[{"data":1,"prerenderedAt":4268},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-financni-sektor":1626,"course-stats-imork":1932,"course-topics-imork":1936,"backlinks-imork-financni-sektor":4245,"related-imork-financni-sektor":4253},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":1931},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":1637,"extension":661,"meta":1918,"navigation":664,"path":1919,"seo":1920,"sources":1921,"stem":1923,"tags":1924,"type":1929,"updated":677,"__hash__":1930},"summaries\u002Fsummaries\u002Fimork-financni-sektor.md","ISMS ve finančním sektoru",{"type":9,"value":1631,"toc":1902},[1632,1635,1638,1642,1663,1667,1670,1674,1728,1732,1752,1756,1782,1786,1789,1793,1807,1811,1814,1834,1838,1843,1858,1862,1888,1897],[12,1633,1629],{"id":1634},"isms-ve-finančním-sektoru",[724,1636,1637],{},"Přednáška z 17. ledna 2023. Regulatorní rámec EU pro kybernetickou bezpečnost a digitální odolnost ve finančním sektoru.",[115,1639,1641],{"id":1640},"kontext","Kontext",[120,1643,1644,1647,1650,1657],{},[123,1645,1646],{},"Digitální transformace finančního sektoru je v pokročilé fázi",[123,1648,1649],{},"Výrazně vzrostlo kybernetické nebezpečí",[123,1651,1652,1656],{},[207,1653,1655],{"className":1654,"dataFsResolvedFilePath":585,"href":586},[210],"Řízení bezpečnosti a budování povědomí"," zaostává",[123,1658,1659,1662],{},[38,1660,1661],{},"Řešení",": řízení bezpečnosti začíná ve vrcholovém vedení — firmy budou více právně odpovědné",[115,1664,1666],{"id":1665},"dora-digital-operational-resilience-act","DORA — Digital Operational Resilience Act",[724,1668,1669],{},"Nařízení EU č. 2022\u002F2554 o digitální provozní odolnosti finančního sektoru. Platnost od 16. 1. 2023.",[198,1671,1673],{"id":1672},"_4-pilíře-dora","4 pilíře DORA",[16,1675,1676,1686],{},[19,1677,1678],{},[22,1679,1680,1683],{},[25,1681,1682],{},"Pilíř",[25,1684,1685],{},"Obsah",[30,1687,1688,1698,1708,1718],{},[22,1689,1690,1695],{},[35,1691,1692],{},[38,1693,1694],{},"Řízení IKT rizik",[35,1696,1697],{},"Identifikace, ochrana, prevence, detekce, reakce, školení, komunikace",[22,1699,1700,1705],{},[35,1701,1702],{},[38,1703,1704],{},"Hlášení IKT incidentů",[35,1706,1707],{},"Konsolidace stávajících požadavků, harmonizace procesních pravidel",[22,1709,1710,1715],{},[35,1711,1712],{},[38,1713,1714],{},"Testování digitální odolnosti",[35,1716,1717],{},"Testování IKT nástrojů a systémů; TLPT pro významné subjekty",[22,1719,1720,1725],{},[35,1721,1722],{},[38,1723,1724],{},"Řízení rizik třetích stran",[35,1726,1727],{},"Posílení rámce, monitoring dodavatelů vč. cloudových služeb",[198,1729,1731],{"id":1730},"_6-oblastí-opatření-čl-440","6 oblastí opatření (čl. 4–40)",[152,1733,1734,1737,1740,1743,1746,1749],{},[123,1735,1736],{},"Požadavky na správu a řízení (čl. 4)",[123,1738,1739],{},"Řízení rizik v ICT (čl. 5–14)",[123,1741,1742],{},"Hlášení incidentů (čl. 15–20)",[123,1744,1745],{},"Testování digitální odolnosti (čl. 21–24)",[123,1747,1748],{},"Rizika třetích stran (čl. 25–39)",[123,1750,1751],{},"Sdílení informací (čl. 40)",[198,1753,1755],{"id":1754},"klíčové-definice","Klíčové definice",[120,1757,1758,1764,1770,1776],{},[123,1759,1760,1763],{},[38,1761,1762],{},"Digitální provozní odolnost"," — schopnost finančního subjektu budovat, zajišťovat a revidovat provozní integritu z technologického hlediska",[123,1765,1766,1769],{},[38,1767,1768],{},"Rámec pro řízení rizik"," — strategie, politiky, postupy, protokoly a nástroje IKT pro ochranu fyzických komponent a infrastruktur",[123,1771,1772,1775],{},[38,1773,1774],{},"TLPT"," — Threat-Led Penetration Testing (penetrační testování na základě hrozeb)",[123,1777,1778,1781],{},[38,1779,1780],{},"TPRM"," — Third Party Risk Management",[115,1783,1785],{"id":1784},"mica-markets-in-crypto-assets","MiCA — Markets in Crypto-Assets",[724,1787,1788],{},"Nařízení EU o trzích s kryptoaktivy. Vytváří regulatorní rámec podporující inovace, využívající potenciál kryptoaktiv, zachovávající finanční stabilitu a chránící investory.",[198,1790,1792],{"id":1791},"klíčové-pojmy","Klíčové pojmy",[120,1794,1795,1801],{},[123,1796,1797,1800],{},[38,1798,1799],{},"Kryptoaktivum"," — digitální zachycení hodnoty nebo práv, převoditelné a uložitelné elektronicky pomocí DLT",[123,1802,1803,1806],{},[38,1804,1805],{},"Bílá kniha"," (whitepaper) — dokument s informacemi o vydavateli, projektu, kapitálu, právech a povinnostech",[115,1808,1810],{"id":1809},"dlt-distributed-ledger-technology","DLT — Distributed Ledger Technology",[724,1812,1813],{},"Technologie sdíleného\u002Fdistribuovaného registru. Pilotní režim EU pro tržní infrastruktury na DLT.",[120,1815,1816,1819,1822,1828,1831],{},[123,1817,1818],{},"DLT = konsenzuálně sdílená databáze s validací transakcí",[123,1820,1821],{},"Decentralizace a distribuce mezi uživateli (peer-to-peer)",[123,1823,1824,1827],{},[38,1825,1826],{},"Blockchain je podmnožinou DLT"," (ne naopak)",[123,1829,1830],{},"Pilotní režim: testování infrastruktury pro obchodování s finančními nástroji na DLT",[123,1832,1833],{},"Spolupráce s ESMA (Evropský orgán pro cenné papíry a trhy)",[115,1835,1837],{"id":1836},"komplexní-regulatorní-balíček-eu","Komplexní regulatorní balíček EU",[724,1839,1840],{},[38,1841,1842],{},"DORA + MiCA + DLT = balíček regulace digitálních financí",[120,1844,1845,1852,1855],{},[123,1846,1847,1848],{},"DORA → provozní odolnost a ",[207,1849,1851],{"className":1850,"dataFsResolvedFilePath":576,"href":577},[210],"kybernetická bezpečnost",[123,1853,1854],{},"MiCA → regulace kryptoaktiv",[123,1856,1857],{},"DLT → pilotní tržní infrastruktury",[115,1859,1861],{"id":1860},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,1863,1864,1870,1876,1882],{},[123,1865,1866,1869],{},[207,1867,140],{"className":1868,"dataFsResolvedFilePath":559,"href":560},[210]," — DORA jako sektorový regulační rámec",[123,1871,1872,1875],{},[207,1873,569],{"className":1874,"dataFsResolvedFilePath":567,"href":568},[210]," — řízení IKT rizik jako jádro DORA",[123,1877,1878,1881],{},[207,1879,384],{"className":1880,"dataFsResolvedFilePath":382,"href":383},[210]," — digitální provozní odolnost = kontinuita",[123,1883,1884,1887],{},[207,1885,578],{"className":1886,"dataFsResolvedFilePath":576,"href":577},[210]," — hlášení incidentů, testování",[115,1889,1891,1892],{"id":1890},"zdroj-v-kurzu-imork","Zdroj v kurzu ",[207,1893,43],{"className":1894,"dataFsResolvedFilePath":1895,"href":1896},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,1898,1899],{},[123,1900,1901],{},"Přednáška 2005 — ISMS ve finančním sektoru (2023)",{"title":641,"searchDepth":642,"depth":642,"links":1903},[1904,1905,1910,1913,1914,1915,1916],{"id":1640,"depth":642,"text":1641},{"id":1665,"depth":642,"text":1666,"children":1906},[1907,1908,1909],{"id":1672,"depth":649,"text":1673},{"id":1730,"depth":649,"text":1731},{"id":1754,"depth":649,"text":1755},{"id":1784,"depth":642,"text":1785,"children":1911},[1912],{"id":1791,"depth":649,"text":1792},{"id":1809,"depth":642,"text":1810},{"id":1836,"depth":642,"text":1837},{"id":1860,"depth":642,"text":1861},{"id":1890,"depth":642,"text":1917},"Zdroj v kurzu ImorK",{},"\u002Fsummaries\u002Fimork-financni-sektor",{"title":1629,"description":1637},[1922],"raw\u002Fimork\u002F2005 VUT_Bezp_Finanční sektor_2023.pdf","summaries\u002Fimork-financni-sektor",[658,671,1925,1926,1927,1928],"dora","mica","dlt","blockchain","summary","osR48igDGUbVkCL7ETKALjpgE2yIOKJ1Ty643nibJbk","summaries",{"zapisku":1624,"topics":1933,"summaries":1934,"outputs":1935},6,35,0,[1937,2420,2918,3368,3648,3998],{"id":1938,"title":1939,"body":1940,"course":659,"courses":2404,"created":660,"description":641,"extension":661,"meta":2405,"navigation":664,"path":2406,"seo":2407,"sources":2408,"stem":2411,"tags":2412,"type":2418,"updated":677,"__hash__":2419},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":1941,"toc":2391},[1942,1945,1954,1957,1959,2053,2057,2110,2114,2137,2141,2230,2234,2237,2241,2318,2322,2348,2350,2370,2377],[12,1943,1939],{"id":1944},"bcm-řízení-kontinuity-činnosti",[724,1946,1947],{},[1948,1949],"img",{"alt":1950,"className":1951,"src":1953},"bcm-rpo-rto",[210,1952],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,1955,1956],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,1958,1792],{"id":1791},[16,1960,1961,1974],{},[19,1962,1963],{},[22,1964,1965,1968,1971],{},[25,1966,1967],{},"Pojem",[25,1969,1970],{},"Anglicky",[25,1972,1973],{},"Popis",[30,1975,1976,1989,2001,2014,2027,2040],{},[22,1977,1978,1983,1986],{},[35,1979,1980],{},[38,1981,1982],{},"BCMS",[35,1984,1985],{},"Business Continuity Management System",[35,1987,1988],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,1990,1991,1995,1998],{},[35,1992,1993],{},[38,1994,384],{},[35,1996,1997],{},"Business Continuity Management",[35,1999,2000],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2002,2003,2008,2011],{},[35,2004,2005],{},[38,2006,2007],{},"BIA",[35,2009,2010],{},"Business Impact Analysis",[35,2012,2013],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2015,2016,2021,2024],{},[35,2017,2018],{},[38,2019,2020],{},"MBCO",[35,2022,2023],{},"Minimum Business Continuity Objective",[35,2025,2026],{},"Minimální přijatelná úroveň služeb",[22,2028,2029,2034,2037],{},[35,2030,2031],{},[38,2032,2033],{},"RPO",[35,2035,2036],{},"Recovery Point Objective",[35,2038,2039],{},"Do jakého bodu v minulosti lze obnovit data",[22,2041,2042,2047,2050],{},[35,2043,2044],{},[38,2045,2046],{},"RTO",[35,2048,2049],{},"Recovery Time Objective",[35,2051,2052],{},"Čas potřebný pro obnovu provozu",[115,2054,2056],{"id":2055},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2058,2059,2068],{},[19,2060,2061],{},[22,2062,2063,2066],{},[25,2064,2065],{},"Fáze",[25,2067,1685],{},[30,2069,2070,2080,2090,2100],{},[22,2071,2072,2077],{},[35,2073,2074],{},[38,2075,2076],{},"Plan",[35,2078,2079],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2081,2082,2087],{},[35,2083,2084],{},[38,2085,2086],{},"Do",[35,2088,2089],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2091,2092,2097],{},[35,2093,2094],{},[38,2095,2096],{},"Check",[35,2098,2099],{},"Monitoring, audit, přezkoumání managementem",[22,2101,2102,2107],{},[35,2103,2104],{},[38,2105,2106],{},"Act",[35,2108,2109],{},"Nápravná opatření, neustálé zlepšování",[115,2111,2113],{"id":2112},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2115,2116,2119,2122,2125,2128,2131,2134],{},[123,2117,2118],{},"Kap. 4 — kontext organizace",[123,2120,2121],{},"Kap. 5 — vedení (leadership)",[123,2123,2124],{},"Kap. 6 — plánování (BIA, rizika)",[123,2126,2127],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2129,2130],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2132,2133],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2135,2136],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2138,2140],{"id":2139},"analýza-steeple","Analýza STEEPLE",[16,2142,2143,2153],{},[19,2144,2145],{},[22,2146,2147,2150],{},[25,2148,2149],{},"Faktor",[25,2151,2152],{},"Oblast",[30,2154,2155,2166,2177,2188,2198,2209,2220],{},[22,2156,2157,2163],{},[35,2158,2159,2162],{},[38,2160,2161],{},"S","ociální",[35,2164,2165],{},"Zaměstnanost, bezpečnost, komunity",[22,2167,2168,2174],{},[35,2169,2170,2173],{},[38,2171,2172],{},"T","echnologický",[35,2175,2176],{},"Závislost na technologiích",[22,2178,2179,2185],{},[35,2180,2181,2184],{},[38,2182,2183],{},"E","konomický",[35,2186,2187],{},"Ekonomická situace, finanční instituce",[22,2189,2190,2195],{},[35,2191,2192,2194],{},[38,2193,2183],{},"tický",[35,2196,2197],{},"Podnikatelská etika, média, veřejnost",[22,2199,2200,2206],{},[35,2201,2202,2205],{},[38,2203,2204],{},"P","olitický",[35,2207,2208],{},"Politický systém, hrozba nepokojů",[22,2210,2211,2217],{},[35,2212,2213,2216],{},[38,2214,2215],{},"L","egislativní",[35,2218,2219],{},"Předpisy, zákony",[22,2221,2222,2227],{},[35,2223,2224,2226],{},[38,2225,2183],{},"nvironmentální",[35,2228,2229],{},"Životní prostředí, přírodní hrozby",[115,2231,2233],{"id":2232},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2235,2236],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2238,2240],{"id":2239},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2242,2243,2252],{},[19,2244,2245],{},[22,2246,2247,2250],{},[25,2248,2249],{},"Tier",[25,2251,1973],{},[30,2253,2254,2262,2270,2278,2286,2294,2302,2310],{},[22,2255,2256,2259],{},[35,2257,2258],{},"0",[35,2260,2261],{},"Žádná off-site data",[22,2263,2264,2267],{},[35,2265,2266],{},"1",[35,2268,2269],{},"Fyzická záloha + cold site",[22,2271,2272,2275],{},[35,2273,2274],{},"2",[35,2276,2277],{},"Fyzická záloha + hot site",[22,2279,2280,2283],{},[35,2281,2282],{},"3",[35,2284,2285],{},"Elektronický trezor (electronic vaulting)",[22,2287,2288,2291],{},[35,2289,2290],{},"4",[35,2292,2293],{},"Point-in-time recovery",[22,2295,2296,2299],{},[35,2297,2298],{},"5",[35,2300,2301],{},"Two-site commit (kontinuální přenos)",[22,2303,2304,2307],{},[35,2305,2306],{},"6",[35,2308,2309],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2311,2312,2315],{},[35,2313,2314],{},"7",[35,2316,2317],{},"Automatizovaná obnova (AI monitoring)",[198,2319,2321],{"id":2320},"cloud-dr","Cloud DR",[120,2323,2324,2330,2336,2342],{},[123,2325,2326,2329],{},[38,2327,2328],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2331,2332,2335],{},[38,2333,2334],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2337,2338,2341],{},[38,2339,2340],{},"Hot DR"," — paralelní řešení v tandemu",[123,2343,2344,2347],{},[38,2345,2346],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2349,1861],{"id":1860},[120,2351,2352,2358,2364],{},[123,2353,2354,2357],{},[207,2355,140],{"className":2356,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2359,2360,2363],{},[207,2361,569],{"className":2362,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2365,2366,2369],{},[207,2367,578],{"className":2368,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2371,2373,2374],{"id":2372},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2375,43],{"className":2376,"dataFsResolvedFilePath":1895,"href":1896},[210],[120,2378,2379,2385],{},[123,2380,2381],{},[207,2382,2384],{"className":2383,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2386,2387],{},[207,2388,2390],{"className":2389,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2392},[2393,2394,2395,2396,2397,2401,2402],{"id":1791,"depth":642,"text":1792},{"id":2055,"depth":642,"text":2056},{"id":2112,"depth":642,"text":2113},{"id":2139,"depth":642,"text":2140},{"id":2232,"depth":642,"text":2233,"children":2398},[2399,2400],{"id":2239,"depth":649,"text":2240},{"id":2320,"depth":649,"text":2321},{"id":1860,"depth":642,"text":1861},{"id":2372,"depth":642,"text":2403},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":1939,"description":641},[2409,2410],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2413,2414,2415,2416,2417],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2421,"title":2422,"body":2423,"course":659,"courses":2905,"created":660,"description":641,"extension":661,"meta":2906,"navigation":664,"path":2907,"seo":2908,"sources":2909,"stem":2912,"tags":2913,"type":2418,"updated":677,"__hash__":2917},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2424,"toc":2890},[2425,2428,2435,2442,2445,2449,2515,2519,2523,2582,2586,2606,2610,2614,2715,2719,2742,2746,2768,2772,2779,2835,2837,2868,2873],[12,2426,2422],{"id":2427},"isms-systém-řízení-bezpečnosti-informací",[724,2429,2430],{},[1948,2431],{"alt":2432,"className":2433,"src":2434},"isms-pdca-cyklus",[210,1952],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2436,2437],{},[1948,2438],{"alt":2439,"className":2440,"src":2441},"isms-oborova-mapa",[210,1952],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2443,2444],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2446,2448],{"id":2447},"základní-pilíře","Základní pilíře",[16,2450,2451,2461],{},[19,2452,2453],{},[22,2454,2455,2457,2459],{},[25,2456,1682],{},[25,2458,1970],{},[25,2460,1973],{},[30,2462,2463,2476,2489,2502],{},[22,2464,2465,2470,2473],{},[35,2466,2467],{},[38,2468,2469],{},"Důvěrnost",[35,2471,2472],{},"Confidentiality",[35,2474,2475],{},"Přístup pouze oprávněným osobám",[22,2477,2478,2483,2486],{},[35,2479,2480],{},[38,2481,2482],{},"Integrita",[35,2484,2485],{},"Integrity",[35,2487,2488],{},"Ochrana před neoprávněnou změnou",[22,2490,2491,2496,2499],{},[35,2492,2493],{},[38,2494,2495],{},"Dostupnost",[35,2497,2498],{},"Availability",[35,2500,2501],{},"Systémy a data dostupné v potřebný čas",[22,2503,2504,2509,2512],{},[35,2505,2506],{},[38,2507,2508],{},"Nepopiratelnost",[35,2510,2511],{},"Non-repudiation",[35,2513,2514],{},"Prokázání autorství akce",[115,2516,2518],{"id":2517},"normativní-rámec","Normativní rámec",[198,2520,2522],{"id":2521},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2524,2525,2531,2537,2548,2554,2564,2573],{},[123,2526,2527,2530],{},[38,2528,2529],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2532,2533,2536],{},[38,2534,2535],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2538,2539,2542,2543,2547],{},[38,2540,2541],{},"ISO\u002FIEC 27005"," — ",[207,2544,2546],{"className":2545,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2549,2550,2553],{},[38,2551,2552],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2555,2556,2559,2560],{},[38,2557,2558],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2561,2563],{"className":2562,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2565,2566,2559,2569],{},[38,2567,2568],{},"ISO\u002FIEC 27019",[207,2570,2572],{"className":2571,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2574,2575,2559,2578],{},[38,2576,2577],{},"ISO\u002FIEC 27799",[207,2579,2581],{"className":2580,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2583,2585],{"id":2584},"další-rámce","Další rámce",[120,2587,2588,2594,2600],{},[123,2589,2590,2593],{},[38,2591,2592],{},"NIST"," — americké standardy (SP 800 řada)",[123,2595,2596,2599],{},[38,2597,2598],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2601,2602,2605],{},[38,2603,2604],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2607,2609],{"id":2608},"governance-řízení","Governance (řízení)",[198,2611,2613],{"id":2612},"bezpečnostní-role","Bezpečnostní role",[16,2615,2616,2628],{},[19,2617,2618],{},[22,2619,2620,2623,2625],{},[25,2621,2622],{},"Role",[25,2624,40],{},[25,2626,2627],{},"Odpovědnost",[30,2629,2630,2641,2652,2663,2674,2685,2695,2705],{},[22,2631,2632,2635,2638],{},[35,2633,2634],{},"Chief Information Officer",[35,2636,2637],{},"CIO",[35,2639,2640],{},"Celkové řízení ICT",[22,2642,2643,2646,2649],{},[35,2644,2645],{},"Chief Information Security Officer",[35,2647,2648],{},"CISO",[35,2650,2651],{},"Řízení informační bezpečnosti",[22,2653,2654,2657,2660],{},[35,2655,2656],{},"Chief Technology Officer",[35,2658,2659],{},"CTO",[35,2661,2662],{},"Technologická strategie",[22,2664,2665,2668,2671],{},[35,2666,2667],{},"IS Security Officer",[35,2669,2670],{},"ISSO",[35,2672,2673],{},"Bezpečnost IS",[22,2675,2676,2679,2682],{},[35,2677,2678],{},"Manažer KB",[35,2680,2681],{},"—",[35,2683,2684],{},"Odpovědný za ISMS",[22,2686,2687,2690,2692],{},[35,2688,2689],{},"Architekt KB",[35,2691,2681],{},[35,2693,2694],{},"Návrh a implementace opatření",[22,2696,2697,2700,2702],{},[35,2698,2699],{},"Auditor KB",[35,2701,2681],{},[35,2703,2704],{},"Provádění auditů",[22,2706,2707,2710,2712],{},[35,2708,2709],{},"Garant aktiva",[35,2711,2681],{},[35,2713,2714],{},"Rozvoj, použití a bezpečnost aktiva",[198,2716,2718],{"id":2717},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,2720,2721,2727,2736],{},[123,2722,2723,2726],{},[38,2724,2725],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,2728,2729,2732,2733],{},[38,2730,2731],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,2734,240],{"className":2735,"dataFsResolvedFilePath":585,"href":586},[210],[123,2737,2738,2741],{},[38,2739,2740],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,2743,2745],{"id":2744},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,2747,2748,2753,2758,2763],{},[123,2749,2750,2752],{},[38,2751,2076],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,2754,2755,2757],{},[38,2756,2086],{}," — implementace opatření, řízení rizik",[123,2759,2760,2762],{},[38,2761,2096],{}," — monitorování, audit, přezkoumání",[123,2764,2765,2767],{},[38,2766,2106],{}," — nápravná opatření, neustálé zlepšování",[115,2769,2771],{"id":2770},"oborová-řešení-isms","Oborová řešení ISMS",[724,2773,2774,2775,2778],{},"Kurz ",[207,2776,43],{"className":2777,"dataFsResolvedFilePath":1895,"href":1896},[210]," pokrývá ISMS specifika pro:",[120,2780,2781,2787,2793,2800,2806,2813,2819,2825,2830],{},[123,2782,2783],{},[207,2784,2786],{"className":2785,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,2788,2789,2792],{},[207,2790,282],{"className":2791,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,2794,2795,2799],{},[207,2796,2798],{"className":2797,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,2801,2802,2805],{},[207,2803,300],{"className":2804,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,2807,2808,2812],{},[207,2809,2811],{"className":2810,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,2814,2815,2818],{},[207,2816,318],{"className":2817,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,2820,2821,2824],{},[207,2822,327],{"className":2823,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,2826,2827],{},[207,2828,336],{"className":2829,"dataFsResolvedFilePath":334,"href":335},[210],[123,2831,2832],{},[207,2833,273],{"className":2834,"dataFsResolvedFilePath":271,"href":272},[210],[115,2836,1861],{"id":1860},[120,2838,2839,2845,2850,2856,2862],{},[123,2840,2841,2844],{},[207,2842,569],{"className":2843,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,2846,2847,587],{},[207,2848,240],{"className":2849,"dataFsResolvedFilePath":585,"href":586},[210],[123,2851,2852,2855],{},[207,2853,384],{"className":2854,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,2857,2858,2861],{},[207,2859,578],{"className":2860,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,2863,2864,2867],{},[207,2865,369],{"className":2866,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,2869,2373,2870],{"id":2372},[207,2871,43],{"className":2872,"dataFsResolvedFilePath":1895,"href":1896},[210],[120,2874,2875,2880,2885],{},[123,2876,2877],{},[207,2878,222],{"className":2879,"dataFsResolvedFilePath":220,"href":221},[210],[123,2881,2882],{},[207,2883,249],{"className":2884,"dataFsResolvedFilePath":247,"href":248},[210],[123,2886,2887],{},[207,2888,231],{"className":2889,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":2891},[2892,2893,2897,2901,2902,2903,2904],{"id":2447,"depth":642,"text":2448},{"id":2517,"depth":642,"text":2518,"children":2894},[2895,2896],{"id":2521,"depth":649,"text":2522},{"id":2584,"depth":649,"text":2585},{"id":2608,"depth":642,"text":2609,"children":2898},[2899,2900],{"id":2612,"depth":649,"text":2613},{"id":2717,"depth":649,"text":2718},{"id":2744,"depth":642,"text":2745},{"id":2770,"depth":642,"text":2771},{"id":1860,"depth":642,"text":1861},{"id":2372,"depth":642,"text":2403},[658],{},"\u002Ftopics\u002Fisms",{"title":2422,"description":641},[2910,2911,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,2914,2915,672,2916],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":2919,"title":578,"body":2920,"course":659,"courses":3353,"created":660,"description":641,"extension":661,"meta":3354,"navigation":664,"path":3355,"seo":3356,"sources":3357,"stem":3360,"tags":3361,"type":2418,"updated":677,"__hash__":3367},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":2921,"toc":3339},[2922,2925,2932,2939,2943,2981,2985,2989,3031,3035,3042,3045,3071,3075,3092,3096,3127,3131,3199,3203,3206,3223,3227,3265,3267,3304,3309],[12,2923,578],{"id":2924},"kybernetická-bezpečnost",[724,2926,2927],{},[1948,2928],{"alt":2929,"className":2930,"src":2931},"kb-defense-in-depth",[210,1952],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,2933,2934,2935,2938],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,2936,140],{"className":2937,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,2940,2942],{"id":2941},"základní-pojmy","Základní pojmy",[120,2944,2945,2951,2957,2963,2969,2975],{},[123,2946,2947,2950],{},[38,2948,2949],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,2952,2953,2956],{},[38,2954,2955],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,2958,2959,2962],{},[38,2960,2961],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,2964,2965,2968],{},[38,2966,2967],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,2970,2971,2974],{},[38,2972,2973],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,2976,2977,2980],{},[38,2978,2979],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,2982,2984],{"id":2983},"typy-útoků","Typy útoků",[198,2986,2988],{"id":2987},"podle-cílení","Podle cílení",[16,2990,2991,3003],{},[19,2992,2993],{},[22,2994,2995,2998,3000],{},[25,2996,2997],{},"Typ",[25,2999,1973],{},[25,3001,3002],{},"Cíl",[30,3004,3005,3018],{},[22,3006,3007,3012,3015],{},[35,3008,3009],{},[38,3010,3011],{},"Plošný",[35,3013,3014],{},"Útočníkovi je jedno, kdo je obětí",[35,3016,3017],{},"Botnety, spam, ransomware",[22,3019,3020,3025,3028],{},[35,3021,3022],{},[38,3023,3024],{},"Cílený (APT)",[35,3026,3027],{},"Soustředěná pozornost na konkrétní cíl",[35,3029,3030],{},"Špionáž, sabotáž, krádež dat",[198,3032,3034],{"id":3033},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3036,3037],{},[1948,3038],{"alt":3039,"className":3040,"src":3041},"apt-faze-utoku",[210,1952],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3043,3044],{},"4 fáze:",[152,3046,3047,3053,3059,3065],{},[123,3048,3049,3052],{},[38,3050,3051],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3054,3055,3058],{},[38,3056,3057],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3060,3061,3064],{},[38,3062,3063],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3066,3067,3070],{},[38,3068,3069],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3072,3074],{"id":3073},"základní-vektory-útoku","Základní vektory útoku",[120,3076,3077,3080,3083,3086,3089],{},[123,3078,3079],{},"Email s přílohou (spear phishing)",[123,3081,3082],{},"Trojanizované aplikace",[123,3084,3085],{},"Drive-by download (webové exploity)",[123,3087,3088],{},"Výměnná média (BadUSB)",[123,3090,3091],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3093,3095],{"id":3094},"software-útoky","Software útoky",[120,3097,3098,3104,3110,3116,3121],{},[123,3099,3100,3103],{},[38,3101,3102],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3105,3106,3109],{},[38,3107,3108],{},"Viry"," — poškození HW\u002FSW",[123,3111,3112,3115],{},[38,3113,3114],{},"Trojské koně"," — skrytá funkčnost",[123,3117,3118,3120],{},[38,3119,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3122,3123,3126],{},[38,3124,3125],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3128,3130],{"id":3129},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3132,3133,3145],{},[19,3134,3135],{},[22,3136,3137,3140,3142],{},[25,3138,3139],{},"Útok",[25,3141,3002],{},[25,3143,3144],{},"Efekt",[30,3146,3147,3158,3168,3179,3189],{},[22,3148,3149,3152,3155],{},[35,3150,3151],{},"Content Spoofing",[35,3153,3154],{},"Klient",[35,3156,3157],{},"Ztráta přihlašovacích údajů",[22,3159,3160,3163,3165],{},[35,3161,3162],{},"XSS",[35,3164,3154],{},[35,3166,3167],{},"Přístup k cookies",[22,3169,3170,3173,3176],{},[35,3171,3172],{},"SQL Injection",[35,3174,3175],{},"Server",[35,3177,3178],{},"Neoprávněný přístup do DB",[22,3180,3181,3184,3186],{},[35,3182,3183],{},"DoS\u002FDDoS",[35,3185,3175],{},[35,3187,3188],{},"Nedostupnost služby",[22,3190,3191,3194,3196],{},[35,3192,3193],{},"Path Traversal",[35,3195,3175],{},[35,3197,3198],{},"Přístup k souborům",[115,3200,3202],{"id":3201},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3204,3205],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3207,3208,3211,3214,3217,3220],{},[123,3209,3210],{},"Vydávání se za právníka",[123,3212,3213],{},"Podvod na CEO",[123,3215,3216],{},"Krádež dat (personální oddělení)",[123,3218,3219],{},"Kompromitace účtu",[123,3221,3222],{},"Falešné faktury",[115,3224,3226],{"id":3225},"obranné-technologie","Obranné technologie",[120,3228,3229,3235,3241,3247,3253,3259],{},[123,3230,3231,3234],{},[38,3232,3233],{},"NAC"," — řízení přístupu k síti",[123,3236,3237,3240],{},[38,3238,3239],{},"IDS"," — detekce průniku (pasivní)",[123,3242,3243,3246],{},[38,3244,3245],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3248,3249,3252],{},[38,3250,3251],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3254,3255,3258],{},[38,3256,3257],{},"DLP"," — prevence úniku dat",[123,3260,3261,3264],{},[38,3262,3263],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3266,1861],{"id":1860},[120,3268,3269,3275,3281,3287,3298],{},[123,3270,3271,3274],{},[207,3272,140],{"className":3273,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3276,3277,3280],{},[207,3278,569],{"className":3279,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3282,3283,3286],{},[207,3284,240],{"className":3285,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3288,3289,3292,3293,3297],{},[207,3290,384],{"className":3291,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3294,3296],{"className":3295,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3299,3300,3303],{},[207,3301,369],{"className":3302,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3305,2373,3306],{"id":2372},[207,3307,43],{"className":3308,"dataFsResolvedFilePath":1895,"href":1896},[210],[120,3310,3311,3317,3322,3327,3332],{},[123,3312,3313],{},[207,3314,3316],{"className":3315,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3318,3319],{},[207,3320,417],{"className":3321,"dataFsResolvedFilePath":415,"href":416},[210],[123,3323,3324],{},[207,3325,351],{"className":3326,"dataFsResolvedFilePath":349,"href":350},[210],[123,3328,3329],{},[207,3330,426],{"className":3331,"dataFsResolvedFilePath":424,"href":425},[210],[123,3333,3334],{},[207,3335,458],{"className":3336,"dataFsResolvedFilePath":3337,"href":3338},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3340},[3341,3342,3348,3349,3350,3351,3352],{"id":2941,"depth":642,"text":2942},{"id":2983,"depth":642,"text":2984,"children":3343},[3344,3345,3346,3347],{"id":2987,"depth":649,"text":2988},{"id":3033,"depth":649,"text":3034},{"id":3073,"depth":649,"text":3074},{"id":3094,"depth":649,"text":3095},{"id":3129,"depth":642,"text":3130},{"id":3201,"depth":642,"text":3202},{"id":3225,"depth":642,"text":3226},{"id":1860,"depth":642,"text":1861},{"id":2372,"depth":642,"text":2403},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3358,3359,2910],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3362,3363,3364,3365,3366],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3369,"title":369,"body":3370,"course":659,"courses":3631,"created":660,"description":641,"extension":661,"meta":3632,"navigation":664,"path":3633,"seo":3634,"sources":3635,"stem":3639,"tags":3640,"type":2418,"updated":677,"__hash__":3647},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3371,"toc":3617},[3372,3375,3382,3385,3389,3449,3453,3457,3468,3472,3483,3487,3495,3499,3510,3514,3519,3523,3534,3538,3558,3560,3592,3597],[12,3373,369],{"id":3374},"ochrana-dat",[724,3376,3377],{},[1948,3378],{"alt":3379,"className":3380,"src":3381},"ochrana-dat-technologie",[210,1952],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3383,3384],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3386,3388],{"id":3387},"formy-zneužití-dat","Formy zneužití dat",[16,3390,3391,3400],{},[19,3392,3393],{},[22,3394,3395,3398],{},[25,3396,3397],{},"Forma",[25,3399,1973],{},[30,3401,3402,3409,3417,3425,3433,3441],{},[22,3403,3404,3407],{},[35,3405,3406],{},"Zašifrování",[35,3408,435],{},[22,3410,3411,3414],{},[35,3412,3413],{},"Zveřejnění",[35,3415,3416],{},"Double ransomware",[22,3418,3419,3422],{},[35,3420,3421],{},"Odposlech",[35,3423,3424],{},"Pasivní sběr dat",[22,3426,3427,3430],{},[35,3428,3429],{},"Krádež",[35,3431,3432],{},"Cílená exfiltrace",[22,3434,3435,3438],{},[35,3436,3437],{},"Krádež dodavatelského řetězce",[35,3439,3440],{},"Triple ransomware",[22,3442,3443,3446],{},[35,3444,3445],{},"Prodej",[35,3447,3448],{},"Darknet marketplace",[115,3450,3452],{"id":3451},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3454,3456],{"id":3455},"nac-network-access-control","NAC (Network Access Control)",[120,3458,3459,3462,3465],{},[123,3460,3461],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3463,3464],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3466,3467],{},"Ekvivalenty: MDM, BYOD",[198,3469,3471],{"id":3470},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3473,3474,3477,3480],{},[123,3475,3476],{},"Monitoruje síťový provoz, generuje alerty",[123,3478,3479],{},"Pasivní systém — nezasahuje do provozu",[123,3481,3482],{},"Signaturová a anomální detekce",[198,3484,3486],{"id":3485},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3488,3489,3492],{},[123,3490,3491],{},"Aktivní systém — blokuje škodlivý provoz",[123,3493,3494],{},"Zařazen přímo do síťové cesty (in-line)",[198,3496,3498],{"id":3497},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3500,3501,3504,3507],{},[123,3502,3503],{},"Centralizovaná správa bezpečnostních logů",[123,3505,3506],{},"Sběr s agentem i bez agenta",[123,3508,3509],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3511,3513],{"id":3512},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3515,3516],{},[123,3517,3518],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3520,3522],{"id":3521},"šifrování","Šifrování",[120,3524,3525,3528,3531],{},[123,3526,3527],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3529,3530],{},"RSA (2048+ bit), DSS",[123,3532,3533],{},"SHA-256, SHA-1",[115,3535,3537],{"id":3536},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3539,3540,3546,3552,3555],{},[123,3541,3542,3545],{},[38,3543,3544],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3547,3548,3551],{},[38,3549,3550],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3553,3554],{},"Transportní a tunelovací režim",[123,3556,3557],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3559,1861],{"id":1860},[120,3561,3562,3568,3574,3580,3586],{},[123,3563,3564,3567],{},[207,3565,140],{"className":3566,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3569,3570,3573],{},[207,3571,578],{"className":3572,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3575,3576,3579],{},[207,3577,569],{"className":3578,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3581,3582,3585],{},[207,3583,351],{"className":3584,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3587,3588,3591],{},[207,3589,360],{"className":3590,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3593,2373,3594],{"id":2372},[207,3595,43],{"className":3596,"dataFsResolvedFilePath":1895,"href":1896},[210],[120,3598,3599,3605,3611],{},[123,3600,3601],{},[207,3602,3604],{"className":3603,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3606,3607],{},[207,3608,3610],{"className":3609,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3612,3613],{},[207,3614,3616],{"className":3615,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3618},[3619,3620,3628,3629,3630],{"id":3387,"depth":642,"text":3388},{"id":3451,"depth":642,"text":3452,"children":3621},[3622,3623,3624,3625,3626,3627],{"id":3455,"depth":649,"text":3456},{"id":3470,"depth":649,"text":3471},{"id":3485,"depth":649,"text":3486},{"id":3497,"depth":649,"text":3498},{"id":3512,"depth":649,"text":3513},{"id":3521,"depth":649,"text":3522},{"id":3536,"depth":642,"text":3537},{"id":1860,"depth":642,"text":1861},{"id":2372,"depth":642,"text":2403},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3636,3637,3638],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3374,3641,3642,3643,3644,3645,3646],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3649,"title":569,"body":3650,"course":659,"courses":3985,"created":660,"description":641,"extension":661,"meta":3986,"navigation":664,"path":3987,"seo":3988,"sources":3989,"stem":3990,"tags":3991,"type":2418,"updated":677,"__hash__":3997},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3651,"toc":3974},[3652,3655,3662,3669,3673,3737,3741,3791,3795,3800,3819,3823,3826,3830,3844,3848,3876,3880,3929,3931,3956,3961],[12,3653,569],{"id":3654},"řízení-rizik",[724,3656,3657],{},[1948,3658],{"alt":3659,"className":3660,"src":3661},"rizeni-rizik-proces",[210,1952],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3663,3664,3665,3668],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3666,140],{"className":3667,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3670,3672],{"id":3671},"normativní-základ","Normativní základ",[16,3674,3675,3685],{},[19,3676,3677],{},[22,3678,3679,3682],{},[25,3680,3681],{},"Norma",[25,3683,3684],{},"Zaměření",[30,3686,3687,3697,3707,3717,3727],{},[22,3688,3689,3694],{},[35,3690,3691],{},[38,3692,3693],{},"ISO 31000:2019",[35,3695,3696],{},"Obecné smrnice pro management rizik",[22,3698,3699,3704],{},[35,3700,3701],{},[38,3702,3703],{},"ISO 31010:2020",[35,3705,3706],{},"Techniky posuzování rizik",[22,3708,3709,3714],{},[35,3710,3711],{},[38,3712,3713],{},"ISO\u002FIEC 27005:2019",[35,3715,3716],{},"Řízení rizik bezpečnosti informací",[22,3718,3719,3724],{},[35,3720,3721],{},[38,3722,3723],{},"NIST SP 800-30",[35,3725,3726],{},"Průvodce hodnocením rizik",[22,3728,3729,3734],{},[35,3730,3731],{},[38,3732,3733],{},"NIST SP 800-39",[35,3735,3736],{},"Proces řízení bezpečnostních rizik",[115,3738,3740],{"id":3739},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,3742,3743,3749,3755,3761,3767,3773,3779,3785],{},[123,3744,3745,3748],{},[38,3746,3747],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,3750,3751,3754],{},[38,3752,3753],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,3756,3757,3760],{},[38,3758,3759],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,3762,3763,3766],{},[38,3764,3765],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,3768,3769,3772],{},[38,3770,3771],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,3774,3775,3778],{},[38,3776,3777],{},"Akceptace rizik"," — formální rozhodnutí",[123,3780,3781,3784],{},[38,3782,3783],{},"Komunikace"," — sdílení informací o rizicích",[123,3786,3787,3790],{},[38,3788,3789],{},"Monitorování"," — průběžné přezkoumávání",[115,3792,3794],{"id":3793},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,3796,3797],{},[38,3798,3799],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,3801,3802,3808,3813],{},[123,3803,3804,3807],{},[38,3805,3806],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,3809,3810,3812],{},[38,3811,2961],{}," — slabé místo aktiva (stupnice 1–5)",[123,3814,3815,3818],{},[38,3816,3817],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,3820,3822],{"id":3821},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,3824,3825],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,3827,3829],{"id":3828},"klíčové-dokumenty","Klíčové dokumenty",[120,3831,3832,3838],{},[123,3833,3834,3837],{},[38,3835,3836],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,3839,3840,3843],{},[38,3841,3842],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,3845,3847],{"id":3846},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,3849,3850,3856,3861,3866,3871],{},[123,3851,3852,3855],{},[38,3853,3854],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,3857,3858,3860],{},[38,3859,2678],{}," — odpovědný za ISMS",[123,3862,3863,3865],{},[38,3864,2689],{}," — návrh a implementace opatření",[123,3867,3868,3870],{},[38,3869,2699],{}," — provádění auditů",[123,3872,3873,3875],{},[38,3874,2709],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,3877,3879],{"id":3878},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,3881,3882,3894],{},[19,3883,3884],{},[22,3885,3886,3889,3891],{},[25,3887,3888],{},"Úroveň",[25,3890,3684],{},[25,3892,3893],{},"Typ rizika",[30,3895,3896,3907,3918],{},[22,3897,3898,3901,3904],{},[35,3899,3900],{},"Stupeň 1",[35,3902,3903],{},"Organizace",[35,3905,3906],{},"Strategické riziko",[22,3908,3909,3912,3915],{},[35,3910,3911],{},"Stupeň 2",[35,3913,3914],{},"Poslání\u002Fobchodní procesy",[35,3916,3917],{},"Taktické riziko",[22,3919,3920,3923,3926],{},[35,3921,3922],{},"Stupeň 3",[35,3924,3925],{},"Informační systémy",[35,3927,3928],{},"Operační riziko",[115,3930,1861],{"id":1860},[120,3932,3933,3939,3945,3951],{},[123,3934,3935,3938],{},[207,3936,140],{"className":3937,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,3940,3941,3944],{},[207,3942,384],{"className":3943,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,3946,3947,3950],{},[207,3948,393],{"className":3949,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,3952,3953,3573],{},[207,3954,578],{"className":3955,"dataFsResolvedFilePath":576,"href":577},[210],[115,3957,2373,3958],{"id":2372},[207,3959,43],{"className":3960,"dataFsResolvedFilePath":1895,"href":1896},[210],[120,3962,3963,3969],{},[123,3964,3965],{},[207,3966,3968],{"className":3967,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,3970,3971],{},[207,3972,222],{"className":3973,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":3975},[3976,3977,3978,3979,3980,3981,3982,3983,3984],{"id":3671,"depth":642,"text":3672},{"id":3739,"depth":642,"text":3740},{"id":3793,"depth":642,"text":3794},{"id":3821,"depth":642,"text":3822},{"id":3828,"depth":642,"text":3829},{"id":3846,"depth":642,"text":3847},{"id":3878,"depth":642,"text":3879},{"id":1860,"depth":642,"text":1861},{"id":2372,"depth":642,"text":2403},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[2911,2910],"topics\u002Frizeni-rizik",[658,3992,3993,3994,3995,3996],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":3999,"title":4000,"body":4001,"course":659,"courses":4232,"created":660,"description":641,"extension":661,"meta":4233,"navigation":664,"path":4234,"seo":4235,"sources":4236,"stem":4238,"tags":4239,"type":2418,"updated":677,"__hash__":4244},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4002,"toc":4224},[4003,4006,4013,4016,4020,4119,4123,4158,4162,4182,4186,4189,4191,4211,4216],[12,4004,4000],{"id":4005},"sae-budování-bezpečnostního-povědomí",[724,4007,4008],{},[1948,4009],{"alt":4010,"className":4011,"src":4012},"sae-pyramida",[210,1952],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4014,4015],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4017,4019],{"id":4018},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4021,4022,4039],{},[19,4023,4024],{},[22,4025,4026,4028,4031,4033,4036],{},[25,4027,3888],{},[25,4029,4030],{},"Příznak",[25,4032,3002],{},[25,4034,4035],{},"Metody",[25,4037,4038],{},"Časový rámec",[30,4040,4041,4061,4081,4101],{},[22,4042,4043,4049,4052,4055,4058],{},[35,4044,4045,4048],{},[38,4046,4047],{},"Awareness"," (povědomí)",[35,4050,4051],{},"„Co\"",[35,4053,4054],{},"Rozpoznávání",[35,4056,4057],{},"Média, videa, plakáty",[35,4059,4060],{},"Krátkodobý",[22,4062,4063,4069,4072,4075,4078],{},[35,4064,4065,4068],{},[38,4066,4067],{},"Training"," (výcvik)",[35,4070,4071],{},"„Jak\"",[35,4073,4074],{},"Dovednosti",[35,4076,4077],{},"Přednášky, případovky, cvičení",[35,4079,4080],{},"Střednědobý",[22,4082,4083,4089,4092,4095,4098],{},[35,4084,4085,4088],{},[38,4086,4087],{},"Education"," (vzdělávání)",[35,4090,4091],{},"„Proč\"",[35,4093,4094],{},"Porozumění",[35,4096,4097],{},"Semináře, diskuze, výzkum",[35,4099,4100],{},"Dlouhodobý",[22,4102,4103,4108,4110,4113,4116],{},[35,4104,4105],{},[38,4106,4107],{},"Professional Development",[35,4109,2681],{},[35,4111,4112],{},"Profesní rozvoj",[35,4114,4115],{},"Certifikace, konference",[35,4117,4118],{},"Průběžný",[115,4120,4122],{"id":4121},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4124,4125,4128,4131,4134,4137,4140,4143,4146,4149,4152,4155],{},[123,4126,4127],{},"Role a odpovědnosti v programu",[123,4129,4130],{},"Stanovení cílů pro každou fázi",[123,4132,4133],{},"Rozdělení uživatelů (analýza)",[123,4135,4136],{},"Vytvoření školících materiálů dle skupin",[123,4138,4139],{},"Určení cíle pro každou skupinu",[123,4141,4142],{},"Témata pro každou relaci\u002Fkurz",[123,4144,4145],{},"Metody nasazení (metodiky)",[123,4147,4148],{},"Dokumentace a zpětná vazba",[123,4150,4151],{},"Vyhodnocení a aktualizace materiálů",[123,4153,4154],{},"Četnost opakování",[123,4156,4157],{},"Kalkulace",[115,4159,4161],{"id":4160},"modely-řízení","Modely řízení",[120,4163,4164,4170,4176],{},[123,4165,4166,4169],{},[38,4167,4168],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4171,4172,4175],{},[38,4173,4174],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4177,4178,4181],{},[38,4179,4180],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4183,4185],{"id":4184},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4187,4188],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4190,1861],{"id":1860},[120,4192,4193,4199,4205],{},[123,4194,4195,4198],{},[207,4196,140],{"className":4197,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4200,4201,4204],{},[207,4202,578],{"className":4203,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4206,4207,4210],{},[207,4208,569],{"className":4209,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4212,2373,4213],{"id":2372},[207,4214,43],{"className":4215,"dataFsResolvedFilePath":1895,"href":1896},[210],[120,4217,4218],{},[123,4219,4220],{},[207,4221,4223],{"className":4222,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4225},[4226,4227,4228,4229,4230,4231],{"id":4018,"depth":642,"text":4019},{"id":4121,"depth":642,"text":4122},{"id":4160,"depth":642,"text":4161},{"id":4184,"depth":642,"text":4185},{"id":1860,"depth":642,"text":1861},{"id":2372,"depth":642,"text":2403},[658],{},"\u002Ftopics\u002Fsae",{"title":4000,"description":641},[4237],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4240,4241,4242,3995,4243],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4246,4248,4251],{"slug":658,"path":1896,"title":7,"snippet":4247},"… SMS - Akademické prostředí — kampus, WiFi, identita, VIS - \u003C\u003Cimork-financni-sektor>> — DORA, MiCA, DLT\u002Fblockchain - Zdravotnictví — HIPAA, ISO 27799, …",{"slug":4249,"path":512,"title":513,"snippet":4250},"imork-payment","… — zneužití platebních údajů - Tor a Dark Web — nelegální obchod s kartami - \u003C\u003Cimork-financni-sektor>> — bezpečnost bankovních systémů",{"slug":671,"path":560,"title":2422,"snippet":4252},"… ISP\u002Ftelekomunikace (ISO 27011) - Mission Critical Networks - \u003C\u003Cimork-financni-sektor>> ## Propojení s dalšími tématy - Řízení rizik — jádro ISMS procesu - [[ …",[4254,4257,4259,4262,4265],{"slug":4255,"title":4256,"path":317,"sharedTags":642},"imork-automotive","Automotive bezpečnost",{"slug":4258,"title":231,"path":230,"sharedTags":642},"imork-bezpecnostni-strategie",{"slug":4260,"title":4261,"path":212,"sharedTags":642},"imork-detail-predmetu","ImorK — Detail předmětu",{"slug":4263,"title":4264,"path":263,"sharedTags":642},"imork-akademicke-prostredi","ImorK — ISMS v akademickém prostředí",{"slug":4266,"title":4267,"path":221,"sharedTags":642},"imork-manazerska-bezpecnost","ImorK — Manažerská informační bezpečnost",1777154958931]