[{"data":1,"prerenderedAt":4469},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-bezpecnostni-strategie":1626,"course-stats-imork":2143,"course-topics-imork":2147,"backlinks-imork-bezpecnostni-strategie":4448,"related-imork-bezpecnostni-strategie":4453},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2142},{"id":1628,"title":231,"body":1629,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2127,"navigation":664,"path":2128,"seo":2129,"sources":2130,"stem":2132,"tags":2133,"type":2140,"updated":677,"__hash__":2141},"summaries\u002Fsummaries\u002Fimork-bezpecnostni-strategie.md",{"type":9,"value":1630,"toc":2104},[1631,1634,1643,1646,1650,1654,1660,1664,1670,1674,1694,1698,1756,1760,1764,1767,1781,1785,1836,1840,1893,1897,1968,1972,1979,1983,2003,2007,2026,2030,2033,2037,2043,2046,2060,2064,2090,2099],[12,1632,231],{"id":1633},"bezpečnostní-strategie",[724,1635,1636],{},[1637,1638],"img",{"alt":1639,"className":1640,"src":1642},"imork-strategie-hierarchie",[210,1641],"wikilink-broken","\u002Fwiki-assets\u002Fimork-strategie-hierarchie.jpeg",[724,1644,1645],{},"Přednáška pokrývající bezpečnostní strategie na třech úrovních: EU → ČR → organizace. Strategické řízení, modely vyspělosti a konkrétní rámce.",[115,1647,1649],{"id":1648},"strategické-koncepty","Strategické koncepty",[198,1651,1653],{"id":1652},"strategický-čtverec","Strategický čtverec",[724,1655,1656,1657],{},"Čtyři dimenze strategického plánování: ",[38,1658,1659],{},"Vize\u002Fcíle → Strategie → Nástroje → Zdroje",[198,1661,1663],{"id":1662},"strategický-trojúhelník","Strategický trojúhelník",[724,1665,1666,1667],{},"Zjednodušený model: ",[38,1668,1669],{},"Strategický cíl ↔ Nástroje ↔ Zdroje",[198,1671,1673],{"id":1672},"strategická-analýza-metody","Strategická analýza — metody",[120,1675,1676,1679,1682,1685,1688,1691],{},[123,1677,1678],{},"Analýza poslání, vize a strategických cílů",[123,1680,1681],{},"Analýza funkčních\u002Fpodnikatelských oblastí",[123,1683,1684],{},"Analýza vnějšího a vnitřního prostředí",[123,1686,1687],{},"Analýza konkurenčního prostředí",[123,1689,1690],{},"Analýza zdrojů a kapacity organizace",[123,1692,1693],{},"Návrh konkurenční a prováděcích strategií",[198,1695,1697],{"id":1696},"poslání-vs-vize","Poslání vs. vize",[16,1699,1700,1713],{},[19,1701,1702],{},[22,1703,1704,1707,1710],{},[25,1705,1706],{},"Koncept",[25,1708,1709],{},"Směr",[25,1711,1712],{},"Popis",[30,1714,1715,1729,1743],{},[22,1716,1717,1723,1726],{},[35,1718,1719,1722],{},[38,1720,1721],{},"Poslání"," (mission)",[35,1724,1725],{},"Ven (zákazník)",[35,1727,1728],{},"Smysl a účel existence organizace",[22,1730,1731,1737,1740],{},[35,1732,1733,1736],{},[38,1734,1735],{},"Vize"," (vision)",[35,1738,1739],{},"Dovnitř (management)",[35,1741,1742],{},"Strategická představa budoucnosti",[22,1744,1745,1750,1753],{},[35,1746,1747],{},[38,1748,1749],{},"Strategické cíle",[35,1751,1752],{},"—",[35,1754,1755],{},"Milníky k naplňování vize",[115,1757,1759],{"id":1758},"bezpečnostní-strategie-eu","Bezpečnostní strategie EU",[198,1761,1763],{"id":1762},"enisa-national-capabilities-assessment-framework-2020","ENISA — National Capabilities Assessment Framework (2020)",[724,1765,1766],{},"Měření vyspělosti schopností členských států v kybernetické bezpečnosti. 4 klastry:",[152,1768,1769,1772,1775,1778],{},[123,1770,1771],{},"Řízení a normy kybernetické bezpečnosti",[123,1773,1774],{},"Budování schopností a zvyšování povědomí",[123,1776,1777],{},"Právní a regulatorní povinnosti",[123,1779,1780],{},"Spolupráce",[198,1782,1784],{"id":1783},"_15-společných-strategických-cílů-ncss","15 společných strategických cílů NCSS",[152,1786,1787,1790,1793,1796,1799,1806,1809,1812,1815,1818,1821,1824,1827,1830,1833],{},[123,1788,1789],{},"Vnitrostátní pohotovostní plány",[123,1791,1792],{},"Základní bezpečnostní opatření",[123,1794,1795],{},"Cvičení v oblasti kybernetické bezpečnosti",[123,1797,1798],{},"Schopnost reakce na incident",[123,1800,1801,1802,1805],{},"Zvyšování povědomí uživatelů (",[207,1803,240],{"className":1804,"dataFsResolvedFilePath":585,"href":586},[210],")",[123,1807,1808],{},"Programy odborné přípravy a vzdělávání",[123,1810,1811],{},"Podpora VaV",[123,1813,1814],{},"Pobídky soukromému sektoru",[123,1816,1817],{},"Ochrana KII, OES a DSP",[123,1819,1820],{},"Boj proti kyberkriminalitě",[123,1822,1823],{},"Mechanismy hlášení incidentů",[123,1825,1826],{},"Ochrana osobních údajů",[123,1828,1829],{},"Partnerství veřejný-soukromý sektor (PPP)",[123,1831,1832],{},"Spolupráce veřejných agentur",[123,1834,1835],{},"Mezinárodní spolupráce",[198,1837,1839],{"id":1838},"pětistupňová-škála-vyspělosti-enisa","Pětistupňová škála vyspělosti ENISA",[16,1841,1842,1851],{},[19,1843,1844],{},[22,1845,1846,1849],{},[25,1847,1848],{},"Úroveň",[25,1850,1712],{},[30,1852,1853,1861,1869,1877,1885],{},[22,1854,1855,1858],{},[35,1856,1857],{},"1 — Počáteční",[35,1859,1860],{},"Nemá jasně definovaný přístup",[22,1862,1863,1866],{},[35,1864,1865],{},"2 — Raná definice",[35,1867,1868],{},"Definován vnitrostátní přístup",[22,1870,1871,1874],{},[35,1872,1873],{},"3 — Vytvoření",[35,1875,1876],{},"Jasně určen akční plán",[22,1878,1879,1882],{},[35,1880,1881],{},"4 — Optimalizace",[35,1883,1884],{},"Plán pravidelně přezkoumáván",[22,1886,1887,1890],{},[35,1888,1889],{},"5 — Adaptabilita",[35,1891,1892],{},"Strategie je dynamická a adaptivní",[198,1894,1896],{"id":1895},"cmmc-cybersecurity-maturity-model-certification","CMMC — Cybersecurity Maturity Model Certification",[16,1898,1899,1911],{},[19,1900,1901],{},[22,1902,1903,1905,1908],{},[25,1904,1848],{},[25,1906,1907],{},"Procesy",[25,1909,1910],{},"Postupy",[30,1912,1913,1924,1935,1946,1957],{},[22,1914,1915,1918,1921],{},[35,1916,1917],{},"1",[35,1919,1920],{},"Provedené",[35,1922,1923],{},"Základní kybernetická hygiena",[22,1925,1926,1929,1932],{},[35,1927,1928],{},"2",[35,1930,1931],{},"Zdokumentované",[35,1933,1934],{},"Pokročilá kybernetická hygiena",[22,1936,1937,1940,1943],{},[35,1938,1939],{},"3",[35,1941,1942],{},"Řízené",[35,1944,1945],{},"Správná kybernetická hygiena",[22,1947,1948,1951,1954],{},[35,1949,1950],{},"4",[35,1952,1953],{},"Přezkoumávané",[35,1955,1956],{},"Proaktivní",[22,1958,1959,1962,1965],{},[35,1960,1961],{},"5",[35,1963,1964],{},"Optimalizační",[35,1966,1967],{},"Pokročilé\u002Fpokrokové",[115,1969,1971],{"id":1970},"bezpečnostní-strategie-čr-20212025","Bezpečnostní strategie ČR (2021–2025)",[724,1973,1974,1975,1978],{},"Vytvořena ",[38,1976,1977],{},"NÚKIBem",", převedena do Akčního plánu.",[198,1980,1982],{"id":1981},"tři-vize","Tři vize",[152,1984,1985,1991,1997],{},[123,1986,1987,1990],{},[38,1988,1989],{},"Sebevědomě v kyberprostoru"," — společný přístup, bezpečná infrastruktura, strategická komunikace",[123,1992,1993,1996],{},[38,1994,1995],{},"Silná a spolehlivá spojenectví"," — mezinárodní spolupráce, právní rámec, expertíza",[123,1998,1999,2002],{},[38,2000,2001],{},"Odolná společnost 4.0"," — zabezpečení digitální společnosti, vzdělávání, rozšiřování expertní základny",[198,2004,2006],{"id":2005},"klíčové-pojmy","Klíčové pojmy",[120,2008,2009,2014,2020],{},[123,2010,2011,2013],{},[38,2012,2001],{}," — společnost využívající výhody technologií s minimalizací rizik",[123,2015,2016,2019],{},[38,2017,2018],{},"Digitální hygiena"," — zásady a návyky pro bezpečný pohyb ve virtuálním prostředí",[123,2021,2022,2025],{},[38,2023,2024],{},"Pyramidální model"," — Společnost → Pracovníci VS → Pracovníci NB → Experti KB",[198,2027,2029],{"id":2028},"akční-plán-čr-členění","Akční plán ČR — členění",[724,2031,2032],{},"A. Efektivita struktur a procesů | B. Mezinárodní spolupráce | C. Ochrana KII a VIS | D. Spolupráce se soukromým sektorem | E. VaV a spotřebitelská důvěra | F. Vzdělávání a osvěta | G. Schopnosti Policie ČR | H. Právní úprava",[115,2034,2036],{"id":2035},"bezpečnostní-strategie-organizace","Bezpečnostní strategie organizace",[724,2038,2039,2040],{},"Odvozuje se hierarchicky: ",[38,2041,2042],{},"EU → ČR → Organizace",[724,2044,2045],{},"Úspěšná strategie musí být:",[120,2047,2048,2051,2054,2057],{},[123,2049,2050],{},"Řádně zdokumentovaná",[123,2052,2053],{},"Analyticky podložená",[123,2055,2056],{},"Logicky zdůvodněná",[123,2058,2059],{},"Projednaná a přijatá",[115,2061,2063],{"id":2062},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2065,2066,2072,2078,2084],{},[123,2067,2068,2071],{},[207,2069,140],{"className":2070,"dataFsResolvedFilePath":559,"href":560},[210]," — strategické řízení bezpečnosti jako jádro ISMS",[123,2073,2074,2077],{},[207,2075,569],{"className":2076,"dataFsResolvedFilePath":567,"href":568},[210]," — strategická analýza hrozeb",[123,2079,2080,2083],{},[207,2081,240],{"className":2082,"dataFsResolvedFilePath":585,"href":586},[210]," — strategický cíl č. 5 (zvyšování povědomí)",[123,2085,2086,2089],{},[207,2087,222],{"className":2088,"dataFsResolvedFilePath":220,"href":221},[210]," — governance a role",[115,2091,2093,2094],{"id":2092},"zdroj-v-kurzu-imork","Zdroj v kurzu ",[207,2095,43],{"className":2096,"dataFsResolvedFilePath":2097,"href":2098},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2100,2101],{},[123,2102,2103],{},"Přednáška 2101 — Bezpečnostní strategie (2022)",{"title":641,"searchDepth":642,"depth":642,"links":2105},[2106,2112,2118,2123,2124,2125],{"id":1648,"depth":642,"text":1649,"children":2107},[2108,2109,2110,2111],{"id":1652,"depth":649,"text":1653},{"id":1662,"depth":649,"text":1663},{"id":1672,"depth":649,"text":1673},{"id":1696,"depth":649,"text":1697},{"id":1758,"depth":642,"text":1759,"children":2113},[2114,2115,2116,2117],{"id":1762,"depth":649,"text":1763},{"id":1783,"depth":649,"text":1784},{"id":1838,"depth":649,"text":1839},{"id":1895,"depth":649,"text":1896},{"id":1970,"depth":642,"text":1971,"children":2119},[2120,2121,2122],{"id":1981,"depth":649,"text":1982},{"id":2005,"depth":649,"text":2006},{"id":2028,"depth":649,"text":2029},{"id":2035,"depth":642,"text":2036},{"id":2062,"depth":642,"text":2063},{"id":2092,"depth":642,"text":2126},"Zdroj v kurzu ImorK",{},"\u002Fsummaries\u002Fimork-bezpecnostni-strategie",{"title":231,"description":641},[2131],"raw\u002Fimork\u002F2101 VUT_Bezpečnostní strategie-2022.pdf","summaries\u002Fimork-bezpecnostni-strategie",[658,671,2134,2135,2136,2137,2138,2139],"strategie","enisa","ncss","cmmc","nukib","eu","summary","f_mvGFmBrRkDa1X3-U-t6mrp3qv7lsx84Kk8ORqZ8R8","summaries",{"zapisku":1624,"topics":2144,"summaries":2145,"outputs":2146},6,35,0,[2148,2624,3122,3572,3852,4201],{"id":2149,"title":2150,"body":2151,"course":659,"courses":2608,"created":660,"description":641,"extension":661,"meta":2609,"navigation":664,"path":2610,"seo":2611,"sources":2612,"stem":2615,"tags":2616,"type":2622,"updated":677,"__hash__":2623},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2152,"toc":2595},[2153,2156,2163,2166,2168,2261,2265,2319,2323,2346,2350,2439,2443,2446,2450,2522,2526,2552,2554,2574,2581],[12,2154,2150],{"id":2155},"bcm-řízení-kontinuity-činnosti",[724,2157,2158],{},[1637,2159],{"alt":2160,"className":2161,"src":2162},"bcm-rpo-rto",[210,1641],"\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2164,2165],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2167,2006],{"id":2005},[16,2169,2170,2182],{},[19,2171,2172],{},[22,2173,2174,2177,2180],{},[25,2175,2176],{},"Pojem",[25,2178,2179],{},"Anglicky",[25,2181,1712],{},[30,2183,2184,2197,2209,2222,2235,2248],{},[22,2185,2186,2191,2194],{},[35,2187,2188],{},[38,2189,2190],{},"BCMS",[35,2192,2193],{},"Business Continuity Management System",[35,2195,2196],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2198,2199,2203,2206],{},[35,2200,2201],{},[38,2202,384],{},[35,2204,2205],{},"Business Continuity Management",[35,2207,2208],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2210,2211,2216,2219],{},[35,2212,2213],{},[38,2214,2215],{},"BIA",[35,2217,2218],{},"Business Impact Analysis",[35,2220,2221],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2223,2224,2229,2232],{},[35,2225,2226],{},[38,2227,2228],{},"MBCO",[35,2230,2231],{},"Minimum Business Continuity Objective",[35,2233,2234],{},"Minimální přijatelná úroveň služeb",[22,2236,2237,2242,2245],{},[35,2238,2239],{},[38,2240,2241],{},"RPO",[35,2243,2244],{},"Recovery Point Objective",[35,2246,2247],{},"Do jakého bodu v minulosti lze obnovit data",[22,2249,2250,2255,2258],{},[35,2251,2252],{},[38,2253,2254],{},"RTO",[35,2256,2257],{},"Recovery Time Objective",[35,2259,2260],{},"Čas potřebný pro obnovu provozu",[115,2262,2264],{"id":2263},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2266,2267,2277],{},[19,2268,2269],{},[22,2270,2271,2274],{},[25,2272,2273],{},"Fáze",[25,2275,2276],{},"Obsah",[30,2278,2279,2289,2299,2309],{},[22,2280,2281,2286],{},[35,2282,2283],{},[38,2284,2285],{},"Plan",[35,2287,2288],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2290,2291,2296],{},[35,2292,2293],{},[38,2294,2295],{},"Do",[35,2297,2298],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2300,2301,2306],{},[35,2302,2303],{},[38,2304,2305],{},"Check",[35,2307,2308],{},"Monitoring, audit, přezkoumání managementem",[22,2310,2311,2316],{},[35,2312,2313],{},[38,2314,2315],{},"Act",[35,2317,2318],{},"Nápravná opatření, neustálé zlepšování",[115,2320,2322],{"id":2321},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2324,2325,2328,2331,2334,2337,2340,2343],{},[123,2326,2327],{},"Kap. 4 — kontext organizace",[123,2329,2330],{},"Kap. 5 — vedení (leadership)",[123,2332,2333],{},"Kap. 6 — plánování (BIA, rizika)",[123,2335,2336],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2338,2339],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2341,2342],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2344,2345],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2347,2349],{"id":2348},"analýza-steeple","Analýza STEEPLE",[16,2351,2352,2362],{},[19,2353,2354],{},[22,2355,2356,2359],{},[25,2357,2358],{},"Faktor",[25,2360,2361],{},"Oblast",[30,2363,2364,2375,2386,2397,2407,2418,2429],{},[22,2365,2366,2372],{},[35,2367,2368,2371],{},[38,2369,2370],{},"S","ociální",[35,2373,2374],{},"Zaměstnanost, bezpečnost, komunity",[22,2376,2377,2383],{},[35,2378,2379,2382],{},[38,2380,2381],{},"T","echnologický",[35,2384,2385],{},"Závislost na technologiích",[22,2387,2388,2394],{},[35,2389,2390,2393],{},[38,2391,2392],{},"E","konomický",[35,2395,2396],{},"Ekonomická situace, finanční instituce",[22,2398,2399,2404],{},[35,2400,2401,2403],{},[38,2402,2392],{},"tický",[35,2405,2406],{},"Podnikatelská etika, média, veřejnost",[22,2408,2409,2415],{},[35,2410,2411,2414],{},[38,2412,2413],{},"P","olitický",[35,2416,2417],{},"Politický systém, hrozba nepokojů",[22,2419,2420,2426],{},[35,2421,2422,2425],{},[38,2423,2424],{},"L","egislativní",[35,2427,2428],{},"Předpisy, zákony",[22,2430,2431,2436],{},[35,2432,2433,2435],{},[38,2434,2392],{},"nvironmentální",[35,2437,2438],{},"Životní prostředí, přírodní hrozby",[115,2440,2442],{"id":2441},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2444,2445],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2447,2449],{"id":2448},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2451,2452,2461],{},[19,2453,2454],{},[22,2455,2456,2459],{},[25,2457,2458],{},"Tier",[25,2460,1712],{},[30,2462,2463,2471,2478,2485,2492,2499,2506,2514],{},[22,2464,2465,2468],{},[35,2466,2467],{},"0",[35,2469,2470],{},"Žádná off-site data",[22,2472,2473,2475],{},[35,2474,1917],{},[35,2476,2477],{},"Fyzická záloha + cold site",[22,2479,2480,2482],{},[35,2481,1928],{},[35,2483,2484],{},"Fyzická záloha + hot site",[22,2486,2487,2489],{},[35,2488,1939],{},[35,2490,2491],{},"Elektronický trezor (electronic vaulting)",[22,2493,2494,2496],{},[35,2495,1950],{},[35,2497,2498],{},"Point-in-time recovery",[22,2500,2501,2503],{},[35,2502,1961],{},[35,2504,2505],{},"Two-site commit (kontinuální přenos)",[22,2507,2508,2511],{},[35,2509,2510],{},"6",[35,2512,2513],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2515,2516,2519],{},[35,2517,2518],{},"7",[35,2520,2521],{},"Automatizovaná obnova (AI monitoring)",[198,2523,2525],{"id":2524},"cloud-dr","Cloud DR",[120,2527,2528,2534,2540,2546],{},[123,2529,2530,2533],{},[38,2531,2532],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2535,2536,2539],{},[38,2537,2538],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2541,2542,2545],{},[38,2543,2544],{},"Hot DR"," — paralelní řešení v tandemu",[123,2547,2548,2551],{},[38,2549,2550],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2553,2063],{"id":2062},[120,2555,2556,2562,2568],{},[123,2557,2558,2561],{},[207,2559,140],{"className":2560,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2563,2564,2567],{},[207,2565,569],{"className":2566,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2569,2570,2573],{},[207,2571,578],{"className":2572,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2575,2577,2578],{"id":2576},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2579,43],{"className":2580,"dataFsResolvedFilePath":2097,"href":2098},[210],[120,2582,2583,2589],{},[123,2584,2585],{},[207,2586,2588],{"className":2587,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2590,2591],{},[207,2592,2594],{"className":2593,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2596},[2597,2598,2599,2600,2601,2605,2606],{"id":2005,"depth":642,"text":2006},{"id":2263,"depth":642,"text":2264},{"id":2321,"depth":642,"text":2322},{"id":2348,"depth":642,"text":2349},{"id":2441,"depth":642,"text":2442,"children":2602},[2603,2604],{"id":2448,"depth":649,"text":2449},{"id":2524,"depth":649,"text":2525},{"id":2062,"depth":642,"text":2063},{"id":2576,"depth":642,"text":2607},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2150,"description":641},[2613,2614],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2617,2618,2619,2620,2621],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2625,"title":2626,"body":2627,"course":659,"courses":3109,"created":660,"description":641,"extension":661,"meta":3110,"navigation":664,"path":3111,"seo":3112,"sources":3113,"stem":3116,"tags":3117,"type":2622,"updated":677,"__hash__":3121},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2628,"toc":3094},[2629,2632,2639,2646,2649,2653,2720,2724,2728,2787,2791,2811,2815,2819,2919,2923,2946,2950,2972,2976,2983,3039,3041,3072,3077],[12,2630,2626],{"id":2631},"isms-systém-řízení-bezpečnosti-informací",[724,2633,2634],{},[1637,2635],{"alt":2636,"className":2637,"src":2638},"isms-pdca-cyklus",[210,1641],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2640,2641],{},[1637,2642],{"alt":2643,"className":2644,"src":2645},"isms-oborova-mapa",[210,1641],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2647,2648],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2650,2652],{"id":2651},"základní-pilíře","Základní pilíře",[16,2654,2655,2666],{},[19,2656,2657],{},[22,2658,2659,2662,2664],{},[25,2660,2661],{},"Pilíř",[25,2663,2179],{},[25,2665,1712],{},[30,2667,2668,2681,2694,2707],{},[22,2669,2670,2675,2678],{},[35,2671,2672],{},[38,2673,2674],{},"Důvěrnost",[35,2676,2677],{},"Confidentiality",[35,2679,2680],{},"Přístup pouze oprávněným osobám",[22,2682,2683,2688,2691],{},[35,2684,2685],{},[38,2686,2687],{},"Integrita",[35,2689,2690],{},"Integrity",[35,2692,2693],{},"Ochrana před neoprávněnou změnou",[22,2695,2696,2701,2704],{},[35,2697,2698],{},[38,2699,2700],{},"Dostupnost",[35,2702,2703],{},"Availability",[35,2705,2706],{},"Systémy a data dostupné v potřebný čas",[22,2708,2709,2714,2717],{},[35,2710,2711],{},[38,2712,2713],{},"Nepopiratelnost",[35,2715,2716],{},"Non-repudiation",[35,2718,2719],{},"Prokázání autorství akce",[115,2721,2723],{"id":2722},"normativní-rámec","Normativní rámec",[198,2725,2727],{"id":2726},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2729,2730,2736,2742,2753,2759,2769,2778],{},[123,2731,2732,2735],{},[38,2733,2734],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2737,2738,2741],{},[38,2739,2740],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2743,2744,2747,2748,2752],{},[38,2745,2746],{},"ISO\u002FIEC 27005"," — ",[207,2749,2751],{"className":2750,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2754,2755,2758],{},[38,2756,2757],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2760,2761,2764,2765],{},[38,2762,2763],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2766,2768],{"className":2767,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2770,2771,2764,2774],{},[38,2772,2773],{},"ISO\u002FIEC 27019",[207,2775,2777],{"className":2776,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2779,2780,2764,2783],{},[38,2781,2782],{},"ISO\u002FIEC 27799",[207,2784,2786],{"className":2785,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2788,2790],{"id":2789},"další-rámce","Další rámce",[120,2792,2793,2799,2805],{},[123,2794,2795,2798],{},[38,2796,2797],{},"NIST"," — americké standardy (SP 800 řada)",[123,2800,2801,2804],{},[38,2802,2803],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2806,2807,2810],{},[38,2808,2809],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2812,2814],{"id":2813},"governance-řízení","Governance (řízení)",[198,2816,2818],{"id":2817},"bezpečnostní-role","Bezpečnostní role",[16,2820,2821,2833],{},[19,2822,2823],{},[22,2824,2825,2828,2830],{},[25,2826,2827],{},"Role",[25,2829,40],{},[25,2831,2832],{},"Odpovědnost",[30,2834,2835,2846,2857,2868,2879,2889,2899,2909],{},[22,2836,2837,2840,2843],{},[35,2838,2839],{},"Chief Information Officer",[35,2841,2842],{},"CIO",[35,2844,2845],{},"Celkové řízení ICT",[22,2847,2848,2851,2854],{},[35,2849,2850],{},"Chief Information Security Officer",[35,2852,2853],{},"CISO",[35,2855,2856],{},"Řízení informační bezpečnosti",[22,2858,2859,2862,2865],{},[35,2860,2861],{},"Chief Technology Officer",[35,2863,2864],{},"CTO",[35,2866,2867],{},"Technologická strategie",[22,2869,2870,2873,2876],{},[35,2871,2872],{},"IS Security Officer",[35,2874,2875],{},"ISSO",[35,2877,2878],{},"Bezpečnost IS",[22,2880,2881,2884,2886],{},[35,2882,2883],{},"Manažer KB",[35,2885,1752],{},[35,2887,2888],{},"Odpovědný za ISMS",[22,2890,2891,2894,2896],{},[35,2892,2893],{},"Architekt KB",[35,2895,1752],{},[35,2897,2898],{},"Návrh a implementace opatření",[22,2900,2901,2904,2906],{},[35,2902,2903],{},"Auditor KB",[35,2905,1752],{},[35,2907,2908],{},"Provádění auditů",[22,2910,2911,2914,2916],{},[35,2912,2913],{},"Garant aktiva",[35,2915,1752],{},[35,2917,2918],{},"Rozvoj, použití a bezpečnost aktiva",[198,2920,2922],{"id":2921},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,2924,2925,2931,2940],{},[123,2926,2927,2930],{},[38,2928,2929],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,2932,2933,2936,2937],{},[38,2934,2935],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,2938,240],{"className":2939,"dataFsResolvedFilePath":585,"href":586},[210],[123,2941,2942,2945],{},[38,2943,2944],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,2947,2949],{"id":2948},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,2951,2952,2957,2962,2967],{},[123,2953,2954,2956],{},[38,2955,2285],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,2958,2959,2961],{},[38,2960,2295],{}," — implementace opatření, řízení rizik",[123,2963,2964,2966],{},[38,2965,2305],{}," — monitorování, audit, přezkoumání",[123,2968,2969,2971],{},[38,2970,2315],{}," — nápravná opatření, neustálé zlepšování",[115,2973,2975],{"id":2974},"oborová-řešení-isms","Oborová řešení ISMS",[724,2977,2978,2979,2982],{},"Kurz ",[207,2980,43],{"className":2981,"dataFsResolvedFilePath":2097,"href":2098},[210]," pokrývá ISMS specifika pro:",[120,2984,2985,2991,2997,3004,3010,3017,3023,3029,3034],{},[123,2986,2987],{},[207,2988,2990],{"className":2989,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,2992,2993,2996],{},[207,2994,282],{"className":2995,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,2998,2999,3003],{},[207,3000,3002],{"className":3001,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3005,3006,3009],{},[207,3007,300],{"className":3008,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3011,3012,3016],{},[207,3013,3015],{"className":3014,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3018,3019,3022],{},[207,3020,318],{"className":3021,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3024,3025,3028],{},[207,3026,327],{"className":3027,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3030,3031],{},[207,3032,336],{"className":3033,"dataFsResolvedFilePath":334,"href":335},[210],[123,3035,3036],{},[207,3037,273],{"className":3038,"dataFsResolvedFilePath":271,"href":272},[210],[115,3040,2063],{"id":2062},[120,3042,3043,3049,3054,3060,3066],{},[123,3044,3045,3048],{},[207,3046,569],{"className":3047,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3050,3051,587],{},[207,3052,240],{"className":3053,"dataFsResolvedFilePath":585,"href":586},[210],[123,3055,3056,3059],{},[207,3057,384],{"className":3058,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3061,3062,3065],{},[207,3063,578],{"className":3064,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3067,3068,3071],{},[207,3069,369],{"className":3070,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3073,2577,3074],{"id":2576},[207,3075,43],{"className":3076,"dataFsResolvedFilePath":2097,"href":2098},[210],[120,3078,3079,3084,3089],{},[123,3080,3081],{},[207,3082,222],{"className":3083,"dataFsResolvedFilePath":220,"href":221},[210],[123,3085,3086],{},[207,3087,249],{"className":3088,"dataFsResolvedFilePath":247,"href":248},[210],[123,3090,3091],{},[207,3092,231],{"className":3093,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3095},[3096,3097,3101,3105,3106,3107,3108],{"id":2651,"depth":642,"text":2652},{"id":2722,"depth":642,"text":2723,"children":3098},[3099,3100],{"id":2726,"depth":649,"text":2727},{"id":2789,"depth":649,"text":2790},{"id":2813,"depth":642,"text":2814,"children":3102},[3103,3104],{"id":2817,"depth":649,"text":2818},{"id":2921,"depth":649,"text":2922},{"id":2948,"depth":642,"text":2949},{"id":2974,"depth":642,"text":2975},{"id":2062,"depth":642,"text":2063},{"id":2576,"depth":642,"text":2607},[658],{},"\u002Ftopics\u002Fisms",{"title":2626,"description":641},[3114,3115,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3118,3119,672,3120],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3123,"title":578,"body":3124,"course":659,"courses":3557,"created":660,"description":641,"extension":661,"meta":3558,"navigation":664,"path":3559,"seo":3560,"sources":3561,"stem":3564,"tags":3565,"type":2622,"updated":677,"__hash__":3571},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3125,"toc":3543},[3126,3129,3136,3143,3147,3185,3189,3193,3235,3239,3246,3249,3275,3279,3296,3300,3331,3335,3403,3407,3410,3427,3431,3469,3471,3508,3513],[12,3127,578],{"id":3128},"kybernetická-bezpečnost",[724,3130,3131],{},[1637,3132],{"alt":3133,"className":3134,"src":3135},"kb-defense-in-depth",[210,1641],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3137,3138,3139,3142],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3140,140],{"className":3141,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3144,3146],{"id":3145},"základní-pojmy","Základní pojmy",[120,3148,3149,3155,3161,3167,3173,3179],{},[123,3150,3151,3154],{},[38,3152,3153],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3156,3157,3160],{},[38,3158,3159],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3162,3163,3166],{},[38,3164,3165],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3168,3169,3172],{},[38,3170,3171],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3174,3175,3178],{},[38,3176,3177],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3180,3181,3184],{},[38,3182,3183],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3186,3188],{"id":3187},"typy-útoků","Typy útoků",[198,3190,3192],{"id":3191},"podle-cílení","Podle cílení",[16,3194,3195,3207],{},[19,3196,3197],{},[22,3198,3199,3202,3204],{},[25,3200,3201],{},"Typ",[25,3203,1712],{},[25,3205,3206],{},"Cíl",[30,3208,3209,3222],{},[22,3210,3211,3216,3219],{},[35,3212,3213],{},[38,3214,3215],{},"Plošný",[35,3217,3218],{},"Útočníkovi je jedno, kdo je obětí",[35,3220,3221],{},"Botnety, spam, ransomware",[22,3223,3224,3229,3232],{},[35,3225,3226],{},[38,3227,3228],{},"Cílený (APT)",[35,3230,3231],{},"Soustředěná pozornost na konkrétní cíl",[35,3233,3234],{},"Špionáž, sabotáž, krádež dat",[198,3236,3238],{"id":3237},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3240,3241],{},[1637,3242],{"alt":3243,"className":3244,"src":3245},"apt-faze-utoku",[210,1641],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3247,3248],{},"4 fáze:",[152,3250,3251,3257,3263,3269],{},[123,3252,3253,3256],{},[38,3254,3255],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3258,3259,3262],{},[38,3260,3261],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3264,3265,3268],{},[38,3266,3267],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3270,3271,3274],{},[38,3272,3273],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3276,3278],{"id":3277},"základní-vektory-útoku","Základní vektory útoku",[120,3280,3281,3284,3287,3290,3293],{},[123,3282,3283],{},"Email s přílohou (spear phishing)",[123,3285,3286],{},"Trojanizované aplikace",[123,3288,3289],{},"Drive-by download (webové exploity)",[123,3291,3292],{},"Výměnná média (BadUSB)",[123,3294,3295],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3297,3299],{"id":3298},"software-útoky","Software útoky",[120,3301,3302,3308,3314,3320,3325],{},[123,3303,3304,3307],{},[38,3305,3306],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3309,3310,3313],{},[38,3311,3312],{},"Viry"," — poškození HW\u002FSW",[123,3315,3316,3319],{},[38,3317,3318],{},"Trojské koně"," — skrytá funkčnost",[123,3321,3322,3324],{},[38,3323,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3326,3327,3330],{},[38,3328,3329],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3332,3334],{"id":3333},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3336,3337,3349],{},[19,3338,3339],{},[22,3340,3341,3344,3346],{},[25,3342,3343],{},"Útok",[25,3345,3206],{},[25,3347,3348],{},"Efekt",[30,3350,3351,3362,3372,3383,3393],{},[22,3352,3353,3356,3359],{},[35,3354,3355],{},"Content Spoofing",[35,3357,3358],{},"Klient",[35,3360,3361],{},"Ztráta přihlašovacích údajů",[22,3363,3364,3367,3369],{},[35,3365,3366],{},"XSS",[35,3368,3358],{},[35,3370,3371],{},"Přístup k cookies",[22,3373,3374,3377,3380],{},[35,3375,3376],{},"SQL Injection",[35,3378,3379],{},"Server",[35,3381,3382],{},"Neoprávněný přístup do DB",[22,3384,3385,3388,3390],{},[35,3386,3387],{},"DoS\u002FDDoS",[35,3389,3379],{},[35,3391,3392],{},"Nedostupnost služby",[22,3394,3395,3398,3400],{},[35,3396,3397],{},"Path Traversal",[35,3399,3379],{},[35,3401,3402],{},"Přístup k souborům",[115,3404,3406],{"id":3405},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3408,3409],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3411,3412,3415,3418,3421,3424],{},[123,3413,3414],{},"Vydávání se za právníka",[123,3416,3417],{},"Podvod na CEO",[123,3419,3420],{},"Krádež dat (personální oddělení)",[123,3422,3423],{},"Kompromitace účtu",[123,3425,3426],{},"Falešné faktury",[115,3428,3430],{"id":3429},"obranné-technologie","Obranné technologie",[120,3432,3433,3439,3445,3451,3457,3463],{},[123,3434,3435,3438],{},[38,3436,3437],{},"NAC"," — řízení přístupu k síti",[123,3440,3441,3444],{},[38,3442,3443],{},"IDS"," — detekce průniku (pasivní)",[123,3446,3447,3450],{},[38,3448,3449],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3452,3453,3456],{},[38,3454,3455],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3458,3459,3462],{},[38,3460,3461],{},"DLP"," — prevence úniku dat",[123,3464,3465,3468],{},[38,3466,3467],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3470,2063],{"id":2062},[120,3472,3473,3479,3485,3491,3502],{},[123,3474,3475,3478],{},[207,3476,140],{"className":3477,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3480,3481,3484],{},[207,3482,569],{"className":3483,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3486,3487,3490],{},[207,3488,240],{"className":3489,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3492,3493,3496,3497,3501],{},[207,3494,384],{"className":3495,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3498,3500],{"className":3499,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3503,3504,3507],{},[207,3505,369],{"className":3506,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3509,2577,3510],{"id":2576},[207,3511,43],{"className":3512,"dataFsResolvedFilePath":2097,"href":2098},[210],[120,3514,3515,3521,3526,3531,3536],{},[123,3516,3517],{},[207,3518,3520],{"className":3519,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3522,3523],{},[207,3524,417],{"className":3525,"dataFsResolvedFilePath":415,"href":416},[210],[123,3527,3528],{},[207,3529,351],{"className":3530,"dataFsResolvedFilePath":349,"href":350},[210],[123,3532,3533],{},[207,3534,426],{"className":3535,"dataFsResolvedFilePath":424,"href":425},[210],[123,3537,3538],{},[207,3539,458],{"className":3540,"dataFsResolvedFilePath":3541,"href":3542},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3544},[3545,3546,3552,3553,3554,3555,3556],{"id":3145,"depth":642,"text":3146},{"id":3187,"depth":642,"text":3188,"children":3547},[3548,3549,3550,3551],{"id":3191,"depth":649,"text":3192},{"id":3237,"depth":649,"text":3238},{"id":3277,"depth":649,"text":3278},{"id":3298,"depth":649,"text":3299},{"id":3333,"depth":642,"text":3334},{"id":3405,"depth":642,"text":3406},{"id":3429,"depth":642,"text":3430},{"id":2062,"depth":642,"text":2063},{"id":2576,"depth":642,"text":2607},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3562,3563,3114],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3566,3567,3568,3569,3570],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3573,"title":369,"body":3574,"course":659,"courses":3835,"created":660,"description":641,"extension":661,"meta":3836,"navigation":664,"path":3837,"seo":3838,"sources":3839,"stem":3843,"tags":3844,"type":2622,"updated":677,"__hash__":3851},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3575,"toc":3821},[3576,3579,3586,3589,3593,3653,3657,3661,3672,3676,3687,3691,3699,3703,3714,3718,3723,3727,3738,3742,3762,3764,3796,3801],[12,3577,369],{"id":3578},"ochrana-dat",[724,3580,3581],{},[1637,3582],{"alt":3583,"className":3584,"src":3585},"ochrana-dat-technologie",[210,1641],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3587,3588],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3590,3592],{"id":3591},"formy-zneužití-dat","Formy zneužití dat",[16,3594,3595,3604],{},[19,3596,3597],{},[22,3598,3599,3602],{},[25,3600,3601],{},"Forma",[25,3603,1712],{},[30,3605,3606,3613,3621,3629,3637,3645],{},[22,3607,3608,3611],{},[35,3609,3610],{},"Zašifrování",[35,3612,435],{},[22,3614,3615,3618],{},[35,3616,3617],{},"Zveřejnění",[35,3619,3620],{},"Double ransomware",[22,3622,3623,3626],{},[35,3624,3625],{},"Odposlech",[35,3627,3628],{},"Pasivní sběr dat",[22,3630,3631,3634],{},[35,3632,3633],{},"Krádež",[35,3635,3636],{},"Cílená exfiltrace",[22,3638,3639,3642],{},[35,3640,3641],{},"Krádež dodavatelského řetězce",[35,3643,3644],{},"Triple ransomware",[22,3646,3647,3650],{},[35,3648,3649],{},"Prodej",[35,3651,3652],{},"Darknet marketplace",[115,3654,3656],{"id":3655},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3658,3660],{"id":3659},"nac-network-access-control","NAC (Network Access Control)",[120,3662,3663,3666,3669],{},[123,3664,3665],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3667,3668],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3670,3671],{},"Ekvivalenty: MDM, BYOD",[198,3673,3675],{"id":3674},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3677,3678,3681,3684],{},[123,3679,3680],{},"Monitoruje síťový provoz, generuje alerty",[123,3682,3683],{},"Pasivní systém — nezasahuje do provozu",[123,3685,3686],{},"Signaturová a anomální detekce",[198,3688,3690],{"id":3689},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3692,3693,3696],{},[123,3694,3695],{},"Aktivní systém — blokuje škodlivý provoz",[123,3697,3698],{},"Zařazen přímo do síťové cesty (in-line)",[198,3700,3702],{"id":3701},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3704,3705,3708,3711],{},[123,3706,3707],{},"Centralizovaná správa bezpečnostních logů",[123,3709,3710],{},"Sběr s agentem i bez agenta",[123,3712,3713],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3715,3717],{"id":3716},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3719,3720],{},[123,3721,3722],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3724,3726],{"id":3725},"šifrování","Šifrování",[120,3728,3729,3732,3735],{},[123,3730,3731],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3733,3734],{},"RSA (2048+ bit), DSS",[123,3736,3737],{},"SHA-256, SHA-1",[115,3739,3741],{"id":3740},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3743,3744,3750,3756,3759],{},[123,3745,3746,3749],{},[38,3747,3748],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3751,3752,3755],{},[38,3753,3754],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3757,3758],{},"Transportní a tunelovací režim",[123,3760,3761],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3763,2063],{"id":2062},[120,3765,3766,3772,3778,3784,3790],{},[123,3767,3768,3771],{},[207,3769,140],{"className":3770,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3773,3774,3777],{},[207,3775,578],{"className":3776,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3779,3780,3783],{},[207,3781,569],{"className":3782,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3785,3786,3789],{},[207,3787,351],{"className":3788,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3791,3792,3795],{},[207,3793,360],{"className":3794,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3797,2577,3798],{"id":2576},[207,3799,43],{"className":3800,"dataFsResolvedFilePath":2097,"href":2098},[210],[120,3802,3803,3809,3815],{},[123,3804,3805],{},[207,3806,3808],{"className":3807,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3810,3811],{},[207,3812,3814],{"className":3813,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3816,3817],{},[207,3818,3820],{"className":3819,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3822},[3823,3824,3832,3833,3834],{"id":3591,"depth":642,"text":3592},{"id":3655,"depth":642,"text":3656,"children":3825},[3826,3827,3828,3829,3830,3831],{"id":3659,"depth":649,"text":3660},{"id":3674,"depth":649,"text":3675},{"id":3689,"depth":649,"text":3690},{"id":3701,"depth":649,"text":3702},{"id":3716,"depth":649,"text":3717},{"id":3725,"depth":649,"text":3726},{"id":3740,"depth":642,"text":3741},{"id":2062,"depth":642,"text":2063},{"id":2576,"depth":642,"text":2607},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3840,3841,3842],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3578,3845,3846,3847,3848,3849,3850],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3853,"title":569,"body":3854,"course":659,"courses":4188,"created":660,"description":641,"extension":661,"meta":4189,"navigation":664,"path":4190,"seo":4191,"sources":4192,"stem":4193,"tags":4194,"type":2622,"updated":677,"__hash__":4200},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3855,"toc":4177},[3856,3859,3866,3873,3877,3941,3945,3995,3999,4004,4023,4027,4030,4034,4048,4052,4080,4084,4132,4134,4159,4164],[12,3857,569],{"id":3858},"řízení-rizik",[724,3860,3861],{},[1637,3862],{"alt":3863,"className":3864,"src":3865},"rizeni-rizik-proces",[210,1641],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3867,3868,3869,3872],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3870,140],{"className":3871,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3874,3876],{"id":3875},"normativní-základ","Normativní základ",[16,3878,3879,3889],{},[19,3880,3881],{},[22,3882,3883,3886],{},[25,3884,3885],{},"Norma",[25,3887,3888],{},"Zaměření",[30,3890,3891,3901,3911,3921,3931],{},[22,3892,3893,3898],{},[35,3894,3895],{},[38,3896,3897],{},"ISO 31000:2019",[35,3899,3900],{},"Obecné smrnice pro management rizik",[22,3902,3903,3908],{},[35,3904,3905],{},[38,3906,3907],{},"ISO 31010:2020",[35,3909,3910],{},"Techniky posuzování rizik",[22,3912,3913,3918],{},[35,3914,3915],{},[38,3916,3917],{},"ISO\u002FIEC 27005:2019",[35,3919,3920],{},"Řízení rizik bezpečnosti informací",[22,3922,3923,3928],{},[35,3924,3925],{},[38,3926,3927],{},"NIST SP 800-30",[35,3929,3930],{},"Průvodce hodnocením rizik",[22,3932,3933,3938],{},[35,3934,3935],{},[38,3936,3937],{},"NIST SP 800-39",[35,3939,3940],{},"Proces řízení bezpečnostních rizik",[115,3942,3944],{"id":3943},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,3946,3947,3953,3959,3965,3971,3977,3983,3989],{},[123,3948,3949,3952],{},[38,3950,3951],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,3954,3955,3958],{},[38,3956,3957],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,3960,3961,3964],{},[38,3962,3963],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,3966,3967,3970],{},[38,3968,3969],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,3972,3973,3976],{},[38,3974,3975],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,3978,3979,3982],{},[38,3980,3981],{},"Akceptace rizik"," — formální rozhodnutí",[123,3984,3985,3988],{},[38,3986,3987],{},"Komunikace"," — sdílení informací o rizicích",[123,3990,3991,3994],{},[38,3992,3993],{},"Monitorování"," — průběžné přezkoumávání",[115,3996,3998],{"id":3997},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4000,4001],{},[38,4002,4003],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4005,4006,4012,4017],{},[123,4007,4008,4011],{},[38,4009,4010],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4013,4014,4016],{},[38,4015,3165],{}," — slabé místo aktiva (stupnice 1–5)",[123,4018,4019,4022],{},[38,4020,4021],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4024,4026],{"id":4025},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4028,4029],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4031,4033],{"id":4032},"klíčové-dokumenty","Klíčové dokumenty",[120,4035,4036,4042],{},[123,4037,4038,4041],{},[38,4039,4040],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4043,4044,4047],{},[38,4045,4046],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4049,4051],{"id":4050},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4053,4054,4060,4065,4070,4075],{},[123,4055,4056,4059],{},[38,4057,4058],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4061,4062,4064],{},[38,4063,2883],{}," — odpovědný za ISMS",[123,4066,4067,4069],{},[38,4068,2893],{}," — návrh a implementace opatření",[123,4071,4072,4074],{},[38,4073,2903],{}," — provádění auditů",[123,4076,4077,4079],{},[38,4078,2913],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4081,4083],{"id":4082},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4085,4086,4097],{},[19,4087,4088],{},[22,4089,4090,4092,4094],{},[25,4091,1848],{},[25,4093,3888],{},[25,4095,4096],{},"Typ rizika",[30,4098,4099,4110,4121],{},[22,4100,4101,4104,4107],{},[35,4102,4103],{},"Stupeň 1",[35,4105,4106],{},"Organizace",[35,4108,4109],{},"Strategické riziko",[22,4111,4112,4115,4118],{},[35,4113,4114],{},"Stupeň 2",[35,4116,4117],{},"Poslání\u002Fobchodní procesy",[35,4119,4120],{},"Taktické riziko",[22,4122,4123,4126,4129],{},[35,4124,4125],{},"Stupeň 3",[35,4127,4128],{},"Informační systémy",[35,4130,4131],{},"Operační riziko",[115,4133,2063],{"id":2062},[120,4135,4136,4142,4148,4154],{},[123,4137,4138,4141],{},[207,4139,140],{"className":4140,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4143,4144,4147],{},[207,4145,384],{"className":4146,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4149,4150,4153],{},[207,4151,393],{"className":4152,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4155,4156,3777],{},[207,4157,578],{"className":4158,"dataFsResolvedFilePath":576,"href":577},[210],[115,4160,2577,4161],{"id":2576},[207,4162,43],{"className":4163,"dataFsResolvedFilePath":2097,"href":2098},[210],[120,4165,4166,4172],{},[123,4167,4168],{},[207,4169,4171],{"className":4170,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4173,4174],{},[207,4175,222],{"className":4176,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4178},[4179,4180,4181,4182,4183,4184,4185,4186,4187],{"id":3875,"depth":642,"text":3876},{"id":3943,"depth":642,"text":3944},{"id":3997,"depth":642,"text":3998},{"id":4025,"depth":642,"text":4026},{"id":4032,"depth":642,"text":4033},{"id":4050,"depth":642,"text":4051},{"id":4082,"depth":642,"text":4083},{"id":2062,"depth":642,"text":2063},{"id":2576,"depth":642,"text":2607},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3115,3114],"topics\u002Frizeni-rizik",[658,4195,4196,4197,4198,4199],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4202,"title":4203,"body":4204,"course":659,"courses":4435,"created":660,"description":641,"extension":661,"meta":4436,"navigation":664,"path":4437,"seo":4438,"sources":4439,"stem":4441,"tags":4442,"type":2622,"updated":677,"__hash__":4447},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4205,"toc":4427},[4206,4209,4216,4219,4223,4322,4326,4361,4365,4385,4389,4392,4394,4414,4419],[12,4207,4203],{"id":4208},"sae-budování-bezpečnostního-povědomí",[724,4210,4211],{},[1637,4212],{"alt":4213,"className":4214,"src":4215},"sae-pyramida",[210,1641],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4217,4218],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4220,4222],{"id":4221},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4224,4225,4242],{},[19,4226,4227],{},[22,4228,4229,4231,4234,4236,4239],{},[25,4230,1848],{},[25,4232,4233],{},"Příznak",[25,4235,3206],{},[25,4237,4238],{},"Metody",[25,4240,4241],{},"Časový rámec",[30,4243,4244,4264,4284,4304],{},[22,4245,4246,4252,4255,4258,4261],{},[35,4247,4248,4251],{},[38,4249,4250],{},"Awareness"," (povědomí)",[35,4253,4254],{},"„Co\"",[35,4256,4257],{},"Rozpoznávání",[35,4259,4260],{},"Média, videa, plakáty",[35,4262,4263],{},"Krátkodobý",[22,4265,4266,4272,4275,4278,4281],{},[35,4267,4268,4271],{},[38,4269,4270],{},"Training"," (výcvik)",[35,4273,4274],{},"„Jak\"",[35,4276,4277],{},"Dovednosti",[35,4279,4280],{},"Přednášky, případovky, cvičení",[35,4282,4283],{},"Střednědobý",[22,4285,4286,4292,4295,4298,4301],{},[35,4287,4288,4291],{},[38,4289,4290],{},"Education"," (vzdělávání)",[35,4293,4294],{},"„Proč\"",[35,4296,4297],{},"Porozumění",[35,4299,4300],{},"Semináře, diskuze, výzkum",[35,4302,4303],{},"Dlouhodobý",[22,4305,4306,4311,4313,4316,4319],{},[35,4307,4308],{},[38,4309,4310],{},"Professional Development",[35,4312,1752],{},[35,4314,4315],{},"Profesní rozvoj",[35,4317,4318],{},"Certifikace, konference",[35,4320,4321],{},"Průběžný",[115,4323,4325],{"id":4324},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4327,4328,4331,4334,4337,4340,4343,4346,4349,4352,4355,4358],{},[123,4329,4330],{},"Role a odpovědnosti v programu",[123,4332,4333],{},"Stanovení cílů pro každou fázi",[123,4335,4336],{},"Rozdělení uživatelů (analýza)",[123,4338,4339],{},"Vytvoření školících materiálů dle skupin",[123,4341,4342],{},"Určení cíle pro každou skupinu",[123,4344,4345],{},"Témata pro každou relaci\u002Fkurz",[123,4347,4348],{},"Metody nasazení (metodiky)",[123,4350,4351],{},"Dokumentace a zpětná vazba",[123,4353,4354],{},"Vyhodnocení a aktualizace materiálů",[123,4356,4357],{},"Četnost opakování",[123,4359,4360],{},"Kalkulace",[115,4362,4364],{"id":4363},"modely-řízení","Modely řízení",[120,4366,4367,4373,4379],{},[123,4368,4369,4372],{},[38,4370,4371],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4374,4375,4378],{},[38,4376,4377],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4380,4381,4384],{},[38,4382,4383],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4386,4388],{"id":4387},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4390,4391],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4393,2063],{"id":2062},[120,4395,4396,4402,4408],{},[123,4397,4398,4401],{},[207,4399,140],{"className":4400,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4403,4404,4407],{},[207,4405,578],{"className":4406,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4409,4410,4413],{},[207,4411,569],{"className":4412,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4415,2577,4416],{"id":2576},[207,4417,43],{"className":4418,"dataFsResolvedFilePath":2097,"href":2098},[210],[120,4420,4421],{},[123,4422,4423],{},[207,4424,4426],{"className":4425,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4428},[4429,4430,4431,4432,4433,4434],{"id":4221,"depth":642,"text":4222},{"id":4324,"depth":642,"text":4325},{"id":4363,"depth":642,"text":4364},{"id":4387,"depth":642,"text":4388},{"id":2062,"depth":642,"text":2063},{"id":2576,"depth":642,"text":2607},[658],{},"\u002Ftopics\u002Fsae",{"title":4203,"description":641},[4440],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4443,4444,4445,4198,4446],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4449,4451],{"slug":658,"path":2098,"title":7,"snippet":4450},"… ezpecnost|Manažerská bezpečnost]] — governance, SIEM, log management, bezpečnostní role - \u003C\u003Cimork-bezpecnostni-strategie>> — tvorba a implementace bezpečnostní strategie - SAE — budování bezpečnostn …",{"slug":671,"path":560,"title":2626,"snippet":4452},"… nazerska-bezpecnost|Manažerská bezpečnost]] - Risk Management - \u003C\u003Cimork-bezpecnostni-strategie>>",[4454,4457,4460,4463,4466],{"slug":4455,"title":4456,"path":308,"sharedTags":649},"imork-doprava","ISMS v dopravě (železnice)",{"slug":4458,"title":4459,"path":317,"sharedTags":642},"imork-automotive","Automotive bezpečnost",{"slug":4461,"title":4462,"path":212,"sharedTags":642},"imork-detail-predmetu","ImorK — Detail předmětu",{"slug":4464,"title":4465,"path":263,"sharedTags":642},"imork-akademicke-prostredi","ImorK — ISMS v akademickém prostředí",{"slug":4467,"title":4468,"path":221,"sharedTags":642},"imork-manazerska-bezpecnost","ImorK — Manažerská informační bezpečnost",1777154956001]