[{"data":1,"prerenderedAt":4559},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-bcm":1626,"course-stats-imork":2242,"course-topics-imork":2246,"backlinks-imork-bcm":4540,"related-imork-bcm":4556},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2241},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2225,"navigation":664,"path":2226,"seo":2227,"sources":2228,"stem":2230,"tags":2231,"type":2239,"updated":677,"__hash__":2240},"summaries\u002Fsummaries\u002Fimork-bcm.md","Business Continuity Management (BCM)",{"type":9,"value":1631,"toc":2194},[1632,1635,1639,1658,1662,1670,1674,1700,1704,1712,1716,1719,1807,1811,1814,1856,1860,1863,1867,1893,1897,1901,1915,1919,1934,1938,1958,1962,1966,1992,1996,2022,2026,2040,2044,2048,2086,2090,2097,2101,2105,2125,2129,2143,2147,2154,2173,2180,2184,2187,2191],[12,1633,1629],{"id":1634},"business-continuity-management-bcm",[115,1636,1638],{"id":1637},"definice","Definice",[120,1640,1641,1646,1652],{},[123,1642,1643,1645],{},[38,1644,384],{}," (Business Continuity Management) — řízení kontinuity činností organizace",[123,1647,1648,1651],{},[38,1649,1650],{},"BIA"," (Business Impact Analysis) — analýza dopadů na podnikání; identifikuje kritické procesy a stanoví priority obnovy",[123,1653,1654,1657],{},[38,1655,1656],{},"MBCO"," (Minimum Business Continuity Objective) — minimální úroveň služeb, kterou musí organizace udržet",[115,1659,1661],{"id":1660},"vztah-bcm-k-řízení-rizik","Vztah BCM k řízení rizik",[724,1663,1664,1665,1669],{},"BCM je součástí ",[207,1666,1668],{"className":1667,"dataFsResolvedFilePath":247,"href":248},[210],"podnikového řízení rizik",". Zatímco risk management se zaměřuje na prevenci, BCM řeší situace, kdy k incidentu dojde.",[115,1671,1673],{"id":1672},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[152,1675,1676,1682,1688,1694],{},[123,1677,1678,1681],{},[38,1679,1680],{},"Plan"," — stanovení politiky BCM, analýza BIA, strategie kontinuity",[123,1683,1684,1687],{},[38,1685,1686],{},"Do"," — implementace postupů, školení, dokumentace",[123,1689,1690,1693],{},[38,1691,1692],{},"Check"," — interní audity, přezkum vedením, testování plánů",[123,1695,1696,1699],{},[38,1697,1698],{},"Act"," — nápravná opatření, zlepšování",[115,1701,1703],{"id":1702},"isoiec-270312011","ISO\u002FIEC 27031:2011",[724,1705,1706,1707,1711],{},"Připravenost ICT pro kontinuitu podnikání — propojení mezi ",[207,1708,1710],{"className":1709,"dataFsResolvedFilePath":334,"href":335},[210],"kritickou infrastrukturou"," a BCMS.",[115,1713,1715],{"id":1714},"iso-223012019-požadavky-na-bcms","ISO 22301:2019 — Požadavky na BCMS",[724,1717,1718],{},"Kapitoly mapované na PDCA:",[16,1720,1721,1734],{},[19,1722,1723],{},[22,1724,1725,1728,1731],{},[25,1726,1727],{},"Kapitola",[25,1729,1730],{},"Obsah",[25,1732,1733],{},"PDCA fáze",[30,1735,1736,1746,1756,1766,1777,1787,1797],{},[22,1737,1738,1741,1744],{},[35,1739,1740],{},"4",[35,1742,1743],{},"Kontext organizace",[35,1745,1680],{},[22,1747,1748,1751,1754],{},[35,1749,1750],{},"5",[35,1752,1753],{},"Leadership",[35,1755,1680],{},[22,1757,1758,1761,1764],{},[35,1759,1760],{},"6",[35,1762,1763],{},"Plánování",[35,1765,1680],{},[22,1767,1768,1771,1774],{},[35,1769,1770],{},"7",[35,1772,1773],{},"Podpora",[35,1775,1776],{},"Plan\u002FDo",[22,1778,1779,1782,1785],{},[35,1780,1781],{},"8",[35,1783,1784],{},"Provoz (BIA, strategie, plány)",[35,1786,1686],{},[22,1788,1789,1792,1795],{},[35,1790,1791],{},"9",[35,1793,1794],{},"Hodnocení výkonnosti",[35,1796,1692],{},[22,1798,1799,1802,1805],{},[35,1800,1801],{},"10",[35,1803,1804],{},"Zlepšování",[35,1806,1698],{},[115,1808,1810],{"id":1809},"steeple-analýza","STEEPLE analýza",[724,1812,1813],{},"Analýza vnějšího prostředí pro BCM plánování:",[120,1815,1816,1822,1828,1834,1839,1845,1851],{},[123,1817,1818,1821],{},[38,1819,1820],{},"S"," — Social (sociální faktory)",[123,1823,1824,1827],{},[38,1825,1826],{},"T"," — Technological (technologické)",[123,1829,1830,1833],{},[38,1831,1832],{},"E"," — Economic (ekonomické)",[123,1835,1836,1838],{},[38,1837,1832],{}," — Ethical (etické)",[123,1840,1841,1844],{},[38,1842,1843],{},"P"," — Political (politické)",[123,1846,1847,1850],{},[38,1848,1849],{},"L"," — Legislative (legislativní)",[123,1852,1853,1855],{},[38,1854,1832],{}," — Environmental (environmentální)",[115,1857,1859],{"id":1858},"rozsah-bcm-plánování","Rozsah BCM plánování",[724,1861,1862],{},"Určení hranic BCMS — které procesy, lokality, produkty a služby jsou zahrnuty.",[115,1864,1866],{"id":1865},"přínosy-bcm","Přínosy BCM",[120,1868,1869,1875,1881,1887],{},[123,1870,1871,1874],{},[38,1872,1873],{},"Regulatorní soulad"," — splnění požadavků legislativy a norem",[123,1876,1877,1880],{},[38,1878,1879],{},"Konkurenční výhoda"," — důvěra zákazníků a partnerů",[123,1882,1883,1886],{},[38,1884,1885],{},"Finanční přínosy"," — snížení ztrát z výpadků",[123,1888,1889,1892],{},[38,1890,1891],{},"Reputace"," — ochrana dobrého jména organizace",[115,1894,1896],{"id":1895},"bia-podrobně","BIA podrobně",[198,1898,1900],{"id":1899},"dva-způsoby-provedení-bia","Dva způsoby provedení BIA",[152,1902,1903,1909],{},[123,1904,1905,1908],{},[38,1906,1907],{},"Bottom-up"," — od provozních manažerů směrem nahoru; detailní znalost procesů, ale časově náročné",[123,1910,1911,1914],{},[38,1912,1913],{},"Top-down"," — od vyššího managementu; rychlejší, ale může opomenout provozní detaily",[198,1916,1918],{"id":1917},"principy-bia","Principy BIA",[120,1920,1921,1928],{},[123,1922,1923,1924,1927],{},"Orientace na ",[38,1925,1926],{},"dopad",", ne na příčinu — nezkoumá, co se stane, ale jaké budou následky",[123,1929,1930,1933],{},[38,1931,1932],{},"Kalendář klíčových ročních událostí"," — identifikace období se zvýšenou kritičností (uzávěrky, sezónní špičky)",[115,1935,1937],{"id":1936},"mapování-procesů","Mapování procesů",[120,1939,1940,1946,1952],{},[123,1941,1942,1945],{},[38,1943,1944],{},"Víceúrovňové mapování"," — od strategických procesů po operativní detaily",[123,1947,1948,1951],{},[38,1949,1950],{},"Identifikace zdrojů"," — lidé, technologie, prostory, dodavatelé potřební pro každý proces",[123,1953,1954,1957],{},[38,1955,1956],{},"SPoF"," (Single Point of Failure) — identifikace jediných bodů selhání, jejichž výpadek zastaví celý proces",[115,1959,1961],{"id":1960},"strategie-kontinuity","Strategie kontinuity",[198,1963,1965],{"id":1964},"_4-kroky-strategie","4 kroky strategie",[152,1967,1968,1974,1980,1986],{},[123,1969,1970,1973],{},[38,1971,1972],{},"Reakce na incident"," — okamžitá odezva, aktivace krizového řízení",[123,1975,1976,1979],{},[38,1977,1978],{},"Obnova kritických činností"," — prioritní obnovení klíčových procesů dle BIA",[123,1981,1982,1985],{},[38,1983,1984],{},"Vztahy se stakeholdery"," — komunikace se zainteresovanými stranami",[123,1987,1988,1991],{},[38,1989,1990],{},"Nekritické činnosti"," — postupná obnova ostatních procesů",[198,1993,1995],{"id":1994},"_4-scénáře-narušení","4 scénáře narušení",[152,1997,1998,2004,2010,2016],{},[123,1999,2000,2003],{},[38,2001,2002],{},"Zamezení přístupu"," — nedostupnost budov\u002Fprostor (požár, povodeň)",[123,2005,2006,2009],{},[38,2007,2008],{},"Nedostatek pracovníků"," — pandemie, hromadná absence",[123,2011,2012,2015],{},[38,2013,2014],{},"Selhání technologie"," — výpadek ICT, kybernetický útok",[123,2017,2018,2021],{},[38,2019,2020],{},"Selhání dodavatele"," — přerušení dodavatelského řetězce",[198,2023,2025],{"id":2024},"další-aspekty","Další aspekty",[120,2027,2028,2034],{},[123,2029,2030,2033],{},[38,2031,2032],{},"Riziko nahromadění práce"," — kumulace nedokončených úkolů během výpadku, které mohou přetížit organizaci po obnově",[123,2035,2036,2039],{},[38,2037,2038],{},"Komunikační strategie"," — interní (zaměstnanci, vedení) i externí (zákazníci, úřady, média); řízení komunikace s médii",[115,2041,2043],{"id":2042},"implementace-plánů","Implementace plánů",[198,2045,2047],{"id":2046},"obsah-plánu-kontinuity","Obsah plánu kontinuity",[120,2049,2050,2056,2062,2068,2074,2080],{},[123,2051,2052,2055],{},[38,2053,2054],{},"Účel a rozsah"," — co plán pokrývá",[123,2057,2058,2061],{},[38,2059,2060],{},"Role a odpovědnosti"," — kdo za co odpovídá",[123,2063,2064,2067],{},[38,2065,2066],{},"Aktivační kritéria"," — kdy se plán spouští",[123,2069,2070,2073],{},[38,2071,2072],{},"DRP"," (Disaster Recovery Plan) — obnova IT infrastruktury",[123,2075,2076,2079],{},[38,2077,2078],{},"Kontaktní seznamy"," — krizové kontakty",[123,2081,2082,2085],{},[38,2083,2084],{},"Priority obnovy"," — pořadí obnovovaných procesů dle BIA",[198,2087,2089],{"id":2088},"dlouhodobá-obnova","Dlouhodobá obnova",[724,2091,2092,2093,2096],{},"Dlouhodobá obnova je řízena jako ",[38,2094,2095],{},"samostatný projekt"," — návrat do normálního provozu, obnova plné kapacity, vyhodnocení.",[115,2098,2100],{"id":2099},"testování-bcm","Testování BCM",[198,2102,2104],{"id":2103},"formy-testování","Formy testování",[152,2106,2107,2113,2119],{},[123,2108,2109,2112],{},[38,2110,2111],{},"Přezkoumání u stolu"," (Tabletop review) — teoretické procházení scénářů",[123,2114,2115,2118],{},[38,2116,2117],{},"Procházení plánu"," (Walkthrough) — krokové ověření postupů s účastníky",[123,2120,2121,2124],{},[38,2122,2123],{},"Úplné testování"," (Full exercise) — simulace reálného incidentu",[198,2126,2128],{"id":2127},"zásady-testování","Zásady testování",[120,2130,2131,2137],{},[123,2132,2133,2136],{},[38,2134,2135],{},"Neočekávané testy"," — testování bez předchozího varování pro ověření reálné připravenosti",[123,2138,2139,2142],{},[38,2140,2141],{},"Direktivní řízení pod tlakem"," — v krizové situaci přechod na centralizované rozhodování",[115,2144,2146],{"id":2145},"vkb-vyhláška-o-kybernetické-bezpečnosti","VKB (Vyhláška o kybernetické bezpečnosti)",[724,2148,2149,2150,2153],{},"Požadavky dle ",[38,2151,2152],{},"§15 vyhlášky č. 82\u002F2018 Sb.",":",[120,2155,2156,2161,2167],{},[123,2157,2158,2160],{},[38,2159,1656],{}," — minimální úroveň služeb pro kontinuitu",[123,2162,2163,2166],{},[38,2164,2165],{},"Doba obnovení"," (RTO) — maximální přípustná doba výpadku",[123,2168,2169,2172],{},[38,2170,2171],{},"Bod obnovení dat"," (RPO) — maximální přípustná ztráta dat",[724,2174,2175,2176,2179],{},"Příloha č. 5, bod ",[38,2177,2178],{},"1.23 Politika řízení kontinuity"," — požadavky na dokumentaci a řízení BCM.",[115,2181,2183],{"id":2182},"bcmaas-bcm-as-a-service","BCMaaS (BCM as a Service)",[724,2185,2186],{},"Cloudový model poskytování BCM — outsourcing plánování a řízení kontinuity jako služby, vhodný zejména pro menší organizace bez vlastních kapacit.",[115,2188,2190],{"id":2189},"integrace-bcm-do-kultury-organizace","Integrace BCM do kultury organizace",[724,2192,2193],{},"BCM nesmí být izolovaný projekt — musí být součástí firemní kultury, pravidelně testován a aktualizován.",{"title":641,"searchDepth":642,"depth":642,"links":2195},[2196,2197,2198,2199,2200,2201,2202,2203,2204,2208,2209,2214,2218,2222,2223,2224],{"id":1637,"depth":642,"text":1638},{"id":1660,"depth":642,"text":1661},{"id":1672,"depth":642,"text":1673},{"id":1702,"depth":642,"text":1703},{"id":1714,"depth":642,"text":1715},{"id":1809,"depth":642,"text":1810},{"id":1858,"depth":642,"text":1859},{"id":1865,"depth":642,"text":1866},{"id":1895,"depth":642,"text":1896,"children":2205},[2206,2207],{"id":1899,"depth":649,"text":1900},{"id":1917,"depth":649,"text":1918},{"id":1936,"depth":642,"text":1937},{"id":1960,"depth":642,"text":1961,"children":2210},[2211,2212,2213],{"id":1964,"depth":649,"text":1965},{"id":1994,"depth":649,"text":1995},{"id":2024,"depth":649,"text":2025},{"id":2042,"depth":642,"text":2043,"children":2215},[2216,2217],{"id":2046,"depth":649,"text":2047},{"id":2088,"depth":649,"text":2089},{"id":2099,"depth":642,"text":2100,"children":2219},[2220,2221],{"id":2103,"depth":649,"text":2104},{"id":2127,"depth":649,"text":2128},{"id":2145,"depth":642,"text":2146},{"id":2182,"depth":642,"text":2183},{"id":2189,"depth":642,"text":2190},{},"\u002Fsummaries\u002Fimork-bcm",{"title":1629,"description":641},[2229],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","summaries\u002Fimork-bcm",[658,2232,2233,2234,2235,2236,2237,2238],"bcm","kontinuita-cinnosti","iso-22301","bia","drp","bcmaas","vyhlaska-82-2018","summary","J_vmr-AYHd_z5z6kZzejOKie3Z9rHKr5LTfURqhjruI","summaries",{"zapisku":1624,"topics":2243,"summaries":2244,"outputs":2245},6,35,0,[2247,2714,3213,3663,3943,4293],{"id":2248,"title":2249,"body":2250,"course":659,"courses":2703,"created":660,"description":641,"extension":661,"meta":2704,"navigation":664,"path":2705,"seo":2706,"sources":2707,"stem":2709,"tags":2710,"type":2712,"updated":677,"__hash__":2713},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2251,"toc":2690},[2252,2255,2264,2267,2271,2363,2365,2414,2418,2441,2445,2529,2533,2536,2540,2613,2617,2643,2647,2667,2676],[12,2253,2249],{"id":2254},"bcm-řízení-kontinuity-činnosti",[724,2256,2257],{},[2258,2259],"img",{"alt":2260,"className":2261,"src":2263},"bcm-rpo-rto",[210,2262],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2265,2266],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2268,2270],{"id":2269},"klíčové-pojmy","Klíčové pojmy",[16,2272,2273,2286],{},[19,2274,2275],{},[22,2276,2277,2280,2283],{},[25,2278,2279],{},"Pojem",[25,2281,2282],{},"Anglicky",[25,2284,2285],{},"Popis",[30,2287,2288,2301,2313,2325,2337,2350],{},[22,2289,2290,2295,2298],{},[35,2291,2292],{},[38,2293,2294],{},"BCMS",[35,2296,2297],{},"Business Continuity Management System",[35,2299,2300],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2302,2303,2307,2310],{},[35,2304,2305],{},[38,2306,384],{},[35,2308,2309],{},"Business Continuity Management",[35,2311,2312],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2314,2315,2319,2322],{},[35,2316,2317],{},[38,2318,1650],{},[35,2320,2321],{},"Business Impact Analysis",[35,2323,2324],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2326,2327,2331,2334],{},[35,2328,2329],{},[38,2330,1656],{},[35,2332,2333],{},"Minimum Business Continuity Objective",[35,2335,2336],{},"Minimální přijatelná úroveň služeb",[22,2338,2339,2344,2347],{},[35,2340,2341],{},[38,2342,2343],{},"RPO",[35,2345,2346],{},"Recovery Point Objective",[35,2348,2349],{},"Do jakého bodu v minulosti lze obnovit data",[22,2351,2352,2357,2360],{},[35,2353,2354],{},[38,2355,2356],{},"RTO",[35,2358,2359],{},"Recovery Time Objective",[35,2361,2362],{},"Čas potřebný pro obnovu provozu",[115,2364,1673],{"id":1672},[16,2366,2367,2376],{},[19,2368,2369],{},[22,2370,2371,2374],{},[25,2372,2373],{},"Fáze",[25,2375,1730],{},[30,2377,2378,2387,2396,2405],{},[22,2379,2380,2384],{},[35,2381,2382],{},[38,2383,1680],{},[35,2385,2386],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2388,2389,2393],{},[35,2390,2391],{},[38,2392,1686],{},[35,2394,2395],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2397,2398,2402],{},[35,2399,2400],{},[38,2401,1692],{},[35,2403,2404],{},"Monitoring, audit, přezkoumání managementem",[22,2406,2407,2411],{},[35,2408,2409],{},[38,2410,1698],{},[35,2412,2413],{},"Nápravná opatření, neustálé zlepšování",[115,2415,2417],{"id":2416},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2419,2420,2423,2426,2429,2432,2435,2438],{},[123,2421,2422],{},"Kap. 4 — kontext organizace",[123,2424,2425],{},"Kap. 5 — vedení (leadership)",[123,2427,2428],{},"Kap. 6 — plánování (BIA, rizika)",[123,2430,2431],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2433,2434],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2436,2437],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2439,2440],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2442,2444],{"id":2443},"analýza-steeple","Analýza STEEPLE",[16,2446,2447,2457],{},[19,2448,2449],{},[22,2450,2451,2454],{},[25,2452,2453],{},"Faktor",[25,2455,2456],{},"Oblast",[30,2458,2459,2469,2479,2489,2499,2509,2519],{},[22,2460,2461,2466],{},[35,2462,2463,2465],{},[38,2464,1820],{},"ociální",[35,2467,2468],{},"Zaměstnanost, bezpečnost, komunity",[22,2470,2471,2476],{},[35,2472,2473,2475],{},[38,2474,1826],{},"echnologický",[35,2477,2478],{},"Závislost na technologiích",[22,2480,2481,2486],{},[35,2482,2483,2485],{},[38,2484,1832],{},"konomický",[35,2487,2488],{},"Ekonomická situace, finanční instituce",[22,2490,2491,2496],{},[35,2492,2493,2495],{},[38,2494,1832],{},"tický",[35,2497,2498],{},"Podnikatelská etika, média, veřejnost",[22,2500,2501,2506],{},[35,2502,2503,2505],{},[38,2504,1843],{},"olitický",[35,2507,2508],{},"Politický systém, hrozba nepokojů",[22,2510,2511,2516],{},[35,2512,2513,2515],{},[38,2514,1849],{},"egislativní",[35,2517,2518],{},"Předpisy, zákony",[22,2520,2521,2526],{},[35,2522,2523,2525],{},[38,2524,1832],{},"nvironmentální",[35,2527,2528],{},"Životní prostředí, přírodní hrozby",[115,2530,2532],{"id":2531},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2534,2535],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2537,2539],{"id":2538},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2541,2542,2551],{},[19,2543,2544],{},[22,2545,2546,2549],{},[25,2547,2548],{},"Tier",[25,2550,2285],{},[30,2552,2553,2561,2569,2577,2585,2592,2599,2606],{},[22,2554,2555,2558],{},[35,2556,2557],{},"0",[35,2559,2560],{},"Žádná off-site data",[22,2562,2563,2566],{},[35,2564,2565],{},"1",[35,2567,2568],{},"Fyzická záloha + cold site",[22,2570,2571,2574],{},[35,2572,2573],{},"2",[35,2575,2576],{},"Fyzická záloha + hot site",[22,2578,2579,2582],{},[35,2580,2581],{},"3",[35,2583,2584],{},"Elektronický trezor (electronic vaulting)",[22,2586,2587,2589],{},[35,2588,1740],{},[35,2590,2591],{},"Point-in-time recovery",[22,2593,2594,2596],{},[35,2595,1750],{},[35,2597,2598],{},"Two-site commit (kontinuální přenos)",[22,2600,2601,2603],{},[35,2602,1760],{},[35,2604,2605],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2607,2608,2610],{},[35,2609,1770],{},[35,2611,2612],{},"Automatizovaná obnova (AI monitoring)",[198,2614,2616],{"id":2615},"cloud-dr","Cloud DR",[120,2618,2619,2625,2631,2637],{},[123,2620,2621,2624],{},[38,2622,2623],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2626,2627,2630],{},[38,2628,2629],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2632,2633,2636],{},[38,2634,2635],{},"Hot DR"," — paralelní řešení v tandemu",[123,2638,2639,2642],{},[38,2640,2641],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2644,2646],{"id":2645},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2648,2649,2655,2661],{},[123,2650,2651,2654],{},[207,2652,140],{"className":2653,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2656,2657,2660],{},[207,2658,569],{"className":2659,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2662,2663,2666],{},[207,2664,578],{"className":2665,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2668,2670,2671],{"id":2669},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2672,43],{"className":2673,"dataFsResolvedFilePath":2674,"href":2675},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2677,2678,2684],{},[123,2679,2680],{},[207,2681,2683],{"className":2682,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2685,2686],{},[207,2687,2689],{"className":2688,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2691},[2692,2693,2694,2695,2696,2700,2701],{"id":2269,"depth":642,"text":2270},{"id":1672,"depth":642,"text":1673},{"id":2416,"depth":642,"text":2417},{"id":2443,"depth":642,"text":2444},{"id":2531,"depth":642,"text":2532,"children":2697},[2698,2699],{"id":2538,"depth":649,"text":2539},{"id":2615,"depth":649,"text":2616},{"id":2645,"depth":642,"text":2646},{"id":2669,"depth":642,"text":2702},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2249,"description":641},[2229,2708],"raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2232,2233,2234,2235,2711],"disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2715,"title":2716,"body":2717,"course":659,"courses":3200,"created":660,"description":641,"extension":661,"meta":3201,"navigation":664,"path":3202,"seo":3203,"sources":3204,"stem":3207,"tags":3208,"type":2712,"updated":677,"__hash__":3212},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2718,"toc":3185},[2719,2722,2729,2736,2739,2743,2810,2814,2818,2877,2881,2901,2905,2909,3010,3014,3037,3041,3063,3067,3074,3130,3132,3163,3168],[12,2720,2716],{"id":2721},"isms-systém-řízení-bezpečnosti-informací",[724,2723,2724],{},[2258,2725],{"alt":2726,"className":2727,"src":2728},"isms-pdca-cyklus",[210,2262],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2730,2731],{},[2258,2732],{"alt":2733,"className":2734,"src":2735},"isms-oborova-mapa",[210,2262],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2737,2738],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2740,2742],{"id":2741},"základní-pilíře","Základní pilíře",[16,2744,2745,2756],{},[19,2746,2747],{},[22,2748,2749,2752,2754],{},[25,2750,2751],{},"Pilíř",[25,2753,2282],{},[25,2755,2285],{},[30,2757,2758,2771,2784,2797],{},[22,2759,2760,2765,2768],{},[35,2761,2762],{},[38,2763,2764],{},"Důvěrnost",[35,2766,2767],{},"Confidentiality",[35,2769,2770],{},"Přístup pouze oprávněným osobám",[22,2772,2773,2778,2781],{},[35,2774,2775],{},[38,2776,2777],{},"Integrita",[35,2779,2780],{},"Integrity",[35,2782,2783],{},"Ochrana před neoprávněnou změnou",[22,2785,2786,2791,2794],{},[35,2787,2788],{},[38,2789,2790],{},"Dostupnost",[35,2792,2793],{},"Availability",[35,2795,2796],{},"Systémy a data dostupné v potřebný čas",[22,2798,2799,2804,2807],{},[35,2800,2801],{},[38,2802,2803],{},"Nepopiratelnost",[35,2805,2806],{},"Non-repudiation",[35,2808,2809],{},"Prokázání autorství akce",[115,2811,2813],{"id":2812},"normativní-rámec","Normativní rámec",[198,2815,2817],{"id":2816},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2819,2820,2826,2832,2843,2849,2859,2868],{},[123,2821,2822,2825],{},[38,2823,2824],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2827,2828,2831],{},[38,2829,2830],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2833,2834,2837,2838,2842],{},[38,2835,2836],{},"ISO\u002FIEC 27005"," — ",[207,2839,2841],{"className":2840,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2844,2845,2848],{},[38,2846,2847],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2850,2851,2854,2855],{},[38,2852,2853],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2856,2858],{"className":2857,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2860,2861,2854,2864],{},[38,2862,2863],{},"ISO\u002FIEC 27019",[207,2865,2867],{"className":2866,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2869,2870,2854,2873],{},[38,2871,2872],{},"ISO\u002FIEC 27799",[207,2874,2876],{"className":2875,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2878,2880],{"id":2879},"další-rámce","Další rámce",[120,2882,2883,2889,2895],{},[123,2884,2885,2888],{},[38,2886,2887],{},"NIST"," — americké standardy (SP 800 řada)",[123,2890,2891,2894],{},[38,2892,2893],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2896,2897,2900],{},[38,2898,2899],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2902,2904],{"id":2903},"governance-řízení","Governance (řízení)",[198,2906,2908],{"id":2907},"bezpečnostní-role","Bezpečnostní role",[16,2910,2911,2923],{},[19,2912,2913],{},[22,2914,2915,2918,2920],{},[25,2916,2917],{},"Role",[25,2919,40],{},[25,2921,2922],{},"Odpovědnost",[30,2924,2925,2936,2947,2958,2969,2980,2990,3000],{},[22,2926,2927,2930,2933],{},[35,2928,2929],{},"Chief Information Officer",[35,2931,2932],{},"CIO",[35,2934,2935],{},"Celkové řízení ICT",[22,2937,2938,2941,2944],{},[35,2939,2940],{},"Chief Information Security Officer",[35,2942,2943],{},"CISO",[35,2945,2946],{},"Řízení informační bezpečnosti",[22,2948,2949,2952,2955],{},[35,2950,2951],{},"Chief Technology Officer",[35,2953,2954],{},"CTO",[35,2956,2957],{},"Technologická strategie",[22,2959,2960,2963,2966],{},[35,2961,2962],{},"IS Security Officer",[35,2964,2965],{},"ISSO",[35,2967,2968],{},"Bezpečnost IS",[22,2970,2971,2974,2977],{},[35,2972,2973],{},"Manažer KB",[35,2975,2976],{},"—",[35,2978,2979],{},"Odpovědný za ISMS",[22,2981,2982,2985,2987],{},[35,2983,2984],{},"Architekt KB",[35,2986,2976],{},[35,2988,2989],{},"Návrh a implementace opatření",[22,2991,2992,2995,2997],{},[35,2993,2994],{},"Auditor KB",[35,2996,2976],{},[35,2998,2999],{},"Provádění auditů",[22,3001,3002,3005,3007],{},[35,3003,3004],{},"Garant aktiva",[35,3006,2976],{},[35,3008,3009],{},"Rozvoj, použití a bezpečnost aktiva",[198,3011,3013],{"id":3012},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,3015,3016,3022,3031],{},[123,3017,3018,3021],{},[38,3019,3020],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,3023,3024,3027,3028],{},[38,3025,3026],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3029,240],{"className":3030,"dataFsResolvedFilePath":585,"href":586},[210],[123,3032,3033,3036],{},[38,3034,3035],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3038,3040],{"id":3039},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3042,3043,3048,3053,3058],{},[123,3044,3045,3047],{},[38,3046,1680],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3049,3050,3052],{},[38,3051,1686],{}," — implementace opatření, řízení rizik",[123,3054,3055,3057],{},[38,3056,1692],{}," — monitorování, audit, přezkoumání",[123,3059,3060,3062],{},[38,3061,1698],{}," — nápravná opatření, neustálé zlepšování",[115,3064,3066],{"id":3065},"oborová-řešení-isms","Oborová řešení ISMS",[724,3068,3069,3070,3073],{},"Kurz ",[207,3071,43],{"className":3072,"dataFsResolvedFilePath":2674,"href":2675},[210]," pokrývá ISMS specifika pro:",[120,3075,3076,3082,3088,3095,3101,3108,3114,3120,3125],{},[123,3077,3078],{},[207,3079,3081],{"className":3080,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3083,3084,3087],{},[207,3085,282],{"className":3086,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3089,3090,3094],{},[207,3091,3093],{"className":3092,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3096,3097,3100],{},[207,3098,300],{"className":3099,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3102,3103,3107],{},[207,3104,3106],{"className":3105,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3109,3110,3113],{},[207,3111,318],{"className":3112,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3115,3116,3119],{},[207,3117,327],{"className":3118,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3121,3122],{},[207,3123,336],{"className":3124,"dataFsResolvedFilePath":334,"href":335},[210],[123,3126,3127],{},[207,3128,273],{"className":3129,"dataFsResolvedFilePath":271,"href":272},[210],[115,3131,2646],{"id":2645},[120,3133,3134,3140,3145,3151,3157],{},[123,3135,3136,3139],{},[207,3137,569],{"className":3138,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3141,3142,587],{},[207,3143,240],{"className":3144,"dataFsResolvedFilePath":585,"href":586},[210],[123,3146,3147,3150],{},[207,3148,384],{"className":3149,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3152,3153,3156],{},[207,3154,578],{"className":3155,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3158,3159,3162],{},[207,3160,369],{"className":3161,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3164,2670,3165],{"id":2669},[207,3166,43],{"className":3167,"dataFsResolvedFilePath":2674,"href":2675},[210],[120,3169,3170,3175,3180],{},[123,3171,3172],{},[207,3173,222],{"className":3174,"dataFsResolvedFilePath":220,"href":221},[210],[123,3176,3177],{},[207,3178,249],{"className":3179,"dataFsResolvedFilePath":247,"href":248},[210],[123,3181,3182],{},[207,3183,231],{"className":3184,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3186},[3187,3188,3192,3196,3197,3198,3199],{"id":2741,"depth":642,"text":2742},{"id":2812,"depth":642,"text":2813,"children":3189},[3190,3191],{"id":2816,"depth":649,"text":2817},{"id":2879,"depth":649,"text":2880},{"id":2903,"depth":642,"text":2904,"children":3193},[3194,3195],{"id":2907,"depth":649,"text":2908},{"id":3012,"depth":649,"text":3013},{"id":3039,"depth":642,"text":3040},{"id":3065,"depth":642,"text":3066},{"id":2645,"depth":642,"text":2646},{"id":2669,"depth":642,"text":2702},[658],{},"\u002Ftopics\u002Fisms",{"title":2716,"description":641},[3205,3206,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3209,3210,672,3211],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3214,"title":578,"body":3215,"course":659,"courses":3648,"created":660,"description":641,"extension":661,"meta":3649,"navigation":664,"path":3650,"seo":3651,"sources":3652,"stem":3655,"tags":3656,"type":2712,"updated":677,"__hash__":3662},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3216,"toc":3634},[3217,3220,3227,3234,3238,3276,3280,3284,3326,3330,3337,3340,3366,3370,3387,3391,3422,3426,3494,3498,3501,3518,3522,3560,3562,3599,3604],[12,3218,578],{"id":3219},"kybernetická-bezpečnost",[724,3221,3222],{},[2258,3223],{"alt":3224,"className":3225,"src":3226},"kb-defense-in-depth",[210,2262],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3228,3229,3230,3233],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3231,140],{"className":3232,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3235,3237],{"id":3236},"základní-pojmy","Základní pojmy",[120,3239,3240,3246,3252,3258,3264,3270],{},[123,3241,3242,3245],{},[38,3243,3244],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3247,3248,3251],{},[38,3249,3250],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3253,3254,3257],{},[38,3255,3256],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3259,3260,3263],{},[38,3261,3262],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3265,3266,3269],{},[38,3267,3268],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3271,3272,3275],{},[38,3273,3274],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3277,3279],{"id":3278},"typy-útoků","Typy útoků",[198,3281,3283],{"id":3282},"podle-cílení","Podle cílení",[16,3285,3286,3298],{},[19,3287,3288],{},[22,3289,3290,3293,3295],{},[25,3291,3292],{},"Typ",[25,3294,2285],{},[25,3296,3297],{},"Cíl",[30,3299,3300,3313],{},[22,3301,3302,3307,3310],{},[35,3303,3304],{},[38,3305,3306],{},"Plošný",[35,3308,3309],{},"Útočníkovi je jedno, kdo je obětí",[35,3311,3312],{},"Botnety, spam, ransomware",[22,3314,3315,3320,3323],{},[35,3316,3317],{},[38,3318,3319],{},"Cílený (APT)",[35,3321,3322],{},"Soustředěná pozornost na konkrétní cíl",[35,3324,3325],{},"Špionáž, sabotáž, krádež dat",[198,3327,3329],{"id":3328},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3331,3332],{},[2258,3333],{"alt":3334,"className":3335,"src":3336},"apt-faze-utoku",[210,2262],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3338,3339],{},"4 fáze:",[152,3341,3342,3348,3354,3360],{},[123,3343,3344,3347],{},[38,3345,3346],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3349,3350,3353],{},[38,3351,3352],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3355,3356,3359],{},[38,3357,3358],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3361,3362,3365],{},[38,3363,3364],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3367,3369],{"id":3368},"základní-vektory-útoku","Základní vektory útoku",[120,3371,3372,3375,3378,3381,3384],{},[123,3373,3374],{},"Email s přílohou (spear phishing)",[123,3376,3377],{},"Trojanizované aplikace",[123,3379,3380],{},"Drive-by download (webové exploity)",[123,3382,3383],{},"Výměnná média (BadUSB)",[123,3385,3386],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3388,3390],{"id":3389},"software-útoky","Software útoky",[120,3392,3393,3399,3405,3411,3416],{},[123,3394,3395,3398],{},[38,3396,3397],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3400,3401,3404],{},[38,3402,3403],{},"Viry"," — poškození HW\u002FSW",[123,3406,3407,3410],{},[38,3408,3409],{},"Trojské koně"," — skrytá funkčnost",[123,3412,3413,3415],{},[38,3414,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3417,3418,3421],{},[38,3419,3420],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3423,3425],{"id":3424},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3427,3428,3440],{},[19,3429,3430],{},[22,3431,3432,3435,3437],{},[25,3433,3434],{},"Útok",[25,3436,3297],{},[25,3438,3439],{},"Efekt",[30,3441,3442,3453,3463,3474,3484],{},[22,3443,3444,3447,3450],{},[35,3445,3446],{},"Content Spoofing",[35,3448,3449],{},"Klient",[35,3451,3452],{},"Ztráta přihlašovacích údajů",[22,3454,3455,3458,3460],{},[35,3456,3457],{},"XSS",[35,3459,3449],{},[35,3461,3462],{},"Přístup k cookies",[22,3464,3465,3468,3471],{},[35,3466,3467],{},"SQL Injection",[35,3469,3470],{},"Server",[35,3472,3473],{},"Neoprávněný přístup do DB",[22,3475,3476,3479,3481],{},[35,3477,3478],{},"DoS\u002FDDoS",[35,3480,3470],{},[35,3482,3483],{},"Nedostupnost služby",[22,3485,3486,3489,3491],{},[35,3487,3488],{},"Path Traversal",[35,3490,3470],{},[35,3492,3493],{},"Přístup k souborům",[115,3495,3497],{"id":3496},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3499,3500],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3502,3503,3506,3509,3512,3515],{},[123,3504,3505],{},"Vydávání se za právníka",[123,3507,3508],{},"Podvod na CEO",[123,3510,3511],{},"Krádež dat (personální oddělení)",[123,3513,3514],{},"Kompromitace účtu",[123,3516,3517],{},"Falešné faktury",[115,3519,3521],{"id":3520},"obranné-technologie","Obranné technologie",[120,3523,3524,3530,3536,3542,3548,3554],{},[123,3525,3526,3529],{},[38,3527,3528],{},"NAC"," — řízení přístupu k síti",[123,3531,3532,3535],{},[38,3533,3534],{},"IDS"," — detekce průniku (pasivní)",[123,3537,3538,3541],{},[38,3539,3540],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3543,3544,3547],{},[38,3545,3546],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3549,3550,3553],{},[38,3551,3552],{},"DLP"," — prevence úniku dat",[123,3555,3556,3559],{},[38,3557,3558],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3561,2646],{"id":2645},[120,3563,3564,3570,3576,3582,3593],{},[123,3565,3566,3569],{},[207,3567,140],{"className":3568,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3571,3572,3575],{},[207,3573,569],{"className":3574,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3577,3578,3581],{},[207,3579,240],{"className":3580,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3583,3584,3587,3588,3592],{},[207,3585,384],{"className":3586,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3589,3591],{"className":3590,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3594,3595,3598],{},[207,3596,369],{"className":3597,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3600,2670,3601],{"id":2669},[207,3602,43],{"className":3603,"dataFsResolvedFilePath":2674,"href":2675},[210],[120,3605,3606,3612,3617,3622,3627],{},[123,3607,3608],{},[207,3609,3611],{"className":3610,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3613,3614],{},[207,3615,417],{"className":3616,"dataFsResolvedFilePath":415,"href":416},[210],[123,3618,3619],{},[207,3620,351],{"className":3621,"dataFsResolvedFilePath":349,"href":350},[210],[123,3623,3624],{},[207,3625,426],{"className":3626,"dataFsResolvedFilePath":424,"href":425},[210],[123,3628,3629],{},[207,3630,458],{"className":3631,"dataFsResolvedFilePath":3632,"href":3633},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3635},[3636,3637,3643,3644,3645,3646,3647],{"id":3236,"depth":642,"text":3237},{"id":3278,"depth":642,"text":3279,"children":3638},[3639,3640,3641,3642],{"id":3282,"depth":649,"text":3283},{"id":3328,"depth":649,"text":3329},{"id":3368,"depth":649,"text":3369},{"id":3389,"depth":649,"text":3390},{"id":3424,"depth":642,"text":3425},{"id":3496,"depth":642,"text":3497},{"id":3520,"depth":642,"text":3521},{"id":2645,"depth":642,"text":2646},{"id":2669,"depth":642,"text":2702},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3653,3654,3205],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3657,3658,3659,3660,3661],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3664,"title":369,"body":3665,"course":659,"courses":3926,"created":660,"description":641,"extension":661,"meta":3927,"navigation":664,"path":3928,"seo":3929,"sources":3930,"stem":3934,"tags":3935,"type":2712,"updated":677,"__hash__":3942},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3666,"toc":3912},[3667,3670,3677,3680,3684,3744,3748,3752,3763,3767,3778,3782,3790,3794,3805,3809,3814,3818,3829,3833,3853,3855,3887,3892],[12,3668,369],{"id":3669},"ochrana-dat",[724,3671,3672],{},[2258,3673],{"alt":3674,"className":3675,"src":3676},"ochrana-dat-technologie",[210,2262],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3678,3679],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3681,3683],{"id":3682},"formy-zneužití-dat","Formy zneužití dat",[16,3685,3686,3695],{},[19,3687,3688],{},[22,3689,3690,3693],{},[25,3691,3692],{},"Forma",[25,3694,2285],{},[30,3696,3697,3704,3712,3720,3728,3736],{},[22,3698,3699,3702],{},[35,3700,3701],{},"Zašifrování",[35,3703,435],{},[22,3705,3706,3709],{},[35,3707,3708],{},"Zveřejnění",[35,3710,3711],{},"Double ransomware",[22,3713,3714,3717],{},[35,3715,3716],{},"Odposlech",[35,3718,3719],{},"Pasivní sběr dat",[22,3721,3722,3725],{},[35,3723,3724],{},"Krádež",[35,3726,3727],{},"Cílená exfiltrace",[22,3729,3730,3733],{},[35,3731,3732],{},"Krádež dodavatelského řetězce",[35,3734,3735],{},"Triple ransomware",[22,3737,3738,3741],{},[35,3739,3740],{},"Prodej",[35,3742,3743],{},"Darknet marketplace",[115,3745,3747],{"id":3746},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3749,3751],{"id":3750},"nac-network-access-control","NAC (Network Access Control)",[120,3753,3754,3757,3760],{},[123,3755,3756],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3758,3759],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3761,3762],{},"Ekvivalenty: MDM, BYOD",[198,3764,3766],{"id":3765},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3768,3769,3772,3775],{},[123,3770,3771],{},"Monitoruje síťový provoz, generuje alerty",[123,3773,3774],{},"Pasivní systém — nezasahuje do provozu",[123,3776,3777],{},"Signaturová a anomální detekce",[198,3779,3781],{"id":3780},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3783,3784,3787],{},[123,3785,3786],{},"Aktivní systém — blokuje škodlivý provoz",[123,3788,3789],{},"Zařazen přímo do síťové cesty (in-line)",[198,3791,3793],{"id":3792},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3795,3796,3799,3802],{},[123,3797,3798],{},"Centralizovaná správa bezpečnostních logů",[123,3800,3801],{},"Sběr s agentem i bez agenta",[123,3803,3804],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3806,3808],{"id":3807},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3810,3811],{},[123,3812,3813],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3815,3817],{"id":3816},"šifrování","Šifrování",[120,3819,3820,3823,3826],{},[123,3821,3822],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3824,3825],{},"RSA (2048+ bit), DSS",[123,3827,3828],{},"SHA-256, SHA-1",[115,3830,3832],{"id":3831},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3834,3835,3841,3847,3850],{},[123,3836,3837,3840],{},[38,3838,3839],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3842,3843,3846],{},[38,3844,3845],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3848,3849],{},"Transportní a tunelovací režim",[123,3851,3852],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3854,2646],{"id":2645},[120,3856,3857,3863,3869,3875,3881],{},[123,3858,3859,3862],{},[207,3860,140],{"className":3861,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3864,3865,3868],{},[207,3866,578],{"className":3867,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3870,3871,3874],{},[207,3872,569],{"className":3873,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3876,3877,3880],{},[207,3878,351],{"className":3879,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3882,3883,3886],{},[207,3884,360],{"className":3885,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3888,2670,3889],{"id":2669},[207,3890,43],{"className":3891,"dataFsResolvedFilePath":2674,"href":2675},[210],[120,3893,3894,3900,3906],{},[123,3895,3896],{},[207,3897,3899],{"className":3898,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3901,3902],{},[207,3903,3905],{"className":3904,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3907,3908],{},[207,3909,3911],{"className":3910,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3913},[3914,3915,3923,3924,3925],{"id":3682,"depth":642,"text":3683},{"id":3746,"depth":642,"text":3747,"children":3916},[3917,3918,3919,3920,3921,3922],{"id":3750,"depth":649,"text":3751},{"id":3765,"depth":649,"text":3766},{"id":3780,"depth":649,"text":3781},{"id":3792,"depth":649,"text":3793},{"id":3807,"depth":649,"text":3808},{"id":3816,"depth":649,"text":3817},{"id":3831,"depth":642,"text":3832},{"id":2645,"depth":642,"text":2646},{"id":2669,"depth":642,"text":2702},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3931,3932,3933],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3669,3936,3937,3938,3939,3940,3941],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3944,"title":569,"body":3945,"course":659,"courses":4280,"created":660,"description":641,"extension":661,"meta":4281,"navigation":664,"path":4282,"seo":4283,"sources":4284,"stem":4285,"tags":4286,"type":2712,"updated":677,"__hash__":4292},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3946,"toc":4269},[3947,3950,3957,3964,3968,4032,4036,4086,4090,4095,4114,4118,4121,4125,4139,4143,4171,4175,4224,4226,4251,4256],[12,3948,569],{"id":3949},"řízení-rizik",[724,3951,3952],{},[2258,3953],{"alt":3954,"className":3955,"src":3956},"rizeni-rizik-proces",[210,2262],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3958,3959,3960,3963],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3961,140],{"className":3962,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3965,3967],{"id":3966},"normativní-základ","Normativní základ",[16,3969,3970,3980],{},[19,3971,3972],{},[22,3973,3974,3977],{},[25,3975,3976],{},"Norma",[25,3978,3979],{},"Zaměření",[30,3981,3982,3992,4002,4012,4022],{},[22,3983,3984,3989],{},[35,3985,3986],{},[38,3987,3988],{},"ISO 31000:2019",[35,3990,3991],{},"Obecné smrnice pro management rizik",[22,3993,3994,3999],{},[35,3995,3996],{},[38,3997,3998],{},"ISO 31010:2020",[35,4000,4001],{},"Techniky posuzování rizik",[22,4003,4004,4009],{},[35,4005,4006],{},[38,4007,4008],{},"ISO\u002FIEC 27005:2019",[35,4010,4011],{},"Řízení rizik bezpečnosti informací",[22,4013,4014,4019],{},[35,4015,4016],{},[38,4017,4018],{},"NIST SP 800-30",[35,4020,4021],{},"Průvodce hodnocením rizik",[22,4023,4024,4029],{},[35,4025,4026],{},[38,4027,4028],{},"NIST SP 800-39",[35,4030,4031],{},"Proces řízení bezpečnostních rizik",[115,4033,4035],{"id":4034},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4037,4038,4044,4050,4056,4062,4068,4074,4080],{},[123,4039,4040,4043],{},[38,4041,4042],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4045,4046,4049],{},[38,4047,4048],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4051,4052,4055],{},[38,4053,4054],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4057,4058,4061],{},[38,4059,4060],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4063,4064,4067],{},[38,4065,4066],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4069,4070,4073],{},[38,4071,4072],{},"Akceptace rizik"," — formální rozhodnutí",[123,4075,4076,4079],{},[38,4077,4078],{},"Komunikace"," — sdílení informací o rizicích",[123,4081,4082,4085],{},[38,4083,4084],{},"Monitorování"," — průběžné přezkoumávání",[115,4087,4089],{"id":4088},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4091,4092],{},[38,4093,4094],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4096,4097,4103,4108],{},[123,4098,4099,4102],{},[38,4100,4101],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4104,4105,4107],{},[38,4106,3256],{}," — slabé místo aktiva (stupnice 1–5)",[123,4109,4110,4113],{},[38,4111,4112],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4115,4117],{"id":4116},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4119,4120],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4122,4124],{"id":4123},"klíčové-dokumenty","Klíčové dokumenty",[120,4126,4127,4133],{},[123,4128,4129,4132],{},[38,4130,4131],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4134,4135,4138],{},[38,4136,4137],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4140,4142],{"id":4141},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4144,4145,4151,4156,4161,4166],{},[123,4146,4147,4150],{},[38,4148,4149],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4152,4153,4155],{},[38,4154,2973],{}," — odpovědný za ISMS",[123,4157,4158,4160],{},[38,4159,2984],{}," — návrh a implementace opatření",[123,4162,4163,4165],{},[38,4164,2994],{}," — provádění auditů",[123,4167,4168,4170],{},[38,4169,3004],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4172,4174],{"id":4173},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4176,4177,4189],{},[19,4178,4179],{},[22,4180,4181,4184,4186],{},[25,4182,4183],{},"Úroveň",[25,4185,3979],{},[25,4187,4188],{},"Typ rizika",[30,4190,4191,4202,4213],{},[22,4192,4193,4196,4199],{},[35,4194,4195],{},"Stupeň 1",[35,4197,4198],{},"Organizace",[35,4200,4201],{},"Strategické riziko",[22,4203,4204,4207,4210],{},[35,4205,4206],{},"Stupeň 2",[35,4208,4209],{},"Poslání\u002Fobchodní procesy",[35,4211,4212],{},"Taktické riziko",[22,4214,4215,4218,4221],{},[35,4216,4217],{},"Stupeň 3",[35,4219,4220],{},"Informační systémy",[35,4222,4223],{},"Operační riziko",[115,4225,2646],{"id":2645},[120,4227,4228,4234,4240,4246],{},[123,4229,4230,4233],{},[207,4231,140],{"className":4232,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4235,4236,4239],{},[207,4237,384],{"className":4238,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4241,4242,4245],{},[207,4243,393],{"className":4244,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4247,4248,3868],{},[207,4249,578],{"className":4250,"dataFsResolvedFilePath":576,"href":577},[210],[115,4252,2670,4253],{"id":2669},[207,4254,43],{"className":4255,"dataFsResolvedFilePath":2674,"href":2675},[210],[120,4257,4258,4264],{},[123,4259,4260],{},[207,4261,4263],{"className":4262,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4265,4266],{},[207,4267,222],{"className":4268,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4270},[4271,4272,4273,4274,4275,4276,4277,4278,4279],{"id":3966,"depth":642,"text":3967},{"id":4034,"depth":642,"text":4035},{"id":4088,"depth":642,"text":4089},{"id":4116,"depth":642,"text":4117},{"id":4123,"depth":642,"text":4124},{"id":4141,"depth":642,"text":4142},{"id":4173,"depth":642,"text":4174},{"id":2645,"depth":642,"text":2646},{"id":2669,"depth":642,"text":2702},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3206,3205],"topics\u002Frizeni-rizik",[658,4287,4288,4289,4290,4291],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4294,"title":4295,"body":4296,"course":659,"courses":4527,"created":660,"description":641,"extension":661,"meta":4528,"navigation":664,"path":4529,"seo":4530,"sources":4531,"stem":4533,"tags":4534,"type":2712,"updated":677,"__hash__":4539},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4297,"toc":4519},[4298,4301,4308,4311,4315,4414,4418,4453,4457,4477,4481,4484,4486,4506,4511],[12,4299,4295],{"id":4300},"sae-budování-bezpečnostního-povědomí",[724,4302,4303],{},[2258,4304],{"alt":4305,"className":4306,"src":4307},"sae-pyramida",[210,2262],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4309,4310],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4312,4314],{"id":4313},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4316,4317,4334],{},[19,4318,4319],{},[22,4320,4321,4323,4326,4328,4331],{},[25,4322,4183],{},[25,4324,4325],{},"Příznak",[25,4327,3297],{},[25,4329,4330],{},"Metody",[25,4332,4333],{},"Časový rámec",[30,4335,4336,4356,4376,4396],{},[22,4337,4338,4344,4347,4350,4353],{},[35,4339,4340,4343],{},[38,4341,4342],{},"Awareness"," (povědomí)",[35,4345,4346],{},"„Co\"",[35,4348,4349],{},"Rozpoznávání",[35,4351,4352],{},"Média, videa, plakáty",[35,4354,4355],{},"Krátkodobý",[22,4357,4358,4364,4367,4370,4373],{},[35,4359,4360,4363],{},[38,4361,4362],{},"Training"," (výcvik)",[35,4365,4366],{},"„Jak\"",[35,4368,4369],{},"Dovednosti",[35,4371,4372],{},"Přednášky, případovky, cvičení",[35,4374,4375],{},"Střednědobý",[22,4377,4378,4384,4387,4390,4393],{},[35,4379,4380,4383],{},[38,4381,4382],{},"Education"," (vzdělávání)",[35,4385,4386],{},"„Proč\"",[35,4388,4389],{},"Porozumění",[35,4391,4392],{},"Semináře, diskuze, výzkum",[35,4394,4395],{},"Dlouhodobý",[22,4397,4398,4403,4405,4408,4411],{},[35,4399,4400],{},[38,4401,4402],{},"Professional Development",[35,4404,2976],{},[35,4406,4407],{},"Profesní rozvoj",[35,4409,4410],{},"Certifikace, konference",[35,4412,4413],{},"Průběžný",[115,4415,4417],{"id":4416},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4419,4420,4423,4426,4429,4432,4435,4438,4441,4444,4447,4450],{},[123,4421,4422],{},"Role a odpovědnosti v programu",[123,4424,4425],{},"Stanovení cílů pro každou fázi",[123,4427,4428],{},"Rozdělení uživatelů (analýza)",[123,4430,4431],{},"Vytvoření školících materiálů dle skupin",[123,4433,4434],{},"Určení cíle pro každou skupinu",[123,4436,4437],{},"Témata pro každou relaci\u002Fkurz",[123,4439,4440],{},"Metody nasazení (metodiky)",[123,4442,4443],{},"Dokumentace a zpětná vazba",[123,4445,4446],{},"Vyhodnocení a aktualizace materiálů",[123,4448,4449],{},"Četnost opakování",[123,4451,4452],{},"Kalkulace",[115,4454,4456],{"id":4455},"modely-řízení","Modely řízení",[120,4458,4459,4465,4471],{},[123,4460,4461,4464],{},[38,4462,4463],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4466,4467,4470],{},[38,4468,4469],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4472,4473,4476],{},[38,4474,4475],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4478,4480],{"id":4479},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4482,4483],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4485,2646],{"id":2645},[120,4487,4488,4494,4500],{},[123,4489,4490,4493],{},[207,4491,140],{"className":4492,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4495,4496,4499],{},[207,4497,578],{"className":4498,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4501,4502,4505],{},[207,4503,569],{"className":4504,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4507,2670,4508],{"id":2669},[207,4509,43],{"className":4510,"dataFsResolvedFilePath":2674,"href":2675},[210],[120,4512,4513],{},[123,4514,4515],{},[207,4516,4518],{"className":4517,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4520},[4521,4522,4523,4524,4525,4526],{"id":4313,"depth":642,"text":4314},{"id":4416,"depth":642,"text":4417},{"id":4455,"depth":642,"text":4456},{"id":4479,"depth":642,"text":4480},{"id":2645,"depth":642,"text":2646},{"id":2669,"depth":642,"text":2702},[658],{},"\u002Ftopics\u002Fsae",{"title":4295,"description":641},[4532],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4535,4536,4537,4290,4538],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4541,4543,4545,4548,4552],{"slug":2232,"path":594,"title":2249,"snippet":4542},"… ost|Kybernetická bezpečnost]] — reakce na incidenty ## Zdroje v kurzu ImorK - \u003C\u003Cimork-bcm>> - Disaster Recovery — shrnutí přednášky",{"slug":658,"path":2675,"title":7,"snippet":4544},"… mork-ochrana-dat|Ochrana dat]] — NAC, IDS\u002FIPS, SIEM, DLP, IPv6 ### Kontinuita a obnova - \u003C\u003Cimork-bcm>> — ISO 22301, BIA, STEEPLE, PDCA - Disaster Recovery — RPO\u002FRTO, cloud DR, 7 t …",{"slug":4546,"path":392,"title":2532,"snippet":4547},"imork-dr","# Disaster Recovery (DR) ## Vztah k BCM DR je součástí \u003C\u003Cimork-bcm>>. Zaměřuje se na obnovu IT systémů a dat po havárii. ## Klíčové metriky - **RPO** (Recov …",{"slug":4549,"path":272,"title":4550,"snippet":4551},"imork-financni-sektor","ISMS ve finančním sektoru","… rový regulační rámec - Řízení rizik — řízení IKT rizik jako jádro DORA - \u003C\u003Cimork-bcm>> — digitální provozní odolnost = kontinuita - [[kyberneticka-bezpecnost|Kybernetická bezpe …",{"slug":4553,"path":3633,"title":4554,"snippet":4555},"imork-pripadovky","Případové studie — ImorK","… ků (verze 2024) - Prevence, reakce, obnova - Propojení s Disaster Recovery a \u003C\u003Cimork-bcm>> ### Platební bezpečnost (2204) - Bezpečnost platebních systémů - PCI DSS, online platby …",[4557],{"slug":2232,"title":2249,"path":594,"sharedTags":4558},5,1777154955777]