[{"data":1,"prerenderedAt":4597},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-anatomie-utoku":1626,"course-stats-imork":2263,"course-topics-imork":2267,"backlinks-imork-anatomie-utoku":4564,"related-imork-anatomie-utoku":4585},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2262},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2247,"navigation":664,"path":2248,"seo":2249,"sources":2250,"stem":2252,"tags":2253,"type":2260,"updated":677,"__hash__":2261},"summaries\u002Fsummaries\u002Fimork-anatomie-utoku.md","Anatomie kybernetického útoku",{"type":9,"value":1631,"toc":2226},[1632,1635,1639,1653,1657,1731,1735,1767,1771,1785,1789,1792,1796,1867,1871,1897,1901,1904,1908,1946,1950,1953,1957,1960,1980,1984,1992,2017,2021,2153,2157,2160,2207,2211,2219,2223],[12,1633,1629],{"id":1634},"anatomie-kybernetického-útoku",[115,1636,1638],{"id":1637},"útočný-povrch-attack-surface","Útočný povrch (Attack Surface)",[120,1640,1641,1647],{},[123,1642,1643,1646],{},[38,1644,1645],{},"Digitální"," — síťová rozhraní, aplikace, služby, API",[123,1648,1649,1652],{},[38,1650,1651],{},"Fyzický"," — USB porty, přístupové body, zařízení",[115,1654,1656],{"id":1655},"klíčové-pojmy","Klíčové pojmy",[16,1658,1659,1669],{},[19,1660,1661],{},[22,1662,1663,1666],{},[25,1664,1665],{},"Pojem",[25,1667,1668],{},"Definice",[30,1670,1671,1681,1691,1701,1711,1721],{},[22,1672,1673,1678],{},[35,1674,1675],{},[38,1676,1677],{},"Threat Agent",[35,1679,1680],{},"Aktér provádějící útok (hacker, insider, APT skupina)",[22,1682,1683,1688],{},[35,1684,1685],{},[38,1686,1687],{},"Attack Vector",[35,1689,1690],{},"Cesta\u002Fmetoda průniku do systému",[22,1692,1693,1698],{},[35,1694,1695],{},[38,1696,1697],{},"Vulnerability",[35,1699,1700],{},"Zranitelnost — slabina v systému",[22,1702,1703,1708],{},[35,1704,1705],{},[38,1706,1707],{},"Exploit",[35,1709,1710],{},"Kód\u002Ftechnika zneužívající zranitelnost",[22,1712,1713,1718],{},[35,1714,1715],{},[38,1716,1717],{},"Payload",[35,1719,1720],{},"Škodlivý obsah doručený exploitem",[22,1722,1723,1728],{},[35,1724,1725],{},[38,1726,1727],{},"Shellcode",[35,1729,1730],{},"Kód spuštěný po úspěšném exploitu",[115,1732,1734],{"id":1733},"základní-vektory-útoku","Základní vektory útoku",[152,1736,1737,1743,1749,1755,1761],{},[123,1738,1739,1742],{},[38,1740,1741],{},"Email s přílohou"," — nejčastější vektor, sociální inženýrství",[123,1744,1745,1748],{},[38,1746,1747],{},"Trojanizované aplikace"," — legitimní software s malwarem",[123,1750,1751,1754],{},[38,1752,1753],{},"Drive-by download"," — stažení malwaru při návštěvě webu",[123,1756,1757,1760],{},[38,1758,1759],{},"Vyměnitelná média"," — USB (BadUSB) — fyzický vektor",[123,1762,1763,1766],{},[38,1764,1765],{},"Watering hole"," — kompromitace často navštěvovaného webu cílové skupiny",[115,1768,1770],{"id":1769},"plošný-vs-cílený-útok","Plošný vs. cílený útok",[120,1772,1773,1779],{},[123,1774,1775,1778],{},[38,1776,1777],{},"Plošný útok"," — masový, automatizovaný, netargeted (spam, phishing kampaně)",[123,1780,1781,1784],{},[38,1782,1783],{},"Cílený útok"," — zaměřený na konkrétní organizaci\u002Fosobu, sofistikovaný",[115,1786,1788],{"id":1787},"apt-advanced-persistent-threat","APT (Advanced Persistent Threat)",[724,1790,1791],{},"Pokročilá přetrvávající hrozba — dlouhodobý, cílený útok financovaný státem nebo organizovaným zločinem.",[198,1793,1795],{"id":1794},"_4-fáze-apt","4 fáze APT",[152,1797,1798,1812,1833,1850],{},[123,1799,1800,1803,1804],{},[38,1801,1802],{},"Příprava"," (Preparation\u002FReconnaissance)",[120,1805,1806,1809],{},[123,1807,1808],{},"Průzkum cíle (OSINT, sociální sítě, technický recon)",[123,1810,1811],{},"Výběr vektoru útoku",[123,1813,1814,1817,1818],{},[38,1815,1816],{},"Infiltrace"," (Infiltration)",[120,1819,1820,1827,1830],{},[123,1821,1822,1826],{},[207,1823,1825],{"className":1824,"dataFsResolvedFilePath":415,"href":416},[210],"Spear phishing"," — cílený phishing",[123,1828,1829],{},"Malvertising — škodlivá reklama",[123,1831,1832],{},"Počáteční kompromitace systému",[123,1834,1835,1838,1839],{},[38,1836,1837],{},"Kompromitace"," (Compromise)",[120,1840,1841,1844,1847],{},[123,1842,1843],{},"Laterální pohyb (lateral movement) — šíření v síti",[123,1845,1846],{},"Eskalace oprávnění",[123,1848,1849],{},"Instalace backdoorů",[123,1851,1852,1855,1856],{},[38,1853,1854],{},"Dokončení"," (Completion)",[120,1857,1858,1861,1864],{},[123,1859,1860],{},"Exfiltrace dat",[123,1862,1863],{},"Dlouhodobý přístup",[123,1865,1866],{},"Případná destrukce\u002Fsabotáž",[115,1868,1870],{"id":1869},"softwarové-útoky","Softwarové útoky",[120,1872,1873,1879,1885,1891],{},[123,1874,1875,1878],{},[38,1876,1877],{},"Adware"," — nevyžádaná reklama",[123,1880,1881,1884],{},[38,1882,1883],{},"Spyware"," — sledování aktivity uživatele",[123,1886,1887,1890],{},[38,1888,1889],{},"Viry"," — sebereplikující škodlivý kód",[123,1892,1893,1896],{},[38,1894,1895],{},"Trojany"," — malware maskovaný jako legitimní software",[115,1898,1900],{"id":1899},"sociální-inženýrství","Sociální inženýrství",[724,1902,1903],{},"Nejoblíbenější metoda útoku — manipulace s lidskou důvěrou a emocemi (strach, zvědavost, autorita, časový tlak). Obchází technická opatření tím, že cílí na nejslabší článek — člověka.",[115,1905,1907],{"id":1906},"phishing-vs-spear-phishing","Phishing vs. Spear Phishing",[16,1909,1910,1920],{},[19,1911,1912],{},[22,1913,1914,1917],{},[25,1915,1916],{},"Typ",[25,1918,1919],{},"Popis",[30,1921,1922,1936],{},[22,1923,1924,1929],{},[35,1925,1926],{},[38,1927,1928],{},"Phishing",[35,1930,1931,1932,1935],{},"Masový útok — ",[38,1933,1934],{},"83 % útočníků"," předstírá příslušnost ke známé značce",[22,1937,1938,1943],{},[35,1939,1940],{},[38,1941,1942],{},"Spear Phishing",[35,1944,1945],{},"Cílený útok na konkrétní osoby\u002Forganizace — personalizované zprávy",[198,1947,1949],{"id":1948},"struktura-phisherské-organizace","Struktura phisherské organizace",[724,1951,1952],{},"Organizovaná skupina s dělbou rolí — tvůrci stránek, spameři, muly pro praní peněz, koordinátoři.",[115,1954,1956],{"id":1955},"typy-malwaru-rozšířeno","Typy malwaru — rozšířeno",[724,1958,1959],{},"Doplnění k základním softwarovým útokům:",[120,1961,1962,1968,1974],{},[123,1963,1964,1967],{},[38,1965,1966],{},"Cryptojacking"," — neoprávněné využití výpočetního výkonu oběti pro těžbu kryptoměn",[123,1969,1970,1973],{},[38,1971,1972],{},"Trojský kůň"," — maskuje se jako legitimní software, otevírá zadní vrátka",[123,1975,1976,1979],{},[38,1977,1978],{},"Červi (worms)"," — samostatné šíření po síti bez interakce uživatele (na rozdíl od virů)",[115,1981,1983],{"id":1982},"watering-hole-supply-chain-útoky","Watering hole \u002F Supply chain útoky",[724,1985,1986,1987,1991],{},"Pokročilé útoky na dodavatelský řetězec a průmyslové řídicí systémy (",[207,1988,1990],{"className":1989,"dataFsResolvedFilePath":334,"href":335},[210],"ICS","):",[120,1993,1994,1999,2005,2011],{},[123,1995,1996,1998],{},[38,1997,1765],{}," — kompromitace webu často navštěvovaného cílovou skupinou",[123,2000,2001,2004],{},[38,2002,2003],{},"Supply chain"," — infiltrace přes důvěryhodného dodavatele softwaru\u002Fhardwaru",[123,2006,2007,2010],{},[38,2008,2009],{},"Steganografie v obrázcích"," — ukrytí škodlivého kódu v obrazových souborech",[123,2012,2013,2016],{},[38,2014,2015],{},"Zneužití výjimek jako dešifrovacích klíčů"," — využití exception handlerů pro aktivaci payloadu",[115,2018,2020],{"id":2019},"útoky-podle-isoosi-vrstev","Útoky podle ISO\u002FOSI vrstev",[16,2022,2023,2039],{},[19,2024,2025],{},[22,2026,2027,2030,2033,2036],{},[25,2028,2029],{},"Vrstva",[25,2031,2032],{},"Protokoly",[25,2034,2035],{},"Techniky útoku",[25,2037,2038],{},"Mitigace",[30,2040,2041,2057,2073,2089,2105,2121,2137],{},[22,2042,2043,2048,2051,2054],{},[35,2044,2045],{},[38,2046,2047],{},"L1 (fyzická)",[35,2049,2050],{},"Ethernet, Wi-Fi",[35,2052,2053],{},"Odposlech, rušení",[35,2055,2056],{},"Fyzická bezpečnost, stínění",[22,2058,2059,2064,2067,2070],{},[35,2060,2061],{},[38,2062,2063],{},"L2 (linková)",[35,2065,2066],{},"ARP, MAC",[35,2068,2069],{},"ARP spoofing, MAC flooding",[35,2071,2072],{},"Port security, DHCP snooping",[22,2074,2075,2080,2083,2086],{},[35,2076,2077],{},[38,2078,2079],{},"L3 (síťová)",[35,2081,2082],{},"IP, ICMP",[35,2084,2085],{},"IP spoofing, ICMP flood",[35,2087,2088],{},"Filtrování, ACL",[22,2090,2091,2096,2099,2102],{},[35,2092,2093],{},[38,2094,2095],{},"L4 (transportní)",[35,2097,2098],{},"TCP, UDP",[35,2100,2101],{},"SYN flood, UDP flood",[35,2103,2104],{},"SYN cookies, rate limiting",[22,2106,2107,2112,2115,2118],{},[35,2108,2109],{},[38,2110,2111],{},"L5 (relační)",[35,2113,2114],{},"NetBIOS, RPC",[35,2116,2117],{},"Session hijacking",[35,2119,2120],{},"Šifrování sessions",[22,2122,2123,2128,2131,2134],{},[35,2124,2125],{},[38,2126,2127],{},"L6 (prezentační)",[35,2129,2130],{},"SSL\u002FTLS",[35,2132,2133],{},"SSL stripping, POODLE",[35,2135,2136],{},"Aktualizace, HSTS",[22,2138,2139,2144,2147,2150],{},[35,2140,2141],{},[38,2142,2143],{},"L7 (aplikační)",[35,2145,2146],{},"HTTP, DNS, SMTP",[35,2148,2149],{},"[[imork-www",[35,2151,2152],{},"XSS]], [[imork-www",[115,2154,2156],{"id":2155},"amplifikační-útoky","Amplifikační útoky",[724,2158,2159],{},"DDoS útoky využívající asymetrii mezi malým požadavkem a velkou odpovědí:",[16,2161,2162,2174],{},[19,2163,2164],{},[22,2165,2166,2168,2171],{},[25,2167,1916],{},[25,2169,2170],{},"Amplifikační faktor",[25,2172,2173],{},"Princip",[30,2175,2176,2189],{},[22,2177,2178,2183,2186],{},[35,2179,2180],{},[38,2181,2182],{},"DNS amplification",[35,2184,2185],{},"1:70",[35,2187,2188],{},"Malý DNS dotaz → velká odpověď (ANY record)",[22,2190,2191,2196,2199],{},[35,2192,2193],{},[38,2194,2195],{},"NTP amplification",[35,2197,2198],{},"1:556",[35,2200,2201,2202,2206],{},"Příkaz ",[2203,2204,2205],"code",{},"monlist"," → obrovská odpověď",[198,2208,2210],{"id":2209},"obrana","Obrana",[120,2212,2213],{},[123,2214,2215,2218],{},[38,2216,2217],{},"BCP38"," (RFC 2827) — filtrování zdrojových IP adres na hranici sítě (ingress filtering), zamezení IP spoofingu",[115,2220,2222],{"id":2221},"mitre-attck","MITRE ATT&CK",[724,2224,2225],{},"Znalostní báze taktik a technik kybernetických útoků — referenční framework pro popis chování útočníků.",{"title":641,"searchDepth":642,"depth":642,"links":2227},[2228,2229,2230,2231,2232,2235,2236,2237,2240,2241,2242,2243,2246],{"id":1637,"depth":642,"text":1638},{"id":1655,"depth":642,"text":1656},{"id":1733,"depth":642,"text":1734},{"id":1769,"depth":642,"text":1770},{"id":1787,"depth":642,"text":1788,"children":2233},[2234],{"id":1794,"depth":649,"text":1795},{"id":1869,"depth":642,"text":1870},{"id":1899,"depth":642,"text":1900},{"id":1906,"depth":642,"text":1907,"children":2238},[2239],{"id":1948,"depth":649,"text":1949},{"id":1955,"depth":642,"text":1956},{"id":1982,"depth":642,"text":1983},{"id":2019,"depth":642,"text":2020},{"id":2155,"depth":642,"text":2156,"children":2244},[2245],{"id":2209,"depth":649,"text":2210},{"id":2221,"depth":642,"text":2222},{},"\u002Fsummaries\u002Fimork-anatomie-utoku",{"title":1629,"description":641},[2251],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","summaries\u002Fimork-anatomie-utoku",[658,673,2254,2255,2256,2257,2258,2259],"apt","exploit","phishing","socialni-inzenyrstvi","malware","supply-chain","summary","uyh1iT5L9T1JAdGrSpU7KFcF6aLiKI26GbUzKuDQN6g","summaries",{"zapisku":1624,"topics":2264,"summaries":2265,"outputs":2266},6,35,0,[2268,2754,3253,3687,3967,4317],{"id":2269,"title":2270,"body":2271,"course":659,"courses":2738,"created":660,"description":641,"extension":661,"meta":2739,"navigation":664,"path":2740,"seo":2741,"sources":2742,"stem":2745,"tags":2746,"type":2752,"updated":677,"__hash__":2753},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2272,"toc":2725},[2273,2276,2285,2288,2290,2382,2386,2440,2444,2467,2471,2560,2564,2567,2571,2648,2652,2678,2682,2702,2711],[12,2274,2270],{"id":2275},"bcm-řízení-kontinuity-činnosti",[724,2277,2278],{},[2279,2280],"img",{"alt":2281,"className":2282,"src":2284},"bcm-rpo-rto",[210,2283],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2286,2287],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2289,1656],{"id":1655},[16,2291,2292,2303],{},[19,2293,2294],{},[22,2295,2296,2298,2301],{},[25,2297,1665],{},[25,2299,2300],{},"Anglicky",[25,2302,1919],{},[30,2304,2305,2318,2330,2343,2356,2369],{},[22,2306,2307,2312,2315],{},[35,2308,2309],{},[38,2310,2311],{},"BCMS",[35,2313,2314],{},"Business Continuity Management System",[35,2316,2317],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2319,2320,2324,2327],{},[35,2321,2322],{},[38,2323,384],{},[35,2325,2326],{},"Business Continuity Management",[35,2328,2329],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2331,2332,2337,2340],{},[35,2333,2334],{},[38,2335,2336],{},"BIA",[35,2338,2339],{},"Business Impact Analysis",[35,2341,2342],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2344,2345,2350,2353],{},[35,2346,2347],{},[38,2348,2349],{},"MBCO",[35,2351,2352],{},"Minimum Business Continuity Objective",[35,2354,2355],{},"Minimální přijatelná úroveň služeb",[22,2357,2358,2363,2366],{},[35,2359,2360],{},[38,2361,2362],{},"RPO",[35,2364,2365],{},"Recovery Point Objective",[35,2367,2368],{},"Do jakého bodu v minulosti lze obnovit data",[22,2370,2371,2376,2379],{},[35,2372,2373],{},[38,2374,2375],{},"RTO",[35,2377,2378],{},"Recovery Time Objective",[35,2380,2381],{},"Čas potřebný pro obnovu provozu",[115,2383,2385],{"id":2384},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2387,2388,2398],{},[19,2389,2390],{},[22,2391,2392,2395],{},[25,2393,2394],{},"Fáze",[25,2396,2397],{},"Obsah",[30,2399,2400,2410,2420,2430],{},[22,2401,2402,2407],{},[35,2403,2404],{},[38,2405,2406],{},"Plan",[35,2408,2409],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2411,2412,2417],{},[35,2413,2414],{},[38,2415,2416],{},"Do",[35,2418,2419],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2421,2422,2427],{},[35,2423,2424],{},[38,2425,2426],{},"Check",[35,2428,2429],{},"Monitoring, audit, přezkoumání managementem",[22,2431,2432,2437],{},[35,2433,2434],{},[38,2435,2436],{},"Act",[35,2438,2439],{},"Nápravná opatření, neustálé zlepšování",[115,2441,2443],{"id":2442},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2445,2446,2449,2452,2455,2458,2461,2464],{},[123,2447,2448],{},"Kap. 4 — kontext organizace",[123,2450,2451],{},"Kap. 5 — vedení (leadership)",[123,2453,2454],{},"Kap. 6 — plánování (BIA, rizika)",[123,2456,2457],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2459,2460],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2462,2463],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2465,2466],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2468,2470],{"id":2469},"analýza-steeple","Analýza STEEPLE",[16,2472,2473,2483],{},[19,2474,2475],{},[22,2476,2477,2480],{},[25,2478,2479],{},"Faktor",[25,2481,2482],{},"Oblast",[30,2484,2485,2496,2507,2518,2528,2539,2550],{},[22,2486,2487,2493],{},[35,2488,2489,2492],{},[38,2490,2491],{},"S","ociální",[35,2494,2495],{},"Zaměstnanost, bezpečnost, komunity",[22,2497,2498,2504],{},[35,2499,2500,2503],{},[38,2501,2502],{},"T","echnologický",[35,2505,2506],{},"Závislost na technologiích",[22,2508,2509,2515],{},[35,2510,2511,2514],{},[38,2512,2513],{},"E","konomický",[35,2516,2517],{},"Ekonomická situace, finanční instituce",[22,2519,2520,2525],{},[35,2521,2522,2524],{},[38,2523,2513],{},"tický",[35,2526,2527],{},"Podnikatelská etika, média, veřejnost",[22,2529,2530,2536],{},[35,2531,2532,2535],{},[38,2533,2534],{},"P","olitický",[35,2537,2538],{},"Politický systém, hrozba nepokojů",[22,2540,2541,2547],{},[35,2542,2543,2546],{},[38,2544,2545],{},"L","egislativní",[35,2548,2549],{},"Předpisy, zákony",[22,2551,2552,2557],{},[35,2553,2554,2556],{},[38,2555,2513],{},"nvironmentální",[35,2558,2559],{},"Životní prostředí, přírodní hrozby",[115,2561,2563],{"id":2562},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2565,2566],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2568,2570],{"id":2569},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2572,2573,2582],{},[19,2574,2575],{},[22,2576,2577,2580],{},[25,2578,2579],{},"Tier",[25,2581,1919],{},[30,2583,2584,2592,2600,2608,2616,2624,2632,2640],{},[22,2585,2586,2589],{},[35,2587,2588],{},"0",[35,2590,2591],{},"Žádná off-site data",[22,2593,2594,2597],{},[35,2595,2596],{},"1",[35,2598,2599],{},"Fyzická záloha + cold site",[22,2601,2602,2605],{},[35,2603,2604],{},"2",[35,2606,2607],{},"Fyzická záloha + hot site",[22,2609,2610,2613],{},[35,2611,2612],{},"3",[35,2614,2615],{},"Elektronický trezor (electronic vaulting)",[22,2617,2618,2621],{},[35,2619,2620],{},"4",[35,2622,2623],{},"Point-in-time recovery",[22,2625,2626,2629],{},[35,2627,2628],{},"5",[35,2630,2631],{},"Two-site commit (kontinuální přenos)",[22,2633,2634,2637],{},[35,2635,2636],{},"6",[35,2638,2639],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2641,2642,2645],{},[35,2643,2644],{},"7",[35,2646,2647],{},"Automatizovaná obnova (AI monitoring)",[198,2649,2651],{"id":2650},"cloud-dr","Cloud DR",[120,2653,2654,2660,2666,2672],{},[123,2655,2656,2659],{},[38,2657,2658],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2661,2662,2665],{},[38,2663,2664],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2667,2668,2671],{},[38,2669,2670],{},"Hot DR"," — paralelní řešení v tandemu",[123,2673,2674,2677],{},[38,2675,2676],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2679,2681],{"id":2680},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2683,2684,2690,2696],{},[123,2685,2686,2689],{},[207,2687,140],{"className":2688,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2691,2692,2695],{},[207,2693,569],{"className":2694,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2697,2698,2701],{},[207,2699,578],{"className":2700,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2703,2705,2706],{"id":2704},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2707,43],{"className":2708,"dataFsResolvedFilePath":2709,"href":2710},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2712,2713,2719],{},[123,2714,2715],{},[207,2716,2718],{"className":2717,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2720,2721],{},[207,2722,2724],{"className":2723,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2726},[2727,2728,2729,2730,2731,2735,2736],{"id":1655,"depth":642,"text":1656},{"id":2384,"depth":642,"text":2385},{"id":2442,"depth":642,"text":2443},{"id":2469,"depth":642,"text":2470},{"id":2562,"depth":642,"text":2563,"children":2732},[2733,2734],{"id":2569,"depth":649,"text":2570},{"id":2650,"depth":649,"text":2651},{"id":2680,"depth":642,"text":2681},{"id":2704,"depth":642,"text":2737},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2270,"description":641},[2743,2744],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2747,2748,2749,2750,2751],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2755,"title":2756,"body":2757,"course":659,"courses":3240,"created":660,"description":641,"extension":661,"meta":3241,"navigation":664,"path":3242,"seo":3243,"sources":3244,"stem":3247,"tags":3248,"type":2752,"updated":677,"__hash__":3252},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2758,"toc":3225},[2759,2762,2769,2776,2779,2783,2850,2854,2858,2917,2921,2941,2945,2949,3050,3054,3077,3081,3103,3107,3114,3170,3172,3203,3208],[12,2760,2756],{"id":2761},"isms-systém-řízení-bezpečnosti-informací",[724,2763,2764],{},[2279,2765],{"alt":2766,"className":2767,"src":2768},"isms-pdca-cyklus",[210,2283],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2770,2771],{},[2279,2772],{"alt":2773,"className":2774,"src":2775},"isms-oborova-mapa",[210,2283],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2777,2778],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2780,2782],{"id":2781},"základní-pilíře","Základní pilíře",[16,2784,2785,2796],{},[19,2786,2787],{},[22,2788,2789,2792,2794],{},[25,2790,2791],{},"Pilíř",[25,2793,2300],{},[25,2795,1919],{},[30,2797,2798,2811,2824,2837],{},[22,2799,2800,2805,2808],{},[35,2801,2802],{},[38,2803,2804],{},"Důvěrnost",[35,2806,2807],{},"Confidentiality",[35,2809,2810],{},"Přístup pouze oprávněným osobám",[22,2812,2813,2818,2821],{},[35,2814,2815],{},[38,2816,2817],{},"Integrita",[35,2819,2820],{},"Integrity",[35,2822,2823],{},"Ochrana před neoprávněnou změnou",[22,2825,2826,2831,2834],{},[35,2827,2828],{},[38,2829,2830],{},"Dostupnost",[35,2832,2833],{},"Availability",[35,2835,2836],{},"Systémy a data dostupné v potřebný čas",[22,2838,2839,2844,2847],{},[35,2840,2841],{},[38,2842,2843],{},"Nepopiratelnost",[35,2845,2846],{},"Non-repudiation",[35,2848,2849],{},"Prokázání autorství akce",[115,2851,2853],{"id":2852},"normativní-rámec","Normativní rámec",[198,2855,2857],{"id":2856},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2859,2860,2866,2872,2883,2889,2899,2908],{},[123,2861,2862,2865],{},[38,2863,2864],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2867,2868,2871],{},[38,2869,2870],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2873,2874,2877,2878,2882],{},[38,2875,2876],{},"ISO\u002FIEC 27005"," — ",[207,2879,2881],{"className":2880,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2884,2885,2888],{},[38,2886,2887],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2890,2891,2894,2895],{},[38,2892,2893],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2896,2898],{"className":2897,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2900,2901,2894,2904],{},[38,2902,2903],{},"ISO\u002FIEC 27019",[207,2905,2907],{"className":2906,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2909,2910,2894,2913],{},[38,2911,2912],{},"ISO\u002FIEC 27799",[207,2914,2916],{"className":2915,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2918,2920],{"id":2919},"další-rámce","Další rámce",[120,2922,2923,2929,2935],{},[123,2924,2925,2928],{},[38,2926,2927],{},"NIST"," — americké standardy (SP 800 řada)",[123,2930,2931,2934],{},[38,2932,2933],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2936,2937,2940],{},[38,2938,2939],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2942,2944],{"id":2943},"governance-řízení","Governance (řízení)",[198,2946,2948],{"id":2947},"bezpečnostní-role","Bezpečnostní role",[16,2950,2951,2963],{},[19,2952,2953],{},[22,2954,2955,2958,2960],{},[25,2956,2957],{},"Role",[25,2959,40],{},[25,2961,2962],{},"Odpovědnost",[30,2964,2965,2976,2987,2998,3009,3020,3030,3040],{},[22,2966,2967,2970,2973],{},[35,2968,2969],{},"Chief Information Officer",[35,2971,2972],{},"CIO",[35,2974,2975],{},"Celkové řízení ICT",[22,2977,2978,2981,2984],{},[35,2979,2980],{},"Chief Information Security Officer",[35,2982,2983],{},"CISO",[35,2985,2986],{},"Řízení informační bezpečnosti",[22,2988,2989,2992,2995],{},[35,2990,2991],{},"Chief Technology Officer",[35,2993,2994],{},"CTO",[35,2996,2997],{},"Technologická strategie",[22,2999,3000,3003,3006],{},[35,3001,3002],{},"IS Security Officer",[35,3004,3005],{},"ISSO",[35,3007,3008],{},"Bezpečnost IS",[22,3010,3011,3014,3017],{},[35,3012,3013],{},"Manažer KB",[35,3015,3016],{},"—",[35,3018,3019],{},"Odpovědný za ISMS",[22,3021,3022,3025,3027],{},[35,3023,3024],{},"Architekt KB",[35,3026,3016],{},[35,3028,3029],{},"Návrh a implementace opatření",[22,3031,3032,3035,3037],{},[35,3033,3034],{},"Auditor KB",[35,3036,3016],{},[35,3038,3039],{},"Provádění auditů",[22,3041,3042,3045,3047],{},[35,3043,3044],{},"Garant aktiva",[35,3046,3016],{},[35,3048,3049],{},"Rozvoj, použití a bezpečnost aktiva",[198,3051,3053],{"id":3052},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,3055,3056,3062,3071],{},[123,3057,3058,3061],{},[38,3059,3060],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,3063,3064,3067,3068],{},[38,3065,3066],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3069,240],{"className":3070,"dataFsResolvedFilePath":585,"href":586},[210],[123,3072,3073,3076],{},[38,3074,3075],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3078,3080],{"id":3079},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3082,3083,3088,3093,3098],{},[123,3084,3085,3087],{},[38,3086,2406],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3089,3090,3092],{},[38,3091,2416],{}," — implementace opatření, řízení rizik",[123,3094,3095,3097],{},[38,3096,2426],{}," — monitorování, audit, přezkoumání",[123,3099,3100,3102],{},[38,3101,2436],{}," — nápravná opatření, neustálé zlepšování",[115,3104,3106],{"id":3105},"oborová-řešení-isms","Oborová řešení ISMS",[724,3108,3109,3110,3113],{},"Kurz ",[207,3111,43],{"className":3112,"dataFsResolvedFilePath":2709,"href":2710},[210]," pokrývá ISMS specifika pro:",[120,3115,3116,3122,3128,3135,3141,3148,3154,3160,3165],{},[123,3117,3118],{},[207,3119,3121],{"className":3120,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3123,3124,3127],{},[207,3125,282],{"className":3126,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3129,3130,3134],{},[207,3131,3133],{"className":3132,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3136,3137,3140],{},[207,3138,300],{"className":3139,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3142,3143,3147],{},[207,3144,3146],{"className":3145,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3149,3150,3153],{},[207,3151,318],{"className":3152,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3155,3156,3159],{},[207,3157,327],{"className":3158,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3161,3162],{},[207,3163,336],{"className":3164,"dataFsResolvedFilePath":334,"href":335},[210],[123,3166,3167],{},[207,3168,273],{"className":3169,"dataFsResolvedFilePath":271,"href":272},[210],[115,3171,2681],{"id":2680},[120,3173,3174,3180,3185,3191,3197],{},[123,3175,3176,3179],{},[207,3177,569],{"className":3178,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3181,3182,587],{},[207,3183,240],{"className":3184,"dataFsResolvedFilePath":585,"href":586},[210],[123,3186,3187,3190],{},[207,3188,384],{"className":3189,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3192,3193,3196],{},[207,3194,578],{"className":3195,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3198,3199,3202],{},[207,3200,369],{"className":3201,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3204,2705,3205],{"id":2704},[207,3206,43],{"className":3207,"dataFsResolvedFilePath":2709,"href":2710},[210],[120,3209,3210,3215,3220],{},[123,3211,3212],{},[207,3213,222],{"className":3214,"dataFsResolvedFilePath":220,"href":221},[210],[123,3216,3217],{},[207,3218,249],{"className":3219,"dataFsResolvedFilePath":247,"href":248},[210],[123,3221,3222],{},[207,3223,231],{"className":3224,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3226},[3227,3228,3232,3236,3237,3238,3239],{"id":2781,"depth":642,"text":2782},{"id":2852,"depth":642,"text":2853,"children":3229},[3230,3231],{"id":2856,"depth":649,"text":2857},{"id":2919,"depth":649,"text":2920},{"id":2943,"depth":642,"text":2944,"children":3233},[3234,3235],{"id":2947,"depth":649,"text":2948},{"id":3052,"depth":649,"text":3053},{"id":3079,"depth":642,"text":3080},{"id":3105,"depth":642,"text":3106},{"id":2680,"depth":642,"text":2681},{"id":2704,"depth":642,"text":2737},[658],{},"\u002Ftopics\u002Fisms",{"title":2756,"description":641},[3245,3246,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3249,3250,672,3251],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3254,"title":578,"body":3255,"course":659,"courses":3675,"created":660,"description":641,"extension":661,"meta":3676,"navigation":664,"path":3677,"seo":3678,"sources":3679,"stem":3681,"tags":3682,"type":2752,"updated":677,"__hash__":3686},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3256,"toc":3661},[3257,3260,3267,3274,3278,3313,3317,3321,3362,3365,3372,3375,3398,3400,3416,3420,3450,3454,3522,3526,3529,3546,3550,3588,3590,3627,3632],[12,3258,578],{"id":3259},"kybernetická-bezpečnost",[724,3261,3262],{},[2279,3263],{"alt":3264,"className":3265,"src":3266},"kb-defense-in-depth",[210,2283],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3268,3269,3270,3273],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3271,140],{"className":3272,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3275,3277],{"id":3276},"základní-pojmy","Základní pojmy",[120,3279,3280,3286,3292,3298,3303,3308],{},[123,3281,3282,3285],{},[38,3283,3284],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3287,3288,3291],{},[38,3289,3290],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3293,3294,3297],{},[38,3295,3296],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3299,3300,3302],{},[38,3301,1707],{}," — kód zneužívající konkrétní zranitelnost",[123,3304,3305,3307],{},[38,3306,1717],{}," — kód spuštěný po úspěšném exploitu",[123,3309,3310,3312],{},[38,3311,1727],{}," — kód spouštěný v shellu napadeného systému",[115,3314,3316],{"id":3315},"typy-útoků","Typy útoků",[198,3318,3320],{"id":3319},"podle-cílení","Podle cílení",[16,3322,3323,3334],{},[19,3324,3325],{},[22,3326,3327,3329,3331],{},[25,3328,1916],{},[25,3330,1919],{},[25,3332,3333],{},"Cíl",[30,3335,3336,3349],{},[22,3337,3338,3343,3346],{},[35,3339,3340],{},[38,3341,3342],{},"Plošný",[35,3344,3345],{},"Útočníkovi je jedno, kdo je obětí",[35,3347,3348],{},"Botnety, spam, ransomware",[22,3350,3351,3356,3359],{},[35,3352,3353],{},[38,3354,3355],{},"Cílený (APT)",[35,3357,3358],{},"Soustředěná pozornost na konkrétní cíl",[35,3360,3361],{},"Špionáž, sabotáž, krádež dat",[198,3363,3364],{"id":1787},"APT — Advanced Persistent Threat",[724,3366,3367],{},[2279,3368],{"alt":3369,"className":3370,"src":3371},"apt-faze-utoku",[210,2283],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3373,3374],{},"4 fáze:",[152,3376,3377,3382,3388,3393],{},[123,3378,3379,3381],{},[38,3380,1802],{}," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3383,3384,3387],{},[38,3385,3386],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3389,3390,3392],{},[38,3391,1837],{}," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3394,3395,3397],{},[38,3396,1854],{}," — exfiltrace dat, vydírání, sabotáž",[198,3399,1734],{"id":1733},[120,3401,3402,3405,3407,3410,3413],{},[123,3403,3404],{},"Email s přílohou (spear phishing)",[123,3406,1747],{},[123,3408,3409],{},"Drive-by download (webové exploity)",[123,3411,3412],{},"Výměnná média (BadUSB)",[123,3414,3415],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3417,3419],{"id":3418},"software-útoky","Software útoky",[120,3421,3422,3428,3433,3439,3444],{},[123,3423,3424,3427],{},[38,3425,3426],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3429,3430,3432],{},[38,3431,1889],{}," — poškození HW\u002FSW",[123,3434,3435,3438],{},[38,3436,3437],{},"Trojské koně"," — skrytá funkčnost",[123,3440,3441,3443],{},[38,3442,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3445,3446,3449],{},[38,3447,3448],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3451,3453],{"id":3452},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3455,3456,3468],{},[19,3457,3458],{},[22,3459,3460,3463,3465],{},[25,3461,3462],{},"Útok",[25,3464,3333],{},[25,3466,3467],{},"Efekt",[30,3469,3470,3481,3491,3502,3512],{},[22,3471,3472,3475,3478],{},[35,3473,3474],{},"Content Spoofing",[35,3476,3477],{},"Klient",[35,3479,3480],{},"Ztráta přihlašovacích údajů",[22,3482,3483,3486,3488],{},[35,3484,3485],{},"XSS",[35,3487,3477],{},[35,3489,3490],{},"Přístup k cookies",[22,3492,3493,3496,3499],{},[35,3494,3495],{},"SQL Injection",[35,3497,3498],{},"Server",[35,3500,3501],{},"Neoprávněný přístup do DB",[22,3503,3504,3507,3509],{},[35,3505,3506],{},"DoS\u002FDDoS",[35,3508,3498],{},[35,3510,3511],{},"Nedostupnost služby",[22,3513,3514,3517,3519],{},[35,3515,3516],{},"Path Traversal",[35,3518,3498],{},[35,3520,3521],{},"Přístup k souborům",[115,3523,3525],{"id":3524},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3527,3528],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3530,3531,3534,3537,3540,3543],{},[123,3532,3533],{},"Vydávání se za právníka",[123,3535,3536],{},"Podvod na CEO",[123,3538,3539],{},"Krádež dat (personální oddělení)",[123,3541,3542],{},"Kompromitace účtu",[123,3544,3545],{},"Falešné faktury",[115,3547,3549],{"id":3548},"obranné-technologie","Obranné technologie",[120,3551,3552,3558,3564,3570,3576,3582],{},[123,3553,3554,3557],{},[38,3555,3556],{},"NAC"," — řízení přístupu k síti",[123,3559,3560,3563],{},[38,3561,3562],{},"IDS"," — detekce průniku (pasivní)",[123,3565,3566,3569],{},[38,3567,3568],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3571,3572,3575],{},[38,3573,3574],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3577,3578,3581],{},[38,3579,3580],{},"DLP"," — prevence úniku dat",[123,3583,3584,3587],{},[38,3585,3586],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3589,2681],{"id":2680},[120,3591,3592,3598,3604,3610,3621],{},[123,3593,3594,3597],{},[207,3595,140],{"className":3596,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3599,3600,3603],{},[207,3601,569],{"className":3602,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3605,3606,3609],{},[207,3607,240],{"className":3608,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3611,3612,3615,3616,3620],{},[207,3613,384],{"className":3614,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3617,3619],{"className":3618,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3622,3623,3626],{},[207,3624,369],{"className":3625,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3628,2705,3629],{"id":2704},[207,3630,43],{"className":3631,"dataFsResolvedFilePath":2709,"href":2710},[210],[120,3633,3634,3639,3644,3649,3654],{},[123,3635,3636],{},[207,3637,1629],{"className":3638,"dataFsResolvedFilePath":406,"href":407},[210],[123,3640,3641],{},[207,3642,417],{"className":3643,"dataFsResolvedFilePath":415,"href":416},[210],[123,3645,3646],{},[207,3647,351],{"className":3648,"dataFsResolvedFilePath":349,"href":350},[210],[123,3650,3651],{},[207,3652,426],{"className":3653,"dataFsResolvedFilePath":424,"href":425},[210],[123,3655,3656],{},[207,3657,458],{"className":3658,"dataFsResolvedFilePath":3659,"href":3660},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3662},[3663,3664,3670,3671,3672,3673,3674],{"id":3276,"depth":642,"text":3277},{"id":3315,"depth":642,"text":3316,"children":3665},[3666,3667,3668,3669],{"id":3319,"depth":649,"text":3320},{"id":1787,"depth":649,"text":3364},{"id":1733,"depth":649,"text":1734},{"id":3418,"depth":649,"text":3419},{"id":3452,"depth":642,"text":3453},{"id":3524,"depth":642,"text":3525},{"id":3548,"depth":642,"text":3549},{"id":2680,"depth":642,"text":2681},{"id":2704,"depth":642,"text":2737},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[2251,3680,3245],"raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3683,2254,3684,2256,3685],"utoky","ransomware","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3688,"title":369,"body":3689,"course":659,"courses":3950,"created":660,"description":641,"extension":661,"meta":3951,"navigation":664,"path":3952,"seo":3953,"sources":3954,"stem":3958,"tags":3959,"type":2752,"updated":677,"__hash__":3966},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3690,"toc":3936},[3691,3694,3701,3704,3708,3768,3772,3776,3787,3791,3802,3806,3814,3818,3829,3833,3838,3842,3853,3857,3877,3879,3911,3916],[12,3692,369],{"id":3693},"ochrana-dat",[724,3695,3696],{},[2279,3697],{"alt":3698,"className":3699,"src":3700},"ochrana-dat-technologie",[210,2283],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3702,3703],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3705,3707],{"id":3706},"formy-zneužití-dat","Formy zneužití dat",[16,3709,3710,3719],{},[19,3711,3712],{},[22,3713,3714,3717],{},[25,3715,3716],{},"Forma",[25,3718,1919],{},[30,3720,3721,3728,3736,3744,3752,3760],{},[22,3722,3723,3726],{},[35,3724,3725],{},"Zašifrování",[35,3727,435],{},[22,3729,3730,3733],{},[35,3731,3732],{},"Zveřejnění",[35,3734,3735],{},"Double ransomware",[22,3737,3738,3741],{},[35,3739,3740],{},"Odposlech",[35,3742,3743],{},"Pasivní sběr dat",[22,3745,3746,3749],{},[35,3747,3748],{},"Krádež",[35,3750,3751],{},"Cílená exfiltrace",[22,3753,3754,3757],{},[35,3755,3756],{},"Krádež dodavatelského řetězce",[35,3758,3759],{},"Triple ransomware",[22,3761,3762,3765],{},[35,3763,3764],{},"Prodej",[35,3766,3767],{},"Darknet marketplace",[115,3769,3771],{"id":3770},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3773,3775],{"id":3774},"nac-network-access-control","NAC (Network Access Control)",[120,3777,3778,3781,3784],{},[123,3779,3780],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3782,3783],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3785,3786],{},"Ekvivalenty: MDM, BYOD",[198,3788,3790],{"id":3789},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3792,3793,3796,3799],{},[123,3794,3795],{},"Monitoruje síťový provoz, generuje alerty",[123,3797,3798],{},"Pasivní systém — nezasahuje do provozu",[123,3800,3801],{},"Signaturová a anomální detekce",[198,3803,3805],{"id":3804},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3807,3808,3811],{},[123,3809,3810],{},"Aktivní systém — blokuje škodlivý provoz",[123,3812,3813],{},"Zařazen přímo do síťové cesty (in-line)",[198,3815,3817],{"id":3816},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3819,3820,3823,3826],{},[123,3821,3822],{},"Centralizovaná správa bezpečnostních logů",[123,3824,3825],{},"Sběr s agentem i bez agenta",[123,3827,3828],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3830,3832],{"id":3831},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3834,3835],{},[123,3836,3837],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3839,3841],{"id":3840},"šifrování","Šifrování",[120,3843,3844,3847,3850],{},[123,3845,3846],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3848,3849],{},"RSA (2048+ bit), DSS",[123,3851,3852],{},"SHA-256, SHA-1",[115,3854,3856],{"id":3855},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3858,3859,3865,3871,3874],{},[123,3860,3861,3864],{},[38,3862,3863],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3866,3867,3870],{},[38,3868,3869],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3872,3873],{},"Transportní a tunelovací režim",[123,3875,3876],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3878,2681],{"id":2680},[120,3880,3881,3887,3893,3899,3905],{},[123,3882,3883,3886],{},[207,3884,140],{"className":3885,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3888,3889,3892],{},[207,3890,578],{"className":3891,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3894,3895,3898],{},[207,3896,569],{"className":3897,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3900,3901,3904],{},[207,3902,351],{"className":3903,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3906,3907,3910],{},[207,3908,360],{"className":3909,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3912,2705,3913],{"id":2704},[207,3914,43],{"className":3915,"dataFsResolvedFilePath":2709,"href":2710},[210],[120,3917,3918,3924,3930],{},[123,3919,3920],{},[207,3921,3923],{"className":3922,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3925,3926],{},[207,3927,3929],{"className":3928,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3931,3932],{},[207,3933,3935],{"className":3934,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3937},[3938,3939,3947,3948,3949],{"id":3706,"depth":642,"text":3707},{"id":3770,"depth":642,"text":3771,"children":3940},[3941,3942,3943,3944,3945,3946],{"id":3774,"depth":649,"text":3775},{"id":3789,"depth":649,"text":3790},{"id":3804,"depth":649,"text":3805},{"id":3816,"depth":649,"text":3817},{"id":3831,"depth":649,"text":3832},{"id":3840,"depth":649,"text":3841},{"id":3855,"depth":642,"text":3856},{"id":2680,"depth":642,"text":2681},{"id":2704,"depth":642,"text":2737},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3955,3956,3957],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3693,3960,3961,3962,3963,3964,3965],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3968,"title":569,"body":3969,"course":659,"courses":4304,"created":660,"description":641,"extension":661,"meta":4305,"navigation":664,"path":4306,"seo":4307,"sources":4308,"stem":4309,"tags":4310,"type":2752,"updated":677,"__hash__":4316},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3970,"toc":4293},[3971,3974,3981,3988,3992,4056,4060,4110,4114,4119,4138,4142,4145,4149,4163,4167,4195,4199,4248,4250,4275,4280],[12,3972,569],{"id":3973},"řízení-rizik",[724,3975,3976],{},[2279,3977],{"alt":3978,"className":3979,"src":3980},"rizeni-rizik-proces",[210,2283],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3982,3983,3984,3987],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3985,140],{"className":3986,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3989,3991],{"id":3990},"normativní-základ","Normativní základ",[16,3993,3994,4004],{},[19,3995,3996],{},[22,3997,3998,4001],{},[25,3999,4000],{},"Norma",[25,4002,4003],{},"Zaměření",[30,4005,4006,4016,4026,4036,4046],{},[22,4007,4008,4013],{},[35,4009,4010],{},[38,4011,4012],{},"ISO 31000:2019",[35,4014,4015],{},"Obecné smrnice pro management rizik",[22,4017,4018,4023],{},[35,4019,4020],{},[38,4021,4022],{},"ISO 31010:2020",[35,4024,4025],{},"Techniky posuzování rizik",[22,4027,4028,4033],{},[35,4029,4030],{},[38,4031,4032],{},"ISO\u002FIEC 27005:2019",[35,4034,4035],{},"Řízení rizik bezpečnosti informací",[22,4037,4038,4043],{},[35,4039,4040],{},[38,4041,4042],{},"NIST SP 800-30",[35,4044,4045],{},"Průvodce hodnocením rizik",[22,4047,4048,4053],{},[35,4049,4050],{},[38,4051,4052],{},"NIST SP 800-39",[35,4054,4055],{},"Proces řízení bezpečnostních rizik",[115,4057,4059],{"id":4058},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4061,4062,4068,4074,4080,4086,4092,4098,4104],{},[123,4063,4064,4067],{},[38,4065,4066],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4069,4070,4073],{},[38,4071,4072],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4075,4076,4079],{},[38,4077,4078],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4081,4082,4085],{},[38,4083,4084],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4087,4088,4091],{},[38,4089,4090],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4093,4094,4097],{},[38,4095,4096],{},"Akceptace rizik"," — formální rozhodnutí",[123,4099,4100,4103],{},[38,4101,4102],{},"Komunikace"," — sdílení informací o rizicích",[123,4105,4106,4109],{},[38,4107,4108],{},"Monitorování"," — průběžné přezkoumávání",[115,4111,4113],{"id":4112},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4115,4116],{},[38,4117,4118],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4120,4121,4127,4132],{},[123,4122,4123,4126],{},[38,4124,4125],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4128,4129,4131],{},[38,4130,3296],{}," — slabé místo aktiva (stupnice 1–5)",[123,4133,4134,4137],{},[38,4135,4136],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4139,4141],{"id":4140},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4143,4144],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4146,4148],{"id":4147},"klíčové-dokumenty","Klíčové dokumenty",[120,4150,4151,4157],{},[123,4152,4153,4156],{},[38,4154,4155],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4158,4159,4162],{},[38,4160,4161],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4164,4166],{"id":4165},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4168,4169,4175,4180,4185,4190],{},[123,4170,4171,4174],{},[38,4172,4173],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4176,4177,4179],{},[38,4178,3013],{}," — odpovědný za ISMS",[123,4181,4182,4184],{},[38,4183,3024],{}," — návrh a implementace opatření",[123,4186,4187,4189],{},[38,4188,3034],{}," — provádění auditů",[123,4191,4192,4194],{},[38,4193,3044],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4196,4198],{"id":4197},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4200,4201,4213],{},[19,4202,4203],{},[22,4204,4205,4208,4210],{},[25,4206,4207],{},"Úroveň",[25,4209,4003],{},[25,4211,4212],{},"Typ rizika",[30,4214,4215,4226,4237],{},[22,4216,4217,4220,4223],{},[35,4218,4219],{},"Stupeň 1",[35,4221,4222],{},"Organizace",[35,4224,4225],{},"Strategické riziko",[22,4227,4228,4231,4234],{},[35,4229,4230],{},"Stupeň 2",[35,4232,4233],{},"Poslání\u002Fobchodní procesy",[35,4235,4236],{},"Taktické riziko",[22,4238,4239,4242,4245],{},[35,4240,4241],{},"Stupeň 3",[35,4243,4244],{},"Informační systémy",[35,4246,4247],{},"Operační riziko",[115,4249,2681],{"id":2680},[120,4251,4252,4258,4264,4270],{},[123,4253,4254,4257],{},[207,4255,140],{"className":4256,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4259,4260,4263],{},[207,4261,384],{"className":4262,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4265,4266,4269],{},[207,4267,393],{"className":4268,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4271,4272,3892],{},[207,4273,578],{"className":4274,"dataFsResolvedFilePath":576,"href":577},[210],[115,4276,2705,4277],{"id":2704},[207,4278,43],{"className":4279,"dataFsResolvedFilePath":2709,"href":2710},[210],[120,4281,4282,4288],{},[123,4283,4284],{},[207,4285,4287],{"className":4286,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4289,4290],{},[207,4291,222],{"className":4292,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4294},[4295,4296,4297,4298,4299,4300,4301,4302,4303],{"id":3990,"depth":642,"text":3991},{"id":4058,"depth":642,"text":4059},{"id":4112,"depth":642,"text":4113},{"id":4140,"depth":642,"text":4141},{"id":4147,"depth":642,"text":4148},{"id":4165,"depth":642,"text":4166},{"id":4197,"depth":642,"text":4198},{"id":2680,"depth":642,"text":2681},{"id":2704,"depth":642,"text":2737},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3246,3245],"topics\u002Frizeni-rizik",[658,4311,4312,4313,4314,4315],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4318,"title":4319,"body":4320,"course":659,"courses":4551,"created":660,"description":641,"extension":661,"meta":4552,"navigation":664,"path":4553,"seo":4554,"sources":4555,"stem":4557,"tags":4558,"type":2752,"updated":677,"__hash__":4563},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4321,"toc":4543},[4322,4325,4332,4335,4339,4438,4442,4477,4481,4501,4505,4508,4510,4530,4535],[12,4323,4319],{"id":4324},"sae-budování-bezpečnostního-povědomí",[724,4326,4327],{},[2279,4328],{"alt":4329,"className":4330,"src":4331},"sae-pyramida",[210,2283],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4333,4334],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4336,4338],{"id":4337},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4340,4341,4358],{},[19,4342,4343],{},[22,4344,4345,4347,4350,4352,4355],{},[25,4346,4207],{},[25,4348,4349],{},"Příznak",[25,4351,3333],{},[25,4353,4354],{},"Metody",[25,4356,4357],{},"Časový rámec",[30,4359,4360,4380,4400,4420],{},[22,4361,4362,4368,4371,4374,4377],{},[35,4363,4364,4367],{},[38,4365,4366],{},"Awareness"," (povědomí)",[35,4369,4370],{},"„Co\"",[35,4372,4373],{},"Rozpoznávání",[35,4375,4376],{},"Média, videa, plakáty",[35,4378,4379],{},"Krátkodobý",[22,4381,4382,4388,4391,4394,4397],{},[35,4383,4384,4387],{},[38,4385,4386],{},"Training"," (výcvik)",[35,4389,4390],{},"„Jak\"",[35,4392,4393],{},"Dovednosti",[35,4395,4396],{},"Přednášky, případovky, cvičení",[35,4398,4399],{},"Střednědobý",[22,4401,4402,4408,4411,4414,4417],{},[35,4403,4404,4407],{},[38,4405,4406],{},"Education"," (vzdělávání)",[35,4409,4410],{},"„Proč\"",[35,4412,4413],{},"Porozumění",[35,4415,4416],{},"Semináře, diskuze, výzkum",[35,4418,4419],{},"Dlouhodobý",[22,4421,4422,4427,4429,4432,4435],{},[35,4423,4424],{},[38,4425,4426],{},"Professional Development",[35,4428,3016],{},[35,4430,4431],{},"Profesní rozvoj",[35,4433,4434],{},"Certifikace, konference",[35,4436,4437],{},"Průběžný",[115,4439,4441],{"id":4440},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4443,4444,4447,4450,4453,4456,4459,4462,4465,4468,4471,4474],{},[123,4445,4446],{},"Role a odpovědnosti v programu",[123,4448,4449],{},"Stanovení cílů pro každou fázi",[123,4451,4452],{},"Rozdělení uživatelů (analýza)",[123,4454,4455],{},"Vytvoření školících materiálů dle skupin",[123,4457,4458],{},"Určení cíle pro každou skupinu",[123,4460,4461],{},"Témata pro každou relaci\u002Fkurz",[123,4463,4464],{},"Metody nasazení (metodiky)",[123,4466,4467],{},"Dokumentace a zpětná vazba",[123,4469,4470],{},"Vyhodnocení a aktualizace materiálů",[123,4472,4473],{},"Četnost opakování",[123,4475,4476],{},"Kalkulace",[115,4478,4480],{"id":4479},"modely-řízení","Modely řízení",[120,4482,4483,4489,4495],{},[123,4484,4485,4488],{},[38,4486,4487],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4490,4491,4494],{},[38,4492,4493],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4496,4497,4500],{},[38,4498,4499],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4502,4504],{"id":4503},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4506,4507],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4509,2681],{"id":2680},[120,4511,4512,4518,4524],{},[123,4513,4514,4517],{},[207,4515,140],{"className":4516,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4519,4520,4523],{},[207,4521,578],{"className":4522,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4525,4526,4529],{},[207,4527,569],{"className":4528,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4531,2705,4532],{"id":2704},[207,4533,43],{"className":4534,"dataFsResolvedFilePath":2709,"href":2710},[210],[120,4536,4537],{},[123,4538,4539],{},[207,4540,4542],{"className":4541,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4544},[4545,4546,4547,4548,4549,4550],{"id":4337,"depth":642,"text":4338},{"id":4440,"depth":642,"text":4441},{"id":4479,"depth":642,"text":4480},{"id":4503,"depth":642,"text":4504},{"id":2680,"depth":642,"text":2681},{"id":2704,"depth":642,"text":2737},[658],{},"\u002Ftopics\u002Fsae",{"title":4319,"description":641},[4556],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4559,4560,4561,4314,4562],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4565,4567,4571,4575,4579,4583],{"slug":658,"path":2710,"title":7,"snippet":4566},"… mork-dr|Disaster Recovery]] — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS ### Kybernetické útoky - \u003C\u003Cimork-anatomie-utoku>> — APT, vektory, exploit\u002Fpayload - AI útoky — WormGPT, BEC, phishing - …",{"slug":4568,"path":530,"title":4569,"snippet":4570},"imork-audio-hack","Případovka: Audio Hack","… ektor - CVE databáze eviduje i fyzické zranitelnosti HW ## Propojení s dalšími tématy - \u003C\u003Cimork-anatomie-utoku>> — fyzická útočná plocha - Ochrana dat — fyzická ochrana médií - [[imork-m …",{"slug":4572,"path":3660,"title":4573,"snippet":4574},"imork-pripadovky","Případové studie — ImorK","… rová specifika - Propojení s řízením rizik, SAE a \u003C\u003Cimork-anatomie-utoku>> ## Zdroj v kurzu ImorK - Případové studie 2104–2207 (10 PDF prezentací)",{"slug":4576,"path":443,"title":4577,"snippet":4578},"imork-rizeny-hacking","Řízený hacking — Advanced Persistent Threat (APT)","… ISMS a řízením rizik v organizaci ## Vazby na další témata - \u003C\u003Cimork-anatomie-utoku>> — obecný kill chain model - Síťové útoky — technické vektory průni …",{"slug":4580,"path":425,"title":4581,"snippet":4582},"imork-sitove-utoky","Síťové útoky — komplexní přehled","… - Propojení s ISMS a řízením rizik ## Vazby na další témata - \u003C\u003Cimork-anatomie-utoku>> — obecný model útočného řetězce - Řízený hacking \u002F APT — APT sku …",{"slug":673,"path":577,"title":578,"snippet":4584},"… Ochrana dat — technologická ochrana ## Zdroje v kurzu ImorK - \u003C\u003Cimork-anatomie-utoku>> - AI útoky - Bezpečnost webu - [[imork-sitove-utoky|Síťo …",[4586,4588,4591,4594,4596],{"slug":673,"title":578,"path":577,"sharedTags":4587},4,{"slug":4589,"title":4590,"path":416,"sharedTags":642},"imork-ai-utoky","AI útoky a kybernetická kriminalita",{"slug":4592,"title":4593,"path":452,"sharedTags":642},"imork-internetova-bezpecnost","Internetová bezpečnost — cvičení",{"slug":4595,"title":522,"path":521,"sharedTags":642},"imork-mobilni-bezpecnost",{"slug":4576,"title":4577,"path":443,"sharedTags":642},1777154955410]