],{"className":3038,"dataFsResolvedFilePath":1073,"href":1074},[1037],[1204,3040,3041,1752],{},[1034,3042,1751],{"className":3043,"dataFsResolvedFilePath":1749,"href":1750},[1037],{"title":1754,"searchDepth":145,"depth":145,"links":3045},[3046,3047,3048,3049,3050,3055,3056,3057,3058,3059,3060,3061,3062],{"id":1080,"depth":145,"text":1081},{"id":1198,"depth":145,"text":1199},{"id":1249,"depth":145,"text":1250},{"id":1294,"depth":145,"text":1295},{"id":1348,"depth":145,"text":1349,"children":3051},[3052,3053,3054],{"id":1356,"depth":100,"text":1357},{"id":1371,"depth":100,"text":1372},{"id":1419,"depth":100,"text":1420},{"id":1440,"depth":145,"text":1441},{"id":1465,"depth":145,"text":1466},{"id":1520,"depth":145,"text":1521},{"id":1541,"depth":145,"text":1542},{"id":1564,"depth":145,"text":1565},{"id":1635,"depth":145,"text":1636},{"id":1665,"depth":145,"text":1772},{"id":1709,"depth":145,"text":1710},[5],{},{"title":1006,"description":1777},[1784,1785,1786,1787,1788],[5,108,70,279,486,227,289],{"id":3069,"title":3070,"body":3071,"course":1774,"courses":3581,"created":2541,"description":1754,"extension":1778,"meta":3582,"navigation":1780,"path":3583,"seo":3584,"sources":3585,"stem":3589,"tags":3590,"type":1791,"updated":1776,"__hash__":3591},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":1008,"value":3072,"toc":3567},[3073,3076,3083,3090,3093,3097,3164,3168,3172,3235,3239,3259,3263,3267,3369,3373,3399,3403,3425,3429,3436,3504,3506],[1011,3074,3070],{"id":3075},"isms-systém-řízení-bezpečnosti-informací",[1015,3077,3078],{},[1808,3079],{"alt":3080,"className":3081,"src":3082},"isms-pdca-cyklus",[1037,1812],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[1015,3084,3085],{},[1808,3086],{"alt":3087,"className":3088,"src":3089},"isms-oborova-mapa",[1037,1812],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[1015,3091,3092],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[1078,3094,3096],{"id":3095},"základní-pilíře","Základní pilíře",[1083,3098,3099,3110],{},[1086,3100,3101],{},[1089,3102,3103,3106,3108],{},[1092,3104,3105],{},"Pilíř",[1092,3107,1097],{},[1092,3109,1831],{},[1102,3111,3112,3125,3138,3151],{},[1089,3113,3114,3119,3122],{},[1107,3115,3116],{},[1018,3117,3118],{},"Důvěrnost",[1107,3120,3121],{},"Confidentiality",[1107,3123,3124],{},"Přístup pouze oprávněným osobám",[1089,3126,3127,3132,3135],{},[1107,3128,3129],{},[1018,3130,3131],{},"Integrita",[1107,3133,3134],{},"Integrity",[1107,3136,3137],{},"Ochrana před neoprávněnou změnou",[1089,3139,3140,3145,3148],{},[1107,3141,3142],{},[1018,3143,3144],{},"Dostupnost",[1107,3146,3147],{},"Availability",[1107,3149,3150],{},"Systémy a data dostupné v potřebný čas",[1089,3152,3153,3158,3161],{},[1107,3154,3155],{},[1018,3156,3157],{},"Nepopiratelnost",[1107,3159,3160],{},"Non-repudiation",[1107,3162,3163],{},"Prokázání autorství akce",[1078,3165,3167],{"id":3166},"normativní-rámec","Normativní rámec",[1354,3169,3171],{"id":3170},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[1297,3173,3174,3180,3186,3197,3203,3214,3225],{},[1204,3175,3176,3179],{},[1018,3177,3178],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[1204,3181,3182,3185],{},[1018,3183,3184],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[1204,3187,3188,3191,3192,3196],{},[1018,3189,3190],{},"ISO\u002FIEC 27005"," — ",[1034,3193,3195],{"className":3194,"dataFsResolvedFilePath":1733,"href":1734},[1037],"řízení rizik"," bezpečnosti informací",[1204,3198,3199,3202],{},[1018,3200,3201],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[1204,3204,3205,3208,3209],{},[1018,3206,3207],{},"ISO\u002FIEC 27011"," — ISMS pro ",[1034,3210,910],{"className":3211,"dataFsResolvedFilePath":3212,"href":3213},[1037],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp",[1204,3215,3216,3208,3219],{},[1018,3217,3218],{},"ISO\u002FIEC 27019",[1034,3220,3224],{"className":3221,"dataFsResolvedFilePath":3222,"href":3223},[1037],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","energetiku",[1204,3226,3227,3208,3230,3234],{},[1018,3228,3229],{},"ISO 27799",[1034,3231,3233],{"className":3232,"dataFsResolvedFilePath":1052,"href":1053},[1037],"zdravotnictví"," (publikováno samostatně, ne ISO\u002FIEC)",[1354,3236,3238],{"id":3237},"další-rámce","Další rámce",[1297,3240,3241,3247,3253],{},[1204,3242,3243,3246],{},[1018,3244,3245],{},"NIST"," — americké standardy (SP 800 řada)",[1204,3248,3249,3252],{},[1018,3250,3251],{},"ISACA"," — profesní certifikace (CISM, CISA)",[1204,3254,3255,3258],{},[1018,3256,3257],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[1078,3260,3262],{"id":3261},"governance-řízení","Governance (řízení)",[1354,3264,3266],{"id":3265},"bezpečnostní-role","Bezpečnostní role",[1083,3268,3269,3282],{},[1086,3270,3271],{},[1089,3272,3273,3276,3279],{},[1092,3274,3275],{},"Role",[1092,3277,3278],{},"Zkratka",[1092,3280,3281],{},"Odpovědnost",[1102,3283,3284,3295,3306,3317,3328,3339,3349,3359],{},[1089,3285,3286,3289,3292],{},[1107,3287,3288],{},"Chief Information Officer",[1107,3290,3291],{},"CIO",[1107,3293,3294],{},"Celkové řízení ICT",[1089,3296,3297,3300,3303],{},[1107,3298,3299],{},"Chief Information Security Officer",[1107,3301,3302],{},"CISO",[1107,3304,3305],{},"Řízení informační bezpečnosti",[1089,3307,3308,3311,3314],{},[1107,3309,3310],{},"Chief Technology Officer",[1107,3312,3313],{},"CTO",[1107,3315,3316],{},"Technologická strategie",[1089,3318,3319,3322,3325],{},[1107,3320,3321],{},"IS Security Officer",[1107,3323,3324],{},"ISSO",[1107,3326,3327],{},"Bezpečnost IS",[1089,3329,3330,3333,3336],{},[1107,3331,3332],{},"Manažer KB",[1107,3334,3335],{},"—",[1107,3337,3338],{},"Odpovědný za ISMS",[1089,3340,3341,3344,3346],{},[1107,3342,3343],{},"Architekt KB",[1107,3345,3335],{},[1107,3347,3348],{},"Návrh a implementace opatření",[1089,3350,3351,3354,3356],{},[1107,3352,3353],{},"Auditor KB",[1107,3355,3335],{},[1107,3357,3358],{},"Provádění auditů",[1089,3360,3361,3364,3366],{},[1107,3362,3363],{},"Garant aktiva",[1107,3365,3335],{},[1107,3367,3368],{},"Rozvoj, použití a bezpečnost aktiva",[1354,3370,3372],{"id":3371},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[1201,3374,3375,3381,3393],{},[1204,3376,3377,3380],{},[1018,3378,3379],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[1204,3382,3383,3386,3387],{},[1018,3384,3385],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[1034,3388,3392],{"className":3389,"dataFsResolvedFilePath":3390,"href":3391},[1037],"topics\u002Fsae.md","\u002Fwiki\u002Fsae","SAE",[1204,3394,3395,3398],{},[1018,3396,3397],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[1078,3400,3402],{"id":3401},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[1201,3404,3405,3410,3415,3420],{},[1204,3406,3407,3409],{},[1018,3408,1936],{}," — stanovení kontextu, politiky, rozsahu ISMS",[1204,3411,3412,3414],{},[1018,3413,1946],{}," — implementace opatření, řízení rizik",[1204,3416,3417,3419],{},[1018,3418,1956],{}," — monitorování, audit, přezkoumání",[1204,3421,3422,3424],{},[1018,3423,1966],{}," — nápravná opatření, neustálé zlepšování",[1078,3426,3428],{"id":3427},"oborová-řešení-isms","Oborová řešení ISMS",[1015,3430,3431,3432,3435],{},"Kurz ",[1034,3433,1040],{"className":3434,"dataFsResolvedFilePath":1038,"href":1039},[1037]," pokrývá ISMS specifika pro:",[1297,3437,3438,3444,3450,3457,3466,3475,3484,3491,3499],{},[1204,3439,3440],{},[1034,3441,3443],{"className":3442,"dataFsResolvedFilePath":1696,"href":1697},[1037],"Akademické\u002Funiverzitní prostředí",[1204,3445,3446,3449],{},[1034,3447,1632],{"className":3448,"dataFsResolvedFilePath":1052,"href":1053},[1037]," (HIPAA, ISO 27799)",[1204,3451,3452,3456],{},[1034,3453,3455],{"className":3454,"dataFsResolvedFilePath":3222,"href":3223},[1037],"Energetiku"," (ISO 27019, IEC 61850)",[1204,3458,3459,3465],{},[1034,3460,3464],{"className":3461,"dataFsResolvedFilePath":3462,"href":3463},[1037],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," (NISTIR 7628)",[1204,3467,3468,3474],{},[1034,3469,3473],{"className":3470,"dataFsResolvedFilePath":3471,"href":3472},[1037],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[1204,3476,3477,3483],{},[1034,3478,3482],{"className":3479,"dataFsResolvedFilePath":3480,"href":3481},[1037],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," (TISAX)",[1204,3485,3486,3490],{},[1034,3487,3489],{"className":3488,"dataFsResolvedFilePath":3212,"href":3213},[1037],"ISP\u002Ftelekomunikace"," (ISO 27011)",[1204,3492,3493],{},[1034,3494,3498],{"className":3495,"dataFsResolvedFilePath":3496,"href":3497},[1037],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks",[1204,3500,3501],{},[1034,3502,1622],{"className":3503,"dataFsResolvedFilePath":1620,"href":1621},[1037],[1078,3505,1710],{"id":1709},[1297,3507,3508,3514,3520,3528,3534,3540,3549,3558],{},[1204,3509,3510,3513],{},[1034,3511,1735],{"className":3512,"dataFsResolvedFilePath":1733,"href":1734},[1037]," — jádro ISMS procesu",[1204,3515,3516,3519],{},[1034,3517,3392],{"className":3518,"dataFsResolvedFilePath":3390,"href":3391},[1037]," — budování bezpečnostního povědomí",[1204,3521,3522,3527],{},[1034,3523,1853],{"className":3524,"dataFsResolvedFilePath":3525,"href":3526},[1037],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — kontinuita činnosti",[1204,3529,3530,3533],{},[1034,3531,2493],{"className":3532,"dataFsResolvedFilePath":2491,"href":2492},[1037]," — širší kontext",[1204,3535,3536,3539],{},[1034,3537,1603],{"className":3538,"dataFsResolvedFilePath":1045,"href":1046},[1037]," — technologická opatření",[1204,3541,3542,3548],{},[1034,3543,3547],{"className":3544,"dataFsResolvedFilePath":3545,"href":3546},[1037],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance kontext",[1204,3550,3551,3557],{},[1034,3552,3556],{"className":3553,"dataFsResolvedFilePath":3554,"href":3555},[1037],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Záznam přednášky Risk Management"," — bibliografická karta",[1204,3559,3560,3566],{},[1034,3561,3565],{"className":3562,"dataFsResolvedFilePath":3563,"href":3564},[1037],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — ENISA NCSS, NÚKIB strategie",{"title":1754,"searchDepth":145,"depth":145,"links":3568},[3569,3570,3574,3578,3579,3580],{"id":3095,"depth":145,"text":3096},{"id":3166,"depth":145,"text":3167,"children":3571},[3572,3573],{"id":3170,"depth":100,"text":3171},{"id":3237,"depth":100,"text":3238},{"id":3261,"depth":145,"text":3262,"children":3575},[3576,3577],{"id":3265,"depth":100,"text":3266},{"id":3371,"depth":100,"text":3372},{"id":3401,"depth":145,"text":3402},{"id":3427,"depth":145,"text":3428},{"id":1709,"depth":145,"text":1710},[5],{},"\u002Ftopics\u002Fisms",{"title":3070,"description":1754},[3586,3587,3588],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","raw\u002Fimork\u002FDetail předmětu.md","topics\u002Fisms",[5,37,614,616,114,110],"MAuUW-ktk0wWc5AS56HRZFpDbys8Z-J8r3mjMNbPNWc",{"id":3593,"title":2493,"body":3594,"course":1774,"courses":4132,"created":2541,"description":1754,"extension":1778,"meta":4133,"navigation":1780,"path":4134,"seo":4135,"sources":4136,"stem":4139,"tags":4140,"type":1791,"updated":1776,"__hash__":4141},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":1008,"value":3595,"toc":4116},[3596,3599,3606,3613,3617,3655,3659,3663,3705,3709,3716,3719,3745,3749,3766,3770,3802,3806,3874,3878,3881,3898,3902,3940,3942,3979,3983,4047,4051],[1011,3597,2493],{"id":3598},"kybernetická-bezpečnost",[1015,3600,3601],{},[1808,3602],{"alt":3603,"className":3604,"src":3605},"kb-defense-in-depth",[1037,1812],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[1015,3607,3608,3609,3612],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[1034,3610,1726],{"className":3611,"dataFsResolvedFilePath":1724,"href":1725},[1037]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[1078,3614,3616],{"id":3615},"základní-pojmy","Základní pojmy",[1297,3618,3619,3625,3631,3637,3643,3649],{},[1204,3620,3621,3624],{},[1018,3622,3623],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[1204,3626,3627,3630],{},[1018,3628,3629],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[1204,3632,3633,3636],{},[1018,3634,3635],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[1204,3638,3639,3642],{},[1018,3640,3641],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[1204,3644,3645,3648],{},[1018,3646,3647],{},"Payload"," — kód spuštěný po úspěšném exploitu",[1204,3650,3651,3654],{},[1018,3652,3653],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[1078,3656,3658],{"id":3657},"typy-útoků","Typy útoků",[1354,3660,3662],{"id":3661},"podle-cílení","Podle cílení",[1083,3664,3665,3677],{},[1086,3666,3667],{},[1089,3668,3669,3672,3674],{},[1092,3670,3671],{},"Typ",[1092,3673,1831],{},[1092,3675,3676],{},"Cíl",[1102,3678,3679,3692],{},[1089,3680,3681,3686,3689],{},[1107,3682,3683],{},[1018,3684,3685],{},"Plošný",[1107,3687,3688],{},"Útočníkovi je jedno, kdo je obětí",[1107,3690,3691],{},"Botnety, spam, ransomware",[1089,3693,3694,3699,3702],{},[1107,3695,3696],{},[1018,3697,3698],{},"Cílený (APT)",[1107,3700,3701],{},"Soustředěná pozornost na konkrétní cíl",[1107,3703,3704],{},"Špionáž, sabotáž, krádež dat",[1354,3706,3708],{"id":3707},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[1015,3710,3711],{},[1808,3712],{"alt":3713,"className":3714,"src":3715},"apt-faze-utoku",[1037,1812],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[1015,3717,3718],{},"4 fáze:",[1201,3720,3721,3727,3733,3739],{},[1204,3722,3723,3726],{},[1018,3724,3725],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[1204,3728,3729,3732],{},[1018,3730,3731],{},"Průnik"," — spear phishing, watering hole, malvertising",[1204,3734,3735,3738],{},[1018,3736,3737],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[1204,3740,3741,3744],{},[1018,3742,3743],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[1354,3746,3748],{"id":3747},"základní-vektory-útoku","Základní vektory útoku",[1297,3750,3751,3754,3757,3760,3763],{},[1204,3752,3753],{},"Email s přílohou (spear phishing)",[1204,3755,3756],{},"Trojanizované aplikace",[1204,3758,3759],{},"Drive-by download (webové exploity)",[1204,3761,3762],{},"Výměnná média (BadUSB)",[1204,3764,3765],{},"Watering hole (kompromitace důvěryhodného webu)",[1354,3767,3769],{"id":3768},"software-útoky","Software útoky",[1297,3771,3772,3778,3784,3790,3796],{},[1204,3773,3774,3777],{},[1018,3775,3776],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[1204,3779,3780,3783],{},[1018,3781,3782],{},"Viry"," — poškození HW\u002FSW",[1204,3785,3786,3789],{},[1018,3787,3788],{},"Trojské koně"," — skrytá funkčnost",[1204,3791,3792,3795],{},[1018,3793,3794],{},"Ransomware"," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[1204,3797,3798,3801],{},[1018,3799,3800],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[1078,3803,3805],{"id":3804},"webové-útoky-owasp","Webové útoky (OWASP)",[1083,3807,3808,3820],{},[1086,3809,3810],{},[1089,3811,3812,3815,3817],{},[1092,3813,3814],{},"Útok",[1092,3816,3676],{},[1092,3818,3819],{},"Efekt",[1102,3821,3822,3833,3843,3854,3864],{},[1089,3823,3824,3827,3830],{},[1107,3825,3826],{},"Content Spoofing",[1107,3828,3829],{},"Klient",[1107,3831,3832],{},"Ztráta přihlašovacích údajů",[1089,3834,3835,3838,3840],{},[1107,3836,3837],{},"XSS",[1107,3839,3829],{},[1107,3841,3842],{},"Přístup k cookies",[1089,3844,3845,3848,3851],{},[1107,3846,3847],{},"SQL Injection",[1107,3849,3850],{},"Server",[1107,3852,3853],{},"Neoprávněný přístup do DB",[1089,3855,3856,3859,3861],{},[1107,3857,3858],{},"DoS\u002FDDoS",[1107,3860,3850],{},[1107,3862,3863],{},"Nedostupnost služby",[1089,3865,3866,3869,3871],{},[1107,3867,3868],{},"Path Traversal",[1107,3870,3850],{},[1107,3872,3873],{},"Přístup k souborům",[1078,3875,3877],{"id":3876},"bec-business-email-compromise","BEC — Business Email Compromise",[1015,3879,3880],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[1201,3882,3883,3886,3889,3892,3895],{},[1204,3884,3885],{},"Vydávání se za právníka",[1204,3887,3888],{},"Podvod na CEO",[1204,3890,3891],{},"Krádež dat (personální oddělení)",[1204,3893,3894],{},"Kompromitace účtu",[1204,3896,3897],{},"Falešné faktury",[1078,3899,3901],{"id":3900},"obranné-technologie","Obranné technologie",[1297,3903,3904,3910,3916,3922,3928,3934],{},[1204,3905,3906,3909],{},[1018,3907,3908],{},"NAC"," — řízení přístupu k síti",[1204,3911,3912,3915],{},[1018,3913,3914],{},"IDS"," — detekce průniku (pasivní)",[1204,3917,3918,3921],{},[1018,3919,3920],{},"IPS"," — prevence průniku (aktivní, in-line)",[1204,3923,3924,3927],{},[1018,3925,3926],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[1204,3929,3930,3933],{},[1018,3931,3932],{},"DLP"," — prevence úniku dat",[1204,3935,3936,3939],{},[1018,3937,3938],{},"FW\u002FVPN"," — perimetrová ochrana",[1078,3941,1710],{"id":1709},[1297,3943,3944,3950,3956,3962,3973],{},[1204,3945,3946,3949],{},[1034,3947,1726],{"className":3948,"dataFsResolvedFilePath":1724,"href":1725},[1037]," — manažerský rámec bezpečnosti",[1204,3951,3952,3955],{},[1034,3953,1735],{"className":3954,"dataFsResolvedFilePath":1733,"href":1734},[1037]," — hodnocení hrozeb a zranitelností",[1204,3957,3958,3961],{},[1034,3959,3392],{"className":3960,"dataFsResolvedFilePath":3390,"href":3391},[1037]," — budování povědomí jako obrana č. 1",[1204,3963,3964,3967,3968,3972],{},[1034,3965,1853],{"className":3966,"dataFsResolvedFilePath":3525,"href":3526},[1037]," \u002F ",[1034,3969,3971],{"className":3970,"dataFsResolvedFilePath":2509,"href":2510},[1037],"DR"," — reakce na incidenty a obnova",[1204,3974,3975,3978],{},[1034,3976,1603],{"className":3977,"dataFsResolvedFilePath":1045,"href":1046},[1037]," — technologická ochrana",[1354,3980,3982],{"id":3981},"záznamy-přednášek-a-útočné-techniky","Záznamy přednášek a útočné techniky",[1297,3984,3985,3994,4003,4012,4020,4029,4038],{},[1204,3986,3987,3993],{},[1034,3988,3992],{"className":3989,"dataFsResolvedFilePath":3990,"href":3991},[1037],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie kybernetického útoku"," — APT, vektory, MITRE ATT&CK",[1204,3995,3996,4002],{},[1034,3997,4001],{"className":3998,"dataFsResolvedFilePath":3999,"href":4000},[1037],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky a obrana"," — WormGPT, BEC",[1204,4004,4005,4011],{},[1034,4006,4010],{"className":4007,"dataFsResolvedFilePath":4008,"href":4009},[1037],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, ISO\u002FOSI L1–L7",[1204,4013,4014,4019],{},[1034,4015,3794],{"className":4016,"dataFsResolvedFilePath":4017,"href":4018},[1037],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware"," — historie, RaaS, NISTIR 8374",[1204,4021,4022,4028],{},[1034,4023,4027],{"className":4024,"dataFsResolvedFilePath":4025,"href":4026},[1037],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking a APT skupiny"," — APT28\u002F29\u002F41",[1204,4030,4031,4037],{},[1034,4032,4036],{"className":4033,"dataFsResolvedFilePath":4034,"href":4035},[1037],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — OSINT, behaviorální biometrika",[1204,4039,4040,4046],{},[1034,4041,4045],{"className":4042,"dataFsResolvedFilePath":4043,"href":4044},[1037],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webových služeb"," — OWASP, XSS, SQL injection",[1354,4048,4050],{"id":4049},"případové-studie","Případové studie",[1297,4052,4053,4062,4068,4077,4083,4092,4101,4110],{},[1204,4054,4055,4061],{},[1034,4056,4060],{"className":4057,"dataFsResolvedFilePath":4058,"href":4059},[1037],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov, FN Brno, Nymburk",[1204,4063,4064,4067],{},[1034,4065,1705],{"className":4066,"dataFsResolvedFilePath":1073,"href":1074},[1037]," — PII, ISO 27701",[1204,4069,4070,4076],{},[1034,4071,4075],{"className":4072,"dataFsResolvedFilePath":4073,"href":4074},[1037],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa přihlašování"," — privilegované účty, NIST SP 800-63",[1204,4078,4079,4082],{},[1034,4080,1689],{"className":4081,"dataFsResolvedFilePath":1059,"href":1060},[1037]," — PCI DSS v4.0.1",[1204,4084,4085,4091],{},[1034,4086,4090],{"className":4087,"dataFsResolvedFilePath":4088,"href":4089},[1037],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, 5G",[1204,4093,4094,4100],{},[1034,4095,4099],{"className":4096,"dataFsResolvedFilePath":4097,"href":4098},[1037],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR síť"," — onion routing, dark web",[1204,4102,4103,4109],{},[1034,4104,4108],{"className":4105,"dataFsResolvedFilePath":4106,"href":4107},[1037],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — CVE-2022-38392",[1204,4111,4112,4115],{},[1034,4113,1068],{"className":4114,"dataFsResolvedFilePath":1066,"href":1067},[1037]," — telemedicína, NSeZ",{"title":1754,"searchDepth":145,"depth":145,"links":4117},[4118,4119,4125,4126,4127,4128],{"id":3615,"depth":145,"text":3616},{"id":3657,"depth":145,"text":3658,"children":4120},[4121,4122,4123,4124],{"id":3661,"depth":100,"text":3662},{"id":3707,"depth":100,"text":3708},{"id":3747,"depth":100,"text":3748},{"id":3768,"depth":100,"text":3769},{"id":3804,"depth":145,"text":3805},{"id":3876,"depth":145,"text":3877},{"id":3900,"depth":145,"text":3901},{"id":1709,"depth":145,"text":1710,"children":4129},[4130,4131],{"id":3981,"depth":100,"text":3982},{"id":4049,"depth":100,"text":4050},[5],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":2493,"description":1754},[4137,4138,3586],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[5,62,944,72,138,132,275],"ZGXpTQk1lM-ZV0_FuXL-vNa95AogiXG3M6yEOrni_vI",{"id":4143,"title":1603,"body":4144,"course":1774,"courses":4658,"created":2541,"description":1754,"extension":1778,"meta":4659,"navigation":1780,"path":4660,"seo":4661,"sources":4662,"stem":4665,"tags":4666,"type":1791,"updated":1776,"__hash__":4667},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":1008,"value":4145,"toc":4635},[4146,4148,4155,4158,4162,4221,4225,4229,4240,4244,4255,4259,4267,4271,4282,4286,4291,4295,4306,4310,4313,4317,4349,4353,4408,4412,4493,4497,4500,4504,4511,4518,4522,4528,4530,4536,4540,4565,4569,4589,4591],[1011,4147,1603],{"id":70},[1015,4149,4150],{},[1808,4151],{"alt":4152,"className":4153,"src":4154},"ochrana-dat-technologie",[1037,1812],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[1015,4156,4157],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[1078,4159,4161],{"id":4160},"formy-zneužití-dat","Formy zneužití dat",[1083,4163,4164,4172],{},[1086,4165,4166],{},[1089,4167,4168,4170],{},[1092,4169,2256],{},[1092,4171,1831],{},[1102,4173,4174,4181,4189,4197,4205,4213],{},[1089,4175,4176,4179],{},[1107,4177,4178],{},"Zašifrování",[1107,4180,3794],{},[1089,4182,4183,4186],{},[1107,4184,4185],{},"Zveřejnění",[1107,4187,4188],{},"Double ransomware",[1089,4190,4191,4194],{},[1107,4192,4193],{},"Odposlech",[1107,4195,4196],{},"Pasivní sběr dat",[1089,4198,4199,4202],{},[1107,4200,4201],{},"Krádež",[1107,4203,4204],{},"Cílená exfiltrace",[1089,4206,4207,4210],{},[1107,4208,4209],{},"Krádež dodavatelského řetězce",[1107,4211,4212],{},"Triple ransomware",[1089,4214,4215,4218],{},[1107,4216,4217],{},"Prodej",[1107,4219,4220],{},"Darknet marketplace",[1078,4222,4224],{"id":4223},"bezpečnostní-technologie","Bezpečnostní technologie",[1354,4226,4228],{"id":4227},"nac-network-access-control","NAC (Network Access Control)",[1297,4230,4231,4234,4237],{},[1204,4232,4233],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[1204,4235,4236],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[1204,4238,4239],{},"Ekvivalenty: MDM, BYOD",[1354,4241,4243],{"id":4242},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[1297,4245,4246,4249,4252],{},[1204,4247,4248],{},"Monitoruje síťový provoz, generuje alerty",[1204,4250,4251],{},"Pasivní systém — nezasahuje do provozu",[1204,4253,4254],{},"Signaturová a anomální detekce",[1354,4256,4258],{"id":4257},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[1297,4260,4261,4264],{},[1204,4262,4263],{},"Aktivní systém — blokuje škodlivý provoz",[1204,4265,4266],{},"Zařazen přímo do síťové cesty (in-line)",[1354,4268,4270],{"id":4269},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[1297,4272,4273,4276,4279],{},[1204,4274,4275],{},"Centralizovaná správa bezpečnostních logů",[1204,4277,4278],{},"Sběr s agentem i bez agenta",[1204,4280,4281],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[1354,4283,4285],{"id":4284},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[1297,4287,4288],{},[1204,4289,4290],{},"Klasifikace citlivých dat a vynucení ochrany",[1354,4292,4294],{"id":4293},"šifrování","Šifrování",[1297,4296,4297,4300,4303],{},[1204,4298,4299],{},"AES (128\u002F192\u002F256 bit), 3DES",[1204,4301,4302],{},"RSA (2048+ bit), DSS",[1204,4304,4305],{},"SHA-256, SHA-1",[1354,4307,4309],{"id":4308},"utm-unified-threat-management","UTM (Unified Threat Management)",[1015,4311,4312],{},"Jednotná správa hrozeb — FW + IDS\u002FIPS + AV + VPN v jednom zařízení.",[1078,4314,4316],{"id":4315},"siem-podrobně","SIEM podrobně",[1297,4318,4319,4325,4331,4337,4343],{},[1204,4320,4321,4324],{},[1018,4322,4323],{},"EPS"," (Events Per Second) — klíčová metrika pro dimenzování SIEM.",[1204,4326,4327,4330],{},[1018,4328,4329],{},"Velikost logů"," — plánování úložné kapacity dle objemu generovaných dat.",[1204,4332,4333,4336],{},[1018,4334,4335],{},"Typy zařízení"," — síťové prvky, servery, aplikace, bezpečnostní systémy, endpointy.",[1204,4338,4339,4342],{},[1018,4340,4341],{},"Implementace"," — začít s nejkritičtějšími zdroji logů, postupně rozšiřovat.",[1204,4344,4345,4348],{},[1018,4346,4347],{},"Provozní příručka + BCM"," — dokumentace provozu SIEM a jeho zahrnutí do plánů kontinuity.",[1078,4350,4352],{"id":4351},"dlp-tři-stavy-dat","DLP — tři stavy dat",[1083,4354,4355,4367],{},[1086,4356,4357],{},[1089,4358,4359,4362,4364],{},[1092,4360,4361],{},"Stav",[1092,4363,1831],{},[1092,4365,4366],{},"Ochrana",[1102,4368,4369,4382,4395],{},[1089,4370,4371,4376,4379],{},[1107,4372,4373],{},[1018,4374,4375],{},"Data in Use",[1107,4377,4378],{},"Aktivně zpracovávaná na endpointu",[1107,4380,4381],{},"DLP koncových bodů (agent na stanici, kontrola USB, tisk, schránka, email)",[1089,4383,4384,4389,4392],{},[1107,4385,4386],{},[1018,4387,4388],{},"Data in Motion",[1107,4390,4391],{},"Přenášená po síti",[1107,4393,4394],{},"Síťový DLP (gateway), monitorování a blokování na perimetru",[1089,4396,4397,4402,4405],{},[1107,4398,4399],{},[1018,4400,4401],{},"Data at Rest",[1107,4403,4404],{},"Uložená na discích, v databázích",[1107,4406,4407],{},"Šifrování, řízení přístupu",[1078,4409,4411],{"id":4410},"kryptografie-historický-přehled","Kryptografie — historický přehled",[1083,4413,4414,4429],{},[1086,4415,4416],{},[1089,4417,4418,4421,4424,4426],{},[1092,4419,4420],{},"Algoritmus",[1092,4422,4423],{},"Rok",[1092,4425,3671],{},[1092,4427,4428],{},"Délka klíče",[1102,4430,4431,4447,4462,4478],{},[1089,4432,4433,4438,4441,4444],{},[1107,4434,4435],{},[1018,4436,4437],{},"DES",[1107,4439,4440],{},"1975",[1107,4442,4443],{},"Symetrický (blokový)",[1107,4445,4446],{},"64-bit (efektivních 56)",[1089,4448,4449,4454,4457,4459],{},[1107,4450,4451],{},[1018,4452,4453],{},"IDEA",[1107,4455,4456],{},"1990",[1107,4458,4443],{},[1107,4460,4461],{},"128-bit",[1089,4463,4464,4469,4472,4475],{},[1107,4465,4466],{},[1018,4467,4468],{},"RSA",[1107,4470,4471],{},"1977 (MIT)",[1107,4473,4474],{},"Asymetrický",[1107,4476,4477],{},"1024–4096 bit",[1089,4479,4480,4485,4488,4490],{},[1107,4481,4482],{},[1018,4483,4484],{},"AES",[1107,4486,4487],{},"1997 (NIST)",[1107,4489,4443],{},[1107,4491,4492],{},"128\u002F192\u002F256-bit",[1354,4494,4496],{"id":4495},"steganografie","Steganografie",[1015,4498,4499],{},"Skrytí informace ve zdánlivě neškodné zprávě — na rozdíl od kryptografie nezakrývá obsah, ale samotnou existenci tajné komunikace. Využití v obrázcích, zvuku, videu.",[1354,4501,4503],{"id":4502},"digitální-podpisy-a-hašovací-funkce","Digitální podpisy a hašovací funkce",[1015,4505,4506,4507,4510],{},"Ověření autora a integrity dokumentu pomocí asymetrické kryptografie. Hašovací funkce vytváří jednosměrný otisk dokumentu — základ pro ověření integrity. ",[1018,4508,4509],{},"4 vlastnosti elektronického podpisu",": identifikace, integrita, nepopiratelnost, nenapodobitelnost.",[1015,4512,4513,4514,4517],{},"V ČR existují ",[1018,4515,4516],{},"3 akreditované certifikační autority"," pro vydávání kvalifikovaných certifikátů.",[1354,4519,4521],{"id":4520},"dynamický-biometrický-podpis","Dynamický biometrický podpis",[1015,4523,4524,4527],{},[1018,4525,4526],{},"ISO\u002FIEC 24745"," — ochrana biometrických šablon. Zachycuje unikátní biometrickou stopu (tlak, rychlost, sklon pera, dynamika) — každý podpis je jedinečný i při opakování.",[1354,4529,1590],{"id":500},[1015,4531,4532,4535],{},[1018,4533,4534],{},"Nařízení EU č. 910\u002F2014"," o elektronické identifikaci a službách vytvářejících důvěru — elektronické pečetě, časová razítka, služby vytvářející důvěru (certifikační autority, doručovací služby).",[1354,4537,4539],{"id":4538},"enisa-data-protection-engineering","ENISA Data Protection Engineering",[1015,4541,4542,4543,1055,4546,4548,4549,4552,4553,1055,4555,1055,4558,4561,4562,1561],{},"Doporučení pro technickou ochranu osobních údajů: ",[1018,4544,4545],{},"Privacy by Design \u002F Default",[1018,4547,1393],{}," (Data Protection Impact Assessment), ",[1018,4550,4551],{},"PET"," (Privacy Enhancing Technologies), ",[1018,4554,366],{},[1018,4556,4557],{},"differential privacy",[1018,4559,4560],{},"TEE"," (Trusted Execution Environment), ",[1018,4563,4564],{},"synthetic data",[1078,4566,4568],{"id":4567},"ipv6-bezpečnost","IPv6 bezpečnost",[1297,4570,4571,4577,4583,4586],{},[1204,4572,4573,4576],{},[1018,4574,4575],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[1204,4578,4579,4582],{},[1018,4580,4581],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[1204,4584,4585],{},"Transportní a tunelovací režim",[1204,4587,4588],{},"SPD (Security Policy Database), bezpečnostní asociace",[1078,4590,1710],{"id":1709},[1297,4592,4593,4599,4605,4611,4618,4627],{},[1204,4594,4595,4598],{},[1034,4596,1726],{"className":4597,"dataFsResolvedFilePath":1724,"href":1725},[1037]," — ochrana dat jako technická vrstva ISMS",[1204,4600,4601,4604],{},[1034,4602,2493],{"className":4603,"dataFsResolvedFilePath":2491,"href":2492},[1037]," — kontext hrozeb",[1204,4606,4607,4610],{},[1034,4608,1735],{"className":4609,"dataFsResolvedFilePath":1733,"href":1734},[1037]," — hodnocení aktiv a hrozeb",[1204,4612,4613,4617],{},[1034,4614,4616],{"className":4615,"dataFsResolvedFilePath":4043,"href":4044},[1037],"Bezpečnost webu"," — webové útoky a obrana",[1204,4619,4620,4626],{},[1034,4621,4625],{"className":4622,"dataFsResolvedFilePath":4623,"href":4624},[1037],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — emailové protokoly",[1204,4628,4629,2503],{},[1034,4630,4634],{"className":4631,"dataFsResolvedFilePath":4632,"href":4633},[1037],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Záznam přednášky Ochrana dat",{"title":1754,"searchDepth":145,"depth":145,"links":4636},[4637,4638,4647,4648,4649,4656,4657],{"id":4160,"depth":145,"text":4161},{"id":4223,"depth":145,"text":4224,"children":4639},[4640,4641,4642,4643,4644,4645,4646],{"id":4227,"depth":100,"text":4228},{"id":4242,"depth":100,"text":4243},{"id":4257,"depth":100,"text":4258},{"id":4269,"depth":100,"text":4270},{"id":4284,"depth":100,"text":4285},{"id":4293,"depth":100,"text":4294},{"id":4308,"depth":100,"text":4309},{"id":4315,"depth":145,"text":4316},{"id":4351,"depth":145,"text":4352},{"id":4410,"depth":145,"text":4411,"children":4650},[4651,4652,4653,4654,4655],{"id":4495,"depth":100,"text":4496},{"id":4502,"depth":100,"text":4503},{"id":4520,"depth":100,"text":4521},{"id":500,"depth":100,"text":1590},{"id":4538,"depth":100,"text":4539},{"id":4567,"depth":145,"text":4568},{"id":1709,"depth":145,"text":1710},[5],{},"\u002Ftopics\u002Fochrana-dat",{"title":1603,"description":1754},[1785,4663,4664],"raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[5,70,95,732,572,604,181,108],"M650k0ZNR2BPigQlhjBZfiXYtu5pDBHhmlFhIKtM8X0",{"id":4669,"title":1735,"body":4670,"course":1774,"courses":5157,"created":2541,"description":1754,"extension":1778,"meta":5158,"navigation":1780,"path":5159,"seo":5160,"sources":5161,"stem":5162,"tags":5163,"type":1791,"updated":1776,"__hash__":5164},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":1008,"value":4671,"toc":5146},[4672,4675,4682,4688,4824,4828,4891,4895,4945,4949,4954,4973,4977,4980,4984,4998,5002,5009,5023,5027,5055,5059,5108,5110],[1011,4673,1735],{"id":4674},"řízení-rizik",[1015,4676,4677],{},[1808,4678],{"alt":4679,"className":4680,"src":4681},"rizeni-rizik-proces",[1037,1812],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[1015,4683,4684,4685,1561],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[1034,4686,1726],{"className":4687,"dataFsResolvedFilePath":1724,"href":1725},[1037],[4689,4690,4694,4714,4729,4817],"aside",{"className":4691,"dataCallout":584},[4692,4693],"callout","callout-info",[1015,4695,4698,4706,4707,4713],{"className":4696},[4697],"callout-title",[4699,4700],"span",{"className":4701,"ariaHidden":4705},[4702,4703,4704],"iconify","i-lucide:info","callout-icon","true","Související pohled v kurzu ",[1034,4708,4712],{"className":4709,"dataFsResolvedFilePath":4710,"href":4711},[1037],"courses\u002Firmank.md","\u002Fwiki\u002Firmank","IrmanK"," — Risk management",[1015,4715,4716,4717,4720,4721,4724,4725,4728],{},"Tento topic pokrývá ",[1018,4718,4719],{},"kybernetické \u002F informační"," riziko podle ISO\u002FIEC 27005. Pro ",[1018,4722,4723],{},"podnikové (enterprise) riziko"," v širším smyslu (finanční, strategické, change-driven) viz odpovídající stránky kurzu ",[1034,4726,4712],{"className":4727,"dataFsResolvedFilePath":4710,"href":4711},[1037],":",[1297,4730,4731,4740,4748,4791,4800,4808],{},[1204,4732,4733,4739],{},[1034,4734,4738],{"className":4735,"dataFsResolvedFilePath":4736,"href":4737},[1037],"topics\u002Fdefinice-rizika.md","\u002Fwiki\u002Fdefinice-rizika","definice-rizika"," — 10 definic rizika, podnikatelské riziko, postoj k riziku",[1204,4741,4742,4747],{},[1034,4743,692],{"className":4744,"dataFsResolvedFilePath":4745,"href":4746},[1037],"topics\u002Fmereni-rizika.md","\u002Fwiki\u002Fmereni-rizika"," — statistické charakteristiky (σ, σ², KV)",[1204,4749,4750,3191,4755,4790],{},[1034,4751,68],{"className":4752,"dataFsResolvedFilePath":4753,"href":4754},[1037],"topics\u002Fmapa-rizik.md","\u002Fwiki\u002Fmapa-rizik",[4699,4756,4759],{"className":4757},[4758],"katex",[4760,4761,4763],"math",{"xmlns":4762},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[4764,4765,4766,4785],"semantics",{},[4767,4768,4769,4773,4777,4780,4783],"mrow",{},[4770,4771,4772],"mi",{},"R",[4774,4775,4776],"mo",{},"=",[4770,4778,4779],{},"D",[4774,4781,4782],{},"×",[4770,4784,2064],{},[4786,4787,4789],"annotation",{"encoding":4788},"application\u002Fx-tex","R = D \\times P",", matice 5×5, tři barevné zóny",[1204,4792,4793,4799],{},[1034,4794,4798],{"className":4795,"dataFsResolvedFilePath":4796,"href":4797},[1037],"topics\u002Ftaktiky-rizeni-rizik.md","\u002Fwiki\u002Ftaktiky-rizeni-rizik","taktiky-rizeni-rizik"," — vyvárování \u002F udržení \u002F redukce \u002F přenos",[1204,4801,4802,4807],{},[1034,4803,634],{"className":4804,"dataFsResolvedFilePath":4805,"href":4806},[1037],"topics\u002Fklasifikace-rizik.md","\u002Fwiki\u002Fklasifikace-rizik"," — kritické × důležité × běžné; dynamické × statické; čisté × spekulativní",[1204,4809,4810,4816],{},[1034,4811,4815],{"className":4812,"dataFsResolvedFilePath":4813,"href":4814},[1037],"topics\u002Fmetody-snizovani-rizika.md","\u002Fwiki\u002Fmetody-snizovani-rizika","metody-snizovani-rizika"," — 6 strategií, ofenzivní řízení",[1015,4818,4819,4820,4823],{},"Oba pohledy se doplňují: ISMS \u002F ISO 27005 je specializace pro ",[1018,4821,4822],{},"informační rizika",", IrmanK je obecné podnikové riziko.",[1078,4825,4827],{"id":4826},"normativní-základ","Normativní základ",[1083,4829,4830,4839],{},[1086,4831,4832],{},[1089,4833,4834,4837],{},[1092,4835,4836],{},"Norma",[1092,4838,1384],{},[1102,4840,4841,4851,4861,4871,4881],{},[1089,4842,4843,4848],{},[1107,4844,4845],{},[1018,4846,4847],{},"ISO 31000:2018",[1107,4849,4850],{},"Obecné směrnice pro management rizik",[1089,4852,4853,4858],{},[1107,4854,4855],{},[1018,4856,4857],{},"IEC 31010:2019",[1107,4859,4860],{},"Techniky posuzování rizik",[1089,4862,4863,4868],{},[1107,4864,4865],{},[1018,4866,4867],{},"ISO\u002FIEC 27005:2022",[1107,4869,4870],{},"Řízení rizik bezpečnosti informací",[1089,4872,4873,4878],{},[1107,4874,4875],{},[1018,4876,4877],{},"NIST SP 800-30",[1107,4879,4880],{},"Průvodce hodnocením rizik",[1089,4882,4883,4888],{},[1107,4884,4885],{},[1018,4886,4887],{},"NIST SP 800-39",[1107,4889,4890],{},"Proces řízení bezpečnostních rizik",[1078,4892,4894],{"id":4893},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[1201,4896,4897,4903,4909,4915,4921,4927,4933,4939],{},[1204,4898,4899,4902],{},[1018,4900,4901],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[1204,4904,4905,4908],{},[1018,4906,4907],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[1204,4910,4911,4914],{},[1018,4912,4913],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[1204,4916,4917,4920],{},[1018,4918,4919],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[1204,4922,4923,4926],{},[1018,4924,4925],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[1204,4928,4929,4932],{},[1018,4930,4931],{},"Akceptace rizik"," — formální rozhodnutí",[1204,4934,4935,4938],{},[1018,4936,4937],{},"Komunikace"," — sdílení informací o rizicích",[1204,4940,4941,4944],{},[1018,4942,4943],{},"Monitorování"," — průběžné přezkoumávání",[1078,4946,4948],{"id":4947},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[1015,4950,4951],{},[1018,4952,4953],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[1297,4955,4956,4962,4967],{},[1204,4957,4958,4961],{},[1018,4959,4960],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[1204,4963,4964,4966],{},[1018,4965,3635],{}," — slabé místo aktiva (stupnice 1–5)",[1204,4968,4969,4972],{},[1018,4970,4971],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[1078,4974,4976],{"id":4975},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[1015,4978,4979],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[1078,4981,4983],{"id":4982},"klíčové-dokumenty","Klíčové dokumenty",[1297,4985,4986,4992],{},[1204,4987,4988,4991],{},[1018,4989,4990],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s vybranými opatřeními pro jednotlivá rizika, odpovědnými osobami, termíny implementace, potřebnými zdroji.",[1204,4993,4994,4997],{},[1018,4995,4996],{},"SoA \u002F PoA"," (Statement of Applicability \u002F Prohlášení o aplikovatelnosti) — seznam všech opatření z Přílohy A normy ISO 27001 s uvedením, zda je opatření aplikováno, zdůvodnění zahrnutí\u002Fvyloučení a stavu implementace.",[1078,4999,5001],{"id":5000},"metodika-pro-organizace-s-kii-vis","Metodika pro organizace s KII \u002F VIS",[1015,5003,5004,5005,5008],{},"Specifický postup hodnocení rizik dle požadavků zákona o kybernetické bezpečnosti (",[1018,5006,5007],{},"ZKB 181\u002F2014 Sb.",") a prováděcích vyhlášek pro organizace provozující:",[1297,5010,5011,5017],{},[1204,5012,5013,5016],{},[1018,5014,5015],{},"KII"," — kritickou informační infrastrukturu",[1204,5018,5019,5022],{},[1018,5020,5021],{},"VIS"," — významné informační systémy",[1078,5024,5026],{"id":5025},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[1297,5028,5029,5035,5040,5045,5050],{},[1204,5030,5031,5034],{},[1018,5032,5033],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[1204,5036,5037,5039],{},[1018,5038,3332],{}," — odpovědný za ISMS",[1204,5041,5042,5044],{},[1018,5043,3343],{}," — návrh a implementace opatření",[1204,5046,5047,5049],{},[1018,5048,3353],{}," — provádění auditů",[1204,5051,5052,5054],{},[1018,5053,3363],{}," — zajištění rozvoje a bezpečnosti aktiva",[1078,5056,5058],{"id":5057},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[1083,5060,5061,5073],{},[1086,5062,5063],{},[1089,5064,5065,5068,5070],{},[1092,5066,5067],{},"Úroveň",[1092,5069,1384],{},[1092,5071,5072],{},"Typ rizika",[1102,5074,5075,5086,5097],{},[1089,5076,5077,5080,5083],{},[1107,5078,5079],{},"Stupeň 1",[1107,5081,5082],{},"Organizace",[1107,5084,5085],{},"Strategické riziko",[1089,5087,5088,5091,5094],{},[1107,5089,5090],{},"Stupeň 2",[1107,5092,5093],{},"Poslání\u002Fobchodní procesy",[1107,5095,5096],{},"Taktické riziko",[1089,5098,5099,5102,5105],{},[1107,5100,5101],{},"Stupeň 3",[1107,5103,5104],{},"Informační systémy",[1107,5106,5107],{},"Operační riziko",[1078,5109,1710],{"id":1709},[1297,5111,5112,5118,5124,5131,5136,5141],{},[1204,5113,5114,5117],{},[1034,5115,1726],{"className":5116,"dataFsResolvedFilePath":1724,"href":1725},[1037]," — řízení rizik jako součást systému",[1204,5119,5120,5123],{},[1034,5121,1853],{"className":5122,"dataFsResolvedFilePath":3525,"href":3526},[1037]," — kontinuita činnosti při materializaci rizik",[1204,5125,5126,5130],{},[1034,5127,5129],{"className":5128,"dataFsResolvedFilePath":2509,"href":2510},[1037],"Disaster Recovery"," — obnova po havárii",[1204,5132,5133,4604],{},[1034,5134,2493],{"className":5135,"dataFsResolvedFilePath":2491,"href":2492},[1037],[1204,5137,5138,2503],{},[1034,5139,3556],{"className":5140,"dataFsResolvedFilePath":3554,"href":3555},[1037],[1204,5142,5143,3548],{},[1034,5144,3547],{"className":5145,"dataFsResolvedFilePath":3545,"href":3546},[1037],{"title":1754,"searchDepth":145,"depth":145,"links":5147},[5148,5149,5150,5151,5152,5153,5154,5155,5156],{"id":4826,"depth":145,"text":4827},{"id":4893,"depth":145,"text":4894},{"id":4947,"depth":145,"text":4948},{"id":4975,"depth":145,"text":4976},{"id":4982,"depth":145,"text":4983},{"id":5000,"depth":145,"text":5001},{"id":5025,"depth":145,"text":5026},{"id":5057,"depth":145,"text":5058},{"id":1709,"depth":145,"text":1710},[5],{},"\u002Ftopics\u002Frizeni-rizik",{"title":1735,"description":1754},[3587,3586],"topics\u002Frizeni-rizik",[5,299,120,225,47,558],"B2O-5KFFyDd3C5ghtPpboBxcyKKtHedHtDlkrl4iqPA",{"id":5166,"title":5167,"body":5168,"course":1774,"courses":5455,"created":2541,"description":1754,"extension":1778,"meta":5456,"navigation":1780,"path":5457,"seo":5458,"sources":5459,"stem":5461,"tags":5462,"type":1791,"updated":1776,"__hash__":5463},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":1008,"value":5169,"toc":5444},[5170,5173,5180,5197,5201,5204,5208,5307,5311,5346,5350,5370,5374,5377,5381,5384,5388,5391,5395,5414,5416],[1011,5171,5167],{"id":5172},"sae-budování-bezpečnostního-povědomí",[1015,5174,5175],{},[1808,5176],{"alt":5177,"className":5178,"src":5179},"sae-pyramida",[1037,1812],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[1015,5181,5182,5183,5186,5187,1062,5190,5186,5193,5196],{},"Program definovaný doporučeními NIST řady SP 800 (zejména ",[1018,5184,5185],{},"NIST SP 800-50"," ",[2125,5188,5189],{},"Building an IT Security Awareness and Training Program",[1018,5191,5192],{},"NIST SP 800-16",[2125,5194,5195],{},"IT Security Training Requirements","), sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[1078,5198,5200],{"id":5199},"sae-continuum-model","SAE Continuum Model",[1015,5202,5203],{},"Postupný rozvoj od základního povědomí přes školení a vzdělávání až po profesní specializaci. Každá úroveň staví na předchozí — uživatel nejprve rozpoznává hrozbu, pak ji umí řešit, posléze rozumí proč a nakonec vede ostatní.",[1078,5205,5207],{"id":5206},"čtyři-úrovně-sae","Čtyři úrovně SAE",[1083,5209,5210,5227],{},[1086,5211,5212],{},[1089,5213,5214,5216,5219,5221,5224],{},[1092,5215,5067],{},[1092,5217,5218],{},"Příznak",[1092,5220,3676],{},[1092,5222,5223],{},"Metody",[1092,5225,5226],{},"Časový rámec",[1102,5228,5229,5249,5269,5289],{},[1089,5230,5231,5237,5240,5243,5246],{},[1107,5232,5233,5236],{},[1018,5234,5235],{},"Awareness"," (povědomí)",[1107,5238,5239],{},"„Co\"",[1107,5241,5242],{},"Rozpoznávání",[1107,5244,5245],{},"Média, videa, plakáty",[1107,5247,5248],{},"Krátkodobý",[1089,5250,5251,5257,5260,5263,5266],{},[1107,5252,5253,5256],{},[1018,5254,5255],{},"Training"," (výcvik)",[1107,5258,5259],{},"„Jak\"",[1107,5261,5262],{},"Dovednosti",[1107,5264,5265],{},"Přednášky, případovky, cvičení",[1107,5267,5268],{},"Střednědobý",[1089,5270,5271,5277,5280,5283,5286],{},[1107,5272,5273,5276],{},[1018,5274,5275],{},"Education"," (vzdělávání)",[1107,5278,5279],{},"„Proč\"",[1107,5281,5282],{},"Porozumění",[1107,5284,5285],{},"Semináře, diskuze, výzkum",[1107,5287,5288],{},"Dlouhodobý",[1089,5290,5291,5296,5298,5301,5304],{},[1107,5292,5293],{},[1018,5294,5295],{},"Professional Development",[1107,5297,3335],{},[1107,5299,5300],{},"Profesní rozvoj",[1107,5302,5303],{},"Certifikace, konference",[1107,5305,5306],{},"Průběžný",[1078,5308,5310],{"id":5309},"sae-plán-11-kroků","SAE plán (11 kroků)",[1201,5312,5313,5316,5319,5322,5325,5328,5331,5334,5337,5340,5343],{},[1204,5314,5315],{},"Role a odpovědnosti v programu",[1204,5317,5318],{},"Stanovení cílů pro každou fázi",[1204,5320,5321],{},"Rozdělení uživatelů (analýza)",[1204,5323,5324],{},"Vytvoření školících materiálů dle skupin",[1204,5326,5327],{},"Určení cíle pro každou skupinu",[1204,5329,5330],{},"Témata pro každou relaci\u002Fkurz",[1204,5332,5333],{},"Metody nasazení (metodiky)",[1204,5335,5336],{},"Dokumentace a zpětná vazba",[1204,5338,5339],{},"Vyhodnocení a aktualizace materiálů",[1204,5341,5342],{},"Četnost opakování",[1204,5344,5345],{},"Kalkulace",[1078,5347,5349],{"id":5348},"modely-řízení","Modely řízení",[1297,5351,5352,5358,5364],{},[1204,5353,5354,5357],{},[1018,5355,5356],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[1204,5359,5360,5363],{},[1018,5361,5362],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[1204,5365,5366,5369],{},[1018,5367,5368],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[1078,5371,5373],{"id":5372},"doporučená-témata-dle-vyhlášky-č-4092025-sb","Doporučená témata dle vyhlášky č. 409\u002F2025 Sb.",[1015,5375,5376],{},"Vyhláška o bezpečnostních opatřeních poskytovatele regulované služby v režimu vyšších povinností (prováděcí předpis k novému ZKB č. 264\u002F2025 Sb. — transpozice NIS2; účinná od 1. 11. 2025). Příloha č. 6 obsahuje doporučená témata SAE: bezpečné chování na internetu, rozpoznání phishingu a sociálního inženýrství, práce s hesly a vícefaktorová autentizace, klasifikace informací, hlášení incidentů, BYOD, cloud, firewall, malware, VPN, šifrování, zálohování, fyzická bezpečnost, mobilní zařízení.",[1078,5378,5380],{"id":5379},"matice-školení-nist-sp-500-172","Matice školení (NIST SP 500-172)",[1015,5382,5383],{},"Mapuje role v organizaci na požadované úrovně znalostí a dovedností v oblasti informační bezpečnosti — od běžného uživatele přes IT správce a manažery až po bezpečnostní specialisty.",[1078,5385,5387],{"id":5386},"rozšíření-na-dodavatelský-řetězec","Rozšíření na dodavatelský řetězec",[1015,5389,5390],{},"SAE se netýká jen interních zaměstnanců — zahrnuje i dodavatele, partnery a třetí strany s přístupem k informačním systémům. Smluvně lze požadovat doložení absolvovaného školení.",[1078,5392,5394],{"id":5393},"související-certifikace-isaca","Související certifikace ISACA",[1015,5396,5397,5398,5401,5402,5405,5406,5409,5410,5413],{},"Pro profesionály v oblasti SAE a bezpečnostního řízení: ",[1018,5399,5400],{},"CISM"," (Certified Information Security Manager), ",[1018,5403,5404],{},"CISA"," (Certified Information Systems Auditor), ",[1018,5407,5408],{},"CRISC"," (Certified in Risk and Information Systems Control), ",[1018,5411,5412],{},"CGEIT"," (Certified in Governance of Enterprise IT).",[1078,5415,1710],{"id":1709},[1297,5417,5418,5424,5430,5436],{},[1204,5419,5420,5423],{},[1034,5421,1726],{"className":5422,"dataFsResolvedFilePath":1724,"href":1725},[1037]," — SAE jako součást provozní bezpečnosti",[1204,5425,5426,5429],{},[1034,5427,2493],{"className":5428,"dataFsResolvedFilePath":2491,"href":2492},[1037]," — povědomí jako obrana č. 1",[1204,5431,5432,5435],{},[1034,5433,1735],{"className":5434,"dataFsResolvedFilePath":1733,"href":1734},[1037]," — snižování rizika lidského faktoru",[1204,5437,5438,2503],{},[1034,5439,5443],{"className":5440,"dataFsResolvedFilePath":5441,"href":5442},[1037],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","Záznam přednášky SAE",{"title":1754,"searchDepth":145,"depth":145,"links":5445},[5446,5447,5448,5449,5450,5451,5452,5453,5454],{"id":5199,"depth":145,"text":5200},{"id":5206,"depth":145,"text":5207},{"id":5309,"depth":145,"text":5310},{"id":5348,"depth":145,"text":5349},{"id":5372,"depth":145,"text":5373},{"id":5379,"depth":145,"text":5380},{"id":5386,"depth":145,"text":5387},{"id":5393,"depth":145,"text":5394},{"id":1709,"depth":145,"text":1710},[5],{},"\u002Ftopics\u002Fsae",{"title":5167,"description":1754},[5460],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[5,307,165,321,47,658],"9ygPXUfrcjQxY_kfJ3wM_ro1kNaCShu4p8WUZC4FYmI",[5465,5467,5472,5477],{"slug":5,"path":1039,"title":6,"snippet":5466},"… 1, RPO\u002FRTO - Ochrana dat — NAC, IDS\u002FIPS, SIEM, DLP, kryptografie, eIDAS - \u003C\u003Cgdpr>> — nařízení (EU) 2016\u002F679, DPIA, Privacy by Design, ISO 27701 ## Referenční výstupy - [[ …",{"slug":5468,"path":5469,"title":5470,"snippet":5471},"imork-glosar","\u002Fwiki\u002Fimork-glosar","ImorK — Glosář pojmů a zkratek","… DPIA** — Data Protection Impact Assessment (čl. 35 GDPR). Posouzení dopadu na ochranu OÚ. \u003C\u003Cgdpr>>. - **DPO** — Data Protection Officer. Pověřenec pro ochranu OÚ (GDPR čl. 37–39). [[gdpr|G …",{"slug":5473,"path":5474,"title":5475,"snippet":5476},"imork-normy-prehled","\u002Fwiki\u002Fimork-normy-prehled","ImorK — Přehled norem a standardů podle sektoru","… ocuje - Řízení rizik — metodika napříč ISO 27005 \u002F 31000 \u002F NIST 800-30 - \u003C\u003Cgdpr>> — nejčastěji odkazovaná regulace v kurzu",{"slug":5478,"path":5479,"title":5480,"snippet":5481},"overview","\u002F","Přehled — Fakulta podnikatelská VUT v Brně","… tiky-rizeni-rizik]]) - ISMS — systém řízení bezpečnosti informací napříč obory - \u003C\u003Cgdpr>> — nařízení (EU) 2016\u002F679; cross-course koncept (ImorK krádež dat DPI …",[5483,5485,5486,5487],{"slug":5484,"title":1742,"path":1074,"sharedTags":53},"imork-kradez-dat",{"slug":70,"title":1603,"path":1046,"sharedTags":100},{"slug":5468,"title":5470,"path":5469,"sharedTags":145},{"slug":5488,"title":5489,"path":4633,"sharedTags":145},"imork-ochrana-dat","Záznam přednášky — Ochrana dat",1777893132664]