[{"data":1,"prerenderedAt":6450},["ShallowReactive",2],{"courses-with-stats":3,"all-tag-counts":24,"wiki-imork-glosar":1003,"course-stats-imork":2640,"course-topics-imork":2642,"backlinks-imork-glosar":6433,"related-imork-glosar":6440},[4,8,12,16,20],{"slug":5,"title":6,"count":7},"imork","Management oborových řešení (ImorK)",43,{"slug":9,"title":10,"count":11},"imek","Matematická ekonomie (ImeK)",22,{"slug":13,"title":14,"count":15},"mikk","Mikroekonomie 2 (mikK)",31,{"slug":17,"title":18,"count":19},"ipmrk","Pokročilé metody v rozhodování (IpmrK)",24,{"slug":21,"title":22,"count":23},"irmank","Risk management (IrmanK)",30,[25,27,30,32,33,34,36,39,42,44,46,49,51,54,56,59,61,63,65,67,69,71,74,76,78,80,82,84,86,88,90,92,94,96,98,101,103,105,107,109,111,113,115,117,119,121,123,125,127,129,131,133,135,137,139,141,143,146,148,150,152,154,156,158,160,162,164,166,168,170,172,174,176,178,180,182,184,186,188,190,192,194,196,198,200,202,204,206,208,210,212,214,216,218,220,222,224,226,228,230,232,234,236,238,240,242,244,246,248,250,252,254,256,258,260,262,264,266,268,270,272,274,276,278,280,282,284,286,288,290,292,294,296,298,300,302,304,306,308,310,312,314,316,318,320,322,324,326,328,330,332,334,336,338,340,342,344,346,348,350,352,355,357,359,361,363,365,367,369,371,373,375,377,379,381,383,385,387,389,391,393,395,397,399,401,403,405,407,409,411,413,415,417,419,421,423,425,427,429,431,433,435,437,439,441,443,445,447,449,451,453,455,457,459,461,463,465,467,469,471,473,475,477,479,481,483,485,487,489,491,493,495,497,499,501,503,505,507,509,511,513,515,517,519,521,523,525,527,529,531,533,535,537,539,541,543,545,547,549,551,553,555,557,559,561,563,565,567,569,571,573,575,577,579,581,583,585,587,589,591,593,595,597,599,601,603,605,607,609,611,613,615,617,619,621,623,625,627,629,631,633,635,637,639,641,643,645,647,649,651,653,655,657,659,661,663,665,667,669,671,673,675,677,679,681,683,685,687,689,691,693,695,697,699,701,703,705,707,709,711,713,715,717,719,721,723,725,727,729,731,733,735,737,739,741,743,745,747,749,751,753,755,757,759,761,763,765,767,769,771,773,775,777,779,781,783,785,787,789,791,793,795,797,799,801,803,805,807,809,811,813,815,817,819,821,823,825,827,829,831,833,835,837,839,841,843,845,847,849,851,853,855,857,859,861,863,865,867,869,871,873,875,877,879,881,883,885,887,889,891,893,895,897,899,901,903,905,907,909,911,913,915,917,919,921,923,925,927,929,931,933,935,937,939,941,943,945,947,949,951,953,955,957,959,961,963,965,967,969,971,973,975,977,979,981,983,985,987,989,991,993,995,997,999,1001],{"tag":5,"count":26},44,{"tag":28,"count":29},"mikroekonomie",33,{"tag":13,"count":31},32,{"tag":21,"count":15},{"tag":17,"count":19},{"tag":9,"count":35},23,{"tag":37,"count":38},"isms",15,{"tag":40,"count":41},"neuronove-site",8,{"tag":43,"count":41},"oligopol",{"tag":45,"count":41},"optimalizace",{"tag":47,"count":48},"nist",7,{"tag":50,"count":48},"riziko",{"tag":52,"count":53},"fuzzy",6,{"tag":55,"count":53},"makroekonomie",{"tag":57,"count":58},"behavior",5,{"tag":60,"count":58},"geneticke-algoritmy",{"tag":62,"count":58},"kyberneticka-bezpecnost",{"tag":64,"count":58},"lagrange",{"tag":66,"count":58},"lewin",{"tag":68,"count":58},"mapa-rizik",{"tag":70,"count":58},"ochrana-dat",{"tag":72,"count":73},"apt",4,{"tag":75,"count":73},"cenova-diskriminace",{"tag":77,"count":73},"chaos",{"tag":79,"count":73},"cpm-pert",{"tag":81,"count":73},"datamining",{"tag":83,"count":73},"elasticita",{"tag":85,"count":73},"evolucni-algoritmy",{"tag":87,"count":73},"monopol",{"tag":89,"count":73},"npv",{"tag":91,"count":73},"oborova-reseni",{"tag":93,"count":73},"predikce",{"tag":95,"count":73},"sifrovani",{"tag":97,"count":73},"uzitecnost",{"tag":99,"count":100},"backpropagation",3,{"tag":102,"count":100},"cobb-douglas",{"tag":104,"count":100},"delphi",{"tag":106,"count":100},"derivace",{"tag":108,"count":100},"gdpr",{"tag":110,"count":100},"governance",{"tag":112,"count":100},"indiferencni-krivky",{"tag":114,"count":100},"informacni-bezpecnost",{"tag":116,"count":100},"integral",{"tag":118,"count":100},"is-lm",{"tag":120,"count":100},"iso-31000",{"tag":122,"count":100},"kaizen",{"tag":124,"count":100},"klastrovani",{"tag":126,"count":100},"koluze",{"tag":128,"count":100},"matlab",{"tag":130,"count":100},"multiplikator",{"tag":132,"count":100},"phishing",{"tag":134,"count":100},"poptavka-nabidka",{"tag":136,"count":100},"prednaska",{"tag":138,"count":100},"ransomware",{"tag":140,"count":100},"vzorce",{"tag":142,"count":100},"zdravotnictvi",{"tag":144,"count":145},"5g",2,{"tag":147,"count":145},"aco",{"tag":149,"count":145},"akreditiv",{"tag":151,"count":145},"anfis",{"tag":153,"count":145},"apriori",{"tag":155,"count":145},"atraktory",{"tag":157,"count":145},"autentizace",{"tag":159,"count":145},"bcm",{"tag":161,"count":145},"bec",{"tag":163,"count":145},"bertrand",{"tag":165,"count":145},"bezpecnostni-povedomi",{"tag":167,"count":145},"bia",{"tag":169,"count":145},"box-jenkins",{"tag":171,"count":145},"cournot",{"tag":173,"count":145},"crisp-dm",{"tag":175,"count":145},"cyert-march",{"tag":177,"count":145},"diferencial",{"tag":179,"count":145},"disaster-recovery",{"tag":181,"count":145},"dlp",{"tag":183,"count":145},"doyle",{"tag":185,"count":145},"dualita",{"tag":187,"count":145},"duchodova-elasticita",{"tag":189,"count":145},"ehealth",{"tag":191,"count":145},"energetika",{"tag":193,"count":145},"enisa",{"tag":195,"count":145},"expertni-systemy",{"tag":197,"count":145},"exportni-financovani",{"tag":199,"count":145},"faktoring",{"tag":201,"count":145},"fmincon",{"tag":203,"count":145},"fraktaly",{"tag":205,"count":145},"funkce-clenstvi",{"tag":207,"count":145},"ga",{"tag":209,"count":145},"glosar",{"tag":211,"count":145},"gnp",{"tag":213,"count":145},"hicks",{"tag":215,"count":145},"hurst",{"tag":217,"count":145},"inference",{"tag":219,"count":145},"iot",{"tag":221,"count":145},"iso-22301",{"tag":223,"count":145},"iso-27000",{"tag":225,"count":145},"iso-27005",{"tag":227,"count":145},"iso-27701",{"tag":229,"count":145},"izokvanty",{"tag":231,"count":145},"kniha",{"tag":233,"count":145},"kontinuita-cinnosti",{"tag":235,"count":145},"kriticka-infrastruktura",{"tag":237,"count":145},"kriticke-faktory",{"tag":239,"count":145},"krizeni",{"tag":241,"count":145},"krizova-elasticita",{"tag":243,"count":145},"link-analyza",{"tag":245,"count":145},"linprog",{"tag":247,"count":145},"logisticka-funkce",{"tag":249,"count":145},"malware",{"tag":251,"count":145},"metaheuristiky",{"tag":253,"count":145},"mobilni-bezpecnost",{"tag":255,"count":145},"monopolisticka-konkurence",{"tag":257,"count":145},"motyli-efekt",{"tag":259,"count":145},"mrs",{"tag":261,"count":145},"mrts",{"tag":263,"count":145},"mrtva-vaha",{"tag":265,"count":145},"mutace",{"tag":267,"count":145},"narodni-duchod",{"tag":269,"count":145},"nash",{"tag":271,"count":145},"nukib",{"tag":273,"count":145},"osint",{"tag":275,"count":145},"owasp",{"tag":277,"count":145},"perceptron",{"tag":279,"count":145},"pii",{"tag":281,"count":145},"pravidla",{"tag":283,"count":145},"prebytek",{"tag":285,"count":145},"predterminy",{"tag":287,"count":145},"prehled",{"tag":289,"count":145},"privacy-by-design",{"tag":291,"count":145},"produkce",{"tag":293,"count":145},"pso",{"tag":295,"count":145},"redukce",{"tag":297,"count":145},"retence",{"tag":299,"count":145},"rizeni-rizik",{"tag":301,"count":145},"rovnovaha",{"tag":303,"count":145},"rozhodovaci-stromy",{"tag":305,"count":145},"ryuk",{"tag":307,"count":145},"sae",{"tag":309,"count":145},"selekce",{"tag":311,"count":145},"siem",{"tag":313,"count":145},"sigma",{"tag":315,"count":145},"simon",{"tag":317,"count":145},"simulated-annealing",{"tag":319,"count":145},"sitova-analyza",{"tag":321,"count":145},"skoleni",{"tag":323,"count":145},"slutsky",{"tag":325,"count":145},"smart-grid",{"tag":327,"count":145},"soma",{"tag":329,"count":145},"spotrebitel",{"tag":331,"count":145},"stackelberg",{"tag":333,"count":145},"sylabus",{"tag":335,"count":145},"tabu-search",{"tag":337,"count":145},"ucelova-funkce",{"tag":339,"count":145},"uceni",{"tag":341,"count":145},"volatilita",{"tag":343,"count":145},"witness-miner",{"tag":345,"count":145},"zdaneni",{"tag":347,"count":145},"zkouska",{"tag":349,"count":145},"zkousky",{"tag":351,"count":145},"zmena",{"tag":353,"count":354},"agent-zmeny",1,{"tag":356,"count":354},"ai",{"tag":358,"count":354},"aktivacni-funkce",{"tag":360,"count":354},"alternativni-cile",{"tag":362,"count":354},"analyza",{"tag":364,"count":354},"analyza-rizik",{"tag":366,"count":354},"anonymizace",{"tag":368,"count":354},"aplikacni-portfolio",{"tag":370,"count":354},"automotive",{"tag":372,"count":354},"bandwagon",{"tag":374,"count":354},"banky",{"tag":376,"count":354},"baumol",{"tag":378,"count":354},"bcmaas",{"tag":380,"count":354},"bez-recourse",{"tag":382,"count":354},"bezpecnost",{"tag":384,"count":354},"biometrika",{"tag":386,"count":354},"blockchain",{"tag":388,"count":354},"body-zvratu",{"tag":390,"count":354},"bot",{"tag":392,"count":354},"botnet",{"tag":394,"count":354},"buchta",{"tag":396,"count":354},"buffett",{"tag":398,"count":354},"bundling",{"tag":400,"count":354},"can-bus",{"tag":402,"count":354},"cash-flow",{"tag":404,"count":354},"casove-rady",{"tag":406,"count":354},"cenova-elasticita",{"tag":408,"count":354},"cenova-konkurence",{"tag":410,"count":354},"cenova-tuhost",{"tag":412,"count":354},"cenovy-vudce",{"tag":414,"count":354},"ces",{"tag":416,"count":354},"ceteris-paribus",{"tag":418,"count":354},"chamberlin",{"tag":420,"count":354},"ciste-spekulativni",{"tag":422,"count":354},"citlivostni-analyza",{"tag":424,"count":354},"cloud",{"tag":426,"count":354},"cmmc",{"tag":428,"count":354},"cobweb",{"tag":430,"count":354},"common-criteria",{"tag":432,"count":354},"cs",{"tag":434,"count":354},"cve",{"tag":436,"count":354},"dane",{"tag":438,"count":354},"danove-bremeno",{"tag":440,"count":354},"darknet",{"tag":442,"count":354},"data-diodes",{"tag":444,"count":354},"ddos",{"tag":446,"count":354},"debt-netting",{"tag":448,"count":354},"deep-learning",{"tag":450,"count":354},"defuzzifikace",{"tag":452,"count":354},"dekompozice",{"tag":454,"count":354},"deming",{"tag":456,"count":354},"desatero",{"tag":458,"count":354},"detail-predmetu",{"tag":460,"count":354},"deterministicke-modely",{"tag":462,"count":354},"digitalni-identita",{"tag":464,"count":354},"digitalni-stopa",{"tag":466,"count":354},"diverzifikace",{"tag":468,"count":354},"dkim",{"tag":470,"count":354},"dlt",{"tag":472,"count":354},"dmarc",{"tag":474,"count":354},"dodavatelska",{"tag":476,"count":354},"dokumenty",{"tag":478,"count":354},"doprava",{"tag":480,"count":354},"dora",{"tag":482,"count":354},"dos",{"tag":484,"count":354},"dostupnost",{"tag":486,"count":354},"dpia",{"tag":488,"count":354},"dr",{"tag":490,"count":354},"draas",{"tag":492,"count":354},"duopol",{"tag":494,"count":354},"dynamicke-staticke",{"tag":496,"count":354},"efqm",{"tag":498,"count":354},"ehr",{"tag":500,"count":354},"eidas",{"tag":502,"count":354},"ekonomie",{"tag":504,"count":354},"elektronicka-preskripce",{"tag":506,"count":354},"email",{"tag":508,"count":354},"emotet",{"tag":510,"count":354},"emv",{"tag":512,"count":354},"endogenni",{"tag":514,"count":354},"engel",{"tag":516,"count":354},"eu",{"tag":518,"count":354},"euler",{"tag":520,"count":354},"excel",{"tag":522,"count":354},"exogenni",{"tag":524,"count":354},"exploit",{"tag":526,"count":354},"extremy",{"tag":528,"count":354},"factory-support",{"tag":530,"count":354},"fancy-bear",{"tag":532,"count":354},"fel-expert",{"tag":534,"count":354},"force-field",{"tag":536,"count":354},"forfaiting",{"tag":538,"count":354},"fuzzy-system",{"tag":540,"count":354},"fyzicky-utok",{"tag":542,"count":354},"geograficka",{"tag":544,"count":354},"giffen",{"tag":546,"count":354},"hdd",{"tag":548,"count":354},"hedging",{"tag":550,"count":354},"hesla",{"tag":552,"count":354},"hhi",{"tag":554,"count":354},"hipaa",{"tag":556,"count":354},"hodnoceni",{"tag":558,"count":354},"hodnoceni-rizik",{"tag":560,"count":354},"horizontalni",{"tag":562,"count":354},"hotelling",{"tag":564,"count":354},"hybridni-system",{"tag":566,"count":354},"iam",{"tag":568,"count":354},"icc",{"tag":570,"count":354},"identifikace",{"tag":572,"count":354},"ids",{"tag":574,"count":354},"iec-61850",{"tag":576,"count":354},"iec-62351",{"tag":578,"count":354},"implicitni-funkce",{"tag":580,"count":354},"incident-management",{"tag":582,"count":354},"incident-response",{"tag":584,"count":354},"info",{"tag":586,"count":354},"informacni-valka",{"tag":588,"count":354},"inovace",{"tag":590,"count":354},"integraly",{"tag":592,"count":354},"internet",{"tag":594,"count":354},"intervence",{"tag":596,"count":354},"intervencni-strategie",{"tag":598,"count":354},"intlinprog",{"tag":600,"count":354},"investice",{"tag":602,"count":354},"investicni-rozhodovani",{"tag":604,"count":354},"ips",{"tag":606,"count":354},"ipsec",{"tag":608,"count":354},"irr",{"tag":610,"count":354},"is-it-strategie",{"tag":612,"count":354},"iso-11898",{"tag":614,"count":354},"iso-27001",{"tag":616,"count":354},"iso-27002",{"tag":618,"count":354},"iso-27011",{"tag":620,"count":354},"iso-27799",{"tag":622,"count":354},"isp",{"tag":624,"count":354},"kalkul",{"tag":626,"count":354},"kampus",{"tag":628,"count":354},"kartel",{"tag":630,"count":354},"katalog-rizik",{"tag":632,"count":354},"klasifikace",{"tag":634,"count":354},"klasifikace-rizik",{"tag":636,"count":354},"knapsack",{"tag":638,"count":354},"koeficient-variace",{"tag":640,"count":354},"komparativni-statika",{"tag":642,"count":354},"koncentrace",{"tag":644,"count":354},"kriticka-analyza",{"tag":646,"count":354},"kriticka-cesta",{"tag":648,"count":354},"kriticka-zona",{"tag":650,"count":354},"krizove-rizeni",{"tag":652,"count":354},"kryptografie",{"tag":654,"count":354},"kupon",{"tag":656,"count":354},"kursove-riziko",{"tag":658,"count":354},"kyberneticka-hygiena",{"tag":660,"count":354},"kyberprostor",{"tag":662,"count":354},"leasing",{"tag":664,"count":354},"lerner",{"tag":666,"count":354},"letter-of-credit",{"tag":668,"count":354},"lidske-zdroje",{"tag":670,"count":354},"linearni-programovani",{"tag":672,"count":354},"literatura",{"tag":674,"count":354},"lorenz",{"tag":676,"count":354},"manazerske-modely",{"tag":678,"count":354},"markup",{"tag":680,"count":354},"marshall",{"tag":682,"count":354},"maurer",{"tag":684,"count":354},"maximalizace-zisku",{"tag":686,"count":354},"mcfarlan",{"tag":688,"count":354},"mckinsey-7s",{"tag":690,"count":354},"mcn",{"tag":692,"count":354},"mereni-rizika",{"tag":694,"count":354},"mezni-naklady",{"tag":696,"count":354},"mezni-uzitecnost",{"tag":698,"count":354},"meznik",{"tag":700,"count":354},"mica",{"tag":702,"count":354},"minimalizace-vydaju",{"tag":704,"count":354},"mitm",{"tag":706,"count":354},"mobilni-platby",{"tag":708,"count":354},"model",{"tag":710,"count":354},"model-hrozeb",{"tag":712,"count":354},"modely",{"tag":714,"count":354},"monopson",{"tag":716,"count":354},"mpc",{"tag":718,"count":354},"mpl-apl",{"tag":720,"count":354},"mps",{"tag":722,"count":354},"mr-tr",{"tag":724,"count":354},"mrcs",{"tag":726,"count":354},"mzdova-diskriminace",{"tag":728,"count":354},"nabidka",{"tag":730,"count":354},"nabidka-firmy",{"tag":732,"count":354},"nac",{"tag":734,"count":354},"naklady",{"tag":736,"count":354},"ncpi",{"tag":738,"count":354},"ncss",{"tag":740,"count":354},"nejistota",{"tag":742,"count":354},"nemocnice",{"tag":744,"count":354},"neurcity",{"tag":746,"count":354},"neuspesny-manazer",{"tag":748,"count":354},"nfc",{"tag":750,"count":354},"ngn",{"tag":752,"count":354},"nistir-7628",{"tag":754,"count":354},"nistir-8374",{"tag":756,"count":354},"non-recourse",{"tag":758,"count":354},"normy",{"tag":760,"count":354},"nsa",{"tag":762,"count":354},"odhad-poptavky",{"tag":764,"count":354},"odpor",{"tag":766,"count":354},"ofenzivni-rizeni",{"tag":768,"count":354},"omezeni",{"tag":770,"count":354},"opec",{"tag":772,"count":354},"operacni-vyzkum",{"tag":774,"count":354},"optimalizace-spotrebitele",{"tag":776,"count":354},"pacs",{"tag":778,"count":354},"parcialni-derivace",{"tag":780,"count":354},"pcc",{"tag":782,"count":354},"pci-dss",{"tag":784,"count":354},"penetracni-testy",{"tag":786,"count":354},"peters-waterman",{"tag":788,"count":354},"pgp",{"tag":790,"count":354},"platby",{"tag":792,"count":354},"plc",{"tag":794,"count":354},"podnikatelske-riziko",{"tag":796,"count":354},"pohledavky",{"tag":798,"count":354},"pojisteni",{"tag":800,"count":354},"polaroid",{"tag":802,"count":354},"poptavka",{"tag":804,"count":354},"poptavka-spotrebitele",{"tag":806,"count":354},"postoj-k-riziku",{"tag":808,"count":354},"posun-krivek",{"tag":810,"count":354},"preference",{"tag":812,"count":354},"prenos",{"tag":814,"count":354},"prijatelna-zona",{"tag":816,"count":354},"prijem",{"tag":818,"count":354},"prijem-naklady-zisk",{"tag":820,"count":354},"priklady",{"tag":822,"count":354},"primitivni-funkce",{"tag":824,"count":354},"priprava",{"tag":826,"count":354},"prirozeny-monopol",{"tag":828,"count":354},"privilegovane-ucty",{"tag":830,"count":354},"produkcni-funkce",{"tag":832,"count":354},"prognoza",{"tag":834,"count":354},"prognozovani",{"tag":836,"count":354},"projekt",{"tag":838,"count":354},"projektove-rizeni",{"tag":840,"count":354},"ps",{"tag":842,"count":354},"raas",{"tag":844,"count":354},"reakcni-krivka",{"tag":846,"count":354},"recourse",{"tag":848,"count":354},"reference",{"tag":850,"count":354},"regulace",{"tag":852,"count":354},"reseni",{"tag":854,"count":354},"rozmrazeni",{"tag":856,"count":354},"rozpoctove-omezeni",{"tag":858,"count":354},"rpo",{"tag":860,"count":354},"rto",{"tag":862,"count":354},"samostatna-prace",{"tag":864,"count":354},"satisficing",{"tag":866,"count":354},"scada",{"tag":868,"count":354},"scoring",{"tag":870,"count":354},"shephard",{"tag":872,"count":354},"sim",{"tag":874,"count":354},"sitove-utoky",{"tag":876,"count":354},"slovnik",{"tag":878,"count":354},"sniffing",{"tag":880,"count":354},"snizovani-rizika",{"tag":882,"count":354},"socialni-inzenyrstvi",{"tag":884,"count":354},"soukromi",{"tag":886,"count":354},"spf",{"tag":888,"count":354},"spolehlivost",{"tag":890,"count":354},"sponzor",{"tag":892,"count":354},"spoofing",{"tag":894,"count":354},"srovnani",{"tag":896,"count":354},"ssl",{"tag":898,"count":354},"strategicke",{"tag":900,"count":354},"strategie",{"tag":902,"count":354},"supply-chain",{"tag":904,"count":354},"sweezy",{"tag":906,"count":354},"taktiky",{"tag":908,"count":354},"tc-z-mc",{"tag":910,"count":354},"telekomunikace",{"tag":912,"count":354},"telemedicina",{"tag":914,"count":354},"teorie-her",{"tag":916,"count":354},"tisax",{"tag":918,"count":354},"tls",{"tag":920,"count":354},"tokenizace",{"tag":922,"count":354},"tor",{"tag":924,"count":354},"tr-z-mr",{"tag":926,"count":354},"trenovani",{"tag":928,"count":354},"trh-penez",{"tag":930,"count":354},"trh-prace",{"tag":932,"count":354},"trh-zbozi",{"tag":934,"count":354},"tsp",{"tag":936,"count":354},"two-part-tariff",{"tag":938,"count":354},"univerzity",{"tag":940,"count":354},"urcity",{"tag":942,"count":354},"urokova-mira",{"tag":944,"count":354},"utoky",{"tag":946,"count":354},"uvod-do-matematicke-ekonomie",{"tag":948,"count":354},"vazane-extremy",{"tag":950,"count":354},"veblen",{"tag":952,"count":354},"vertikalni",{"tag":954,"count":354},"vezno-dilema",{"tag":956,"count":354},"vicevrstve-site",{"tag":958,"count":354},"vnm",{"tag":960,"count":354},"vodni-elektrarna",{"tag":962,"count":354},"volne-extremy",{"tag":964,"count":354},"vs",{"tag":966,"count":354},"vyhodnoceni",{"tag":968,"count":354},"vykupne",{"tag":970,"count":354},"vyrobce",{"tag":972,"count":354},"vyvarovani",{"tag":974,"count":354},"vzor",{"tag":976,"count":354},"walton",{"tag":978,"count":354},"wannacry",{"tag":980,"count":354},"ward",{"tag":982,"count":354},"web",{"tag":984,"count":354},"wifi",{"tag":986,"count":354},"williamson",{"tag":988,"count":354},"wormgpt",{"tag":990,"count":354},"xml-security",{"tag":992,"count":354},"zalomena-poptavka",{"tag":994,"count":354},"zamestnanecka-firma",{"tag":996,"count":354},"zavazna-zona",{"tag":998,"count":354},"zeleznice",{"tag":1000,"count":354},"zisk",{"tag":1002,"count":354},"zranitelnost",{"page":1004,"collection":2639},{"id":1005,"title":1006,"body":1007,"course":5,"courses":2620,"created":2621,"description":2622,"extension":2623,"meta":2624,"navigation":2625,"path":2626,"seo":2627,"sources":2628,"stem":2635,"tags":2636,"type":2637,"updated":2621,"__hash__":2638},"outputs\u002Foutputs\u002Fimork-glosar.md","ImorK — Glosář pojmů a zkratek",{"type":1008,"value":1009,"toc":2592},"minimark",[1010,1014,1039,1044,1069,1072,1172,1176,1284,1288,1382,1386,1515,1519,1626,1630,1648,1652,1662,1666,1714,1718,1833,1837,1875,1879,1890,1894,1967,1971,2029,2033,2056,2059,2136,2140,2212,2216,2340,2344,2385,2389,2418,2422,2450,2454,2493,2497,2530,2534,2560,2564],[1011,1012,1006],"h1",{"id":1013},"imork-glosář-pojmů-a-zkratek",[1015,1016,1017,1018,1026,1027,1031,1032,1038],"p",{},"Abecední slovník bezpečnostní terminologie kurzu ",[1019,1020,1025],"a",{"className":1021,"dataFsResolvedFilePath":1023,"href":1024},[1022],"wikilink","courses\u002Fimork.md","\u002Fwiki\u002Fimork","ImorK",". Ke každému pojmu uvedeno ",[1028,1029,1030],"em",{},"rozvinutí zkratky, krátká definice, odkaz na stránku s plným výkladem",". Pro normy a regulace primárně viz ",[1019,1033,1037],{"className":1034,"dataFsResolvedFilePath":1035,"href":1036},[1022],"outputs\u002Fimork-normy-prehled.md","\u002Fwiki\u002Fimork-normy-prehled","Přehled norem"," — tady jsou jen zařazeny pro hledání v Ctrl-F.",[1040,1041,1043],"h2",{"id":1042},"čísla-numerické","Čísla \u002F Numerické",[1045,1046,1047],"ul",{},[1048,1049,1050,1054,1055,1061,1062,1068],"li",{},[1051,1052,1053],"strong",{},"5G"," — Pátá generace mobilních sítí. Bezpečnostní výzvy: nový radio interface, edge computing, network slicing, IoT density. ",[1019,1056,1060],{"className":1057,"dataFsResolvedFilePath":1058,"href":1059},[1022],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost",", ",[1019,1063,1067],{"className":1064,"dataFsResolvedFilePath":1065,"href":1066},[1022],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP",".",[1040,1070,1071],{"id":1019},"A",[1045,1073,1074,1092,1107,1116,1128,1147,1163],{},[1048,1075,1076,1079,1080,1061,1086,1068],{},[1051,1077,1078],{},"AAA"," — Authentication, Authorization, Accounting. Tři pilíře řízení síťového přístupu. Viz ",[1019,1081,1085],{"className":1082,"dataFsResolvedFilePath":1083,"href":1084},[1022],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí",[1019,1087,1091],{"className":1088,"dataFsResolvedFilePath":1089,"href":1090},[1022],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat","Ochrana dat",[1048,1093,1094,1097,1098,1061,1101,1068],{},[1051,1095,1096],{},"ACL"," — Access Control List. Seznam pravidel řídících přístup k aktivům (NTFS ACL, síťové ACL na routerech). ",[1019,1099,1091],{"className":1100,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1019,1102,1106],{"className":1103,"dataFsResolvedFilePath":1104,"href":1105},[1022],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","útoky na L3",[1048,1108,1109,1112,1113,1068],{},[1051,1110,1111],{},"AES"," — Advanced Encryption Standard (Rijndael, výběr NIST 1997, finalizace 2001). Symetrický blokový algoritmus, klíče 128\u002F192\u002F256-bit. ",[1019,1114,1091],{"className":1115,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,1117,1118,1121,1122,1068],{},[1051,1119,1120],{},"AH"," — Authentication Header (IPsec, RFC 4301). Autentizace a integrita IP paketů. ",[1019,1123,1127],{"className":1124,"dataFsResolvedFilePath":1125,"href":1126},[1022],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu",[1048,1129,1130,1133,1134,1140,1141,1068],{},[1051,1131,1132],{},"ANN"," — Artificial Neural Network. Klasifikace, predikce, detekce anomálií. Cross-course do ",[1019,1135,1139],{"className":1136,"dataFsResolvedFilePath":1137,"href":1138},[1022],"courses\u002Fipmrk.md","\u002Fwiki\u002Fipmrk","IpmrK"," \u002F ",[1019,1142,1146],{"className":1143,"dataFsResolvedFilePath":1144,"href":1145},[1022],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","umele-neuronove-site",[1048,1148,1149,1152,1153,1061,1157,1068],{},[1051,1150,1151],{},"APT"," — Advanced Persistent Threat. Pokročilá přetrvávající hrozba — dlouhodobý cílený útok. 4 fáze: příprava → infiltrace → kompromitace → dokončení. ",[1019,1154,1156],{"className":1155,"dataFsResolvedFilePath":1104,"href":1105},[1022],"imork-anatomie-utoku",[1019,1158,1162],{"className":1159,"dataFsResolvedFilePath":1160,"href":1161},[1022],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","imork-rizeny-hacking",[1048,1164,1165,1168,1169,1068],{},[1051,1166,1167],{},"APT28\u002F29\u002F34\u002F37\u002F41"," — Konkrétní ruské\u002Firánské\u002Fseverokorejské\u002Fčínské státem sponzorované hackerské skupiny. ",[1019,1170,1162],{"className":1171,"dataFsResolvedFilePath":1160,"href":1161},[1022],[1040,1173,1175],{"id":1174},"b","B",[1045,1177,1178,1189,1198,1207,1224,1233,1268],{},[1048,1179,1180,1183,1184,1068],{},[1051,1181,1182],{},"BCM"," — Business Continuity Management. Řízení kontinuity činnosti. ISO 22301. ",[1019,1185,1182],{"className":1186,"dataFsResolvedFilePath":1187,"href":1188},[1022],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm",[1048,1190,1191,1194,1195,1068],{},[1051,1192,1193],{},"BCMS"," — Business Continuity Management System. Systémová implementace BCM. ",[1019,1196,1182],{"className":1197,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,1199,1200,1203,1204,1068],{},[1051,1201,1202],{},"BCMaaS"," — BCM as a Service. Cloudový outsourcingový model BCM. ",[1019,1205,1182],{"className":1206,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,1208,1209,1212,1213,1061,1219,1068],{},[1051,1210,1211],{},"BEC"," — Business Email Compromise. Zneužití firemního emailu k podvodným platbám; 5 typů dle FBI. ",[1019,1214,1218],{"className":1215,"dataFsResolvedFilePath":1216,"href":1217},[1022],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","imork-ai-utoky",[1019,1220,62],{"className":1221,"dataFsResolvedFilePath":1222,"href":1223},[1022],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost",[1048,1225,1226,1229,1230,1068],{},[1051,1227,1228],{},"BIA"," — Business Impact Analysis. Analýza dopadu výpadku procesů; orientace na dopad, ne příčinu. ",[1019,1231,1182],{"className":1232,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,1234,1235,1238,1239,1242,1243,1246,1247,1250,1251,1254,1255,1258,1259,1061,1262,1068],{},[1051,1236,1237],{},"BICSI"," — Building Industry Consulting Services International. Standardizační organizace pro kabeláž a infrastrukturu: ",[1051,1240,1241],{},"BICSI 001-2017"," (vzdělávací instituce), ",[1051,1244,1245],{},"BICSI 002"," (datová centra), ",[1051,1248,1249],{},"BICSI 004"," (zdravotnictví), ",[1051,1252,1253],{},"BICSI 007"," (inteligentní budovy), ",[1051,1256,1257],{},"BICSI 008"," (WLAN). ",[1019,1260,1085],{"className":1261,"dataFsResolvedFilePath":1083,"href":1084},[1022],[1019,1263,1267],{"className":1264,"dataFsResolvedFilePath":1265,"href":1266},[1022],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví",[1048,1269,1270,1273,1274,1061,1278,1068],{},[1051,1271,1272],{},"BYOD"," — Bring Your Own Device. Politika vlastních zařízení v práci. ",[1019,1275,1277],{"className":1276,"dataFsResolvedFilePath":1058,"href":1059},[1022],"imork-mobilni-bezpecnost",[1019,1279,1283],{"className":1280,"dataFsResolvedFilePath":1281,"href":1282},[1022],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","imork-manazerska-bezpecnost",[1040,1285,1287],{"id":1286},"c","C",[1045,1289,1290,1302,1314,1324,1333,1345,1356,1365],{},[1048,1291,1292,1295,1296,1068],{},[1051,1293,1294],{},"CAN bus"," — Controller Area Network. Sběrnice ve vozidlech (1986). ",[1019,1297,1301],{"className":1298,"dataFsResolvedFilePath":1299,"href":1300},[1022],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive",[1048,1303,1304,1307,1308,1068],{},[1051,1305,1306],{},"CIA"," — Confidentiality, Integrity, Availability. Tři pilíře informační bezpečnosti (+ Non-repudiation). ",[1019,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[1022],"topics\u002Fisms.md","\u002Fwiki\u002Fisms","ISMS",[1048,1315,1316,1319,1320,1068],{},[1051,1317,1318],{},"CIO \u002F CISO \u002F CTO \u002F ISSO"," — Chief Information \u002F Information Security \u002F Technology Officer; Information System Security Officer. Bezpečnostní role. ",[1019,1321,1323],{"className":1322,"dataFsResolvedFilePath":1281,"href":1282},[1022],"Manažerská bezpečnost",[1048,1325,1326,1329,1330,1068],{},[1051,1327,1328],{},"CISA \u002F CISM \u002F CRISC \u002F CGEIT"," — ISACA profesní certifikace. ",[1019,1331,1323],{"className":1332,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,1334,1335,1338,1339,1068],{},[1051,1336,1337],{},"CMMC 2.0"," — Cybersecurity Maturity Model Certification (DoD USA). 3 úrovně (Foundational \u002F Advanced \u002F Expert); 48 CFR final rule účinný 10. 11. 2025. ",[1019,1340,1344],{"className":1341,"dataFsResolvedFilePath":1342,"href":1343},[1022],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie",[1048,1346,1347,1350,1351,1068],{},[1051,1348,1349],{},"CRISP-DM"," — Cross-Industry Standard Process for Data Mining. Cross-course do ",[1019,1352,1139],{"className":1353,"dataFsResolvedFilePath":1354,"href":1355},[1022],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining",[1048,1357,1358,1361,1362,1068],{},[1051,1359,1360],{},"CSIRT"," — Computer Security Incident Response Team. Tým pro reakci na incidenty. ",[1019,1363,1283],{"className":1364,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,1366,1367,1370,1371,1374,1375,1381],{},[1051,1368,1369],{},"CVE"," — Common Vulnerabilities and Exposures. Standardizovaný identifikátor zranitelnosti. Příklad: ",[1051,1372,1373],{},"CVE-2022-38392"," (rezonanční útok na HDD, ",[1019,1376,1380],{"className":1377,"dataFsResolvedFilePath":1378,"href":1379},[1022],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","imork-audio-hack",").",[1040,1383,1385],{"id":1384},"d","D",[1045,1387,1388,1400,1409,1418,1430,1439,1451,1460,1469,1479,1491,1500],{},[1048,1389,1390,1393,1394,1068],{},[1051,1391,1392],{},"DDoS"," — Distributed Denial of Service. Distribuovaný útok na dostupnost. ",[1019,1395,1399],{"className":1396,"dataFsResolvedFilePath":1397,"href":1398},[1022],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","imork-sitove-utoky",[1048,1401,1402,1405,1406,1068],{},[1051,1403,1404],{},"DES"," — Data Encryption Standard (1975). Historický symetrický algoritmus, 64-bit klíč. ",[1019,1407,1091],{"className":1408,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,1410,1411,1414,1415,1068],{},[1051,1412,1413],{},"DICOM"," — Digital Imaging and Communications in Medicine. Standard zdravotnického zobrazování. ",[1019,1416,1267],{"className":1417,"dataFsResolvedFilePath":1265,"href":1266},[1022],[1048,1419,1420,1423,1424,1068],{},[1051,1421,1422],{},"DKIM"," — DomainKeys Identified Mail (RFC 6376). Digitální podpis emailu. ",[1019,1425,1429],{"className":1426,"dataFsResolvedFilePath":1427,"href":1428},[1022],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Email",[1048,1431,1432,1435,1436,1068],{},[1051,1433,1434],{},"DLP"," — Data Loss Prevention. Prevence úniku dat (in use \u002F in motion \u002F at rest). ",[1019,1437,1091],{"className":1438,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,1440,1441,1444,1445,1068],{},[1051,1442,1443],{},"DLT"," — Distributed Ledger Technology. Blockchain a podobné. ",[1019,1446,1450],{"className":1447,"dataFsResolvedFilePath":1448,"href":1449},[1022],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor",[1048,1452,1453,1456,1457,1068],{},[1051,1454,1455],{},"DMARC"," — Domain-based Message Authentication, Reporting & Conformance (RFC 7489). Politika použití SPF + DKIM. ",[1019,1458,1429],{"className":1459,"dataFsResolvedFilePath":1427,"href":1428},[1022],[1048,1461,1462,1465,1466,1068],{},[1051,1463,1464],{},"DORA"," — Digital Operational Resilience Act (EU 2022\u002F2554). Regulace finančního sektoru. ",[1019,1467,1450],{"className":1468,"dataFsResolvedFilePath":1448,"href":1449},[1022],[1048,1470,1471,1474,1475,1068],{},[1051,1472,1473],{},"DoS"," — Denial of Service. Útok na dostupnost (jednozdrojový předchůdce DDoS). ",[1019,1476,1478],{"className":1477,"dataFsResolvedFilePath":1397,"href":1398},[1022],"Síťové útoky",[1048,1480,1481,1484,1485,1068],{},[1051,1482,1483],{},"DPIA"," — Data Protection Impact Assessment (čl. 35 GDPR). Posouzení dopadu na ochranu OÚ. ",[1019,1486,1490],{"className":1487,"dataFsResolvedFilePath":1488,"href":1489},[1022],"topics\u002Fgdpr.md","\u002Fwiki\u002Fgdpr","GDPR",[1048,1492,1493,1496,1497,1068],{},[1051,1494,1495],{},"DPO"," — Data Protection Officer. Pověřenec pro ochranu OÚ (GDPR čl. 37–39). ",[1019,1498,1490],{"className":1499,"dataFsResolvedFilePath":1488,"href":1489},[1022],[1048,1501,1502,1505,1506,1061,1512,1068],{},[1051,1503,1504],{},"DR \u002F DRP \u002F DRaaS"," — Disaster Recovery \u002F Plan \u002F as a Service. 7 tiers (0–7). ",[1019,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[1022],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery",[1019,1513,1182],{"className":1514,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1040,1516,1518],{"id":1517},"e","E",[1045,1520,1521,1531,1543,1552,1564,1577,1586,1598,1604,1616],{},[1048,1522,1523,1526,1527,1530],{},[1051,1524,1525],{},"EAL"," — Evaluation Assurance Level (Common Criteria, ISO\u002FIEC 15408). Úrovně 1–7. ",[1019,1528,1060],{"className":1529,"dataFsResolvedFilePath":1058,"href":1059},[1022]," (typicky EAL3+).",[1048,1532,1533,1536,1537,1068],{},[1051,1534,1535],{},"EDR \u002F XDR"," — Endpoint \u002F Extended Detection and Response. Pokročilé sledování koncových bodů. ",[1019,1538,1542],{"className":1539,"dataFsResolvedFilePath":1540,"href":1541},[1022],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware",[1048,1544,1545,1548,1549,1068],{},[1051,1546,1547],{},"eduroam"," — Federace identit pro akademické instituce. ",[1019,1550,1085],{"className":1551,"dataFsResolvedFilePath":1083,"href":1084},[1022],[1048,1553,1554,1557,1558,1068],{},[1051,1555,1556],{},"EHR"," — Electronic Health Record. Elektronický zdravotní záznam. ",[1019,1559,1563],{"className":1560,"dataFsResolvedFilePath":1561,"href":1562},[1022],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth",[1048,1565,1566,1569,1570,1573,1574,1068],{},[1051,1567,1568],{},"eIDAS"," — Nařízení (EU) 910\u002F2014, novelizováno ",[1051,1571,1572],{},"(EU) 2024\u002F1183 — „eIDAS 2.0\""," od 5\u002F2024 (zavádí EUDI Wallet). Elektronická identifikace a důvěryhodné služby. ",[1019,1575,1091],{"className":1576,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,1578,1579,1582,1583,1068],{},[1051,1580,1581],{},"EMM"," — Enterprise Mobility Management. Rozšířená správa mobilních zařízení. ",[1019,1584,1277],{"className":1585,"dataFsResolvedFilePath":1058,"href":1059},[1022],[1048,1587,1588,1591,1592,1068],{},[1051,1589,1590],{},"EMV"," — Europay\u002FMastercard\u002FVisa. Standard pro čipové karty. ",[1019,1593,1597],{"className":1594,"dataFsResolvedFilePath":1595,"href":1596},[1022],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb",[1048,1599,1600,1603],{},[1051,1601,1602],{},"ENISA"," — European Union Agency for Cybersecurity. Evropská agentura pro kybernetickou bezpečnost.",[1048,1605,1606,1609,1610,1061,1613,1068],{},[1051,1607,1608],{},"EPS"," — Events Per Second (SIEM dimenzování) \u002F Elektrická požární signalizace (fyzická bezpečnost). ",[1019,1611,70],{"className":1612,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1019,1614,1283],{"className":1615,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,1617,1618,1621,1622,1068],{},[1051,1619,1620],{},"ESP"," — Encapsulating Security Payload (IPsec). Šifrování + autentizace. ",[1019,1623,1625],{"className":1624,"dataFsResolvedFilePath":1125,"href":1126},[1022],"imork-www",[1040,1627,1629],{"id":1628},"f","F",[1045,1631,1632],{},[1048,1633,1634,1637,1638,1641,1642,1068],{},[1051,1635,1636],{},"FIPS 140-3"," — Federal Information Processing Standards. Validace kryptografických modulů. Schválen 2019, povinný pro nové validace od dubna 2022; ",[1051,1639,1640],{},"nahrazuje FIPS 140-2"," (jeho validace přechází na Historical List 21. 9. 2026). ",[1019,1643,1647],{"className":1644,"dataFsResolvedFilePath":1645,"href":1646},[1022],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","imork-sprava-login",[1040,1649,1651],{"id":1650},"g","G",[1045,1653,1654],{},[1048,1655,1656,1658,1659,1068],{},[1051,1657,1490],{}," — General Data Protection Regulation, nařízení (EU) 2016\u002F679. Účinnost 25. 5. 2018. ",[1019,1660,1490],{"className":1661,"dataFsResolvedFilePath":1488,"href":1489},[1022],[1040,1663,1665],{"id":1664},"h","H",[1045,1667,1668,1697],{},[1048,1669,1670,1673,1674,1677,1678,1681,1682,1685,1686,1689,1690,1693,1694,1068],{},[1051,1671,1672],{},"HIPAA"," — Health Insurance Portability and Accountability Act (USA, 1996). 5 titulů (I–V): I. ",[1028,1675,1676],{},"Health Care Access, Portability, and Renewability","; II. ",[1028,1679,1680],{},"Administrative Simplification"," (obsahuje Privacy Rule, Security Rule, Unique Identifiers Rule, Transactions Rule, Enforcement Rule, Breach Notification Rule); III. ",[1028,1683,1684],{},"Tax-Related Health Provisions","; IV. ",[1028,1687,1688],{},"Application and Enforcement of Group Health Plan Requirements","; V. ",[1028,1691,1692],{},"Revenue Offsets",". ",[1019,1695,1267],{"className":1696,"dataFsResolvedFilePath":1265,"href":1266},[1022],[1048,1698,1699,1702,1703,1706,1707,1710,1711,1068],{},[1051,1700,1701],{},"HITECH Act"," — Health Information Technology for Economic and Clinical Health Act (USA, 2009; součást ARRA). Rozšiřuje HIPAA na ",[1051,1704,1705],{},"business associates",", zavádí ",[1051,1708,1709],{},"Breach Notification Rule",", posiluje sankce. ",[1019,1712,1267],{"className":1713,"dataFsResolvedFilePath":1265,"href":1266},[1022],[1040,1715,1717],{"id":1716},"i","I",[1045,1719,1720,1729,1738,1750,1762,1772,1787,1796,1805,1811,1819,1827],{},[1048,1721,1722,1725,1726,1068],{},[1051,1723,1724],{},"IAM \u002F IdM"," — Identity and Access Management \u002F Identity Management. Správa identit a přístupu. ",[1019,1727,1283],{"className":1728,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,1730,1731,1734,1735,1068],{},[1051,1732,1733],{},"IDS \u002F IPS"," — Intrusion Detection \u002F Prevention System. Pasivní detekce vs. aktivní in-line blokace. ",[1019,1736,1091],{"className":1737,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,1739,1740,1743,1744,1068],{},[1051,1741,1742],{},"IEC 61850"," — Standard pro komunikaci v elektrárnách (3-úrovňová architektura). ",[1019,1745,1749],{"className":1746,"dataFsResolvedFilePath":1747,"href":1748},[1022],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","imork-energetika",[1048,1751,1752,1755,1756,1068],{},[1051,1753,1754],{},"IEC 62351"," — Bezpečnost protokolů IEC 61850. ",[1019,1757,1761],{"className":1758,"dataFsResolvedFilePath":1759,"href":1760},[1022],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","imork-smart-grid",[1048,1763,1764,1767,1768,1068],{},[1051,1765,1766],{},"IMS"," — IP Multimedia Subsystem. Architektura pro multimediální služby přes IP, základ NGN. ",[1019,1769,1771],{"className":1770,"dataFsResolvedFilePath":1065,"href":1066},[1022],"imork-isp",[1048,1773,1774,1777,1778,1061,1784,1068],{},[1051,1775,1776],{},"IoT"," — Internet of Things. Internet věcí — zranitelný útokům přes botnety. ",[1019,1779,1783],{"className":1780,"dataFsResolvedFilePath":1781,"href":1782},[1022],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","imork-kradez-dat",[1019,1785,1761],{"className":1786,"dataFsResolvedFilePath":1759,"href":1760},[1022],[1048,1788,1789,1792,1793,1068],{},[1051,1790,1791],{},"IPsec"," — Internet Protocol Security (RFC 4301). Bezpečnost na L3, AH\u002FESP, transportní\u002Ftunelovací režim. ",[1019,1794,1625],{"className":1795,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1048,1797,1798,1801,1802,1068],{},[1051,1799,1800],{},"IRP"," — Incident Response Plan. 4 fáze (NIST SP 800-61 Rev. 3, duben 2025; profil CSF 2.0). ",[1019,1803,1283],{"className":1804,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,1806,1807,1810],{},[1051,1808,1809],{},"ISACA"," — Information Systems Audit and Control Association. Profesní organizace.",[1048,1812,1813,1815,1816,1068],{},[1051,1814,1313],{}," — Information Security Management System. Systém řízení bezpečnosti informací (ISO 27001). ",[1019,1817,1313],{"className":1818,"dataFsResolvedFilePath":1311,"href":1312},[1022],[1048,1820,1821,1823,1824,1068],{},[1051,1822,1067],{}," — Internet Service Provider. Poskytovatel internetových služeb. ",[1019,1825,1771],{"className":1826,"dataFsResolvedFilePath":1065,"href":1066},[1022],[1048,1828,1829,1832],{},[1051,1830,1831],{},"ISVS"," — Informační systémy veřejné správy. Zákon č. 365\u002F2000 Sb. (ČR).",[1040,1834,1836],{"id":1835},"k","K",[1045,1838,1839,1851,1863],{},[1048,1840,1841,1844,1845,1068],{},[1051,1842,1843],{},"KII"," — Kritická informační infrastruktura (ZKB). ",[1019,1846,1850],{"className":1847,"dataFsResolvedFilePath":1848,"href":1849},[1022],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik",[1048,1852,1853,1856,1857,1068],{},[1051,1854,1855],{},"KRACK"," — Key Reinstallation Attack. Útok na WPA2 (2017). ",[1019,1858,1862],{"className":1859,"dataFsResolvedFilePath":1860,"href":1861},[1022],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","imork-internetova-bezpecnost",[1048,1864,1865,1868,1869,1874],{},[1051,1866,1867],{},"KYC"," — Know Your Customer. Požadavek finančního sektoru. Cross-course do ",[1019,1870,195],{"className":1871,"dataFsResolvedFilePath":1872,"href":1873},[1022],"topics\u002Fexpertni-systemy.md","\u002Fwiki\u002Fexpertni-systemy"," (compliance).",[1040,1876,1878],{"id":1877},"l","L",[1045,1880,1881],{},[1048,1882,1883,1886,1887,1068],{},[1051,1884,1885],{},"LDAP"," — Lightweight Directory Access Protocol. Adresářové služby. ",[1019,1888,1283],{"className":1889,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1040,1891,1893],{"id":1892},"m","M",[1045,1895,1896,1909,1918,1930,1939,1948,1958],{},[1048,1897,1898,1901,1902,1908],{},[1051,1899,1900],{},"MAD"," — Mutually Assured Destruction. Cross-course z teorie her (",[1019,1903,1907],{"className":1904,"dataFsResolvedFilePath":1905,"href":1906},[1022],"topics\u002Fmikk-vezno-dilema-teorie-her.md","\u002Fwiki\u002Fmikk-vezno-dilema-teorie-her","MikK",") — analog v kybernetické deterrence.",[1048,1910,1911,1914,1915,1068],{},[1051,1912,1913],{},"MBCO"," — Minimum Business Continuity Objective. Minimální úroveň služeb pro kontinuitu. ",[1019,1916,1182],{"className":1917,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,1919,1920,1923,1924,1068],{},[1051,1921,1922],{},"MCN"," — Mission Critical Networks. Kritické sítě. ",[1019,1925,1929],{"className":1926,"dataFsResolvedFilePath":1927,"href":1928},[1022],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","imork-mcn",[1048,1931,1932,1935,1936,1068],{},[1051,1933,1934],{},"MDM"," — Mobile Device Management. Správa mobilních zařízení. ",[1019,1937,1277],{"className":1938,"dataFsResolvedFilePath":1058,"href":1059},[1022],[1048,1940,1941,1944,1945,1068],{},[1051,1942,1943],{},"MFA"," — Multi-Factor Authentication. Vícefaktorové ověření (znalost \u002F vlastnictví \u002F biometrika). ",[1019,1946,1647],{"className":1947,"dataFsResolvedFilePath":1645,"href":1646},[1022],[1048,1949,1950,1953,1954,1068],{},[1051,1951,1952],{},"MICA \u002F MiCA"," — Markets in Crypto-Assets, nařízení (EU) 2023\u002F1114. ",[1019,1955,1957],{"className":1956,"dataFsResolvedFilePath":1448,"href":1449},[1022],"imork-financni-sektor",[1048,1959,1960,1963,1964,1068],{},[1051,1961,1962],{},"MITRE ATT&CK"," — Adversarial Tactics, Techniques, and Common Knowledge. Znalostní báze útoků. ",[1019,1965,1156],{"className":1966,"dataFsResolvedFilePath":1104,"href":1105},[1022],[1040,1968,1970],{"id":1969},"n","N",[1045,1972,1973,1982,1991,2000,2009,2015],{},[1048,1974,1975,1978,1979,1068],{},[1051,1976,1977],{},"NAC"," — Network Access Control. Řízení přístupu k síti (4 fáze). ",[1019,1980,1091],{"className":1981,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,1983,1984,1987,1988,1068],{},[1051,1985,1986],{},"NBA"," — Network Behavior Analysis. Detekce hrozeb chováním sítě (zero-day, polymorfní malware). ",[1019,1989,1283],{"className":1990,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,1992,1993,1996,1997,1068],{},[1051,1994,1995],{},"NCPI"," — Network Critical Physical Infrastructure. ",[1019,1998,1922],{"className":1999,"dataFsResolvedFilePath":1927,"href":1928},[1022],[1048,2001,2002,2005,2006,1068],{},[1051,2003,2004],{},"NGN"," — Next Generation Networks. Konvergence dat \u002F vysílání \u002F telekomunikace. ",[1019,2007,1771],{"className":2008,"dataFsResolvedFilePath":1065,"href":1066},[1022],[1048,2010,2011,2014],{},[1051,2012,2013],{},"NIS2"," — Směrnice (EU) 2022\u002F2555. Nahrazuje NIS1; rozšířený rozsah kritických služeb.",[1048,2016,2017,2020,2021,2024,2025,1068],{},[1051,2018,2019],{},"NÚKIB"," — Národní úřad pro kybernetickou a informační bezpečnost (ČR). Založen ",[1051,2022,2023],{},"1. 8. 2017"," (odštěpením z NBÚ zákonem č. 205\u002F2017 Sb.); sídlo Brno. Vydává prováděcí vyhlášky k ZKB a Bezpečnostní strategii ČR. ",[1019,2026,2028],{"className":2027,"dataFsResolvedFilePath":1342,"href":1343},[1022],"imork-bezpecnostni-strategie",[1040,2030,2032],{"id":2031},"o","O",[1045,2034,2035,2047],{},[1048,2036,2037,2040,2041,1061,2044,1068],{},[1051,2038,2039],{},"OSINT"," — Open Source Intelligence. Sběr informací z veřejných zdrojů. ",[1019,2042,1162],{"className":2043,"dataFsResolvedFilePath":1160,"href":1161},[1022],[1019,2045,1862],{"className":2046,"dataFsResolvedFilePath":1860,"href":1861},[1022],[1048,2048,2049,2052,2053,1068],{},[1051,2050,2051],{},"OWASP"," — Open Web Application Security Project. Top 10 web rizik. ",[1019,2054,1625],{"className":2055,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1040,2057,2058],{"id":1015},"P",[1045,2060,2061,2071,2085,2097,2109,2118,2127],{},[1048,2062,2063,2066,2067,1068],{},[1051,2064,2065],{},"PACS"," — Picture Archiving and Communication System. Zdravotnické zobrazování. ",[1019,2068,2070],{"className":2069,"dataFsResolvedFilePath":1265,"href":1266},[1022],"imork-zdravotnictvi",[1048,2072,2073,2076,2077,2080,2081,1068],{},[1051,2074,2075],{},"PCI DSS"," — Payment Card Industry Data Security Standard. Aktuální ",[1051,2078,2079],{},"v4.0.1"," (od 6\u002F2024; v4.0 z 3\u002F2022 vyřazena 31. 12. 2024). ",[1019,2082,2084],{"className":2083,"dataFsResolvedFilePath":1595,"href":1596},[1022],"imork-payment",[1048,2086,2087,2090,2091,1061,2094,1068],{},[1051,2088,2089],{},"PDCA"," — Plan-Do-Check-Act (Demingův cyklus). ",[1019,2092,1313],{"className":2093,"dataFsResolvedFilePath":1311,"href":1312},[1022],[1019,2095,1182],{"className":2096,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,2098,2099,2102,2103,1061,2106,1068],{},[1051,2100,2101],{},"PII"," — Personally Identifiable Information. NIST analog k „osobnímu údaji\" GDPR. ",[1019,2104,1490],{"className":2105,"dataFsResolvedFilePath":1488,"href":1489},[1022],[1019,2107,1783],{"className":2108,"dataFsResolvedFilePath":1781,"href":1782},[1022],[1048,2110,2111,2114,2115,1068],{},[1051,2112,2113],{},"PIMS"," — Privacy Information Management System. ISO\u002FIEC 27701. ",[1019,2116,1490],{"className":2117,"dataFsResolvedFilePath":1488,"href":1489},[1022],[1048,2119,2120,2123,2124,1068],{},[1051,2121,2122],{},"PKI"," — Public Key Infrastructure. Certifikační autority, digitální certifikáty. ",[1019,2125,1283],{"className":2126,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,2128,2129,2132,2133,1068],{},[1051,2130,2131],{},"PoA \u002F SoA"," — Prohlášení o aplikovatelnosti \u002F Statement of Applicability. ISO 27001 Příloha A. ",[1019,2134,1850],{"className":2135,"dataFsResolvedFilePath":1848,"href":1849},[1022],[1040,2137,2139],{"id":2138},"r","R",[1045,2141,2142,2151,2160,2169,2178,2187,2196],{},[1048,2143,2144,2147,2148,1068],{},[1051,2145,2146],{},"RaaS"," — Ransomware-as-a-Service. Obchodní model ransomware. ",[1019,2149,1542],{"className":2150,"dataFsResolvedFilePath":1540,"href":1541},[1022],[1048,2152,2153,2156,2157,1068],{},[1051,2154,2155],{},"RPO"," — Recovery Point Objective. Maximální přípustná ztráta dat. ",[1019,2158,1182],{"className":2159,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,2161,2162,2165,2166,1068],{},[1051,2163,2164],{},"RSA"," — Rivest-Shamir-Adleman (1977). Asymetrický algoritmus. ",[1019,2167,1091],{"className":2168,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,2170,2171,2174,2175,1068],{},[1051,2172,2173],{},"RTBH"," — Remotely Triggered Black Hole. Ochrana ISP před DDoS. ",[1019,2176,1771],{"className":2177,"dataFsResolvedFilePath":1065,"href":1066},[1022],[1048,2179,2180,2183,2184,1068],{},[1051,2181,2182],{},"RTO"," — Recovery Time Objective. Maximální přípustná doba výpadku. ",[1019,2185,1182],{"className":2186,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,2188,2189,2192,2193,1068],{},[1051,2190,2191],{},"RTP"," — Risk Treatment Plan. Plán zvládání rizik. ",[1019,2194,1850],{"className":2195,"dataFsResolvedFilePath":1848,"href":1849},[1022],[1048,2197,2198,2201,2202,1061,2208,1068],{},[1051,2199,2200],{},"RYUK"," — Ransomware z let 2018+; aktér v útoku Benešov. ",[1019,2203,2207],{"className":2204,"dataFsResolvedFilePath":2205,"href":2206},[1022],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","imork-nemocnice",[1019,2209,2211],{"className":2210,"dataFsResolvedFilePath":1540,"href":1541},[1022],"imork-ransomware",[1040,2213,2215],{"id":2214},"s","S",[1045,2217,2218,2228,2243,2252,2261,2270,2279,2288,2294,2303,2312,2322,2331],{},[1048,2219,2220,2223,2224,1068],{},[1051,2221,2222],{},"S\u002FMIME"," — Secure\u002FMultipurpose Internet Mail Extensions. End-to-end šifrování emailu. ",[1019,2225,2227],{"className":2226,"dataFsResolvedFilePath":1427,"href":1428},[1022],"imork-email",[1048,2229,2230,2233,2234,2237,2238,1068],{},[1051,2231,2232],{},"SAE"," — Security Awareness and Education. Budování bezpečnostního povědomí. ",[1051,2235,2236],{},"NIST SP 800-50 Rev. 1"," (2024; sloučil původní 800-50 a vyřazený 800-16). ",[1019,2239,2232],{"className":2240,"dataFsResolvedFilePath":2241,"href":2242},[1022],"topics\u002Fsae.md","\u002Fwiki\u002Fsae",[1048,2244,2245,2248,2249,1068],{},[1051,2246,2247],{},"SAML"," — Security Assertion Markup Language. Federovaná autentizace. ",[1019,2250,1625],{"className":2251,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1048,2253,2254,2257,2258,1068],{},[1051,2255,2256],{},"SCAP"," — Security Content Automation Protocol. Automatizované hodnocení bezpečnosti. ",[1019,2259,1283],{"className":2260,"dataFsResolvedFilePath":1281,"href":1282},[1022],[1048,2262,2263,2266,2267,1068],{},[1051,2264,2265],{},"SHA-256"," — Secure Hash Algorithm, 256-bit. ",[1019,2268,70],{"className":2269,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,2271,2272,2275,2276,1068],{},[1051,2273,2274],{},"SIEM"," — Security Information and Event Management. Centralizovaná správa bezpečnostních událostí. ",[1019,2277,1091],{"className":2278,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1048,2280,2281,2284,2285,1068],{},[1051,2282,2283],{},"SIM swap \u002F SIMjacker"," — Útoky převzetím SIM karty. ",[1019,2286,1277],{"className":2287,"dataFsResolvedFilePath":1058,"href":1059},[1022],[1048,2289,2290,2293],{},[1051,2291,2292],{},"SoA"," → viz PoA \u002F SoA.",[1048,2295,2296,2299,2300,1068],{},[1051,2297,2298],{},"SPF"," — Sender Policy Framework (RFC 7208). Antispoofing email. ",[1019,2301,2227],{"className":2302,"dataFsResolvedFilePath":1427,"href":1428},[1022],[1048,2304,2305,2308,2309,1068],{},[1051,2306,2307],{},"SPoF"," — Single Point of Failure. Bod selhání zastavující celý proces. ",[1019,2310,1182],{"className":2311,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1048,2313,2314,2317,2318,1068],{},[1051,2315,2316],{},"SSO"," — Single Sign-On. Jednotné přihlášení (eduID, OAuth, SAML). ",[1019,2319,2321],{"className":2320,"dataFsResolvedFilePath":1083,"href":1084},[1022],"imork-akademicke-prostredi",[1048,2323,2324,2327,2328,1068],{},[1051,2325,2326],{},"STARTTLS"," — Příkaz povýšení nezabezpečené relace na TLS. ",[1019,2329,2227],{"className":2330,"dataFsResolvedFilePath":1427,"href":1428},[1022],[1048,2332,2333,2336,2337,1068],{},[1051,2334,2335],{},"STEEPLE"," — Social\u002FTech\u002FEcon\u002FEthical\u002FPolit\u002FLegisl\u002FEnviron. Analýza vnějšího prostředí pro BCM. ",[1019,2338,1182],{"className":2339,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1040,2341,2343],{"id":2342},"t","T",[1045,2345,2346,2356,2365,2374],{},[1048,2347,2348,2351,2352,1068],{},[1051,2349,2350],{},"TISAX"," — Trusted Information Security Assessment Exchange. Bezpečnostní standard automotive. ",[1019,2353,2355],{"className":2354,"dataFsResolvedFilePath":1299,"href":1300},[1022],"imork-automotive",[1048,2357,2358,2361,2362,1068],{},[1051,2359,2360],{},"TLP"," — Traffic Light Protocol. Klasifikace sdílení informací (RED\u002FAMBER\u002FGREEN\u002FCLEAR). ",[1019,2363,2321],{"className":2364,"dataFsResolvedFilePath":1083,"href":1084},[1022],[1048,2366,2367,2370,2371,1068],{},[1051,2368,2369],{},"TLS"," — Transport Layer Security. Bezpečnost L4 (3 fáze handshaku). ",[1019,2372,1625],{"className":2373,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1048,2375,2376,2379,2380,1068],{},[1051,2377,2378],{},"TOR"," — The Onion Router. Anonymizační síť, exit relays. ",[1019,2381,2378],{"className":2382,"dataFsResolvedFilePath":2383,"href":2384},[1022],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor",[1040,2386,2388],{"id":2387},"u","U",[1045,2390,2391,2400,2409],{},[1048,2392,2393,2396,2397,1068],{},[1051,2394,2395],{},"UN R155"," — UN Regulation No. 155. Cybersecurity Management System pro vozidla; povinné pro nové typy od července 2022, pro celou produkci od července 2024. ",[1019,2398,2355],{"className":2399,"dataFsResolvedFilePath":1299,"href":1300},[1022],[1048,2401,2402,2405,2406,1068],{},[1051,2403,2404],{},"ÚOOÚ"," — Úřad pro ochranu osobních údajů. Český dozorový úřad pro GDPR; přijímá oznámení o porušení podle čl. 33 GDPR. ",[1019,2407,1490],{"className":2408,"dataFsResolvedFilePath":1488,"href":1489},[1022],[1048,2410,2411,2414,2415,1068],{},[1051,2412,2413],{},"UTM"," — Unified Threat Management. FW + IDS\u002FIPS + AV + VPN v jednom zařízení. ",[1019,2416,70],{"className":2417,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1040,2419,2421],{"id":2420},"v","V",[1045,2423,2424,2433],{},[1048,2425,2426,2429,2430,1068],{},[1051,2427,2428],{},"VIS"," — Významný informační systém (vyhl. 360\u002F2020 Sb.). ",[1019,2431,2321],{"className":2432,"dataFsResolvedFilePath":1083,"href":1084},[1022],[1048,2434,2435,2438,2439,2442,2443,2446,2447,1068],{},[1051,2436,2437],{},"VKB"," — Vyhláška o kybernetické bezpečnosti. Původní ",[1051,2440,2441],{},"č. 82\u002F2018 Sb."," (§15 = BCM požadavky) byla ",[1051,2444,2445],{},"zrušena 1. 11. 2025","; nahradila ji vyhl. č. 409\u002F2025 Sb. (transpozice NIS2). ",[1019,2448,1182],{"className":2449,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1040,2451,2453],{"id":2452},"w","W",[1045,2455,2456,2465,2475,2484],{},[1048,2457,2458,2461,2462,1068],{},[1051,2459,2460],{},"WAF"," — Web Application Firewall. Aplikační firewall pro web. ",[1019,2463,1625],{"className":2464,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1048,2466,2467,2470,2471,1068],{},[1051,2468,2469],{},"WBAN"," — Wireless Body Area Network. Síť senzorů na\u002Fv těle pacienta. ",[1019,2472,2474],{"className":2473,"dataFsResolvedFilePath":1561,"href":1562},[1022],"imork-ehealth",[1048,2476,2477,2480,2481,1068],{},[1051,2478,2479],{},"WHOIS"," — Protokol pro lookup vlastníka domény. ",[1019,2482,1625],{"className":2483,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1048,2485,2486,2489,2490,1068],{},[1051,2487,2488],{},"WormGPT"," — Generativní AI nástroj pro automatizaci kybernetické kriminality. ",[1019,2491,1218],{"className":2492,"dataFsResolvedFilePath":1216,"href":1217},[1022],[1040,2494,2496],{"id":2495},"x","X",[1045,2498,2499,2509,2518],{},[1048,2500,2501,2504,2505,1068],{},[1051,2502,2503],{},"X-Keyscore"," — NSA program (odhalený 2013). ",[1019,2506,2508],{"className":2507,"dataFsResolvedFilePath":2383,"href":2384},[1022],"imork-tor",[1048,2510,2511,2514,2515,1068],{},[1051,2512,2513],{},"XKMS \u002F XACML \u002F XML Encryption \u002F XML Digital Signature"," — XML Security stack. ",[1019,2516,1625],{"className":2517,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1048,2519,2520,2523,2524,1061,2527,1068],{},[1051,2521,2522],{},"XSS"," — Cross-Site Scripting. Webový útok cílící na klienta. ",[1019,2525,1625],{"className":2526,"dataFsResolvedFilePath":1125,"href":1126},[1022],[1019,2528,1156],{"className":2529,"dataFsResolvedFilePath":1104,"href":1105},[1022],[1040,2531,2533],{"id":2532},"z","Z",[1045,2535,2536],{},[1048,2537,2538,2541,2542,2545,2546,2549,2550,2553,2554,2556,2557,1068],{},[1051,2539,2540],{},"ZKB"," — Zákon o kybernetické bezpečnosti. Původní ",[1051,2543,2544],{},"č. 181\u002F2014 Sb."," byl ",[1051,2547,2548],{},"zrušen 1. 11. 2025"," a nahrazen ",[1051,2551,2552],{},"zákonem č. 264\u002F2025 Sb."," (transpozice ",[1051,2555,2013],{},"). Definuje role: výbor pro řízení KB, manažer KB, architekt KB, auditor KB, garant aktiva. ",[1019,2558,1850],{"className":2559,"dataFsResolvedFilePath":1848,"href":1849},[1022],[1040,2561,2563],{"id":2562},"související-stránky","Související stránky",[1045,2565,2566,2573,2580,2586],{},[1048,2567,2568,2572],{},[1019,2569,2571],{"className":2570,"dataFsResolvedFilePath":1023,"href":1024},[1022],"ImorK course hub"," — výchozí bod kurzu",[1048,2574,2575,2579],{},[1019,2576,2578],{"className":2577,"dataFsResolvedFilePath":1035,"href":1036},[1022],"Přehled norem podle sektoru"," — komplementární referenční tabulka",[1048,2581,2582,2585],{},[1019,2583,1313],{"className":2584,"dataFsResolvedFilePath":1311,"href":1312},[1022]," — manažerský rámec, který sjednocuje většinu těchto pojmů",[1048,2587,2588,2591],{},[1019,2589,1490],{"className":2590,"dataFsResolvedFilePath":1488,"href":1489},[1022]," — nejčastěji odkazovaná regulace",{"title":2593,"searchDepth":145,"depth":145,"links":2594},"",[2595,2596,2597,2598,2599,2600,2601,2602,2603,2604,2605,2606,2607,2608,2609,2610,2611,2612,2613,2614,2615,2616,2617,2618,2619],{"id":1042,"depth":145,"text":1043},{"id":1019,"depth":145,"text":1071},{"id":1174,"depth":145,"text":1175},{"id":1286,"depth":145,"text":1287},{"id":1384,"depth":145,"text":1385},{"id":1517,"depth":145,"text":1518},{"id":1628,"depth":145,"text":1629},{"id":1650,"depth":145,"text":1651},{"id":1664,"depth":145,"text":1665},{"id":1716,"depth":145,"text":1717},{"id":1835,"depth":145,"text":1836},{"id":1877,"depth":145,"text":1878},{"id":1892,"depth":145,"text":1893},{"id":1969,"depth":145,"text":1970},{"id":2031,"depth":145,"text":2032},{"id":1015,"depth":145,"text":2058},{"id":2138,"depth":145,"text":2139},{"id":2214,"depth":145,"text":2215},{"id":2342,"depth":145,"text":2343},{"id":2387,"depth":145,"text":2388},{"id":2420,"depth":145,"text":2421},{"id":2452,"depth":145,"text":2453},{"id":2495,"depth":145,"text":2496},{"id":2532,"depth":145,"text":2533},{"id":2562,"depth":145,"text":2563},null,"2026-05-04","Abecední slovník bezpečnostní terminologie kurzu ImorK. Ke každému pojmu uvedeno rozvinutí zkratky, krátká definice, odkaz na stránku s plným výkladem. Pro normy a regulace primárně viz Přehled norem — tady jsou jen zařazeny pro hledání v Ctrl-F.","md",{},true,"\u002Foutputs\u002Fimork-glosar",{"title":1006,"description":2622},[2629,2630,2631,2632,2633,2634],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 03 VUT_Síťové útoky-2023.pdf","outputs\u002Fimork-glosar",[5,209,37,62,70,91],"output","jnGWPaHBmi0R0nQ307n-T-6-J3MZdP_FGXitRf_ITlI","outputs",{"zapisku":7,"topics":48,"summaries":2641,"outputs":145},34,[2643,3392,4112,4610,5126,5643,6134],{"id":2644,"title":2645,"body":2646,"course":2620,"courses":3381,"created":3382,"description":2593,"extension":2623,"meta":3383,"navigation":2625,"path":3384,"seo":3385,"sources":3386,"stem":3388,"tags":3389,"type":3390,"updated":2621,"__hash__":3391},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":1008,"value":2647,"toc":3354},[2648,2651,2660,2663,2667,2762,2766,2820,2824,2847,2851,2935,2939,2944,2959,2963,2985,2989,3008,3012,3016,3042,3046,3072,3076,3080,3090,3094,3137,3148,3152,3158,3175,3182,3186,3189,3191,3197,3201,3204,3208,3285,3289,3315,3317],[1011,2649,2645],{"id":2650},"bcm-řízení-kontinuity-činnosti",[1015,2652,2653],{},[2654,2655],"img",{"alt":2656,"className":2657,"src":2659},"bcm-rpo-rto",[1022,2658],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[1015,2661,2662],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[1040,2664,2666],{"id":2665},"klíčové-pojmy","Klíčové pojmy",[2668,2669,2670,2686],"table",{},[2671,2672,2673],"thead",{},[2674,2675,2676,2680,2683],"tr",{},[2677,2678,2679],"th",{},"Pojem",[2677,2681,2682],{},"Anglicky",[2677,2684,2685],{},"Popis",[2687,2688,2689,2702,2714,2726,2738,2750],"tbody",{},[2674,2690,2691,2696,2699],{},[2692,2693,2694],"td",{},[1051,2695,1193],{},[2692,2697,2698],{},"Business Continuity Management System",[2692,2700,2701],{},"Plánovaný, kontinuální a dokumentovaný systém",[2674,2703,2704,2708,2711],{},[2692,2705,2706],{},[1051,2707,1182],{},[2692,2709,2710],{},"Business Continuity Management",[2692,2712,2713],{},"Činnost identifikující dopady a zajišťující kontinuitu",[2674,2715,2716,2720,2723],{},[2692,2717,2718],{},[1051,2719,1228],{},[2692,2721,2722],{},"Business Impact Analysis",[2692,2724,2725],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[2674,2727,2728,2732,2735],{},[2692,2729,2730],{},[1051,2731,1913],{},[2692,2733,2734],{},"Minimum Business Continuity Objective",[2692,2736,2737],{},"Minimální přijatelná úroveň služeb",[2674,2739,2740,2744,2747],{},[2692,2741,2742],{},[1051,2743,2155],{},[2692,2745,2746],{},"Recovery Point Objective",[2692,2748,2749],{},"Do jakého bodu v minulosti lze obnovit data",[2674,2751,2752,2756,2759],{},[2692,2753,2754],{},[1051,2755,2182],{},[2692,2757,2758],{},"Recovery Time Objective",[2692,2760,2761],{},"Čas potřebný pro obnovu provozu",[1040,2763,2765],{"id":2764},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[2668,2767,2768,2778],{},[2671,2769,2770],{},[2674,2771,2772,2775],{},[2677,2773,2774],{},"Fáze",[2677,2776,2777],{},"Obsah",[2687,2779,2780,2790,2800,2810],{},[2674,2781,2782,2787],{},[2692,2783,2784],{},[1051,2785,2786],{},"Plan",[2692,2788,2789],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[2674,2791,2792,2797],{},[2692,2793,2794],{},[1051,2795,2796],{},"Do",[2692,2798,2799],{},"Strategie kontinuity, implementace plánů, cvičení",[2674,2801,2802,2807],{},[2692,2803,2804],{},[1051,2805,2806],{},"Check",[2692,2808,2809],{},"Monitoring, audit, přezkoumání managementem",[2674,2811,2812,2817],{},[2692,2813,2814],{},[1051,2815,2816],{},"Act",[2692,2818,2819],{},"Nápravná opatření, neustálé zlepšování",[1040,2821,2823],{"id":2822},"iso-223012019-struktura","ISO 22301:2019 — struktura",[1045,2825,2826,2829,2832,2835,2838,2841,2844],{},[1048,2827,2828],{},"Kap. 4 — kontext organizace",[1048,2830,2831],{},"Kap. 5 — vedení (leadership)",[1048,2833,2834],{},"Kap. 6 — plánování (BIA, rizika)",[1048,2836,2837],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[1048,2839,2840],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[1048,2842,2843],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[1048,2845,2846],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[1040,2848,2850],{"id":2849},"analýza-steeple","Analýza STEEPLE",[2668,2852,2853,2863],{},[2671,2854,2855],{},[2674,2856,2857,2860],{},[2677,2858,2859],{},"Faktor",[2677,2861,2862],{},"Oblast",[2687,2864,2865,2875,2885,2895,2905,2915,2925],{},[2674,2866,2867,2872],{},[2692,2868,2869,2871],{},[1051,2870,2215],{},"ociální",[2692,2873,2874],{},"Zaměstnanost, bezpečnost, komunity",[2674,2876,2877,2882],{},[2692,2878,2879,2881],{},[1051,2880,2343],{},"echnologický",[2692,2883,2884],{},"Závislost na technologiích",[2674,2886,2887,2892],{},[2692,2888,2889,2891],{},[1051,2890,1518],{},"konomický",[2692,2893,2894],{},"Ekonomická situace, finanční instituce",[2674,2896,2897,2902],{},[2692,2898,2899,2901],{},[1051,2900,1518],{},"tický",[2692,2903,2904],{},"Podnikatelská etika, média, veřejnost",[2674,2906,2907,2912],{},[2692,2908,2909,2911],{},[1051,2910,2058],{},"olitický",[2692,2913,2914],{},"Politický systém, hrozba nepokojů",[2674,2916,2917,2922],{},[2692,2918,2919,2921],{},[1051,2920,1878],{},"egislativní",[2692,2923,2924],{},"Předpisy, zákony",[2674,2926,2927,2932],{},[2692,2928,2929,2931],{},[1051,2930,1518],{},"nvironmentální",[2692,2933,2934],{},"Životní prostředí, přírodní hrozby",[1040,2936,2938],{"id":2937},"bia-business-impact-analysis","BIA (Business Impact Analysis)",[2940,2941,2943],"h3",{"id":2942},"dva-způsoby-provedení","Dva způsoby provedení",[2945,2946,2947,2953],"ol",{},[1048,2948,2949,2952],{},[1051,2950,2951],{},"Bottom-up"," — sběr od provozních manažerů směrem nahoru; detailní znalost procesů, ale časově náročné.",[1048,2954,2955,2958],{},[1051,2956,2957],{},"Top-down"," — od vyššího managementu; rychlejší, ale může opomenout provozní detaily.",[2940,2960,2962],{"id":2961},"principy-bia","Principy BIA",[1045,2964,2965,2979],{},[1048,2966,2967,2968,2971,2972,2975,2976,1068],{},"Orientace na ",[1051,2969,2970],{},"dopad",", ne na příčinu — nezkoumá ",[1028,2973,2974],{},"co se stane",", ale ",[1028,2977,2978],{},"jaké budou následky",[1048,2980,2981,2984],{},[1051,2982,2983],{},"Kalendář klíčových ročních událostí"," — identifikuje období se zvýšenou kritičností (uzávěrky, sezónní špičky).",[1040,2986,2988],{"id":2987},"mapování-procesů","Mapování procesů",[1045,2990,2991,2997,3003],{},[1048,2992,2993,2996],{},[1051,2994,2995],{},"Víceúrovňové mapování"," — od strategických procesů po operativní detaily.",[1048,2998,2999,3002],{},[1051,3000,3001],{},"Identifikace zdrojů"," — lidé, technologie, prostory, dodavatelé potřební pro každý proces.",[1048,3004,3005,3007],{},[1051,3006,2307],{}," (Single Point of Failure) — identifikace jediných bodů selhání, jejichž výpadek zastaví celý proces.",[1040,3009,3011],{"id":3010},"strategie-kontinuity","Strategie kontinuity",[2940,3013,3015],{"id":3014},"_4-kroky-strategie","4 kroky strategie",[2945,3017,3018,3024,3030,3036],{},[1048,3019,3020,3023],{},[1051,3021,3022],{},"Reakce na incident"," — okamžitá odezva, aktivace krizového řízení.",[1048,3025,3026,3029],{},[1051,3027,3028],{},"Obnova kritických činností"," — prioritní obnovení klíčových procesů dle BIA.",[1048,3031,3032,3035],{},[1051,3033,3034],{},"Vztahy se stakeholdery"," — komunikace se zainteresovanými stranami.",[1048,3037,3038,3041],{},[1051,3039,3040],{},"Nekritické činnosti"," — postupná obnova ostatních procesů.",[2940,3043,3045],{"id":3044},"_4-scénáře-narušení","4 scénáře narušení",[2945,3047,3048,3054,3060,3066],{},[1048,3049,3050,3053],{},[1051,3051,3052],{},"Zamezení přístupu"," — nedostupnost budov\u002Fprostor (požár, povodeň).",[1048,3055,3056,3059],{},[1051,3057,3058],{},"Nedostatek pracovníků"," — pandemie, hromadná absence.",[1048,3061,3062,3065],{},[1051,3063,3064],{},"Selhání technologie"," — výpadek ICT, kybernetický útok.",[1048,3067,3068,3071],{},[1051,3069,3070],{},"Selhání dodavatele"," — přerušení dodavatelského řetězce.",[1040,3073,3075],{"id":3074},"implementace-plánů","Implementace plánů",[2940,3077,3079],{"id":3078},"obsah-plánu-kontinuity","Obsah plánu kontinuity",[1015,3081,3082,3083,3086,3087,1068],{},"Účel a rozsah, role a odpovědnosti, aktivační kritéria, ",[1051,3084,3085],{},"DRP"," (Disaster Recovery Plan) pro IT infrastrukturu, kontaktní seznamy, priority obnovy dle BIA. Dlouhodobá obnova je řízena jako ",[1051,3088,3089],{},"samostatný projekt",[1040,3091,3093],{"id":3092},"testování-bcm","Testování BCM",[2668,3095,3096,3105],{},[2671,3097,3098],{},[2674,3099,3100,3103],{},[2677,3101,3102],{},"Forma",[2677,3104,2685],{},[2687,3106,3107,3117,3127],{},[2674,3108,3109,3114],{},[2692,3110,3111],{},[1051,3112,3113],{},"Tabletop review",[2692,3115,3116],{},"Teoretické procházení scénářů",[2674,3118,3119,3124],{},[2692,3120,3121],{},[1051,3122,3123],{},"Walkthrough",[2692,3125,3126],{},"Krokové ověření postupů s účastníky",[2674,3128,3129,3134],{},[2692,3130,3131],{},[1051,3132,3133],{},"Full exercise",[2692,3135,3136],{},"Simulace reálného incidentu",[1015,3138,3139,3140,3143,3144,3147],{},"Zásady: ",[1051,3141,3142],{},"neočekávané testy"," pro ověření reálné připravenosti; v krizové situaci ",[1051,3145,3146],{},"direktivní řízení pod tlakem"," (centralizované rozhodování).",[1040,3149,3151],{"id":3150},"vkb-vyhláška-o-kybernetické-bezpečnosti","VKB — Vyhláška o kybernetické bezpečnosti",[1015,3153,3154,3157],{},[1051,3155,3156],{},"§15 vyhlášky č. 82\u002F2018 Sb."," vyžaduje:",[1045,3159,3160,3165,3170],{},[1048,3161,3162,3164],{},[1051,3163,1913],{}," — minimální úroveň služeb pro kontinuitu",[1048,3166,3167,3169],{},[1051,3168,2182],{}," — maximální přípustná doba výpadku",[1048,3171,3172,3174],{},[1051,3173,2155],{}," — maximální přípustná ztráta dat",[1015,3176,3177,3178,3181],{},"Příloha č. 5, bod ",[1051,3179,3180],{},"1.23 Politika řízení kontinuity"," — požadavky na dokumentaci a řízení BCM.",[1040,3183,3185],{"id":3184},"isoiec-270312025","ISO\u002FIEC 27031:2025",[1015,3187,3188],{},"Připravenost ICT pro kontinuitu podnikání — propojení mezi kritickou infrastrukturou a BCMS. Aktuální vydání 2025 (první 2011, dlouho jediné, novelizace 2025).",[1040,3190,1202],{"id":378},[1015,3192,3193,3196],{},[1051,3194,3195],{},"BCM as a Service"," — cloudový model poskytování BCM, outsourcing plánování a řízení kontinuity, vhodný zejména pro menší organizace bez vlastních kapacit.",[1040,3198,3200],{"id":3199},"disaster-recovery-dr","Disaster Recovery (DR)",[1015,3202,3203],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[2940,3205,3207],{"id":3206},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[2668,3209,3210,3219],{},[2671,3211,3212],{},[2674,3213,3214,3217],{},[2677,3215,3216],{},"Tier",[2677,3218,2685],{},[2687,3220,3221,3229,3237,3245,3253,3261,3269,3277],{},[2674,3222,3223,3226],{},[2692,3224,3225],{},"0",[2692,3227,3228],{},"Žádná off-site data",[2674,3230,3231,3234],{},[2692,3232,3233],{},"1",[2692,3235,3236],{},"Fyzická záloha + cold site",[2674,3238,3239,3242],{},[2692,3240,3241],{},"2",[2692,3243,3244],{},"Fyzická záloha + hot site",[2674,3246,3247,3250],{},[2692,3248,3249],{},"3",[2692,3251,3252],{},"Elektronický trezor (electronic vaulting)",[2674,3254,3255,3258],{},[2692,3256,3257],{},"4",[2692,3259,3260],{},"Point-in-time recovery",[2674,3262,3263,3266],{},[2692,3264,3265],{},"5",[2692,3267,3268],{},"Two-site commit (kontinuální přenos)",[2674,3270,3271,3274],{},[2692,3272,3273],{},"6",[2692,3275,3276],{},"Minimální až nulová ztráta dat (zrcadlení)",[2674,3278,3279,3282],{},[2692,3280,3281],{},"7",[2692,3283,3284],{},"Automatizovaná obnova (AI monitoring)",[2940,3286,3288],{"id":3287},"cloud-dr","Cloud DR",[1045,3290,3291,3297,3303,3309],{},[1048,3292,3293,3296],{},[1051,3294,3295],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[1048,3298,3299,3302],{},[1051,3300,3301],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[1048,3304,3305,3308],{},[1051,3306,3307],{},"Hot DR"," — paralelní řešení v tandemu",[1048,3310,3311,3314],{},[1051,3312,3313],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[1040,3316,2563],{"id":2562},[1045,3318,3319,3325,3331,3338,3347],{},[1048,3320,3321,3324],{},[1019,3322,1313],{"className":3323,"dataFsResolvedFilePath":1311,"href":1312},[1022]," — BCM jako součást bezpečnostního systému",[1048,3326,3327,3330],{},[1019,3328,1850],{"className":3329,"dataFsResolvedFilePath":1848,"href":1849},[1022]," — krizové plány pro zbytková rizika",[1048,3332,3333,3337],{},[1019,3334,3336],{"className":3335,"dataFsResolvedFilePath":1222,"href":1223},[1022],"Kybernetická bezpečnost"," — reakce na incidenty",[1048,3339,3340,3346],{},[1019,3341,3345],{"className":3342,"dataFsResolvedFilePath":3343,"href":3344},[1022],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","Záznam přednášky BCM"," — bibliografická karta zdroje",[1048,3348,3349,3353],{},[1019,3350,3352],{"className":3351,"dataFsResolvedFilePath":1509,"href":1510},[1022],"Disaster Recovery — záznam přednášky"," — DR detail",{"title":2593,"searchDepth":145,"depth":145,"links":3355},[3356,3357,3358,3359,3360,3364,3365,3369,3372,3373,3374,3375,3376,3380],{"id":2665,"depth":145,"text":2666},{"id":2764,"depth":145,"text":2765},{"id":2822,"depth":145,"text":2823},{"id":2849,"depth":145,"text":2850},{"id":2937,"depth":145,"text":2938,"children":3361},[3362,3363],{"id":2942,"depth":100,"text":2943},{"id":2961,"depth":100,"text":2962},{"id":2987,"depth":145,"text":2988},{"id":3010,"depth":145,"text":3011,"children":3366},[3367,3368],{"id":3014,"depth":100,"text":3015},{"id":3044,"depth":100,"text":3045},{"id":3074,"depth":145,"text":3075,"children":3370},[3371],{"id":3078,"depth":100,"text":3079},{"id":3092,"depth":145,"text":3093},{"id":3150,"depth":145,"text":3151},{"id":3184,"depth":145,"text":3185},{"id":378,"depth":145,"text":1202},{"id":3199,"depth":145,"text":3200,"children":3377},[3378,3379],{"id":3206,"depth":100,"text":3207},{"id":3287,"depth":100,"text":3288},{"id":2562,"depth":145,"text":2563},[5],"2026-04-12",{},"\u002Ftopics\u002Fbcm",{"title":2645,"description":2593},[2631,3387],"raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[5,159,233,221,167,179],"topic","rJjmVpDFUwXpFJbeYeMpWko7IyhV7LFx3l9BUUkj0VY",{"id":3393,"title":3394,"body":3395,"course":2620,"courses":4099,"created":2621,"description":4100,"extension":2623,"meta":4101,"navigation":2625,"path":4102,"seo":4103,"sources":4104,"stem":4109,"tags":4110,"type":3390,"updated":2621,"__hash__":4111},"topics\u002Ftopics\u002Fgdpr.md","GDPR — Obecné nařízení o ochraně osobních údajů",{"type":1008,"value":3396,"toc":4079},[3397,3400,3414,3444,3446,3550,3554,3592,3599,3603,3606,3644,3648,3697,3701,3704,3708,3719,3723,3766,3770,3787,3791,3811,3815,3866,3870,3873,3887,3891,3909,3913,3971,3975,4001,4008,4041,4043],[1011,3398,3394],{"id":3399},"gdpr-obecné-nařízení-o-ochraně-osobních-údajů",[1015,3401,3402,3405,3406,3409,3410,3413],{},[1051,3403,3404],{},"Nařízení Evropského parlamentu a Rady (EU) 2016\u002F679"," — General Data Protection Regulation. Účinnost od ",[1051,3407,3408],{},"25. května 2018"," ve všech členských státech EU bez nutnosti transpozice. Pro Českou republiku doplněno ",[1051,3411,3412],{},"zákonem č. 110\u002F2019 Sb."," o zpracování osobních údajů.",[1015,3415,3416,3417,3420,3421,3425,3426,1061,3430,3434,3435,3438,3439,3443],{},"GDPR je v kurzu ",[1019,3418,1025],{"className":3419,"dataFsResolvedFilePath":1023,"href":1024},[1022]," napříč více oblastmi: legislativní rámec ",[1019,3422,3424],{"className":3423,"dataFsResolvedFilePath":1089,"href":1090},[1022],"ochrany dat",", povinný kontext pro ",[1019,3427,3429],{"className":3428,"dataFsResolvedFilePath":1265,"href":1266},[1022],"zdravotnická data",[1019,3431,3433],{"className":3432,"dataFsResolvedFilePath":1595,"href":1596},[1022],"platební údaje"," a ",[1019,3436,1563],{"className":3437,"dataFsResolvedFilePath":1561,"href":1562},[1022]," služby, a operační rámec definovaný v ",[1019,3440,3442],{"className":3441,"dataFsResolvedFilePath":1781,"href":1782},[1022],"případové studii o krádeži dat"," (DPIA, Privacy by Design, ISO 27701).",[1040,3445,2666],{"id":2665},[2668,3447,3448,3459],{},[2671,3449,3450],{},[2674,3451,3452,3454,3456],{},[2677,3453,2679],{},[2677,3455,2682],{},[2677,3457,3458],{},"Definice",[2687,3460,3461,3474,3487,3500,3513,3526,3538],{},[2674,3462,3463,3468,3471],{},[2692,3464,3465],{},[1051,3466,3467],{},"Osobní údaj",[2692,3469,3470],{},"Personal data",[2692,3472,3473],{},"Jakákoli informace identifikující nebo umožňující identifikaci žijící fyzické osoby",[2674,3475,3476,3481,3484],{},[2692,3477,3478],{},[1051,3479,3480],{},"Zvláštní kategorie",[2692,3482,3483],{},"Special category",[2692,3485,3486],{},"Citlivá data: zdraví, biometrika, etnicita, sexuální orientace, politické názory, náboženství, členství v odborech",[2674,3488,3489,3494,3497],{},[2692,3490,3491],{},[1051,3492,3493],{},"Subjekt údajů",[2692,3495,3496],{},"Data subject",[2692,3498,3499],{},"Fyzická osoba, k níž se osobní údaje vztahují",[2674,3501,3502,3507,3510],{},[2692,3503,3504],{},[1051,3505,3506],{},"Správce",[2692,3508,3509],{},"Controller",[2692,3511,3512],{},"Subjekt, který určuje účely a prostředky zpracování",[2674,3514,3515,3520,3523],{},[2692,3516,3517],{},[1051,3518,3519],{},"Zpracovatel",[2692,3521,3522],{},"Processor",[2692,3524,3525],{},"Subjekt zpracovávající osobní údaje na pokyn správce",[2674,3527,3528,3532,3535],{},[2692,3529,3530],{},[1051,3531,1495],{},[2692,3533,3534],{},"Data Protection Officer",[2692,3536,3537],{},"Pověřenec pro ochranu osobních údajů — povinný pro orgány veřejné moci a velké zpracovatele",[2674,3539,3540,3544,3547],{},[2692,3541,3542],{},[1051,3543,2101],{},[2692,3545,3546],{},"Personally Identifiable Information",[2692,3548,3549],{},"Pojem z NIST SP 800-122; v EU se používá ekvivalentní „osobní údaj\"",[1040,3551,3553],{"id":3552},"šest-zásad-zpracování-čl-5","Šest zásad zpracování (čl. 5)",[2945,3555,3556,3562,3568,3574,3580,3586],{},[1048,3557,3558,3561],{},[1051,3559,3560],{},"Zákonnost, korektnost, transparentnost"," (lawfulness, fairness, transparency)",[1048,3563,3564,3567],{},[1051,3565,3566],{},"Účelové omezení"," (purpose limitation) — sběr pouze pro stanovené účely",[1048,3569,3570,3573],{},[1051,3571,3572],{},"Minimalizace údajů"," (data minimisation) — jen nezbytné údaje",[1048,3575,3576,3579],{},[1051,3577,3578],{},"Přesnost"," (accuracy) — udržovat aktuální, opravovat nepřesné",[1048,3581,3582,3585],{},[1051,3583,3584],{},"Omezení uložení"," (storage limitation) — uchovávat ne déle než nutné",[1048,3587,3588,3591],{},[1051,3589,3590],{},"Integrita a důvěrnost"," (integrity, confidentiality) — bezpečnost zpracování",[1015,3593,3594,3595,3598],{},"Sedmá zásada ",[1051,3596,3597],{},"odpovědnost"," (accountability, čl. 5 odst. 2) — správce musí být schopen svůj soulad doložit.",[1040,3600,3602],{"id":3601},"šest-právních-titulů-čl-6","Šest právních titulů (čl. 6)",[1015,3604,3605],{},"Zpracování je zákonné jen, je-li založeno na jednom ze šesti důvodů:",[2945,3607,3608,3614,3620,3626,3632,3638],{},[1048,3609,3610,3613],{},[1051,3611,3612],{},"Souhlas"," subjektu údajů",[1048,3615,3616,3619],{},[1051,3617,3618],{},"Plnění smlouvy"," se subjektem",[1048,3621,3622,3625],{},[1051,3623,3624],{},"Zákonná povinnost"," správce",[1048,3627,3628,3631],{},[1051,3629,3630],{},"Životně důležité zájmy"," subjektu nebo jiné osoby",[1048,3633,3634,3637],{},[1051,3635,3636],{},"Veřejný zájem"," nebo výkon veřejné moci",[1048,3639,3640,3643],{},[1051,3641,3642],{},"Oprávněné zájmy"," správce (s testem proporcionality)",[1040,3645,3647],{"id":3646},"práva-subjektů-údajů-čl-1522","Práva subjektů údajů (čl. 15–22)",[1045,3649,3650,3656,3662,3668,3674,3679,3685,3691],{},[1048,3651,3652,3655],{},[1051,3653,3654],{},"Právo na informace"," — kdo, proč, na základě čeho, jak dlouho zpracovává",[1048,3657,3658,3661],{},[1051,3659,3660],{},"Právo na přístup"," k osobním údajům",[1048,3663,3664,3667],{},[1051,3665,3666],{},"Právo na opravu"," nepřesných údajů",[1048,3669,3670,3673],{},[1051,3671,3672],{},"Právo na výmaz"," („right to be forgotten\", čl. 17)",[1048,3675,3676],{},[1051,3677,3678],{},"Právo na omezení zpracování",[1048,3680,3681,3684],{},[1051,3682,3683],{},"Právo na přenositelnost údajů"," ke konkurenci (čl. 20)",[1048,3686,3687,3690],{},[1051,3688,3689],{},"Právo vznést námitku"," proti zpracování",[1048,3692,3693,3696],{},[1051,3694,3695],{},"Právo nebýt předmětem automatizovaného rozhodování"," vč. profilování (čl. 22)",[1040,3698,3700],{"id":3699},"dpia-data-protection-impact-assessment-čl-35","DPIA — Data Protection Impact Assessment (čl. 35)",[1015,3702,3703],{},"Posouzení vlivu na ochranu osobních údajů — povinné, pokud zpracování pravděpodobně způsobí vysoké riziko pro práva a svobody subjektů.",[2940,3705,3707],{"id":3706},"kdy-je-dpia-povinná","Kdy je DPIA povinná",[1045,3709,3710,3713,3716],{},[1048,3711,3712],{},"Systematické a rozsáhlé hodnocení osobních aspektů (profilování)",[1048,3714,3715],{},"Rozsáhlé zpracování zvláštních kategorií údajů",[1048,3717,3718],{},"Rozsáhlé sledování veřejně přístupných míst (kamery v ulicích, MHD)",[2940,3720,3722],{"id":3721},"tři-analýzy-dpia-per-iso-27701","Tři analýzy DPIA (per ISO 27701)",[2668,3724,3725,3735],{},[2671,3726,3727],{},[2674,3728,3729,3732],{},[2677,3730,3731],{},"Analýza",[2677,3733,3734],{},"Zaměření",[2687,3736,3737,3746,3756],{},[2674,3738,3739,3743],{},[2692,3740,3741],{},[1051,3742,1483],{},[2692,3744,3745],{},"Posouzení dopadu na svobody a práva osob (čl. 35 GDPR)",[2674,3747,3748,3753],{},[2692,3749,3750],{},[1051,3751,3752],{},"Datová",[2692,3754,3755],{},"Význam dat, vazby, identifikace osobních a citlivých dat",[2674,3757,3758,3763],{},[2692,3759,3760],{},[1051,3761,3762],{},"Procesní",[2692,3764,3765],{},"Kdo a jak přistupuje k osobním datům, automatizované zpracování",[2940,3767,3769],{"id":3768},"pět-kroků-hodnocení-rizik","Pět kroků hodnocení rizik",[2945,3771,3772,3775,3778,3781,3784],{},[1048,3773,3774],{},"Definice operace zpracování a kontextu",[1048,3776,3777],{},"Pochopení a hodnocení dopadu (CIA)",[1048,3779,3780],{},"Definice hrozeb a hodnocení pravděpodobnosti",[1048,3782,3783],{},"Vyhodnocení rizika (matice pravděpodobnost × dopad)",[1048,3785,3786],{},"Výběr bezpečnostních opatření",[1040,3788,3790],{"id":3789},"privacy-by-design-privacy-by-default-čl-25","Privacy by Design & Privacy by Default (čl. 25)",[1045,3792,3793,3799,3805],{},[1048,3794,3795,3798],{},[1051,3796,3797],{},"Privacy by Design"," — proaktivní zahrnutí ochrany od počátku návrhu systému; ochrana zabudovaná do architektury, ne dolepovaná",[1048,3800,3801,3804],{},[1051,3802,3803],{},"Privacy by Default"," — výchozí nastavení musí chránit; ověření účelu, rozsahu, sdílení a možností anonymizace před zpracováním",[1048,3806,2967,3807,3810],{},[1051,3808,3809],{},"subjekt údajů"," — analýza rizik z pohledu jednotlivce, ne organizace",[1040,3812,3814],{"id":3813},"oznamovací-povinnost-při-porušení-zabezpečení-čl-3334","Oznamovací povinnost při porušení zabezpečení (čl. 33–34)",[2668,3816,3817,3830],{},[2671,3818,3819],{},[2674,3820,3821,3824,3827],{},[2677,3822,3823],{},"Příjemce",[2677,3825,3826],{},"Lhůta",[2677,3828,3829],{},"Podmínka",[2687,3831,3832,3849],{},[2674,3833,3834,3840,3846],{},[2692,3835,3836,3839],{},[1051,3837,3838],{},"Dozorový úřad"," (ÚOOÚ v ČR)",[2692,3841,3842,3845],{},[1051,3843,3844],{},"72 hodin"," od zjištění",[2692,3847,3848],{},"Vždy, pokud existuje pravděpodobnost rizika pro subjekty",[2674,3850,3851,3856,3859],{},[2692,3852,3853],{},[1051,3854,3855],{},"Subjekty údajů",[2692,3857,3858],{},"Bez zbytečného odkladu",[2692,3860,3861,3862,3865],{},"Pokud existuje ",[1051,3863,3864],{},"vysoké"," riziko pro jejich práva",[1040,3867,3869],{"id":3868},"sankce-čl-83","Sankce (čl. 83)",[1015,3871,3872],{},"Pokuty ve dvou pásmech:",[1045,3874,3875,3881],{},[1048,3876,3877,3880],{},[1051,3878,3879],{},"Až 10 mil. EUR nebo 2 % celosvětového ročního obratu"," (vyšší z obou) — porušení procesních povinností (DPO, smlouva se zpracovatelem, oznámení porušení, DPIA)",[1048,3882,3883,3886],{},[1051,3884,3885],{},"Až 20 mil. EUR nebo 4 % celosvětového ročního obratu"," — porušení zásad zpracování, práv subjektů, podmínek souhlasu, předávání mimo EU",[1040,3888,3890],{"id":3889},"isoiec-27701-pims","ISO\u002FIEC 27701 — PIMS",[1015,3892,3893,3894,3897,3898,3901,3902,3905,3906,1068],{},"Privacy Information Management System — rozšíření ISO 27001\u002F27002 o správu osobních informací. První vydání ",[1051,3895,3896],{},"2019",", aktuální vydání ",[1051,3899,3900],{},"2025",". Mapuje požadavky GDPR na konkrétní opatření a slouží jako certifikovatelný průvodce souladem. Zavádí DPIA, datovou a procesní analýzu jako standardní postupy. Detail v ",[1019,3903,3442],{"className":3904,"dataFsResolvedFilePath":1781,"href":1782},[1022]," a v hub topiku ",[1019,3907,70],{"className":3908,"dataFsResolvedFilePath":1089,"href":1090},[1022],[1040,3910,3912],{"id":3911},"vztah-k-dalším-normám-a-regulacím","Vztah k dalším normám a regulacím",[1045,3914,3915,3921,3927,3933,3950,3955,3963],{},[1048,3916,3917,3920],{},[1051,3918,3919],{},"NIST SP 800-122"," (2010) — Guide to Protecting PII Confidentiality (americký analog)",[1048,3922,3923,3926],{},[1051,3924,3925],{},"NISTIR 8062"," (2017) — Privacy Engineering and Risk Management",[1048,3928,3929,3932],{},[1051,3930,3931],{},"FIPP"," — Fair Information Practice Principles (univerzální zásady, předchůdce GDPR)",[1048,3934,3935,3937,3938,3941,3942,3945,3946,3949],{},[1051,3936,1568],{}," (nařízení EU 910\u002F2014, novelizováno ",[1051,3939,3940],{},"nařízením (EU) 2024\u002F1183 — „eIDAS 2.0\"",", v účinnosti od května 2024) — elektronická identifikace a služby vytvářející důvěru; eIDAS 2.0 zavádí ",[1051,3943,3944],{},"evropskou peněženku digitální identity (EUDI Wallet)",". Doplňuje GDPR pro digitální identitu (viz ",[1019,3947,1091],{"className":3948,"dataFsResolvedFilePath":1089,"href":1090},[1022],")",[1048,3951,3952,3954],{},[1051,3953,2013],{}," (směrnice 2022\u002F2555) — kybernetická bezpečnost, povinnosti hlášení překrývají GDPR čl. 33",[1048,3956,3957,3959,3960],{},[1051,3958,1464],{}," (nařízení EU 2022\u002F2554) — finanční sektor, viz ",[1019,3961,1450],{"className":3962,"dataFsResolvedFilePath":1448,"href":1449},[1022],[1048,3964,3965,3967,3968],{},[1051,3966,1672],{}," (USA) — americký analog pro zdravotnictví, viz ",[1019,3969,1267],{"className":3970,"dataFsResolvedFilePath":1265,"href":1266},[1022],[1040,3972,3974],{"id":3973},"předávání-údajů-mimo-eu-kap-v-gdpr","Předávání údajů mimo EU (kap. V GDPR)",[1045,3976,3977,3983,3989,3995],{},[1048,3978,3979,3982],{},[1051,3980,3981],{},"Adekvátní rozhodnutí Komise"," — země s odpovídající úrovní ochrany: Andorra, Argentina, Brazílie, Faerské ostrovy, Guernsey, Isle of Man, Izrael, Japonsko, Jersey, Jižní Korea, Kanada (komerční subjekty), Nový Zéland, Spojené království, Švýcarsko, Uruguay, USA (EU-US Data Privacy Framework)",[1048,3984,3985,3988],{},[1051,3986,3987],{},"Standardní smluvní doložky"," (SCC) — od 2021 nová verze po Schrems II",[1048,3990,3991,3994],{},[1051,3992,3993],{},"Závazná podniková pravidla"," (BCR) pro nadnárodní skupiny",[1048,3996,3997,4000],{},[1051,3998,3999],{},"Výjimky"," — výslovný souhlas, plnění smlouvy, životně důležité zájmy",[1040,4002,4004,4005],{"id":4003},"aplikační-oblasti-v-kurzu-imork","Aplikační oblasti v kurzu ",[1019,4006,1025],{"className":4007,"dataFsResolvedFilePath":1023,"href":1024},[1022],[1045,4009,4010,4016,4022,4028,4034],{},[1048,4011,4012,4015],{},[1019,4013,1267],{"className":4014,"dataFsResolvedFilePath":1265,"href":1266},[1022]," — zvláštní kategorie (zdravotní data); ISO 27799 + GDPR",[1048,4017,4018,4021],{},[1019,4019,1563],{"className":4020,"dataFsResolvedFilePath":1561,"href":1562},[1022]," — soulad s legislativou jako jeden ze tří pilířů důvěryhodnosti elektronického zdravotnictví",[1048,4023,4024,4027],{},[1019,4025,1597],{"className":4026,"dataFsResolvedFilePath":1595,"href":1596},[1022]," — platební údaje a PCI DSS v kombinaci s GDPR",[1048,4029,4030,4033],{},[1019,4031,1085],{"className":4032,"dataFsResolvedFilePath":1083,"href":1084},[1022]," — soulad s GDPR jako cíl bezpečnostní politiky univerzity",[1048,4035,4036,4040],{},[1019,4037,4039],{"className":4038,"dataFsResolvedFilePath":1781,"href":1782},[1022],"Krádež dat"," — provozní implementace GDPR přes ISO 27701, DPIA, Privacy by Design",[1040,4042,2563],{"id":2562},[1045,4044,4045,4051,4057,4063,4070],{},[1048,4046,4047,4050],{},[1019,4048,1091],{"className":4049,"dataFsResolvedFilePath":1089,"href":1090},[1022]," — technologická vrstva (DLP, šifrování, anonymizace)",[1048,4052,4053,4056],{},[1019,4054,1313],{"className":4055,"dataFsResolvedFilePath":1311,"href":1312},[1022]," — manažerský rámec, ISO 27701 jako rozšíření 27001",[1048,4058,4059,4062],{},[1019,4060,1850],{"className":4061,"dataFsResolvedFilePath":1848,"href":1849},[1022]," — DPIA jako analýza rizik z pohledu subjektů údajů",[1048,4064,4065,4069],{},[1019,4066,4068],{"className":4067,"dataFsResolvedFilePath":1781,"href":1782},[1022],"Krádež dat — případová studie"," — primární zdroj operačního výkladu",[1048,4071,4072,4078],{},[1019,4073,4077],{"className":4074,"dataFsResolvedFilePath":4075,"href":4076},[1022],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — PII a digitální stopa",{"title":2593,"searchDepth":145,"depth":145,"links":4080},[4081,4082,4083,4084,4085,4090,4091,4092,4093,4094,4095,4096,4098],{"id":2665,"depth":145,"text":2666},{"id":3552,"depth":145,"text":3553},{"id":3601,"depth":145,"text":3602},{"id":3646,"depth":145,"text":3647},{"id":3699,"depth":145,"text":3700,"children":4086},[4087,4088,4089],{"id":3706,"depth":100,"text":3707},{"id":3721,"depth":100,"text":3722},{"id":3768,"depth":100,"text":3769},{"id":3789,"depth":145,"text":3790},{"id":3813,"depth":145,"text":3814},{"id":3868,"depth":145,"text":3869},{"id":3889,"depth":145,"text":3890},{"id":3911,"depth":145,"text":3912},{"id":3973,"depth":145,"text":3974},{"id":4003,"depth":145,"text":4097},"Aplikační oblasti v kurzu ImorK",{"id":2562,"depth":145,"text":2563},[5],"Nařízení Evropského parlamentu a Rady (EU) 2016\u002F679 — General Data Protection Regulation. Účinnost od 25. května 2018 ve všech členských státech EU bez nutnosti transpozice. Pro Českou republiku doplněno zákonem č. 110\u002F2019 Sb. o zpracování osobních údajů.",{},"\u002Ftopics\u002Fgdpr",{"title":3394,"description":4100},[4105,2632,4106,4107,4108],"raw\u002Fimork\u002F2109 VUT_Bezp Případovka Krádež dat_2020.pdf","raw\u002Fimork\u002F2105 VUT_Bezp_Případovka eHealth_2021.pdf","raw\u002Fimork\u002F2204 VUT_Bezp_Případovka Payment_2022.pdf","raw\u002Fimork\u002F2004 VUT_Bezp akademici-2021.pdf","topics\u002Fgdpr",[5,108,70,279,486,227,289],"M4sDZtUlYB9tZD2S8vr1U1cLByMC2HCaUhLokavtRLk",{"id":4113,"title":4114,"body":4115,"course":2620,"courses":4601,"created":3382,"description":2593,"extension":2623,"meta":4602,"navigation":2625,"path":4603,"seo":4604,"sources":4605,"stem":4607,"tags":4608,"type":3390,"updated":2621,"__hash__":4609},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":1008,"value":4116,"toc":4587},[4117,4120,4127,4134,4137,4141,4208,4212,4216,4275,4279,4297,4301,4305,4407,4411,4434,4438,4460,4464,4471,4532,4534],[1011,4118,4114],{"id":4119},"isms-systém-řízení-bezpečnosti-informací",[1015,4121,4122],{},[2654,4123],{"alt":4124,"className":4125,"src":4126},"isms-pdca-cyklus",[1022,2658],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[1015,4128,4129],{},[2654,4130],{"alt":4131,"className":4132,"src":4133},"isms-oborova-mapa",[1022,2658],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[1015,4135,4136],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[1040,4138,4140],{"id":4139},"základní-pilíře","Základní pilíře",[2668,4142,4143,4154],{},[2671,4144,4145],{},[2674,4146,4147,4150,4152],{},[2677,4148,4149],{},"Pilíř",[2677,4151,2682],{},[2677,4153,2685],{},[2687,4155,4156,4169,4182,4195],{},[2674,4157,4158,4163,4166],{},[2692,4159,4160],{},[1051,4161,4162],{},"Důvěrnost",[2692,4164,4165],{},"Confidentiality",[2692,4167,4168],{},"Přístup pouze oprávněným osobám",[2674,4170,4171,4176,4179],{},[2692,4172,4173],{},[1051,4174,4175],{},"Integrita",[2692,4177,4178],{},"Integrity",[2692,4180,4181],{},"Ochrana před neoprávněnou změnou",[2674,4183,4184,4189,4192],{},[2692,4185,4186],{},[1051,4187,4188],{},"Dostupnost",[2692,4190,4191],{},"Availability",[2692,4193,4194],{},"Systémy a data dostupné v potřebný čas",[2674,4196,4197,4202,4205],{},[2692,4198,4199],{},[1051,4200,4201],{},"Nepopiratelnost",[2692,4203,4204],{},"Non-repudiation",[2692,4206,4207],{},"Prokázání autorství akce",[1040,4209,4211],{"id":4210},"normativní-rámec","Normativní rámec",[2940,4213,4215],{"id":4214},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[1045,4217,4218,4224,4230,4241,4247,4256,4265],{},[1048,4219,4220,4223],{},[1051,4221,4222],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[1048,4225,4226,4229],{},[1051,4227,4228],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[1048,4231,4232,4235,4236,4240],{},[1051,4233,4234],{},"ISO\u002FIEC 27005"," — ",[1019,4237,4239],{"className":4238,"dataFsResolvedFilePath":1848,"href":1849},[1022],"řízení rizik"," bezpečnosti informací",[1048,4242,4243,4246],{},[1051,4244,4245],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[1048,4248,4249,4252,4253],{},[1051,4250,4251],{},"ISO\u002FIEC 27011"," — ISMS pro ",[1019,4254,910],{"className":4255,"dataFsResolvedFilePath":1065,"href":1066},[1022],[1048,4257,4258,4252,4261],{},[1051,4259,4260],{},"ISO\u002FIEC 27019",[1019,4262,4264],{"className":4263,"dataFsResolvedFilePath":1747,"href":1748},[1022],"energetiku",[1048,4266,4267,4252,4270,4274],{},[1051,4268,4269],{},"ISO 27799",[1019,4271,4273],{"className":4272,"dataFsResolvedFilePath":1265,"href":1266},[1022],"zdravotnictví"," (publikováno samostatně, ne ISO\u002FIEC)",[2940,4276,4278],{"id":4277},"další-rámce","Další rámce",[1045,4280,4281,4287,4292],{},[1048,4282,4283,4286],{},[1051,4284,4285],{},"NIST"," — americké standardy (SP 800 řada)",[1048,4288,4289,4291],{},[1051,4290,1809],{}," — profesní certifikace (CISM, CISA)",[1048,4293,4294,4296],{},[1051,4295,1602],{}," — evropská agentura pro kybernetickou bezpečnost",[1040,4298,4300],{"id":4299},"governance-řízení","Governance (řízení)",[2940,4302,4304],{"id":4303},"bezpečnostní-role","Bezpečnostní role",[2668,4306,4307,4320],{},[2671,4308,4309],{},[2674,4310,4311,4314,4317],{},[2677,4312,4313],{},"Role",[2677,4315,4316],{},"Zkratka",[2677,4318,4319],{},"Odpovědnost",[2687,4321,4322,4333,4344,4355,4366,4377,4387,4397],{},[2674,4323,4324,4327,4330],{},[2692,4325,4326],{},"Chief Information Officer",[2692,4328,4329],{},"CIO",[2692,4331,4332],{},"Celkové řízení ICT",[2674,4334,4335,4338,4341],{},[2692,4336,4337],{},"Chief Information Security Officer",[2692,4339,4340],{},"CISO",[2692,4342,4343],{},"Řízení informační bezpečnosti",[2674,4345,4346,4349,4352],{},[2692,4347,4348],{},"Chief Technology Officer",[2692,4350,4351],{},"CTO",[2692,4353,4354],{},"Technologická strategie",[2674,4356,4357,4360,4363],{},[2692,4358,4359],{},"IS Security Officer",[2692,4361,4362],{},"ISSO",[2692,4364,4365],{},"Bezpečnost IS",[2674,4367,4368,4371,4374],{},[2692,4369,4370],{},"Manažer KB",[2692,4372,4373],{},"—",[2692,4375,4376],{},"Odpovědný za ISMS",[2674,4378,4379,4382,4384],{},[2692,4380,4381],{},"Architekt KB",[2692,4383,4373],{},[2692,4385,4386],{},"Návrh a implementace opatření",[2674,4388,4389,4392,4394],{},[2692,4390,4391],{},"Auditor KB",[2692,4393,4373],{},[2692,4395,4396],{},"Provádění auditů",[2674,4398,4399,4402,4404],{},[2692,4400,4401],{},"Garant aktiva",[2692,4403,4373],{},[2692,4405,4406],{},"Rozvoj, použití a bezpečnost aktiva",[2940,4408,4410],{"id":4409},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[2945,4412,4413,4419,4428],{},[1048,4414,4415,4418],{},[1051,4416,4417],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[1048,4420,4421,4424,4425],{},[1051,4422,4423],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[1019,4426,2232],{"className":4427,"dataFsResolvedFilePath":2241,"href":2242},[1022],[1048,4429,4430,4433],{},[1051,4431,4432],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[1040,4435,4437],{"id":4436},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[2945,4439,4440,4445,4450,4455],{},[1048,4441,4442,4444],{},[1051,4443,2786],{}," — stanovení kontextu, politiky, rozsahu ISMS",[1048,4446,4447,4449],{},[1051,4448,2796],{}," — implementace opatření, řízení rizik",[1048,4451,4452,4454],{},[1051,4453,2806],{}," — monitorování, audit, přezkoumání",[1048,4456,4457,4459],{},[1051,4458,2816],{}," — nápravná opatření, neustálé zlepšování",[1040,4461,4463],{"id":4462},"oborová-řešení-isms","Oborová řešení ISMS",[1015,4465,4466,4467,4470],{},"Kurz ",[1019,4468,1025],{"className":4469,"dataFsResolvedFilePath":1023,"href":1024},[1022]," pokrývá ISMS specifika pro:",[1045,4472,4473,4479,4485,4492,4499,4508,4514,4521,4527],{},[1048,4474,4475],{},[1019,4476,4478],{"className":4477,"dataFsResolvedFilePath":1083,"href":1084},[1022],"Akademické\u002Funiverzitní prostředí",[1048,4480,4481,4484],{},[1019,4482,1267],{"className":4483,"dataFsResolvedFilePath":1265,"href":1266},[1022]," (HIPAA, ISO 27799)",[1048,4486,4487,4491],{},[1019,4488,4490],{"className":4489,"dataFsResolvedFilePath":1747,"href":1748},[1022],"Energetiku"," (ISO 27019, IEC 61850)",[1048,4493,4494,4498],{},[1019,4495,4497],{"className":4496,"dataFsResolvedFilePath":1759,"href":1760},[1022],"Smart Grid"," (NISTIR 7628)",[1048,4500,4501,4507],{},[1019,4502,4506],{"className":4503,"dataFsResolvedFilePath":4504,"href":4505},[1022],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[1048,4509,4510,4513],{},[1019,4511,1301],{"className":4512,"dataFsResolvedFilePath":1299,"href":1300},[1022]," (TISAX)",[1048,4515,4516,4520],{},[1019,4517,4519],{"className":4518,"dataFsResolvedFilePath":1065,"href":1066},[1022],"ISP\u002Ftelekomunikace"," (ISO 27011)",[1048,4522,4523],{},[1019,4524,4526],{"className":4525,"dataFsResolvedFilePath":1927,"href":1928},[1022],"Mission Critical Networks",[1048,4528,4529],{},[1019,4530,1450],{"className":4531,"dataFsResolvedFilePath":1448,"href":1449},[1022],[1040,4533,2563],{"id":2562},[1045,4535,4536,4542,4548,4554,4560,4566,4572,4581],{},[1048,4537,4538,4541],{},[1019,4539,1850],{"className":4540,"dataFsResolvedFilePath":1848,"href":1849},[1022]," — jádro ISMS procesu",[1048,4543,4544,4547],{},[1019,4545,2232],{"className":4546,"dataFsResolvedFilePath":2241,"href":2242},[1022]," — budování bezpečnostního povědomí",[1048,4549,4550,4553],{},[1019,4551,1182],{"className":4552,"dataFsResolvedFilePath":1187,"href":1188},[1022]," — kontinuita činnosti",[1048,4555,4556,4559],{},[1019,4557,3336],{"className":4558,"dataFsResolvedFilePath":1222,"href":1223},[1022]," — širší kontext",[1048,4561,4562,4565],{},[1019,4563,1091],{"className":4564,"dataFsResolvedFilePath":1089,"href":1090},[1022]," — technologická opatření",[1048,4567,4568,4571],{},[1019,4569,1323],{"className":4570,"dataFsResolvedFilePath":1281,"href":1282},[1022]," — governance kontext",[1048,4573,4574,4580],{},[1019,4575,4579],{"className":4576,"dataFsResolvedFilePath":4577,"href":4578},[1022],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Záznam přednášky Risk Management"," — bibliografická karta",[1048,4582,4583,4586],{},[1019,4584,1344],{"className":4585,"dataFsResolvedFilePath":1342,"href":1343},[1022]," — ENISA NCSS, NÚKIB strategie",{"title":2593,"searchDepth":145,"depth":145,"links":4588},[4589,4590,4594,4598,4599,4600],{"id":4139,"depth":145,"text":4140},{"id":4210,"depth":145,"text":4211,"children":4591},[4592,4593],{"id":4214,"depth":100,"text":4215},{"id":4277,"depth":100,"text":4278},{"id":4299,"depth":145,"text":4300,"children":4595},[4596,4597],{"id":4303,"depth":100,"text":4304},{"id":4409,"depth":100,"text":4410},{"id":4436,"depth":145,"text":4437},{"id":4462,"depth":145,"text":4463},{"id":2562,"depth":145,"text":2563},[5],{},"\u002Ftopics\u002Fisms",{"title":4114,"description":2593},[2629,2630,4606],"raw\u002Fimork\u002FDetail předmětu.md","topics\u002Fisms",[5,37,614,616,114,110],"MAuUW-ktk0wWc5AS56HRZFpDbys8Z-J8r3mjMNbPNWc",{"id":4611,"title":3336,"body":4612,"course":2620,"courses":5117,"created":3382,"description":2593,"extension":2623,"meta":5118,"navigation":2625,"path":5119,"seo":5120,"sources":5121,"stem":5123,"tags":5124,"type":3390,"updated":2621,"__hash__":5125},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":1008,"value":4613,"toc":5101},[4614,4617,4624,4631,4635,4673,4677,4681,4723,4727,4734,4737,4763,4767,4784,4788,4818,4822,4889,4893,4896,4913,4917,4952,4954,4990,4994,5043,5047],[1011,4615,3336],{"id":4616},"kybernetická-bezpečnost",[1015,4618,4619],{},[2654,4620],{"alt":4621,"className":4622,"src":4623},"kb-defense-in-depth",[1022,2658],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[1015,4625,4626,4627,4630],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[1019,4628,1313],{"className":4629,"dataFsResolvedFilePath":1311,"href":1312},[1022]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[1040,4632,4634],{"id":4633},"základní-pojmy","Základní pojmy",[1045,4636,4637,4643,4649,4655,4661,4667],{},[1048,4638,4639,4642],{},[1051,4640,4641],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[1048,4644,4645,4648],{},[1051,4646,4647],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[1048,4650,4651,4654],{},[1051,4652,4653],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[1048,4656,4657,4660],{},[1051,4658,4659],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[1048,4662,4663,4666],{},[1051,4664,4665],{},"Payload"," — kód spuštěný po úspěšném exploitu",[1048,4668,4669,4672],{},[1051,4670,4671],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[1040,4674,4676],{"id":4675},"typy-útoků","Typy útoků",[2940,4678,4680],{"id":4679},"podle-cílení","Podle cílení",[2668,4682,4683,4695],{},[2671,4684,4685],{},[2674,4686,4687,4690,4692],{},[2677,4688,4689],{},"Typ",[2677,4691,2685],{},[2677,4693,4694],{},"Cíl",[2687,4696,4697,4710],{},[2674,4698,4699,4704,4707],{},[2692,4700,4701],{},[1051,4702,4703],{},"Plošný",[2692,4705,4706],{},"Útočníkovi je jedno, kdo je obětí",[2692,4708,4709],{},"Botnety, spam, ransomware",[2674,4711,4712,4717,4720],{},[2692,4713,4714],{},[1051,4715,4716],{},"Cílený (APT)",[2692,4718,4719],{},"Soustředěná pozornost na konkrétní cíl",[2692,4721,4722],{},"Špionáž, sabotáž, krádež dat",[2940,4724,4726],{"id":4725},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[1015,4728,4729],{},[2654,4730],{"alt":4731,"className":4732,"src":4733},"apt-faze-utoku",[1022,2658],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[1015,4735,4736],{},"4 fáze:",[2945,4738,4739,4745,4751,4757],{},[1048,4740,4741,4744],{},[1051,4742,4743],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[1048,4746,4747,4750],{},[1051,4748,4749],{},"Průnik"," — spear phishing, watering hole, malvertising",[1048,4752,4753,4756],{},[1051,4754,4755],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[1048,4758,4759,4762],{},[1051,4760,4761],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[2940,4764,4766],{"id":4765},"základní-vektory-útoku","Základní vektory útoku",[1045,4768,4769,4772,4775,4778,4781],{},[1048,4770,4771],{},"Email s přílohou (spear phishing)",[1048,4773,4774],{},"Trojanizované aplikace",[1048,4776,4777],{},"Drive-by download (webové exploity)",[1048,4779,4780],{},"Výměnná média (BadUSB)",[1048,4782,4783],{},"Watering hole (kompromitace důvěryhodného webu)",[2940,4785,4787],{"id":4786},"software-útoky","Software útoky",[1045,4789,4790,4796,4802,4808,4813],{},[1048,4791,4792,4795],{},[1051,4793,4794],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[1048,4797,4798,4801],{},[1051,4799,4800],{},"Viry"," — poškození HW\u002FSW",[1048,4803,4804,4807],{},[1051,4805,4806],{},"Trojské koně"," — skrytá funkčnost",[1048,4809,4810,4812],{},[1051,4811,1542],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[1048,4814,4815,4817],{},[1051,4816,2488],{}," — AI nástroj pro automatizaci kybernetické kriminality",[1040,4819,4821],{"id":4820},"webové-útoky-owasp","Webové útoky (OWASP)",[2668,4823,4824,4836],{},[2671,4825,4826],{},[2674,4827,4828,4831,4833],{},[2677,4829,4830],{},"Útok",[2677,4832,4694],{},[2677,4834,4835],{},"Efekt",[2687,4837,4838,4849,4858,4869,4879],{},[2674,4839,4840,4843,4846],{},[2692,4841,4842],{},"Content Spoofing",[2692,4844,4845],{},"Klient",[2692,4847,4848],{},"Ztráta přihlašovacích údajů",[2674,4850,4851,4853,4855],{},[2692,4852,2522],{},[2692,4854,4845],{},[2692,4856,4857],{},"Přístup k cookies",[2674,4859,4860,4863,4866],{},[2692,4861,4862],{},"SQL Injection",[2692,4864,4865],{},"Server",[2692,4867,4868],{},"Neoprávněný přístup do DB",[2674,4870,4871,4874,4876],{},[2692,4872,4873],{},"DoS\u002FDDoS",[2692,4875,4865],{},[2692,4877,4878],{},"Nedostupnost služby",[2674,4880,4881,4884,4886],{},[2692,4882,4883],{},"Path Traversal",[2692,4885,4865],{},[2692,4887,4888],{},"Přístup k souborům",[1040,4890,4892],{"id":4891},"bec-business-email-compromise","BEC — Business Email Compromise",[1015,4894,4895],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[2945,4897,4898,4901,4904,4907,4910],{},[1048,4899,4900],{},"Vydávání se za právníka",[1048,4902,4903],{},"Podvod na CEO",[1048,4905,4906],{},"Krádež dat (personální oddělení)",[1048,4908,4909],{},"Kompromitace účtu",[1048,4911,4912],{},"Falešné faktury",[1040,4914,4916],{"id":4915},"obranné-technologie","Obranné technologie",[1045,4918,4919,4924,4930,4936,4941,4946],{},[1048,4920,4921,4923],{},[1051,4922,1977],{}," — řízení přístupu k síti",[1048,4925,4926,4929],{},[1051,4927,4928],{},"IDS"," — detekce průniku (pasivní)",[1048,4931,4932,4935],{},[1051,4933,4934],{},"IPS"," — prevence průniku (aktivní, in-line)",[1048,4937,4938,4940],{},[1051,4939,2274],{}," — centralizovaná správa bezpečnostních událostí",[1048,4942,4943,4945],{},[1051,4944,1434],{}," — prevence úniku dat",[1048,4947,4948,4951],{},[1051,4949,4950],{},"FW\u002FVPN"," — perimetrová ochrana",[1040,4953,2563],{"id":2562},[1045,4955,4956,4962,4968,4974,4984],{},[1048,4957,4958,4961],{},[1019,4959,1313],{"className":4960,"dataFsResolvedFilePath":1311,"href":1312},[1022]," — manažerský rámec bezpečnosti",[1048,4963,4964,4967],{},[1019,4965,1850],{"className":4966,"dataFsResolvedFilePath":1848,"href":1849},[1022]," — hodnocení hrozeb a zranitelností",[1048,4969,4970,4973],{},[1019,4971,2232],{"className":4972,"dataFsResolvedFilePath":2241,"href":2242},[1022]," — budování povědomí jako obrana č. 1",[1048,4975,4976,1140,4979,4983],{},[1019,4977,1182],{"className":4978,"dataFsResolvedFilePath":1187,"href":1188},[1022],[1019,4980,4982],{"className":4981,"dataFsResolvedFilePath":1509,"href":1510},[1022],"DR"," — reakce na incidenty a obnova",[1048,4985,4986,4989],{},[1019,4987,1091],{"className":4988,"dataFsResolvedFilePath":1089,"href":1090},[1022]," — technologická ochrana",[2940,4991,4993],{"id":4992},"záznamy-přednášek-a-útočné-techniky","Záznamy přednášek a útočné techniky",[1045,4995,4996,5003,5010,5016,5022,5029,5036],{},[1048,4997,4998,5002],{},[1019,4999,5001],{"className":5000,"dataFsResolvedFilePath":1104,"href":1105},[1022],"Anatomie kybernetického útoku"," — APT, vektory, MITRE ATT&CK",[1048,5004,5005,5009],{},[1019,5006,5008],{"className":5007,"dataFsResolvedFilePath":1216,"href":1217},[1022],"AI útoky a obrana"," — WormGPT, BEC",[1048,5011,5012,5015],{},[1019,5013,1478],{"className":5014,"dataFsResolvedFilePath":1397,"href":1398},[1022]," — DDoS, spoofing, ISO\u002FOSI L1–L7",[1048,5017,5018,5021],{},[1019,5019,1542],{"className":5020,"dataFsResolvedFilePath":1540,"href":1541},[1022]," — historie, RaaS, NISTIR 8374",[1048,5023,5024,5028],{},[1019,5025,5027],{"className":5026,"dataFsResolvedFilePath":1160,"href":1161},[1022],"Řízený hacking a APT skupiny"," — APT28\u002F29\u002F41",[1048,5030,5031,5035],{},[1019,5032,5034],{"className":5033,"dataFsResolvedFilePath":1860,"href":1861},[1022],"Internetová bezpečnost"," — OSINT, behaviorální biometrika",[1048,5037,5038,5042],{},[1019,5039,5041],{"className":5040,"dataFsResolvedFilePath":1125,"href":1126},[1022],"Bezpečnost webových služeb"," — OWASP, XSS, SQL injection",[2940,5044,5046],{"id":5045},"případové-studie","Případové studie",[1045,5048,5049,5056,5062,5069,5075,5081,5088,5095],{},[1048,5050,5051,5055],{},[1019,5052,5054],{"className":5053,"dataFsResolvedFilePath":2205,"href":2206},[1022],"Útoky na nemocnice"," — Benešov, FN Brno, Nymburk",[1048,5057,5058,5061],{},[1019,5059,4039],{"className":5060,"dataFsResolvedFilePath":1781,"href":1782},[1022]," — PII, ISO 27701",[1048,5063,5064,5068],{},[1019,5065,5067],{"className":5066,"dataFsResolvedFilePath":1645,"href":1646},[1022],"Správa přihlašování"," — privilegované účty, NIST SP 800-63",[1048,5070,5071,5074],{},[1019,5072,1597],{"className":5073,"dataFsResolvedFilePath":1595,"href":1596},[1022]," — PCI DSS v4.0.1",[1048,5076,5077,5080],{},[1019,5078,1060],{"className":5079,"dataFsResolvedFilePath":1058,"href":1059},[1022]," — SIMJaker, 5G",[1048,5082,5083,5087],{},[1019,5084,5086],{"className":5085,"dataFsResolvedFilePath":2383,"href":2384},[1022],"TOR síť"," — onion routing, dark web",[1048,5089,5090,5094],{},[1019,5091,5093],{"className":5092,"dataFsResolvedFilePath":1378,"href":1379},[1022],"Audio Hack"," — CVE-2022-38392",[1048,5096,5097,5100],{},[1019,5098,1563],{"className":5099,"dataFsResolvedFilePath":1561,"href":1562},[1022]," — telemedicína, NSeZ",{"title":2593,"searchDepth":145,"depth":145,"links":5102},[5103,5104,5110,5111,5112,5113],{"id":4633,"depth":145,"text":4634},{"id":4675,"depth":145,"text":4676,"children":5105},[5106,5107,5108,5109],{"id":4679,"depth":100,"text":4680},{"id":4725,"depth":100,"text":4726},{"id":4765,"depth":100,"text":4766},{"id":4786,"depth":100,"text":4787},{"id":4820,"depth":145,"text":4821},{"id":4891,"depth":145,"text":4892},{"id":4915,"depth":145,"text":4916},{"id":2562,"depth":145,"text":2563,"children":5114},[5115,5116],{"id":4992,"depth":100,"text":4993},{"id":5045,"depth":100,"text":5046},[5],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":3336,"description":2593},[2633,5122,2629],"raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[5,62,944,72,138,132,275],"ZGXpTQk1lM-ZV0_FuXL-vNa95AogiXG3M6yEOrni_vI",{"id":5127,"title":1091,"body":5128,"course":2620,"courses":5633,"created":3382,"description":2593,"extension":2623,"meta":5634,"navigation":2625,"path":5635,"seo":5636,"sources":5637,"stem":5640,"tags":5641,"type":3390,"updated":2621,"__hash__":5642},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":1008,"value":5129,"toc":5610},[5130,5132,5139,5142,5146,5205,5209,5213,5224,5228,5239,5243,5251,5255,5266,5270,5275,5279,5290,5294,5297,5301,5332,5336,5391,5395,5473,5477,5480,5484,5491,5498,5502,5508,5510,5516,5520,5545,5549,5567,5569],[1011,5131,1091],{"id":70},[1015,5133,5134],{},[2654,5135],{"alt":5136,"className":5137,"src":5138},"ochrana-dat-technologie",[1022,2658],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[1015,5140,5141],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[1040,5143,5145],{"id":5144},"formy-zneužití-dat","Formy zneužití dat",[2668,5147,5148,5156],{},[2671,5149,5150],{},[2674,5151,5152,5154],{},[2677,5153,3102],{},[2677,5155,2685],{},[2687,5157,5158,5165,5173,5181,5189,5197],{},[2674,5159,5160,5163],{},[2692,5161,5162],{},"Zašifrování",[2692,5164,1542],{},[2674,5166,5167,5170],{},[2692,5168,5169],{},"Zveřejnění",[2692,5171,5172],{},"Double ransomware",[2674,5174,5175,5178],{},[2692,5176,5177],{},"Odposlech",[2692,5179,5180],{},"Pasivní sběr dat",[2674,5182,5183,5186],{},[2692,5184,5185],{},"Krádež",[2692,5187,5188],{},"Cílená exfiltrace",[2674,5190,5191,5194],{},[2692,5192,5193],{},"Krádež dodavatelského řetězce",[2692,5195,5196],{},"Triple ransomware",[2674,5198,5199,5202],{},[2692,5200,5201],{},"Prodej",[2692,5203,5204],{},"Darknet marketplace",[1040,5206,5208],{"id":5207},"bezpečnostní-technologie","Bezpečnostní technologie",[2940,5210,5212],{"id":5211},"nac-network-access-control","NAC (Network Access Control)",[1045,5214,5215,5218,5221],{},[1048,5216,5217],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[1048,5219,5220],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[1048,5222,5223],{},"Ekvivalenty: MDM, BYOD",[2940,5225,5227],{"id":5226},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[1045,5229,5230,5233,5236],{},[1048,5231,5232],{},"Monitoruje síťový provoz, generuje alerty",[1048,5234,5235],{},"Pasivní systém — nezasahuje do provozu",[1048,5237,5238],{},"Signaturová a anomální detekce",[2940,5240,5242],{"id":5241},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[1045,5244,5245,5248],{},[1048,5246,5247],{},"Aktivní systém — blokuje škodlivý provoz",[1048,5249,5250],{},"Zařazen přímo do síťové cesty (in-line)",[2940,5252,5254],{"id":5253},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[1045,5256,5257,5260,5263],{},[1048,5258,5259],{},"Centralizovaná správa bezpečnostních logů",[1048,5261,5262],{},"Sběr s agentem i bez agenta",[1048,5264,5265],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[2940,5267,5269],{"id":5268},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[1045,5271,5272],{},[1048,5273,5274],{},"Klasifikace citlivých dat a vynucení ochrany",[2940,5276,5278],{"id":5277},"šifrování","Šifrování",[1045,5280,5281,5284,5287],{},[1048,5282,5283],{},"AES (128\u002F192\u002F256 bit), 3DES",[1048,5285,5286],{},"RSA (2048+ bit), DSS",[1048,5288,5289],{},"SHA-256, SHA-1",[2940,5291,5293],{"id":5292},"utm-unified-threat-management","UTM (Unified Threat Management)",[1015,5295,5296],{},"Jednotná správa hrozeb — FW + IDS\u002FIPS + AV + VPN v jednom zařízení.",[1040,5298,5300],{"id":5299},"siem-podrobně","SIEM podrobně",[1045,5302,5303,5308,5314,5320,5326],{},[1048,5304,5305,5307],{},[1051,5306,1608],{}," (Events Per Second) — klíčová metrika pro dimenzování SIEM.",[1048,5309,5310,5313],{},[1051,5311,5312],{},"Velikost logů"," — plánování úložné kapacity dle objemu generovaných dat.",[1048,5315,5316,5319],{},[1051,5317,5318],{},"Typy zařízení"," — síťové prvky, servery, aplikace, bezpečnostní systémy, endpointy.",[1048,5321,5322,5325],{},[1051,5323,5324],{},"Implementace"," — začít s nejkritičtějšími zdroji logů, postupně rozšiřovat.",[1048,5327,5328,5331],{},[1051,5329,5330],{},"Provozní příručka + BCM"," — dokumentace provozu SIEM a jeho zahrnutí do plánů kontinuity.",[1040,5333,5335],{"id":5334},"dlp-tři-stavy-dat","DLP — tři stavy dat",[2668,5337,5338,5350],{},[2671,5339,5340],{},[2674,5341,5342,5345,5347],{},[2677,5343,5344],{},"Stav",[2677,5346,2685],{},[2677,5348,5349],{},"Ochrana",[2687,5351,5352,5365,5378],{},[2674,5353,5354,5359,5362],{},[2692,5355,5356],{},[1051,5357,5358],{},"Data in Use",[2692,5360,5361],{},"Aktivně zpracovávaná na endpointu",[2692,5363,5364],{},"DLP koncových bodů (agent na stanici, kontrola USB, tisk, schránka, email)",[2674,5366,5367,5372,5375],{},[2692,5368,5369],{},[1051,5370,5371],{},"Data in Motion",[2692,5373,5374],{},"Přenášená po síti",[2692,5376,5377],{},"Síťový DLP (gateway), monitorování a blokování na perimetru",[2674,5379,5380,5385,5388],{},[2692,5381,5382],{},[1051,5383,5384],{},"Data at Rest",[2692,5386,5387],{},"Uložená na discích, v databázích",[2692,5389,5390],{},"Šifrování, řízení přístupu",[1040,5392,5394],{"id":5393},"kryptografie-historický-přehled","Kryptografie — historický přehled",[2668,5396,5397,5412],{},[2671,5398,5399],{},[2674,5400,5401,5404,5407,5409],{},[2677,5402,5403],{},"Algoritmus",[2677,5405,5406],{},"Rok",[2677,5408,4689],{},[2677,5410,5411],{},"Délka klíče",[2687,5413,5414,5429,5444,5459],{},[2674,5415,5416,5420,5423,5426],{},[2692,5417,5418],{},[1051,5419,1404],{},[2692,5421,5422],{},"1975",[2692,5424,5425],{},"Symetrický (blokový)",[2692,5427,5428],{},"64-bit (efektivních 56)",[2674,5430,5431,5436,5439,5441],{},[2692,5432,5433],{},[1051,5434,5435],{},"IDEA",[2692,5437,5438],{},"1990",[2692,5440,5425],{},[2692,5442,5443],{},"128-bit",[2674,5445,5446,5450,5453,5456],{},[2692,5447,5448],{},[1051,5449,2164],{},[2692,5451,5452],{},"1977 (MIT)",[2692,5454,5455],{},"Asymetrický",[2692,5457,5458],{},"1024–4096 bit",[2674,5460,5461,5465,5468,5470],{},[2692,5462,5463],{},[1051,5464,1111],{},[2692,5466,5467],{},"1997 (NIST)",[2692,5469,5425],{},[2692,5471,5472],{},"128\u002F192\u002F256-bit",[2940,5474,5476],{"id":5475},"steganografie","Steganografie",[1015,5478,5479],{},"Skrytí informace ve zdánlivě neškodné zprávě — na rozdíl od kryptografie nezakrývá obsah, ale samotnou existenci tajné komunikace. Využití v obrázcích, zvuku, videu.",[2940,5481,5483],{"id":5482},"digitální-podpisy-a-hašovací-funkce","Digitální podpisy a hašovací funkce",[1015,5485,5486,5487,5490],{},"Ověření autora a integrity dokumentu pomocí asymetrické kryptografie. Hašovací funkce vytváří jednosměrný otisk dokumentu — základ pro ověření integrity. ",[1051,5488,5489],{},"4 vlastnosti elektronického podpisu",": identifikace, integrita, nepopiratelnost, nenapodobitelnost.",[1015,5492,5493,5494,5497],{},"V ČR existují ",[1051,5495,5496],{},"3 akreditované certifikační autority"," pro vydávání kvalifikovaných certifikátů.",[2940,5499,5501],{"id":5500},"dynamický-biometrický-podpis","Dynamický biometrický podpis",[1015,5503,5504,5507],{},[1051,5505,5506],{},"ISO\u002FIEC 24745"," — ochrana biometrických šablon. Zachycuje unikátní biometrickou stopu (tlak, rychlost, sklon pera, dynamika) — každý podpis je jedinečný i při opakování.",[2940,5509,1568],{"id":500},[1015,5511,5512,5515],{},[1051,5513,5514],{},"Nařízení EU č. 910\u002F2014"," o elektronické identifikaci a službách vytvářejících důvěru — elektronické pečetě, časová razítka, služby vytvářející důvěru (certifikační autority, doručovací služby).",[2940,5517,5519],{"id":5518},"enisa-data-protection-engineering","ENISA Data Protection Engineering",[1015,5521,5522,5523,1061,5526,5528,5529,5532,5533,1061,5535,1061,5538,5541,5542,1068],{},"Doporučení pro technickou ochranu osobních údajů: ",[1051,5524,5525],{},"Privacy by Design \u002F Default",[1051,5527,1483],{}," (Data Protection Impact Assessment), ",[1051,5530,5531],{},"PET"," (Privacy Enhancing Technologies), ",[1051,5534,366],{},[1051,5536,5537],{},"differential privacy",[1051,5539,5540],{},"TEE"," (Trusted Execution Environment), ",[1051,5543,5544],{},"synthetic data",[1040,5546,5548],{"id":5547},"ipv6-bezpečnost","IPv6 bezpečnost",[1045,5550,5551,5556,5561,5564],{},[1048,5552,5553,5555],{},[1051,5554,1120],{}," (Authentication Header) — ověření odesílatele a integrity",[1048,5557,5558,5560],{},[1051,5559,1620],{}," (Encapsulating Security Payload) — šifrování dat",[1048,5562,5563],{},"Transportní a tunelovací režim",[1048,5565,5566],{},"SPD (Security Policy Database), bezpečnostní asociace",[1040,5568,2563],{"id":2562},[1045,5570,5571,5577,5583,5589,5595,5602],{},[1048,5572,5573,5576],{},[1019,5574,1313],{"className":5575,"dataFsResolvedFilePath":1311,"href":1312},[1022]," — ochrana dat jako technická vrstva ISMS",[1048,5578,5579,5582],{},[1019,5580,3336],{"className":5581,"dataFsResolvedFilePath":1222,"href":1223},[1022]," — kontext hrozeb",[1048,5584,5585,5588],{},[1019,5586,1850],{"className":5587,"dataFsResolvedFilePath":1848,"href":1849},[1022]," — hodnocení aktiv a hrozeb",[1048,5590,5591,5594],{},[1019,5592,1127],{"className":5593,"dataFsResolvedFilePath":1125,"href":1126},[1022]," — webové útoky a obrana",[1048,5596,5597,5601],{},[1019,5598,5600],{"className":5599,"dataFsResolvedFilePath":1427,"href":1428},[1022],"Bezpečnost emailu"," — emailové protokoly",[1048,5603,5604,3346],{},[1019,5605,5609],{"className":5606,"dataFsResolvedFilePath":5607,"href":5608},[1022],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Záznam přednášky Ochrana dat",{"title":2593,"searchDepth":145,"depth":145,"links":5611},[5612,5613,5622,5623,5624,5631,5632],{"id":5144,"depth":145,"text":5145},{"id":5207,"depth":145,"text":5208,"children":5614},[5615,5616,5617,5618,5619,5620,5621],{"id":5211,"depth":100,"text":5212},{"id":5226,"depth":100,"text":5227},{"id":5241,"depth":100,"text":5242},{"id":5253,"depth":100,"text":5254},{"id":5268,"depth":100,"text":5269},{"id":5277,"depth":100,"text":5278},{"id":5292,"depth":100,"text":5293},{"id":5299,"depth":145,"text":5300},{"id":5334,"depth":145,"text":5335},{"id":5393,"depth":145,"text":5394,"children":5625},[5626,5627,5628,5629,5630],{"id":5475,"depth":100,"text":5476},{"id":5482,"depth":100,"text":5483},{"id":5500,"depth":100,"text":5501},{"id":500,"depth":100,"text":1568},{"id":5518,"depth":100,"text":5519},{"id":5547,"depth":145,"text":5548},{"id":2562,"depth":145,"text":2563},[5],{},"\u002Ftopics\u002Fochrana-dat",{"title":1091,"description":2593},[2632,5638,5639],"raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[5,70,95,732,572,604,181,108],"M650k0ZNR2BPigQlhjBZfiXYtu5pDBHhmlFhIKtM8X0",{"id":5644,"title":1850,"body":5645,"course":2620,"courses":6126,"created":3382,"description":2593,"extension":2623,"meta":6127,"navigation":2625,"path":6128,"seo":6129,"sources":6130,"stem":6131,"tags":6132,"type":3390,"updated":2621,"__hash__":6133},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":1008,"value":5646,"toc":6115},[5647,5650,5657,5663,5797,5801,5864,5868,5918,5922,5927,5946,5950,5953,5957,5970,5974,5981,5993,5997,6025,6029,6078,6080],[1011,5648,1850],{"id":5649},"řízení-rizik",[1015,5651,5652],{},[2654,5653],{"alt":5654,"className":5655,"src":5656},"rizeni-rizik-proces",[1022,2658],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[1015,5658,5659,5660,1068],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[1019,5661,1313],{"className":5662,"dataFsResolvedFilePath":1311,"href":1312},[1022],[5664,5665,5669,5689,5704,5790],"aside",{"className":5666,"dataCallout":584},[5667,5668],"callout","callout-info",[1015,5670,5673,5681,5682,5688],{"className":5671},[5672],"callout-title",[5674,5675],"span",{"className":5676,"ariaHidden":5680},[5677,5678,5679],"iconify","i-lucide:info","callout-icon","true","Související pohled v kurzu ",[1019,5683,5687],{"className":5684,"dataFsResolvedFilePath":5685,"href":5686},[1022],"courses\u002Firmank.md","\u002Fwiki\u002Firmank","IrmanK"," — Risk management",[1015,5690,5691,5692,5695,5696,5699,5700,5703],{},"Tento topic pokrývá ",[1051,5693,5694],{},"kybernetické \u002F informační"," riziko podle ISO\u002FIEC 27005. Pro ",[1051,5697,5698],{},"podnikové (enterprise) riziko"," v širším smyslu (finanční, strategické, change-driven) viz odpovídající stránky kurzu ",[1019,5701,5687],{"className":5702,"dataFsResolvedFilePath":5685,"href":5686},[1022],":",[1045,5705,5706,5715,5723,5764,5773,5781],{},[1048,5707,5708,5714],{},[1019,5709,5713],{"className":5710,"dataFsResolvedFilePath":5711,"href":5712},[1022],"topics\u002Fdefinice-rizika.md","\u002Fwiki\u002Fdefinice-rizika","definice-rizika"," — 10 definic rizika, podnikatelské riziko, postoj k riziku",[1048,5716,5717,5722],{},[1019,5718,692],{"className":5719,"dataFsResolvedFilePath":5720,"href":5721},[1022],"topics\u002Fmereni-rizika.md","\u002Fwiki\u002Fmereni-rizika"," — statistické charakteristiky (σ, σ², KV)",[1048,5724,5725,4235,5730,5763],{},[1019,5726,68],{"className":5727,"dataFsResolvedFilePath":5728,"href":5729},[1022],"topics\u002Fmapa-rizik.md","\u002Fwiki\u002Fmapa-rizik",[5674,5731,5734],{"className":5732},[5733],"katex",[5735,5736,5738],"math",{"xmlns":5737},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[5739,5740,5741,5758],"semantics",{},[5742,5743,5744,5747,5751,5753,5756],"mrow",{},[5745,5746,2139],"mi",{},[5748,5749,5750],"mo",{},"=",[5745,5752,1385],{},[5748,5754,5755],{},"×",[5745,5757,2058],{},[5759,5760,5762],"annotation",{"encoding":5761},"application\u002Fx-tex","R = D \\times P",", matice 5×5, tři barevné zóny",[1048,5765,5766,5772],{},[1019,5767,5771],{"className":5768,"dataFsResolvedFilePath":5769,"href":5770},[1022],"topics\u002Ftaktiky-rizeni-rizik.md","\u002Fwiki\u002Ftaktiky-rizeni-rizik","taktiky-rizeni-rizik"," — vyvárování \u002F udržení \u002F redukce \u002F přenos",[1048,5774,5775,5780],{},[1019,5776,634],{"className":5777,"dataFsResolvedFilePath":5778,"href":5779},[1022],"topics\u002Fklasifikace-rizik.md","\u002Fwiki\u002Fklasifikace-rizik"," — kritické × důležité × běžné; dynamické × statické; čisté × spekulativní",[1048,5782,5783,5789],{},[1019,5784,5788],{"className":5785,"dataFsResolvedFilePath":5786,"href":5787},[1022],"topics\u002Fmetody-snizovani-rizika.md","\u002Fwiki\u002Fmetody-snizovani-rizika","metody-snizovani-rizika"," — 6 strategií, ofenzivní řízení",[1015,5791,5792,5793,5796],{},"Oba pohledy se doplňují: ISMS \u002F ISO 27005 je specializace pro ",[1051,5794,5795],{},"informační rizika",", IrmanK je obecné podnikové riziko.",[1040,5798,5800],{"id":5799},"normativní-základ","Normativní základ",[2668,5802,5803,5812],{},[2671,5804,5805],{},[2674,5806,5807,5810],{},[2677,5808,5809],{},"Norma",[2677,5811,3734],{},[2687,5813,5814,5824,5834,5844,5854],{},[2674,5815,5816,5821],{},[2692,5817,5818],{},[1051,5819,5820],{},"ISO 31000:2018",[2692,5822,5823],{},"Obecné směrnice pro management rizik",[2674,5825,5826,5831],{},[2692,5827,5828],{},[1051,5829,5830],{},"IEC 31010:2019",[2692,5832,5833],{},"Techniky posuzování rizik",[2674,5835,5836,5841],{},[2692,5837,5838],{},[1051,5839,5840],{},"ISO\u002FIEC 27005:2022",[2692,5842,5843],{},"Řízení rizik bezpečnosti informací",[2674,5845,5846,5851],{},[2692,5847,5848],{},[1051,5849,5850],{},"NIST SP 800-30",[2692,5852,5853],{},"Průvodce hodnocením rizik",[2674,5855,5856,5861],{},[2692,5857,5858],{},[1051,5859,5860],{},"NIST SP 800-39",[2692,5862,5863],{},"Proces řízení bezpečnostních rizik",[1040,5865,5867],{"id":5866},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[2945,5869,5870,5876,5882,5888,5894,5900,5906,5912],{},[1048,5871,5872,5875],{},[1051,5873,5874],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[1048,5877,5878,5881],{},[1051,5879,5880],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[1048,5883,5884,5887],{},[1051,5885,5886],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[1048,5889,5890,5893],{},[1051,5891,5892],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[1048,5895,5896,5899],{},[1051,5897,5898],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[1048,5901,5902,5905],{},[1051,5903,5904],{},"Akceptace rizik"," — formální rozhodnutí",[1048,5907,5908,5911],{},[1051,5909,5910],{},"Komunikace"," — sdílení informací o rizicích",[1048,5913,5914,5917],{},[1051,5915,5916],{},"Monitorování"," — průběžné přezkoumávání",[1040,5919,5921],{"id":5920},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[1015,5923,5924],{},[1051,5925,5926],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[1045,5928,5929,5935,5940],{},[1048,5930,5931,5934],{},[1051,5932,5933],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[1048,5936,5937,5939],{},[1051,5938,4653],{}," — slabé místo aktiva (stupnice 1–5)",[1048,5941,5942,5945],{},[1051,5943,5944],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[1040,5947,5949],{"id":5948},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[1015,5951,5952],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[1040,5954,5956],{"id":5955},"klíčové-dokumenty","Klíčové dokumenty",[1045,5958,5959,5964],{},[1048,5960,5961,5963],{},[1051,5962,2191],{}," (Risk Treatment Plan) — plán zvládání rizik s vybranými opatřeními pro jednotlivá rizika, odpovědnými osobami, termíny implementace, potřebnými zdroji.",[1048,5965,5966,5969],{},[1051,5967,5968],{},"SoA \u002F PoA"," (Statement of Applicability \u002F Prohlášení o aplikovatelnosti) — seznam všech opatření z Přílohy A normy ISO 27001 s uvedením, zda je opatření aplikováno, zdůvodnění zahrnutí\u002Fvyloučení a stavu implementace.",[1040,5971,5973],{"id":5972},"metodika-pro-organizace-s-kii-vis","Metodika pro organizace s KII \u002F VIS",[1015,5975,5976,5977,5980],{},"Specifický postup hodnocení rizik dle požadavků zákona o kybernetické bezpečnosti (",[1051,5978,5979],{},"ZKB 181\u002F2014 Sb.",") a prováděcích vyhlášek pro organizace provozující:",[1045,5982,5983,5988],{},[1048,5984,5985,5987],{},[1051,5986,1843],{}," — kritickou informační infrastrukturu",[1048,5989,5990,5992],{},[1051,5991,2428],{}," — významné informační systémy",[1040,5994,5996],{"id":5995},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[1045,5998,5999,6005,6010,6015,6020],{},[1048,6000,6001,6004],{},[1051,6002,6003],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[1048,6006,6007,6009],{},[1051,6008,4370],{}," — odpovědný za ISMS",[1048,6011,6012,6014],{},[1051,6013,4381],{}," — návrh a implementace opatření",[1048,6016,6017,6019],{},[1051,6018,4391],{}," — provádění auditů",[1048,6021,6022,6024],{},[1051,6023,4401],{}," — zajištění rozvoje a bezpečnosti aktiva",[1040,6026,6028],{"id":6027},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[2668,6030,6031,6043],{},[2671,6032,6033],{},[2674,6034,6035,6038,6040],{},[2677,6036,6037],{},"Úroveň",[2677,6039,3734],{},[2677,6041,6042],{},"Typ rizika",[2687,6044,6045,6056,6067],{},[2674,6046,6047,6050,6053],{},[2692,6048,6049],{},"Stupeň 1",[2692,6051,6052],{},"Organizace",[2692,6054,6055],{},"Strategické riziko",[2674,6057,6058,6061,6064],{},[2692,6059,6060],{},"Stupeň 2",[2692,6062,6063],{},"Poslání\u002Fobchodní procesy",[2692,6065,6066],{},"Taktické riziko",[2674,6068,6069,6072,6075],{},[2692,6070,6071],{},"Stupeň 3",[2692,6073,6074],{},"Informační systémy",[2692,6076,6077],{},"Operační riziko",[1040,6079,2563],{"id":2562},[1045,6081,6082,6088,6094,6100,6105,6110],{},[1048,6083,6084,6087],{},[1019,6085,1313],{"className":6086,"dataFsResolvedFilePath":1311,"href":1312},[1022]," — řízení rizik jako součást systému",[1048,6089,6090,6093],{},[1019,6091,1182],{"className":6092,"dataFsResolvedFilePath":1187,"href":1188},[1022]," — kontinuita činnosti při materializaci rizik",[1048,6095,6096,6099],{},[1019,6097,1511],{"className":6098,"dataFsResolvedFilePath":1509,"href":1510},[1022]," — obnova po havárii",[1048,6101,6102,5582],{},[1019,6103,3336],{"className":6104,"dataFsResolvedFilePath":1222,"href":1223},[1022],[1048,6106,6107,3346],{},[1019,6108,4579],{"className":6109,"dataFsResolvedFilePath":4577,"href":4578},[1022],[1048,6111,6112,4571],{},[1019,6113,1323],{"className":6114,"dataFsResolvedFilePath":1281,"href":1282},[1022],{"title":2593,"searchDepth":145,"depth":145,"links":6116},[6117,6118,6119,6120,6121,6122,6123,6124,6125],{"id":5799,"depth":145,"text":5800},{"id":5866,"depth":145,"text":5867},{"id":5920,"depth":145,"text":5921},{"id":5948,"depth":145,"text":5949},{"id":5955,"depth":145,"text":5956},{"id":5972,"depth":145,"text":5973},{"id":5995,"depth":145,"text":5996},{"id":6027,"depth":145,"text":6028},{"id":2562,"depth":145,"text":2563},[5],{},"\u002Ftopics\u002Frizeni-rizik",{"title":1850,"description":2593},[2630,2629],"topics\u002Frizeni-rizik",[5,299,120,225,47,558],"B2O-5KFFyDd3C5ghtPpboBxcyKKtHedHtDlkrl4iqPA",{"id":6135,"title":6136,"body":6137,"course":2620,"courses":6424,"created":3382,"description":2593,"extension":2623,"meta":6425,"navigation":2625,"path":6426,"seo":6427,"sources":6428,"stem":6430,"tags":6431,"type":3390,"updated":2621,"__hash__":6432},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":1008,"value":6138,"toc":6413},[6139,6142,6149,6166,6170,6173,6177,6276,6280,6315,6319,6339,6343,6346,6350,6353,6357,6360,6364,6383,6385],[1011,6140,6136],{"id":6141},"sae-budování-bezpečnostního-povědomí",[1015,6143,6144],{},[2654,6145],{"alt":6146,"className":6147,"src":6148},"sae-pyramida",[1022,2658],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[1015,6150,6151,6152,6155,6156,3434,6159,6155,6162,6165],{},"Program definovaný doporučeními NIST řady SP 800 (zejména ",[1051,6153,6154],{},"NIST SP 800-50"," ",[1028,6157,6158],{},"Building an IT Security Awareness and Training Program",[1051,6160,6161],{},"NIST SP 800-16",[1028,6163,6164],{},"IT Security Training Requirements","), sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[1040,6167,6169],{"id":6168},"sae-continuum-model","SAE Continuum Model",[1015,6171,6172],{},"Postupný rozvoj od základního povědomí přes školení a vzdělávání až po profesní specializaci. Každá úroveň staví na předchozí — uživatel nejprve rozpoznává hrozbu, pak ji umí řešit, posléze rozumí proč a nakonec vede ostatní.",[1040,6174,6176],{"id":6175},"čtyři-úrovně-sae","Čtyři úrovně SAE",[2668,6178,6179,6196],{},[2671,6180,6181],{},[2674,6182,6183,6185,6188,6190,6193],{},[2677,6184,6037],{},[2677,6186,6187],{},"Příznak",[2677,6189,4694],{},[2677,6191,6192],{},"Metody",[2677,6194,6195],{},"Časový rámec",[2687,6197,6198,6218,6238,6258],{},[2674,6199,6200,6206,6209,6212,6215],{},[2692,6201,6202,6205],{},[1051,6203,6204],{},"Awareness"," (povědomí)",[2692,6207,6208],{},"„Co\"",[2692,6210,6211],{},"Rozpoznávání",[2692,6213,6214],{},"Média, videa, plakáty",[2692,6216,6217],{},"Krátkodobý",[2674,6219,6220,6226,6229,6232,6235],{},[2692,6221,6222,6225],{},[1051,6223,6224],{},"Training"," (výcvik)",[2692,6227,6228],{},"„Jak\"",[2692,6230,6231],{},"Dovednosti",[2692,6233,6234],{},"Přednášky, případovky, cvičení",[2692,6236,6237],{},"Střednědobý",[2674,6239,6240,6246,6249,6252,6255],{},[2692,6241,6242,6245],{},[1051,6243,6244],{},"Education"," (vzdělávání)",[2692,6247,6248],{},"„Proč\"",[2692,6250,6251],{},"Porozumění",[2692,6253,6254],{},"Semináře, diskuze, výzkum",[2692,6256,6257],{},"Dlouhodobý",[2674,6259,6260,6265,6267,6270,6273],{},[2692,6261,6262],{},[1051,6263,6264],{},"Professional Development",[2692,6266,4373],{},[2692,6268,6269],{},"Profesní rozvoj",[2692,6271,6272],{},"Certifikace, konference",[2692,6274,6275],{},"Průběžný",[1040,6277,6279],{"id":6278},"sae-plán-11-kroků","SAE plán (11 kroků)",[2945,6281,6282,6285,6288,6291,6294,6297,6300,6303,6306,6309,6312],{},[1048,6283,6284],{},"Role a odpovědnosti v programu",[1048,6286,6287],{},"Stanovení cílů pro každou fázi",[1048,6289,6290],{},"Rozdělení uživatelů (analýza)",[1048,6292,6293],{},"Vytvoření školících materiálů dle skupin",[1048,6295,6296],{},"Určení cíle pro každou skupinu",[1048,6298,6299],{},"Témata pro každou relaci\u002Fkurz",[1048,6301,6302],{},"Metody nasazení (metodiky)",[1048,6304,6305],{},"Dokumentace a zpětná vazba",[1048,6307,6308],{},"Vyhodnocení a aktualizace materiálů",[1048,6310,6311],{},"Četnost opakování",[1048,6313,6314],{},"Kalkulace",[1040,6316,6318],{"id":6317},"modely-řízení","Modely řízení",[1045,6320,6321,6327,6333],{},[1048,6322,6323,6326],{},[1051,6324,6325],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[1048,6328,6329,6332],{},[1051,6330,6331],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[1048,6334,6335,6338],{},[1051,6336,6337],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[1040,6340,6342],{"id":6341},"doporučená-témata-dle-vyhlášky-č-4092025-sb","Doporučená témata dle vyhlášky č. 409\u002F2025 Sb.",[1015,6344,6345],{},"Vyhláška o bezpečnostních opatřeních poskytovatele regulované služby v režimu vyšších povinností (prováděcí předpis k novému ZKB č. 264\u002F2025 Sb. — transpozice NIS2; účinná od 1. 11. 2025). Příloha č. 6 obsahuje doporučená témata SAE: bezpečné chování na internetu, rozpoznání phishingu a sociálního inženýrství, práce s hesly a vícefaktorová autentizace, klasifikace informací, hlášení incidentů, BYOD, cloud, firewall, malware, VPN, šifrování, zálohování, fyzická bezpečnost, mobilní zařízení.",[1040,6347,6349],{"id":6348},"matice-školení-nist-sp-500-172","Matice školení (NIST SP 500-172)",[1015,6351,6352],{},"Mapuje role v organizaci na požadované úrovně znalostí a dovedností v oblasti informační bezpečnosti — od běžného uživatele přes IT správce a manažery až po bezpečnostní specialisty.",[1040,6354,6356],{"id":6355},"rozšíření-na-dodavatelský-řetězec","Rozšíření na dodavatelský řetězec",[1015,6358,6359],{},"SAE se netýká jen interních zaměstnanců — zahrnuje i dodavatele, partnery a třetí strany s přístupem k informačním systémům. Smluvně lze požadovat doložení absolvovaného školení.",[1040,6361,6363],{"id":6362},"související-certifikace-isaca","Související certifikace ISACA",[1015,6365,6366,6367,6370,6371,6374,6375,6378,6379,6382],{},"Pro profesionály v oblasti SAE a bezpečnostního řízení: ",[1051,6368,6369],{},"CISM"," (Certified Information Security Manager), ",[1051,6372,6373],{},"CISA"," (Certified Information Systems Auditor), ",[1051,6376,6377],{},"CRISC"," (Certified in Risk and Information Systems Control), ",[1051,6380,6381],{},"CGEIT"," (Certified in Governance of Enterprise IT).",[1040,6384,2563],{"id":2562},[1045,6386,6387,6393,6399,6405],{},[1048,6388,6389,6392],{},[1019,6390,1313],{"className":6391,"dataFsResolvedFilePath":1311,"href":1312},[1022]," — SAE jako součást provozní bezpečnosti",[1048,6394,6395,6398],{},[1019,6396,3336],{"className":6397,"dataFsResolvedFilePath":1222,"href":1223},[1022]," — povědomí jako obrana č. 1",[1048,6400,6401,6404],{},[1019,6402,1850],{"className":6403,"dataFsResolvedFilePath":1848,"href":1849},[1022]," — snižování rizika lidského faktoru",[1048,6406,6407,3346],{},[1019,6408,6412],{"className":6409,"dataFsResolvedFilePath":6410,"href":6411},[1022],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","Záznam přednášky SAE",{"title":2593,"searchDepth":145,"depth":145,"links":6414},[6415,6416,6417,6418,6419,6420,6421,6422,6423],{"id":6168,"depth":145,"text":6169},{"id":6175,"depth":145,"text":6176},{"id":6278,"depth":145,"text":6279},{"id":6317,"depth":145,"text":6318},{"id":6341,"depth":145,"text":6342},{"id":6348,"depth":145,"text":6349},{"id":6355,"depth":145,"text":6356},{"id":6362,"depth":145,"text":6363},{"id":2562,"depth":145,"text":2563},[5],{},"\u002Ftopics\u002Fsae",{"title":6136,"description":2593},[6429],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[5,307,165,321,47,658],"9ygPXUfrcjQxY_kfJ3wM_ro1kNaCShu4p8WUZC4FYmI",[6434,6436],{"slug":5,"path":1024,"title":6,"snippet":6435},"… VKB), frameworky (NIST CSF, MITRE ATT&CK, OWASP, CMMC); řazeno podle oborového sektoru - \u003C\u003Cimork-glosar>> — abecední slovník ~120 zkratek a pojmů kurzu ## Záznamy přednášek ### Manažerské a str …",{"slug":6437,"path":1036,"title":6438,"snippet":6439},"imork-normy-prehled","ImorK — Přehled norem a standardů podle sektoru","… ející stránky - ImorK course hub — výchozí bod do všech 34 záznamů přednášek - \u003C\u003Cimork-glosar>> — abecední slovník zkratek a klíčových konceptů - ISMS — manažerský rámec, který …",[6441,6442,6446,6447,6448],{"slug":6437,"title":6438,"path":1036,"sharedTags":100},{"slug":6443,"title":6444,"path":6445,"sharedTags":100},"imork-detail-predmetu","Management oborových řešení — Detail předmětu","\u002Fwiki\u002Fimork-detail-predmetu",{"slug":1218,"title":5008,"path":1217,"sharedTags":145},{"slug":1156,"title":5001,"path":1105,"sharedTags":145},{"slug":2355,"title":6449,"path":1300,"sharedTags":145},"Automotive — kybernetická bezpečnost",1777893162890]