[{"data":1,"prerenderedAt":4479},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-email":1626,"course-stats-imork":2146,"course-topics-imork":2150,"backlinks-imork-email":4456,"related-imork-email":4469},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2145},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2129,"navigation":664,"path":2130,"seo":2131,"sources":2132,"stem":2134,"tags":2135,"type":2143,"updated":677,"__hash__":2144},"summaries\u002Fsummaries\u002Fimork-email.md","Bezpečnost emailových služeb",{"type":9,"value":1631,"toc":2104},[1632,1635,1639,1659,1663,1666,1670,1673,1677,1812,1816,1842,1846,1849,1853,1856,1860,1863,1867,1893,1897,1900,1911,1915,1919,1922,1942,1946,1953,1957,1960,1964,1984,1988,1992,1995,1999,2041,2045,2062,2066,2080,2084],[12,1633,1629],{"id":1634},"bezpečnost-emailových-služeb",[115,1636,1638],{"id":1637},"principy-emailu","Principy emailu",[120,1640,1641,1647,1653],{},[123,1642,1643,1646],{},[38,1644,1645],{},"SMTP"," (Simple Mail Transfer Protocol) — odesílání a přenos zpráv",[123,1648,1649,1652],{},[38,1650,1651],{},"POP3"," (Post Office Protocol v3) — stahování zpráv (maže ze serveru)",[123,1654,1655,1658],{},[38,1656,1657],{},"IMAP"," (Internet Message Access Protocol) — přístup ke zprávám na serveru",[115,1660,1662],{"id":1661},"mime-standard","MIME standard",[724,1664,1665],{},"Multipurpose Internet Mail Extensions — umožňuje přenos příloh, formátovaného textu a multimédií v emailu.",[115,1667,1669],{"id":1668},"nist-sp-800-45","NIST SP 800-45",[724,1671,1672],{},"Průvodce zabezpečením emailových služeb — doporučení pro konfiguraci a provoz.",[115,1674,1676],{"id":1675},"_9-bezpečnostních-protokolů-emailu","9 bezpečnostních protokolů emailu",[16,1678,1679,1692],{},[19,1680,1681],{},[22,1682,1683,1686,1689],{},[25,1684,1685],{},"#",[25,1687,1688],{},"Protokol",[25,1690,1691],{},"Funkce",[30,1693,1694,1707,1720,1733,1746,1759,1772,1786,1799],{},[22,1695,1696,1699,1704],{},[35,1697,1698],{},"1",[35,1700,1701],{},[38,1702,1703],{},"SSL\u002FTLS pro HTTPS",[35,1705,1706],{},"Šifrování webového přístupu k emailu",[22,1708,1709,1712,1717],{},[35,1710,1711],{},"2",[35,1713,1714],{},[38,1715,1716],{},"SMTPS",[35,1718,1719],{},"Šifrování SMTP komunikace",[22,1721,1722,1725,1730],{},[35,1723,1724],{},"3",[35,1726,1727],{},[38,1728,1729],{},"STARTTLS",[35,1731,1732],{},"Upgrade nešifrovaného spojení na šifrované",[22,1734,1735,1738,1743],{},[35,1736,1737],{},"4",[35,1739,1740],{},[38,1741,1742],{},"MTA-STS",[35,1744,1745],{},"Vynucení TLS mezi mail servery",[22,1747,1748,1751,1756],{},[35,1749,1750],{},"5",[35,1752,1753],{},[38,1754,1755],{},"SPF",[35,1757,1758],{},"Ověření oprávněného odesílatele (DNS záznam)",[22,1760,1761,1764,1769],{},[35,1762,1763],{},"6",[35,1765,1766],{},[38,1767,1768],{},"DKIM",[35,1770,1771],{},"Digitální podpis zprávy doménou",[22,1773,1774,1777,1783],{},[35,1775,1776],{},"7",[35,1778,1779,1782],{},[38,1780,1781],{},"DMARC"," (+ BIMI)",[35,1784,1785],{},"Politika pro SPF\u002FDKIM selhání + vizuální ověření",[22,1787,1788,1791,1796],{},[35,1789,1790],{},"8",[35,1792,1793],{},[38,1794,1795],{},"S\u002FMIME",[35,1797,1798],{},"End-to-end šifrování a podpis (certifikáty)",[22,1800,1801,1804,1809],{},[35,1802,1803],{},"9",[35,1805,1806],{},[38,1807,1808],{},"OpenPGP",[35,1810,1811],{},"End-to-end šifrování a podpis (klíče)",[115,1813,1815],{"id":1814},"doporučení-pro-šifrování","Doporučení pro šifrování",[120,1817,1818,1824,1830,1836],{},[123,1819,1820,1823],{},[38,1821,1822],{},"Symetrické",": AES 128\u002F192\u002F256",[123,1825,1826,1829],{},[38,1827,1828],{},"Podpisy",": DSS (Digital Signature Standard)",[123,1831,1832,1835],{},[38,1833,1834],{},"Asymetrické",": RSA 2048+ bitů",[123,1837,1838,1841],{},[38,1839,1840],{},"Hash",": SHA-256",[115,1843,1845],{"id":1844},"zabezpečení-os-mailového-serveru","Zabezpečení OS mailového serveru",[724,1847,1848],{},"Hardening operačního systému — minimalizace služeb, aktualizace, správa oprávnění.",[115,1850,1852],{"id":1851},"dmz-architektura","DMZ architektura",[724,1854,1855],{},"Mail server umístěn v demilitarizované zóně — oddělení od vnitřní sítě i internetu.",[115,1857,1859],{"id":1858},"mail-gateway","Mail gateway",[724,1861,1862],{},"Vstupní bod pro email — filtrování spamu, malwaru, kontrola politik.",[115,1864,1866],{"id":1865},"pgp-openpgp","PGP \u002F OpenPGP",[120,1868,1869,1875,1881,1887],{},[123,1870,1871,1874],{},[38,1872,1873],{},"RSA asymetrické šifrování"," — veřejný klíč pro šifrování, soukromý pro dešifrování",[123,1876,1877,1880],{},[38,1878,1879],{},"RFC 2440"," — specifikace OpenPGP Message Format",[123,1882,1883,1886],{},[38,1884,1885],{},"EFAIL zranitelnost (2018)"," — útok na šifrované emaily přes HTML rendering; útočník mohl exfiltrovat obsah šifrované zprávy",[123,1888,1889,1892],{},[38,1890,1891],{},"MDC"," (Modification Detection Code) — ochrana integrity zpráv proti EFAIL útoku",[115,1894,1896],{"id":1895},"digitální-certifikáty","Digitální certifikáty",[724,1898,1899],{},"Elektronické dokumenty prokazující vlastnictví veřejného klíče:",[120,1901,1902,1905,1908],{},[123,1903,1904],{},"Vydávány certifikační autoritou (CA)",[123,1906,1907],{},"Obsahují: veřejný klíč, identitu vlastníka, dobu platnosti, podpis CA",[123,1909,1910],{},"Základ pro důvěryhodnou komunikaci (S\u002FMIME, TLS)",[115,1912,1914],{"id":1913},"emailové-hrozby-21-století","Emailové hrozby 21. století",[198,1916,1918],{"id":1917},"komplexní-přístup-k-ochraně","Komplexní přístup k ochraně",[724,1920,1921],{},"Trojí úroveň:",[152,1923,1924,1930,1936],{},[123,1925,1926,1929],{},[38,1927,1928],{},"Perimetr"," — ochrana na hranici sítě (spam filtry, gateway)",[123,1931,1932,1935],{},[38,1933,1934],{},"Vnitřní síť"," — detekce hrozeb uvnitř organizace",[123,1937,1938,1941],{},[38,1939,1940],{},"Mimo organizaci"," — ochrana značky, monitoring podvodných domén",[198,1943,1945],{"id":1944},"cloud-migration-rizika","Cloud migration rizika",[724,1947,1948,1949,1952],{},"Přechod na cloudové emailové služby (např. ",[38,1950,1951],{},"Office 365",") přináší nové vektory útoku — sdílená infrastruktura, API zranitelnosti.",[198,1954,1956],{"id":1955},"email-jako-vektor-č-1","Email jako vektor č. 1",[724,1958,1959],{},"Email zůstává primárním vektorem kybernetických útoků — vstupní brána pro phishing, malware, BEC.",[115,1961,1963],{"id":1962},"bec-přes-email-business-email-compromise","BEC přes email (Business Email Compromise)",[120,1965,1966,1972,1978],{},[123,1967,1968,1971],{},[38,1969,1970],{},"Impersonace"," — útočník se vydává za vedoucího pracovníka nebo obchodního partnera",[123,1973,1974,1977],{},[38,1975,1976],{},"Kompromitace dodavatelského řetězce"," — zneužití důvěry mezi organizacemi",[123,1979,1980,1983],{},[38,1981,1982],{},"Ztráta citlivých dat"," — exfiltrace informací přes kompromitovaný email",[115,1985,1987],{"id":1986},"ochrana-a-obrana","Ochrana a obrana",[198,1989,1991],{"id":1990},"sae-simulační-nástroje","SAE + simulační nástroje",[724,1993,1994],{},"Školení bezpečnostního povědomí (Security Awareness Education) doplněná o simulované phishingové kampaně.",[198,1996,1998],{"id":1997},"tři-zóny-ochrany","Tři zóny ochrany",[16,2000,2001,2011],{},[19,2002,2003],{},[22,2004,2005,2008],{},[25,2006,2007],{},"Zóna",[25,2009,2010],{},"Opatření",[30,2012,2013,2022,2031],{},[22,2014,2015,2019],{},[35,2016,2017],{},[38,2018,1928],{},[35,2020,2021],{},"Spam\u002Fphishing filtrování, antimalware gateway",[22,2023,2024,2028],{},[35,2025,2026],{},[38,2027,1934],{},[35,2029,2030],{},"Detekce anomálií, monitorování neobvyklého chování",[22,2032,2033,2038],{},[35,2034,2035],{},[38,2036,2037],{},"Za perimetrem",[35,2039,2040],{},"Monitoring podvodných webů, [[imork-email",[115,2042,2044],{"id":2043},"mimecast","Mimecast",[120,2046,2047,2053,2059],{},[123,2048,2049,2052],{},[38,2050,2051],{},"Cloudová emailová brána"," — SaaS architektura",[123,2054,2055,2058],{},[38,2056,2057],{},"Email Security 3.0"," — pokročilá ochrana proti cíleným útokům, impersonaci a malwaru",[123,2060,2061],{},"Integrace s existující infrastrukturou (Office 365, Google Workspace)",[115,2063,2065],{"id":2064},"sandboxing","Sandboxing",[120,2067,2068,2074,2077],{},[123,2069,2070,2073],{},[38,2071,2072],{},"Emulace hrozeb"," — spuštění podezřelých příloh a odkazů v izolovaném virtuálním prostředí",[123,2075,2076],{},"Detekce neznámého malwaru, který projde signaturovou kontrolou",[123,2078,2079],{},"Izolace zabraňuje šíření hrozby do produkční sítě",[115,2081,2083],{"id":2082},"vrstvy-zabezpečení-infrastruktury","Vrstvy zabezpečení infrastruktury",[152,2085,2086,2092,2098],{},[123,2087,2088,2091],{},[38,2089,2090],{},"Firewall"," — síťová filtrace",[123,2093,2094,2097],{},[38,2095,2096],{},"Server"," — hardening, aktualizace",[123,2099,2100,2103],{},[38,2101,2102],{},"Endpoint"," — ochrana koncových stanic",{"title":641,"searchDepth":642,"depth":642,"links":2105},[2106,2107,2108,2109,2110,2111,2112,2113,2114,2115,2116,2121,2122,2126,2127,2128],{"id":1637,"depth":642,"text":1638},{"id":1661,"depth":642,"text":1662},{"id":1668,"depth":642,"text":1669},{"id":1675,"depth":642,"text":1676},{"id":1814,"depth":642,"text":1815},{"id":1844,"depth":642,"text":1845},{"id":1851,"depth":642,"text":1852},{"id":1858,"depth":642,"text":1859},{"id":1865,"depth":642,"text":1866},{"id":1895,"depth":642,"text":1896},{"id":1913,"depth":642,"text":1914,"children":2117},[2118,2119,2120],{"id":1917,"depth":649,"text":1918},{"id":1944,"depth":649,"text":1945},{"id":1955,"depth":649,"text":1956},{"id":1962,"depth":642,"text":1963},{"id":1986,"depth":642,"text":1987,"children":2123},[2124,2125],{"id":1990,"depth":649,"text":1991},{"id":1997,"depth":649,"text":1998},{"id":2043,"depth":642,"text":2044},{"id":2064,"depth":642,"text":2065},{"id":2082,"depth":642,"text":2083},{},"\u002Fsummaries\u002Fimork-email",{"title":1629,"description":641},[2133],"raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","summaries\u002Fimork-email",[658,2136,2137,2138,2139,2140,2141,2142],"email","sifrovani","spf","dkim","dmarc","pgp","bec","summary","__MSmS1lrmaxXAI-afCGO6ozg5OGx49hHkBQqq1CERY","summaries",{"zapisku":1624,"topics":2147,"summaries":2148,"outputs":2149},6,35,0,[2151,2634,3133,3582,3859,4209],{"id":2152,"title":2153,"body":2154,"course":659,"courses":2618,"created":660,"description":641,"extension":661,"meta":2619,"navigation":664,"path":2620,"seo":2621,"sources":2622,"stem":2625,"tags":2626,"type":2632,"updated":677,"__hash__":2633},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2155,"toc":2605},[2156,2159,2168,2171,2175,2269,2273,2327,2331,2354,2358,2447,2451,2454,2458,2528,2532,2558,2562,2582,2591],[12,2157,2153],{"id":2158},"bcm-řízení-kontinuity-činnosti",[724,2160,2161],{},[2162,2163],"img",{"alt":2164,"className":2165,"src":2167},"bcm-rpo-rto",[210,2166],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2169,2170],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2172,2174],{"id":2173},"klíčové-pojmy","Klíčové pojmy",[16,2176,2177,2190],{},[19,2178,2179],{},[22,2180,2181,2184,2187],{},[25,2182,2183],{},"Pojem",[25,2185,2186],{},"Anglicky",[25,2188,2189],{},"Popis",[30,2191,2192,2205,2217,2230,2243,2256],{},[22,2193,2194,2199,2202],{},[35,2195,2196],{},[38,2197,2198],{},"BCMS",[35,2200,2201],{},"Business Continuity Management System",[35,2203,2204],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2206,2207,2211,2214],{},[35,2208,2209],{},[38,2210,384],{},[35,2212,2213],{},"Business Continuity Management",[35,2215,2216],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2218,2219,2224,2227],{},[35,2220,2221],{},[38,2222,2223],{},"BIA",[35,2225,2226],{},"Business Impact Analysis",[35,2228,2229],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2231,2232,2237,2240],{},[35,2233,2234],{},[38,2235,2236],{},"MBCO",[35,2238,2239],{},"Minimum Business Continuity Objective",[35,2241,2242],{},"Minimální přijatelná úroveň služeb",[22,2244,2245,2250,2253],{},[35,2246,2247],{},[38,2248,2249],{},"RPO",[35,2251,2252],{},"Recovery Point Objective",[35,2254,2255],{},"Do jakého bodu v minulosti lze obnovit data",[22,2257,2258,2263,2266],{},[35,2259,2260],{},[38,2261,2262],{},"RTO",[35,2264,2265],{},"Recovery Time Objective",[35,2267,2268],{},"Čas potřebný pro obnovu provozu",[115,2270,2272],{"id":2271},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2274,2275,2285],{},[19,2276,2277],{},[22,2278,2279,2282],{},[25,2280,2281],{},"Fáze",[25,2283,2284],{},"Obsah",[30,2286,2287,2297,2307,2317],{},[22,2288,2289,2294],{},[35,2290,2291],{},[38,2292,2293],{},"Plan",[35,2295,2296],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2298,2299,2304],{},[35,2300,2301],{},[38,2302,2303],{},"Do",[35,2305,2306],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2308,2309,2314],{},[35,2310,2311],{},[38,2312,2313],{},"Check",[35,2315,2316],{},"Monitoring, audit, přezkoumání managementem",[22,2318,2319,2324],{},[35,2320,2321],{},[38,2322,2323],{},"Act",[35,2325,2326],{},"Nápravná opatření, neustálé zlepšování",[115,2328,2330],{"id":2329},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2332,2333,2336,2339,2342,2345,2348,2351],{},[123,2334,2335],{},"Kap. 4 — kontext organizace",[123,2337,2338],{},"Kap. 5 — vedení (leadership)",[123,2340,2341],{},"Kap. 6 — plánování (BIA, rizika)",[123,2343,2344],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2346,2347],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2349,2350],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2352,2353],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2355,2357],{"id":2356},"analýza-steeple","Analýza STEEPLE",[16,2359,2360,2370],{},[19,2361,2362],{},[22,2363,2364,2367],{},[25,2365,2366],{},"Faktor",[25,2368,2369],{},"Oblast",[30,2371,2372,2383,2394,2405,2415,2426,2437],{},[22,2373,2374,2380],{},[35,2375,2376,2379],{},[38,2377,2378],{},"S","ociální",[35,2381,2382],{},"Zaměstnanost, bezpečnost, komunity",[22,2384,2385,2391],{},[35,2386,2387,2390],{},[38,2388,2389],{},"T","echnologický",[35,2392,2393],{},"Závislost na technologiích",[22,2395,2396,2402],{},[35,2397,2398,2401],{},[38,2399,2400],{},"E","konomický",[35,2403,2404],{},"Ekonomická situace, finanční instituce",[22,2406,2407,2412],{},[35,2408,2409,2411],{},[38,2410,2400],{},"tický",[35,2413,2414],{},"Podnikatelská etika, média, veřejnost",[22,2416,2417,2423],{},[35,2418,2419,2422],{},[38,2420,2421],{},"P","olitický",[35,2424,2425],{},"Politický systém, hrozba nepokojů",[22,2427,2428,2434],{},[35,2429,2430,2433],{},[38,2431,2432],{},"L","egislativní",[35,2435,2436],{},"Předpisy, zákony",[22,2438,2439,2444],{},[35,2440,2441,2443],{},[38,2442,2400],{},"nvironmentální",[35,2445,2446],{},"Životní prostředí, přírodní hrozby",[115,2448,2450],{"id":2449},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2452,2453],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2455,2457],{"id":2456},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2459,2460,2469],{},[19,2461,2462],{},[22,2463,2464,2467],{},[25,2465,2466],{},"Tier",[25,2468,2189],{},[30,2470,2471,2479,2486,2493,2500,2507,2514,2521],{},[22,2472,2473,2476],{},[35,2474,2475],{},"0",[35,2477,2478],{},"Žádná off-site data",[22,2480,2481,2483],{},[35,2482,1698],{},[35,2484,2485],{},"Fyzická záloha + cold site",[22,2487,2488,2490],{},[35,2489,1711],{},[35,2491,2492],{},"Fyzická záloha + hot site",[22,2494,2495,2497],{},[35,2496,1724],{},[35,2498,2499],{},"Elektronický trezor (electronic vaulting)",[22,2501,2502,2504],{},[35,2503,1737],{},[35,2505,2506],{},"Point-in-time recovery",[22,2508,2509,2511],{},[35,2510,1750],{},[35,2512,2513],{},"Two-site commit (kontinuální přenos)",[22,2515,2516,2518],{},[35,2517,1763],{},[35,2519,2520],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2522,2523,2525],{},[35,2524,1776],{},[35,2526,2527],{},"Automatizovaná obnova (AI monitoring)",[198,2529,2531],{"id":2530},"cloud-dr","Cloud DR",[120,2533,2534,2540,2546,2552],{},[123,2535,2536,2539],{},[38,2537,2538],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2541,2542,2545],{},[38,2543,2544],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2547,2548,2551],{},[38,2549,2550],{},"Hot DR"," — paralelní řešení v tandemu",[123,2553,2554,2557],{},[38,2555,2556],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2559,2561],{"id":2560},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2563,2564,2570,2576],{},[123,2565,2566,2569],{},[207,2567,140],{"className":2568,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2571,2572,2575],{},[207,2573,569],{"className":2574,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2577,2578,2581],{},[207,2579,578],{"className":2580,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2583,2585,2586],{"id":2584},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2587,43],{"className":2588,"dataFsResolvedFilePath":2589,"href":2590},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2592,2593,2599],{},[123,2594,2595],{},[207,2596,2598],{"className":2597,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2600,2601],{},[207,2602,2604],{"className":2603,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2606},[2607,2608,2609,2610,2611,2615,2616],{"id":2173,"depth":642,"text":2174},{"id":2271,"depth":642,"text":2272},{"id":2329,"depth":642,"text":2330},{"id":2356,"depth":642,"text":2357},{"id":2449,"depth":642,"text":2450,"children":2612},[2613,2614],{"id":2456,"depth":649,"text":2457},{"id":2530,"depth":649,"text":2531},{"id":2560,"depth":642,"text":2561},{"id":2584,"depth":642,"text":2617},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2153,"description":641},[2623,2624],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2627,2628,2629,2630,2631],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2635,"title":2636,"body":2637,"course":659,"courses":3120,"created":660,"description":641,"extension":661,"meta":3121,"navigation":664,"path":3122,"seo":3123,"sources":3124,"stem":3127,"tags":3128,"type":2632,"updated":677,"__hash__":3132},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2638,"toc":3105},[2639,2642,2649,2656,2659,2663,2730,2734,2738,2797,2801,2821,2825,2829,2930,2934,2957,2961,2983,2987,2994,3050,3052,3083,3088],[12,2640,2636],{"id":2641},"isms-systém-řízení-bezpečnosti-informací",[724,2643,2644],{},[2162,2645],{"alt":2646,"className":2647,"src":2648},"isms-pdca-cyklus",[210,2166],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2650,2651],{},[2162,2652],{"alt":2653,"className":2654,"src":2655},"isms-oborova-mapa",[210,2166],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2657,2658],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2660,2662],{"id":2661},"základní-pilíře","Základní pilíře",[16,2664,2665,2676],{},[19,2666,2667],{},[22,2668,2669,2672,2674],{},[25,2670,2671],{},"Pilíř",[25,2673,2186],{},[25,2675,2189],{},[30,2677,2678,2691,2704,2717],{},[22,2679,2680,2685,2688],{},[35,2681,2682],{},[38,2683,2684],{},"Důvěrnost",[35,2686,2687],{},"Confidentiality",[35,2689,2690],{},"Přístup pouze oprávněným osobám",[22,2692,2693,2698,2701],{},[35,2694,2695],{},[38,2696,2697],{},"Integrita",[35,2699,2700],{},"Integrity",[35,2702,2703],{},"Ochrana před neoprávněnou změnou",[22,2705,2706,2711,2714],{},[35,2707,2708],{},[38,2709,2710],{},"Dostupnost",[35,2712,2713],{},"Availability",[35,2715,2716],{},"Systémy a data dostupné v potřebný čas",[22,2718,2719,2724,2727],{},[35,2720,2721],{},[38,2722,2723],{},"Nepopiratelnost",[35,2725,2726],{},"Non-repudiation",[35,2728,2729],{},"Prokázání autorství akce",[115,2731,2733],{"id":2732},"normativní-rámec","Normativní rámec",[198,2735,2737],{"id":2736},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2739,2740,2746,2752,2763,2769,2779,2788],{},[123,2741,2742,2745],{},[38,2743,2744],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2747,2748,2751],{},[38,2749,2750],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2753,2754,2757,2758,2762],{},[38,2755,2756],{},"ISO\u002FIEC 27005"," — ",[207,2759,2761],{"className":2760,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2764,2765,2768],{},[38,2766,2767],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2770,2771,2774,2775],{},[38,2772,2773],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2776,2778],{"className":2777,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2780,2781,2774,2784],{},[38,2782,2783],{},"ISO\u002FIEC 27019",[207,2785,2787],{"className":2786,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2789,2790,2774,2793],{},[38,2791,2792],{},"ISO\u002FIEC 27799",[207,2794,2796],{"className":2795,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2798,2800],{"id":2799},"další-rámce","Další rámce",[120,2802,2803,2809,2815],{},[123,2804,2805,2808],{},[38,2806,2807],{},"NIST"," — americké standardy (SP 800 řada)",[123,2810,2811,2814],{},[38,2812,2813],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2816,2817,2820],{},[38,2818,2819],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2822,2824],{"id":2823},"governance-řízení","Governance (řízení)",[198,2826,2828],{"id":2827},"bezpečnostní-role","Bezpečnostní role",[16,2830,2831,2843],{},[19,2832,2833],{},[22,2834,2835,2838,2840],{},[25,2836,2837],{},"Role",[25,2839,40],{},[25,2841,2842],{},"Odpovědnost",[30,2844,2845,2856,2867,2878,2889,2900,2910,2920],{},[22,2846,2847,2850,2853],{},[35,2848,2849],{},"Chief Information Officer",[35,2851,2852],{},"CIO",[35,2854,2855],{},"Celkové řízení ICT",[22,2857,2858,2861,2864],{},[35,2859,2860],{},"Chief Information Security Officer",[35,2862,2863],{},"CISO",[35,2865,2866],{},"Řízení informační bezpečnosti",[22,2868,2869,2872,2875],{},[35,2870,2871],{},"Chief Technology Officer",[35,2873,2874],{},"CTO",[35,2876,2877],{},"Technologická strategie",[22,2879,2880,2883,2886],{},[35,2881,2882],{},"IS Security Officer",[35,2884,2885],{},"ISSO",[35,2887,2888],{},"Bezpečnost IS",[22,2890,2891,2894,2897],{},[35,2892,2893],{},"Manažer KB",[35,2895,2896],{},"—",[35,2898,2899],{},"Odpovědný za ISMS",[22,2901,2902,2905,2907],{},[35,2903,2904],{},"Architekt KB",[35,2906,2896],{},[35,2908,2909],{},"Návrh a implementace opatření",[22,2911,2912,2915,2917],{},[35,2913,2914],{},"Auditor KB",[35,2916,2896],{},[35,2918,2919],{},"Provádění auditů",[22,2921,2922,2925,2927],{},[35,2923,2924],{},"Garant aktiva",[35,2926,2896],{},[35,2928,2929],{},"Rozvoj, použití a bezpečnost aktiva",[198,2931,2933],{"id":2932},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,2935,2936,2942,2951],{},[123,2937,2938,2941],{},[38,2939,2940],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,2943,2944,2947,2948],{},[38,2945,2946],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,2949,240],{"className":2950,"dataFsResolvedFilePath":585,"href":586},[210],[123,2952,2953,2956],{},[38,2954,2955],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,2958,2960],{"id":2959},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,2962,2963,2968,2973,2978],{},[123,2964,2965,2967],{},[38,2966,2293],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,2969,2970,2972],{},[38,2971,2303],{}," — implementace opatření, řízení rizik",[123,2974,2975,2977],{},[38,2976,2313],{}," — monitorování, audit, přezkoumání",[123,2979,2980,2982],{},[38,2981,2323],{}," — nápravná opatření, neustálé zlepšování",[115,2984,2986],{"id":2985},"oborová-řešení-isms","Oborová řešení ISMS",[724,2988,2989,2990,2993],{},"Kurz ",[207,2991,43],{"className":2992,"dataFsResolvedFilePath":2589,"href":2590},[210]," pokrývá ISMS specifika pro:",[120,2995,2996,3002,3008,3015,3021,3028,3034,3040,3045],{},[123,2997,2998],{},[207,2999,3001],{"className":3000,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3003,3004,3007],{},[207,3005,282],{"className":3006,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3009,3010,3014],{},[207,3011,3013],{"className":3012,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3016,3017,3020],{},[207,3018,300],{"className":3019,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3022,3023,3027],{},[207,3024,3026],{"className":3025,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3029,3030,3033],{},[207,3031,318],{"className":3032,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3035,3036,3039],{},[207,3037,327],{"className":3038,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3041,3042],{},[207,3043,336],{"className":3044,"dataFsResolvedFilePath":334,"href":335},[210],[123,3046,3047],{},[207,3048,273],{"className":3049,"dataFsResolvedFilePath":271,"href":272},[210],[115,3051,2561],{"id":2560},[120,3053,3054,3060,3065,3071,3077],{},[123,3055,3056,3059],{},[207,3057,569],{"className":3058,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3061,3062,587],{},[207,3063,240],{"className":3064,"dataFsResolvedFilePath":585,"href":586},[210],[123,3066,3067,3070],{},[207,3068,384],{"className":3069,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3072,3073,3076],{},[207,3074,578],{"className":3075,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3078,3079,3082],{},[207,3080,369],{"className":3081,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3084,2585,3085],{"id":2584},[207,3086,43],{"className":3087,"dataFsResolvedFilePath":2589,"href":2590},[210],[120,3089,3090,3095,3100],{},[123,3091,3092],{},[207,3093,222],{"className":3094,"dataFsResolvedFilePath":220,"href":221},[210],[123,3096,3097],{},[207,3098,249],{"className":3099,"dataFsResolvedFilePath":247,"href":248},[210],[123,3101,3102],{},[207,3103,231],{"className":3104,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3106},[3107,3108,3112,3116,3117,3118,3119],{"id":2661,"depth":642,"text":2662},{"id":2732,"depth":642,"text":2733,"children":3109},[3110,3111],{"id":2736,"depth":649,"text":2737},{"id":2799,"depth":649,"text":2800},{"id":2823,"depth":642,"text":2824,"children":3113},[3114,3115],{"id":2827,"depth":649,"text":2828},{"id":2932,"depth":649,"text":2933},{"id":2959,"depth":642,"text":2960},{"id":2985,"depth":642,"text":2986},{"id":2560,"depth":642,"text":2561},{"id":2584,"depth":642,"text":2617},[658],{},"\u002Ftopics\u002Fisms",{"title":2636,"description":641},[3125,3126,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3129,3130,672,3131],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3134,"title":578,"body":3135,"course":659,"courses":3567,"created":660,"description":641,"extension":661,"meta":3568,"navigation":664,"path":3569,"seo":3570,"sources":3571,"stem":3574,"tags":3575,"type":2632,"updated":677,"__hash__":3581},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3136,"toc":3553},[3137,3140,3147,3154,3158,3196,3200,3204,3246,3250,3257,3260,3286,3290,3307,3311,3342,3346,3413,3417,3420,3437,3441,3479,3481,3518,3523],[12,3138,578],{"id":3139},"kybernetická-bezpečnost",[724,3141,3142],{},[2162,3143],{"alt":3144,"className":3145,"src":3146},"kb-defense-in-depth",[210,2166],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3148,3149,3150,3153],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3151,140],{"className":3152,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3155,3157],{"id":3156},"základní-pojmy","Základní pojmy",[120,3159,3160,3166,3172,3178,3184,3190],{},[123,3161,3162,3165],{},[38,3163,3164],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3167,3168,3171],{},[38,3169,3170],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3173,3174,3177],{},[38,3175,3176],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3179,3180,3183],{},[38,3181,3182],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3185,3186,3189],{},[38,3187,3188],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3191,3192,3195],{},[38,3193,3194],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3197,3199],{"id":3198},"typy-útoků","Typy útoků",[198,3201,3203],{"id":3202},"podle-cílení","Podle cílení",[16,3205,3206,3218],{},[19,3207,3208],{},[22,3209,3210,3213,3215],{},[25,3211,3212],{},"Typ",[25,3214,2189],{},[25,3216,3217],{},"Cíl",[30,3219,3220,3233],{},[22,3221,3222,3227,3230],{},[35,3223,3224],{},[38,3225,3226],{},"Plošný",[35,3228,3229],{},"Útočníkovi je jedno, kdo je obětí",[35,3231,3232],{},"Botnety, spam, ransomware",[22,3234,3235,3240,3243],{},[35,3236,3237],{},[38,3238,3239],{},"Cílený (APT)",[35,3241,3242],{},"Soustředěná pozornost na konkrétní cíl",[35,3244,3245],{},"Špionáž, sabotáž, krádež dat",[198,3247,3249],{"id":3248},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3251,3252],{},[2162,3253],{"alt":3254,"className":3255,"src":3256},"apt-faze-utoku",[210,2166],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3258,3259],{},"4 fáze:",[152,3261,3262,3268,3274,3280],{},[123,3263,3264,3267],{},[38,3265,3266],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3269,3270,3273],{},[38,3271,3272],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3275,3276,3279],{},[38,3277,3278],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3281,3282,3285],{},[38,3283,3284],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3287,3289],{"id":3288},"základní-vektory-útoku","Základní vektory útoku",[120,3291,3292,3295,3298,3301,3304],{},[123,3293,3294],{},"Email s přílohou (spear phishing)",[123,3296,3297],{},"Trojanizované aplikace",[123,3299,3300],{},"Drive-by download (webové exploity)",[123,3302,3303],{},"Výměnná média (BadUSB)",[123,3305,3306],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3308,3310],{"id":3309},"software-útoky","Software útoky",[120,3312,3313,3319,3325,3331,3336],{},[123,3314,3315,3318],{},[38,3316,3317],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3320,3321,3324],{},[38,3322,3323],{},"Viry"," — poškození HW\u002FSW",[123,3326,3327,3330],{},[38,3328,3329],{},"Trojské koně"," — skrytá funkčnost",[123,3332,3333,3335],{},[38,3334,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3337,3338,3341],{},[38,3339,3340],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3343,3345],{"id":3344},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3347,3348,3360],{},[19,3349,3350],{},[22,3351,3352,3355,3357],{},[25,3353,3354],{},"Útok",[25,3356,3217],{},[25,3358,3359],{},"Efekt",[30,3361,3362,3373,3383,3393,3403],{},[22,3363,3364,3367,3370],{},[35,3365,3366],{},"Content Spoofing",[35,3368,3369],{},"Klient",[35,3371,3372],{},"Ztráta přihlašovacích údajů",[22,3374,3375,3378,3380],{},[35,3376,3377],{},"XSS",[35,3379,3369],{},[35,3381,3382],{},"Přístup k cookies",[22,3384,3385,3388,3390],{},[35,3386,3387],{},"SQL Injection",[35,3389,2096],{},[35,3391,3392],{},"Neoprávněný přístup do DB",[22,3394,3395,3398,3400],{},[35,3396,3397],{},"DoS\u002FDDoS",[35,3399,2096],{},[35,3401,3402],{},"Nedostupnost služby",[22,3404,3405,3408,3410],{},[35,3406,3407],{},"Path Traversal",[35,3409,2096],{},[35,3411,3412],{},"Přístup k souborům",[115,3414,3416],{"id":3415},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3418,3419],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3421,3422,3425,3428,3431,3434],{},[123,3423,3424],{},"Vydávání se za právníka",[123,3426,3427],{},"Podvod na CEO",[123,3429,3430],{},"Krádež dat (personální oddělení)",[123,3432,3433],{},"Kompromitace účtu",[123,3435,3436],{},"Falešné faktury",[115,3438,3440],{"id":3439},"obranné-technologie","Obranné technologie",[120,3442,3443,3449,3455,3461,3467,3473],{},[123,3444,3445,3448],{},[38,3446,3447],{},"NAC"," — řízení přístupu k síti",[123,3450,3451,3454],{},[38,3452,3453],{},"IDS"," — detekce průniku (pasivní)",[123,3456,3457,3460],{},[38,3458,3459],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3462,3463,3466],{},[38,3464,3465],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3468,3469,3472],{},[38,3470,3471],{},"DLP"," — prevence úniku dat",[123,3474,3475,3478],{},[38,3476,3477],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3480,2561],{"id":2560},[120,3482,3483,3489,3495,3501,3512],{},[123,3484,3485,3488],{},[207,3486,140],{"className":3487,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3490,3491,3494],{},[207,3492,569],{"className":3493,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3496,3497,3500],{},[207,3498,240],{"className":3499,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3502,3503,3506,3507,3511],{},[207,3504,384],{"className":3505,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3508,3510],{"className":3509,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3513,3514,3517],{},[207,3515,369],{"className":3516,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3519,2585,3520],{"id":2584},[207,3521,43],{"className":3522,"dataFsResolvedFilePath":2589,"href":2590},[210],[120,3524,3525,3531,3536,3541,3546],{},[123,3526,3527],{},[207,3528,3530],{"className":3529,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3532,3533],{},[207,3534,417],{"className":3535,"dataFsResolvedFilePath":415,"href":416},[210],[123,3537,3538],{},[207,3539,351],{"className":3540,"dataFsResolvedFilePath":349,"href":350},[210],[123,3542,3543],{},[207,3544,426],{"className":3545,"dataFsResolvedFilePath":424,"href":425},[210],[123,3547,3548],{},[207,3549,458],{"className":3550,"dataFsResolvedFilePath":3551,"href":3552},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3554},[3555,3556,3562,3563,3564,3565,3566],{"id":3156,"depth":642,"text":3157},{"id":3198,"depth":642,"text":3199,"children":3557},[3558,3559,3560,3561],{"id":3202,"depth":649,"text":3203},{"id":3248,"depth":649,"text":3249},{"id":3288,"depth":649,"text":3289},{"id":3309,"depth":649,"text":3310},{"id":3344,"depth":642,"text":3345},{"id":3415,"depth":642,"text":3416},{"id":3439,"depth":642,"text":3440},{"id":2560,"depth":642,"text":2561},{"id":2584,"depth":642,"text":2617},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3572,3573,3125],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3576,3577,3578,3579,3580],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3583,"title":369,"body":3584,"course":659,"courses":3844,"created":660,"description":641,"extension":661,"meta":3845,"navigation":664,"path":3846,"seo":3847,"sources":3848,"stem":3851,"tags":3852,"type":2632,"updated":677,"__hash__":3858},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3585,"toc":3830},[3586,3589,3596,3599,3603,3663,3667,3671,3682,3686,3697,3701,3709,3713,3724,3728,3733,3737,3748,3752,3772,3774,3806,3811],[12,3587,369],{"id":3588},"ochrana-dat",[724,3590,3591],{},[2162,3592],{"alt":3593,"className":3594,"src":3595},"ochrana-dat-technologie",[210,2166],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3597,3598],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3600,3602],{"id":3601},"formy-zneužití-dat","Formy zneužití dat",[16,3604,3605,3614],{},[19,3606,3607],{},[22,3608,3609,3612],{},[25,3610,3611],{},"Forma",[25,3613,2189],{},[30,3615,3616,3623,3631,3639,3647,3655],{},[22,3617,3618,3621],{},[35,3619,3620],{},"Zašifrování",[35,3622,435],{},[22,3624,3625,3628],{},[35,3626,3627],{},"Zveřejnění",[35,3629,3630],{},"Double ransomware",[22,3632,3633,3636],{},[35,3634,3635],{},"Odposlech",[35,3637,3638],{},"Pasivní sběr dat",[22,3640,3641,3644],{},[35,3642,3643],{},"Krádež",[35,3645,3646],{},"Cílená exfiltrace",[22,3648,3649,3652],{},[35,3650,3651],{},"Krádež dodavatelského řetězce",[35,3653,3654],{},"Triple ransomware",[22,3656,3657,3660],{},[35,3658,3659],{},"Prodej",[35,3661,3662],{},"Darknet marketplace",[115,3664,3666],{"id":3665},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3668,3670],{"id":3669},"nac-network-access-control","NAC (Network Access Control)",[120,3672,3673,3676,3679],{},[123,3674,3675],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3677,3678],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3680,3681],{},"Ekvivalenty: MDM, BYOD",[198,3683,3685],{"id":3684},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3687,3688,3691,3694],{},[123,3689,3690],{},"Monitoruje síťový provoz, generuje alerty",[123,3692,3693],{},"Pasivní systém — nezasahuje do provozu",[123,3695,3696],{},"Signaturová a anomální detekce",[198,3698,3700],{"id":3699},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3702,3703,3706],{},[123,3704,3705],{},"Aktivní systém — blokuje škodlivý provoz",[123,3707,3708],{},"Zařazen přímo do síťové cesty (in-line)",[198,3710,3712],{"id":3711},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3714,3715,3718,3721],{},[123,3716,3717],{},"Centralizovaná správa bezpečnostních logů",[123,3719,3720],{},"Sběr s agentem i bez agenta",[123,3722,3723],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3725,3727],{"id":3726},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3729,3730],{},[123,3731,3732],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3734,3736],{"id":3735},"šifrování","Šifrování",[120,3738,3739,3742,3745],{},[123,3740,3741],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3743,3744],{},"RSA (2048+ bit), DSS",[123,3746,3747],{},"SHA-256, SHA-1",[115,3749,3751],{"id":3750},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3753,3754,3760,3766,3769],{},[123,3755,3756,3759],{},[38,3757,3758],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3761,3762,3765],{},[38,3763,3764],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3767,3768],{},"Transportní a tunelovací režim",[123,3770,3771],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3773,2561],{"id":2560},[120,3775,3776,3782,3788,3794,3800],{},[123,3777,3778,3781],{},[207,3779,140],{"className":3780,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3783,3784,3787],{},[207,3785,578],{"className":3786,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3789,3790,3793],{},[207,3791,569],{"className":3792,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3795,3796,3799],{},[207,3797,351],{"className":3798,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3801,3802,3805],{},[207,3803,360],{"className":3804,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3807,2585,3808],{"id":2584},[207,3809,43],{"className":3810,"dataFsResolvedFilePath":2589,"href":2590},[210],[120,3812,3813,3819,3825],{},[123,3814,3815],{},[207,3816,3818],{"className":3817,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3820,3821],{},[207,3822,3824],{"className":3823,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3826,3827],{},[207,3828,1629],{"className":3829,"dataFsResolvedFilePath":358,"href":359},[210],{"title":641,"searchDepth":642,"depth":642,"links":3831},[3832,3833,3841,3842,3843],{"id":3601,"depth":642,"text":3602},{"id":3665,"depth":642,"text":3666,"children":3834},[3835,3836,3837,3838,3839,3840],{"id":3669,"depth":649,"text":3670},{"id":3684,"depth":649,"text":3685},{"id":3699,"depth":649,"text":3700},{"id":3711,"depth":649,"text":3712},{"id":3726,"depth":649,"text":3727},{"id":3735,"depth":649,"text":3736},{"id":3750,"depth":642,"text":3751},{"id":2560,"depth":642,"text":2561},{"id":2584,"depth":642,"text":2617},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3849,3850,2133],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","topics\u002Fochrana-dat",[658,3588,2137,3853,3854,3855,3856,3857],"nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3860,"title":569,"body":3861,"course":659,"courses":4196,"created":660,"description":641,"extension":661,"meta":4197,"navigation":664,"path":4198,"seo":4199,"sources":4200,"stem":4201,"tags":4202,"type":2632,"updated":677,"__hash__":4208},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3862,"toc":4185},[3863,3866,3873,3880,3884,3948,3952,4002,4006,4011,4030,4034,4037,4041,4055,4059,4087,4091,4140,4142,4167,4172],[12,3864,569],{"id":3865},"řízení-rizik",[724,3867,3868],{},[2162,3869],{"alt":3870,"className":3871,"src":3872},"rizeni-rizik-proces",[210,2166],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3874,3875,3876,3879],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3877,140],{"className":3878,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3881,3883],{"id":3882},"normativní-základ","Normativní základ",[16,3885,3886,3896],{},[19,3887,3888],{},[22,3889,3890,3893],{},[25,3891,3892],{},"Norma",[25,3894,3895],{},"Zaměření",[30,3897,3898,3908,3918,3928,3938],{},[22,3899,3900,3905],{},[35,3901,3902],{},[38,3903,3904],{},"ISO 31000:2019",[35,3906,3907],{},"Obecné smrnice pro management rizik",[22,3909,3910,3915],{},[35,3911,3912],{},[38,3913,3914],{},"ISO 31010:2020",[35,3916,3917],{},"Techniky posuzování rizik",[22,3919,3920,3925],{},[35,3921,3922],{},[38,3923,3924],{},"ISO\u002FIEC 27005:2019",[35,3926,3927],{},"Řízení rizik bezpečnosti informací",[22,3929,3930,3935],{},[35,3931,3932],{},[38,3933,3934],{},"NIST SP 800-30",[35,3936,3937],{},"Průvodce hodnocením rizik",[22,3939,3940,3945],{},[35,3941,3942],{},[38,3943,3944],{},"NIST SP 800-39",[35,3946,3947],{},"Proces řízení bezpečnostních rizik",[115,3949,3951],{"id":3950},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,3953,3954,3960,3966,3972,3978,3984,3990,3996],{},[123,3955,3956,3959],{},[38,3957,3958],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,3961,3962,3965],{},[38,3963,3964],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,3967,3968,3971],{},[38,3969,3970],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,3973,3974,3977],{},[38,3975,3976],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,3979,3980,3983],{},[38,3981,3982],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,3985,3986,3989],{},[38,3987,3988],{},"Akceptace rizik"," — formální rozhodnutí",[123,3991,3992,3995],{},[38,3993,3994],{},"Komunikace"," — sdílení informací o rizicích",[123,3997,3998,4001],{},[38,3999,4000],{},"Monitorování"," — průběžné přezkoumávání",[115,4003,4005],{"id":4004},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4007,4008],{},[38,4009,4010],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4012,4013,4019,4024],{},[123,4014,4015,4018],{},[38,4016,4017],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4020,4021,4023],{},[38,4022,3176],{}," — slabé místo aktiva (stupnice 1–5)",[123,4025,4026,4029],{},[38,4027,4028],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4031,4033],{"id":4032},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4035,4036],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4038,4040],{"id":4039},"klíčové-dokumenty","Klíčové dokumenty",[120,4042,4043,4049],{},[123,4044,4045,4048],{},[38,4046,4047],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4050,4051,4054],{},[38,4052,4053],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4056,4058],{"id":4057},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4060,4061,4067,4072,4077,4082],{},[123,4062,4063,4066],{},[38,4064,4065],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4068,4069,4071],{},[38,4070,2893],{}," — odpovědný za ISMS",[123,4073,4074,4076],{},[38,4075,2904],{}," — návrh a implementace opatření",[123,4078,4079,4081],{},[38,4080,2914],{}," — provádění auditů",[123,4083,4084,4086],{},[38,4085,2924],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4088,4090],{"id":4089},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4092,4093,4105],{},[19,4094,4095],{},[22,4096,4097,4100,4102],{},[25,4098,4099],{},"Úroveň",[25,4101,3895],{},[25,4103,4104],{},"Typ rizika",[30,4106,4107,4118,4129],{},[22,4108,4109,4112,4115],{},[35,4110,4111],{},"Stupeň 1",[35,4113,4114],{},"Organizace",[35,4116,4117],{},"Strategické riziko",[22,4119,4120,4123,4126],{},[35,4121,4122],{},"Stupeň 2",[35,4124,4125],{},"Poslání\u002Fobchodní procesy",[35,4127,4128],{},"Taktické riziko",[22,4130,4131,4134,4137],{},[35,4132,4133],{},"Stupeň 3",[35,4135,4136],{},"Informační systémy",[35,4138,4139],{},"Operační riziko",[115,4141,2561],{"id":2560},[120,4143,4144,4150,4156,4162],{},[123,4145,4146,4149],{},[207,4147,140],{"className":4148,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4151,4152,4155],{},[207,4153,384],{"className":4154,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4157,4158,4161],{},[207,4159,393],{"className":4160,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4163,4164,3787],{},[207,4165,578],{"className":4166,"dataFsResolvedFilePath":576,"href":577},[210],[115,4168,2585,4169],{"id":2584},[207,4170,43],{"className":4171,"dataFsResolvedFilePath":2589,"href":2590},[210],[120,4173,4174,4180],{},[123,4175,4176],{},[207,4177,4179],{"className":4178,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4181,4182],{},[207,4183,222],{"className":4184,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4186},[4187,4188,4189,4190,4191,4192,4193,4194,4195],{"id":3882,"depth":642,"text":3883},{"id":3950,"depth":642,"text":3951},{"id":4004,"depth":642,"text":4005},{"id":4032,"depth":642,"text":4033},{"id":4039,"depth":642,"text":4040},{"id":4057,"depth":642,"text":4058},{"id":4089,"depth":642,"text":4090},{"id":2560,"depth":642,"text":2561},{"id":2584,"depth":642,"text":2617},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3126,3125],"topics\u002Frizeni-rizik",[658,4203,4204,4205,4206,4207],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4210,"title":4211,"body":4212,"course":659,"courses":4443,"created":660,"description":641,"extension":661,"meta":4444,"navigation":664,"path":4445,"seo":4446,"sources":4447,"stem":4449,"tags":4450,"type":2632,"updated":677,"__hash__":4455},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4213,"toc":4435},[4214,4217,4224,4227,4231,4330,4334,4369,4373,4393,4397,4400,4402,4422,4427],[12,4215,4211],{"id":4216},"sae-budování-bezpečnostního-povědomí",[724,4218,4219],{},[2162,4220],{"alt":4221,"className":4222,"src":4223},"sae-pyramida",[210,2166],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4225,4226],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4228,4230],{"id":4229},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4232,4233,4250],{},[19,4234,4235],{},[22,4236,4237,4239,4242,4244,4247],{},[25,4238,4099],{},[25,4240,4241],{},"Příznak",[25,4243,3217],{},[25,4245,4246],{},"Metody",[25,4248,4249],{},"Časový rámec",[30,4251,4252,4272,4292,4312],{},[22,4253,4254,4260,4263,4266,4269],{},[35,4255,4256,4259],{},[38,4257,4258],{},"Awareness"," (povědomí)",[35,4261,4262],{},"„Co\"",[35,4264,4265],{},"Rozpoznávání",[35,4267,4268],{},"Média, videa, plakáty",[35,4270,4271],{},"Krátkodobý",[22,4273,4274,4280,4283,4286,4289],{},[35,4275,4276,4279],{},[38,4277,4278],{},"Training"," (výcvik)",[35,4281,4282],{},"„Jak\"",[35,4284,4285],{},"Dovednosti",[35,4287,4288],{},"Přednášky, případovky, cvičení",[35,4290,4291],{},"Střednědobý",[22,4293,4294,4300,4303,4306,4309],{},[35,4295,4296,4299],{},[38,4297,4298],{},"Education"," (vzdělávání)",[35,4301,4302],{},"„Proč\"",[35,4304,4305],{},"Porozumění",[35,4307,4308],{},"Semináře, diskuze, výzkum",[35,4310,4311],{},"Dlouhodobý",[22,4313,4314,4319,4321,4324,4327],{},[35,4315,4316],{},[38,4317,4318],{},"Professional Development",[35,4320,2896],{},[35,4322,4323],{},"Profesní rozvoj",[35,4325,4326],{},"Certifikace, konference",[35,4328,4329],{},"Průběžný",[115,4331,4333],{"id":4332},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4335,4336,4339,4342,4345,4348,4351,4354,4357,4360,4363,4366],{},[123,4337,4338],{},"Role a odpovědnosti v programu",[123,4340,4341],{},"Stanovení cílů pro každou fázi",[123,4343,4344],{},"Rozdělení uživatelů (analýza)",[123,4346,4347],{},"Vytvoření školících materiálů dle skupin",[123,4349,4350],{},"Určení cíle pro každou skupinu",[123,4352,4353],{},"Témata pro každou relaci\u002Fkurz",[123,4355,4356],{},"Metody nasazení (metodiky)",[123,4358,4359],{},"Dokumentace a zpětná vazba",[123,4361,4362],{},"Vyhodnocení a aktualizace materiálů",[123,4364,4365],{},"Četnost opakování",[123,4367,4368],{},"Kalkulace",[115,4370,4372],{"id":4371},"modely-řízení","Modely řízení",[120,4374,4375,4381,4387],{},[123,4376,4377,4380],{},[38,4378,4379],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4382,4383,4386],{},[38,4384,4385],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4388,4389,4392],{},[38,4390,4391],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4394,4396],{"id":4395},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4398,4399],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4401,2561],{"id":2560},[120,4403,4404,4410,4416],{},[123,4405,4406,4409],{},[207,4407,140],{"className":4408,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4411,4412,4415],{},[207,4413,578],{"className":4414,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4417,4418,4421],{},[207,4419,569],{"className":4420,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4423,2585,4424],{"id":2584},[207,4425,43],{"className":4426,"dataFsResolvedFilePath":2589,"href":2590},[210],[120,4428,4429],{},[123,4430,4431],{},[207,4432,4434],{"className":4433,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4436},[4437,4438,4439,4440,4441,4442],{"id":4229,"depth":642,"text":4230},{"id":4332,"depth":642,"text":4333},{"id":4371,"depth":642,"text":4372},{"id":4395,"depth":642,"text":4396},{"id":2560,"depth":642,"text":2561},{"id":2584,"depth":642,"text":2617},[658],{},"\u002Ftopics\u002Fsae",{"title":4211,"description":641},[4448],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4451,4452,4453,4206,4454],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4457,4459,4463,4467],{"slug":658,"path":2590,"title":7,"snippet":4458},"… čnost aplikací a dat - Bezpečnost webu — OWASP, SQL injection, XSS, Solid - \u003C\u003Cimork-email>> — SPF, DKIM, DMARC, S\u002FMIME, šifrování - Ochrana dat — NAC, IDS\u002FIPS, …",{"slug":4460,"path":545,"title":4461,"snippet":4462},"imork-digitalni-identita","Digitální identita a digitální stopa","… chrany osobních údajů - Bezpečnost webu — online identita a webové služby - \u003C\u003Cimork-email>> — ověřování identity odesílatele - SAE — budování povědomí o digitální stop …",{"slug":4464,"path":452,"title":4465,"snippet":4466},"imork-internetova-bezpecnost","Internetová bezpečnost — cvičení","… komunikačních partnerů - Opatrnost při sdílení osobních údajů - Rozpoznávání phishingu a \u003C\u003Cimork-email>> ### Technická opatření - Aktualizace SW a OS - Používání antivirového řešení - Šifrován …",{"slug":3588,"path":602,"title":369,"snippet":4468},"… ik]] — hodnocení aktiv a hrozeb - Bezpečnost webu — webové útoky a obrana - \u003C\u003Cimork-email>> — emailové protokoly ## Zdroje v kurzu ImorK - [[imork-ochrana-dat|Ochrana da …",[4470,4473,4474,4476],{"slug":4471,"title":4472,"path":416,"sharedTags":642},"imork-ai-utoky","AI útoky a kybernetická kriminalita",{"slug":3588,"title":369,"path":602,"sharedTags":642},{"slug":4475,"title":369,"path":368,"sharedTags":642},"imork-ochrana-dat",{"slug":4477,"title":4478,"path":503,"sharedTags":642},"imork-tor","TOR — The Onion Router",1777154957137]