[{"data":1,"prerenderedAt":4556},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-internetova-bezpecnost":1626,"course-stats-imork":2230,"course-topics-imork":2234,"backlinks-imork-internetova-bezpecnost":4543,"related-imork-internetova-bezpecnost":4549},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2229},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":2214,"extension":661,"meta":2215,"navigation":664,"path":2216,"seo":2217,"sources":2218,"stem":2220,"tags":2221,"type":2227,"updated":677,"__hash__":2228},"summaries\u002Fsummaries\u002Fimork-internetova-bezpecnost.md","Internetová bezpečnost — cvičení",{"type":9,"value":1631,"toc":2193},[1632,1635,1644,1648,1659,1663,1726,1730,1733,1777,1781,1784,1839,1843,1851,1855,1858,1942,1946,1949,1981,1985,1989,2004,2008,2027,2031,2053,2057,2067,2071,2074,2092,2096,2103,2123,2127,2144,2148],[12,1633,1629],{"id":1634},"internetová-bezpečnost-cvičení",[724,1636,1637,1638,1643],{},"Cvičení (30 slidů, 1.8.2023) pokrývající základní koncepty bezpečnosti na internetu — od struktury kyberprostoru přes hrozby a APT skupiny až po OSINT a pravidla bezpečného chování. Součást kurzu ",[207,1639,43],{"className":1640,"href":1641,"dataFsResolvedFilePath":1642},[210],"\u002Fwiki\u002Fimork","courses\u002Fimork.md",".",[115,1645,1647],{"id":1646},"kyberprostor","Kyberprostor",[120,1649,1650,1656],{},[123,1651,1652,1655],{},[38,1653,1654],{},"Vznik pojmu",": 1983 (William Gibson), popularizace J.P. Barlow (Deklarace nezávislosti kyberprostoru)",[123,1657,1658],{},"Virtuální prostředí vytvořené propojením počítačových sítí",[198,1660,1662],{"id":1661},"vrstvy-webu","Vrstvy webu",[16,1664,1665,1678],{},[19,1666,1667],{},[22,1668,1669,1672,1675],{},[25,1670,1671],{},"Vrstva",[25,1673,1674],{},"Podíl",[25,1676,1677],{},"Charakteristika",[30,1679,1680,1693,1706],{},[22,1681,1682,1687,1690],{},[35,1683,1684],{},[38,1685,1686],{},"Surface Web",[35,1688,1689],{},"~4 %",[35,1691,1692],{},"Indexováno vyhledávači, veřejně přístupné",[22,1694,1695,1700,1703],{},[35,1696,1697],{},[38,1698,1699],{},"Deep Web",[35,1701,1702],{},"~96 %",[35,1704,1705],{},"Neindexováno — databáze, intranety, placený obsah",[22,1707,1708,1713,1716],{},[35,1709,1710],{},[38,1711,1712],{},"Dark Web",[35,1714,1715],{},"(součást Deep)",[35,1717,1718,1719,1725],{},"Přístup přes ",[207,1720,1724],{"className":1721,"href":1723},[210,1722],"wikilink-broken","\u002Fwiki\u002Fimork-tor\\","Tor",", anonymita, nelegální tržiště",[115,1727,1729],{"id":1728},"aktiva-v-kyberprostoru","Aktiva v kyberprostoru",[724,1731,1732],{},"Kategorie aktiv, která je třeba chránit:",[120,1734,1735,1741,1747,1753,1759,1765,1771],{},[123,1736,1737,1740],{},[38,1738,1739],{},"HW"," — servery, síťové prvky, koncová zařízení",[123,1742,1743,1746],{},[38,1744,1745],{},"SW"," — operační systémy, aplikace",[123,1748,1749,1752],{},[38,1750,1751],{},"Informace"," — data, databáze, zálohy",[123,1754,1755,1758],{},[38,1756,1757],{},"Lidské zdroje"," — zaměstnanci, správci, uživatelé",[123,1760,1761,1764],{},[38,1762,1763],{},"Protokoly"," — komunikační a síťové protokoly",[123,1766,1767,1770],{},[38,1768,1769],{},"Služby"," — webové, emailové, cloudové",[123,1772,1773,1776],{},[38,1774,1775],{},"Infrastruktura"," — budovy, napájení, klimatizace",[115,1778,1780],{"id":1779},"hrozby","Hrozby",[724,1782,1783],{},"Klasifikace hrozeb podle typu:",[120,1785,1786,1792,1798,1804,1810,1816,1822,1833],{},[123,1787,1788,1791],{},[38,1789,1790],{},"Fyzické"," — krádež, sabotáž, vandalismus",[123,1793,1794,1797],{},[38,1795,1796],{},"Katastrofy"," — přírodní (povodeň, požár) i lidské",[123,1799,1800,1803],{},[38,1801,1802],{},"Poruchy"," — selhání HW, SW chyby",[123,1805,1806,1809],{},[38,1807,1808],{},"Výpadky"," — ztráta konektivity, napájení",[123,1811,1812,1815],{},[38,1813,1814],{},"Poškození"," — korupce dat, degradace",[123,1817,1818,1821],{},[38,1819,1820],{},"Zneužití"," — neoprávněný přístup, eskalace práv",[123,1823,1824,1827,1828,1832],{},[38,1825,1826],{},"Odposlech"," — ",[207,1829,1831],{"className":1830,"href":425,"dataFsResolvedFilePath":424},[210],"sniffing",", man-in-the-middle",[123,1834,1835,1838],{},[38,1836,1837],{},"Právní"," — nesoulad s legislativou, sankce",[198,1840,1842],{"id":1841},"eset-top-10-hrozeb-čr-2019","ESET Top 10 hrozeb ČR (2019)",[724,1844,1845,1846,1850],{},"Přehled nejčastějších ",[207,1847,1849],{"className":1848,"href":577,"dataFsResolvedFilePath":576},[210],"kybernetických hrozeb"," detekovaných v České republice podle společnosti ESET.",[115,1852,1854],{"id":1853},"apt-skupiny","APT skupiny",[724,1856,1857],{},"Advanced Persistent Threat — sofistikované státem sponzorované skupiny:",[16,1859,1860,1876],{},[19,1861,1862],{},[22,1863,1864,1867,1870,1873],{},[25,1865,1866],{},"Skupina",[25,1868,1869],{},"Alias",[25,1871,1872],{},"Původ",[25,1874,1875],{},"Zaměření",[30,1877,1878,1894,1910,1926],{},[22,1879,1880,1885,1888,1891],{},[35,1881,1882],{},[38,1883,1884],{},"APT28",[35,1886,1887],{},"Fancy Bear",[35,1889,1890],{},"Rusko (GRU)",[35,1892,1893],{},"NATO, politické cíle",[22,1895,1896,1901,1904,1907],{},[35,1897,1898],{},[38,1899,1900],{},"APT29",[35,1902,1903],{},"Cozy Bear",[35,1905,1906],{},"Rusko (SVR)",[35,1908,1909],{},"Vládní instituce, výzkum",[22,1911,1912,1917,1920,1923],{},[35,1913,1914],{},[38,1915,1916],{},"APT34",[35,1918,1919],{},"OilRig",[35,1921,1922],{},"Írán",[35,1924,1925],{},"Blízký východ, energetika",[22,1927,1928,1933,1936,1939],{},[35,1929,1930],{},[38,1931,1932],{},"APT37",[35,1934,1935],{},"Reaper",[35,1937,1938],{},"Severní Korea",[35,1940,1941],{},"Jižní Korea, dezertéři",[115,1943,1945],{"id":1944},"osint-open-source-intelligence","OSINT (Open Source Intelligence)",[724,1947,1948],{},"Zpravodajství z otevřených zdrojů — 5 procesních kroků:",[152,1950,1951,1957,1963,1969,1975],{},[123,1952,1953,1956],{},[38,1954,1955],{},"Identifikace"," — definice cíle a požadavků",[123,1958,1959,1962],{},[38,1960,1961],{},"Sběr"," — shromáždění dat z otevřených zdrojů",[123,1964,1965,1968],{},[38,1966,1967],{},"Zpracování"," — třídění, čištění, strukturování",[123,1970,1971,1974],{},[38,1972,1973],{},"Analýza"," — vyhodnocení, korelace, interpretace",[123,1976,1977,1980],{},[38,1978,1979],{},"Report"," — prezentace výsledků, doporučení",[115,1982,1984],{"id":1983},"pravidla-bezpečného-chování","Pravidla bezpečného chování",[198,1986,1988],{"id":1987},"komunikační-opatření","Komunikační opatření",[120,1990,1991,1994,1997],{},[123,1992,1993],{},"Ověřování identity komunikačních partnerů",[123,1995,1996],{},"Opatrnost při sdílení osobních údajů",[123,1998,1999,2000],{},"Rozpoznávání phishingu a ",[207,2001,2003],{"className":2002,"href":359,"dataFsResolvedFilePath":358},[210],"podvodných emailů",[198,2005,2007],{"id":2006},"technická-opatření","Technická opatření",[120,2009,2010,2013,2016,2019],{},[123,2011,2012],{},"Aktualizace SW a OS",[123,2014,2015],{},"Používání antivirového řešení",[123,2017,2018],{},"Šifrování komunikace",[123,2020,2021,2022,2026],{},"Bezpečné ",[207,2023,2025],{"className":2024,"href":485,"dataFsResolvedFilePath":484},[210],"hesla"," a vícefaktorová autentizace",[115,2028,2030],{"id":2029},"kracks-key-reinstallation-attacks","KRACKs (Key Reinstallation Attacks)",[120,2032,2033,2040,2043,2046],{},[123,2034,2035,2036,2039],{},"Zranitelnost protokolu ",[38,2037,2038],{},"WPA2"," (2017)",[123,2041,2042],{},"Umožňuje odposlech šifrované WiFi komunikace",[123,2044,2045],{},"Útočník vynucuje reinstalaci šifrovacího klíče",[123,2047,2048,2049],{},"Propojení s ",[207,2050,2052],{"className":2051,"href":350,"dataFsResolvedFilePath":349},[210],"bezpečností webových služeb",[115,2054,2056],{"id":2055},"núkib","NÚKIB",[724,2058,2059,2062,2063,1643],{},[38,2060,2061],{},"Národní úřad pro kybernetickou a informační bezpečnost"," — ústřední orgán státní správy ČR pro ",[207,2064,2066],{"className":2065,"href":577,"dataFsResolvedFilePath":576},[210],"kybernetickou bezpečnost",[115,2068,2070],{"id":2069},"nist-sp-800-63-politika-hesel","NIST SP 800-63 — Politika hesel",[724,2072,2073],{},"Moderní doporučení pro správu hesel dle NIST:",[120,2075,2076,2079,2082,2085],{},[123,2077,2078],{},"Minimální délka místo složitých pravidel",[123,2080,2081],{},"Kontrola proti slovníkům kompromitovaných hesel",[123,2083,2084],{},"Odstranění požadavku na pravidelnou změnu hesla",[123,2086,2087,2088],{},"Souvisí s ",[207,2089,2091],{"className":2090,"href":485,"dataFsResolvedFilePath":484},[210],"správou privilegovaných účtů",[115,2093,2095],{"id":2094},"_11-požadavků-na-správu-privilegovaných-účtů","11 požadavků na správu privilegovaných účtů",[724,2097,2098,2099,2102],{},"Požadavky na bezpečné řízení účtů se zvýšenými oprávněními — shodné s obsahem ",[207,2100,486],{"className":2101,"href":485,"dataFsResolvedFilePath":484},[210],":",[120,2104,2105,2108,2111,2114,2117,2120],{},[123,2106,2107],{},"Inventarizace privilegovaných účtů",[123,2109,2110],{},"Princip nejmenšího oprávnění",[123,2112,2113],{},"Vícefaktorová autentizace",[123,2115,2116],{},"Monitoring a audit aktivit",[123,2118,2119],{},"Automatická rotace hesel",[123,2121,2122],{},"Oddělení povinností",[115,2124,2126],{"id":2125},"behaviorální-biometrika","Behaviorální biometrika",[120,2128,2129,2132,2135,2138],{},[123,2130,2131],{},"Identifikace uživatele na základě vzorců chování",[123,2133,2134],{},"Dynamika psaní na klávesnici, pohyb myši, gesta na dotykovém displeji",[123,2136,2137],{},"Kontinuální autentizace bez nutnosti aktivního zásahu uživatele",[123,2139,2048,2140],{},[207,2141,2143],{"className":2142,"href":545,"dataFsResolvedFilePath":544},[210],"digitální identitou",[115,2145,2147],{"id":2146},"souvislosti","Souvislosti",[120,2149,2150,2157,2163,2169,2176,2182,2188],{},[123,2151,2152,2156],{},[207,2153,2155],{"className":2154,"href":350,"dataFsResolvedFilePath":349},[210],"Bezpečnost WWW"," — webové hrozby a ochrana",[123,2158,2159,2162],{},[207,2160,360],{"className":2161,"href":359,"dataFsResolvedFilePath":358},[210]," — phishing, spam, malware",[123,2164,2165,2168],{},[207,2166,486],{"className":2167,"href":485,"dataFsResolvedFilePath":484},[210]," — hesla a privilegované účty",[123,2170,2171,2175],{},[207,2172,2174],{"className":2173,"href":503,"dataFsResolvedFilePath":502},[210],"Tor a anonymita"," — Dark Web",[123,2177,2178,2181],{},[207,2179,426],{"className":2180,"href":425,"dataFsResolvedFilePath":424},[210]," — technické aspekty hrozeb",[123,2183,2184,2187],{},[207,2185,369],{"className":2186,"href":602,"dataFsResolvedFilePath":601},[210]," — legislativní rámec",[123,2189,2190,561],{},[207,2191,140],{"className":2192,"href":560,"dataFsResolvedFilePath":559},[210],{"title":641,"searchDepth":642,"depth":642,"links":2194},[2195,2198,2199,2202,2203,2204,2208,2209,2210,2211,2212,2213],{"id":1646,"depth":642,"text":1647,"children":2196},[2197],{"id":1661,"depth":649,"text":1662},{"id":1728,"depth":642,"text":1729},{"id":1779,"depth":642,"text":1780,"children":2200},[2201],{"id":1841,"depth":649,"text":1842},{"id":1853,"depth":642,"text":1854},{"id":1944,"depth":642,"text":1945},{"id":1983,"depth":642,"text":1984,"children":2205},[2206,2207],{"id":1987,"depth":649,"text":1988},{"id":2006,"depth":649,"text":2007},{"id":2029,"depth":642,"text":2030},{"id":2055,"depth":642,"text":2056},{"id":2069,"depth":642,"text":2070},{"id":2094,"depth":642,"text":2095},{"id":2125,"depth":642,"text":2126},{"id":2146,"depth":642,"text":2147},"Cvičení (30 slidů, 1.8.2023) pokrývající základní koncepty bezpečnosti na internetu — od struktury kyberprostoru přes hrozby a APT skupiny až po OSINT a pravidla bezpečného chování. Součást kurzu ImorK.",{},"\u002Fsummaries\u002Fimork-internetova-bezpecnost",{"title":1629,"description":2214},[2219],"raw\u002Fimork\u002FCV 01 VUT_Bezp_Internetová bezpečnost-2023.pdf","summaries\u002Fimork-internetova-bezpecnost",[658,2222,2223,2224,2225,1646,2226],"internet","bezpecnost","osint","apt","cviceni","summary","5FrB-vL0Z6h-XYH925Yrg9JaBAEsTtTw5Uqw9fv7y6U","summaries",{"zapisku":1624,"topics":2231,"summaries":2232,"outputs":2233},6,35,0,[2235,2722,3220,3669,3948,4296],{"id":2236,"title":2237,"body":2238,"course":659,"courses":2706,"created":660,"description":641,"extension":661,"meta":2707,"navigation":664,"path":2708,"seo":2709,"sources":2710,"stem":2713,"tags":2714,"type":2720,"updated":677,"__hash__":2721},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2239,"toc":2693},[2240,2243,2251,2254,2258,2352,2356,2410,2414,2437,2441,2530,2534,2537,2541,2618,2622,2648,2652,2672,2679],[12,2241,2237],{"id":2242},"bcm-řízení-kontinuity-činnosti",[724,2244,2245],{},[2246,2247],"img",{"alt":2248,"className":2249,"src":2250},"bcm-rpo-rto",[210,1722],"\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2252,2253],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2255,2257],{"id":2256},"klíčové-pojmy","Klíčové pojmy",[16,2259,2260,2273],{},[19,2261,2262],{},[22,2263,2264,2267,2270],{},[25,2265,2266],{},"Pojem",[25,2268,2269],{},"Anglicky",[25,2271,2272],{},"Popis",[30,2274,2275,2288,2300,2313,2326,2339],{},[22,2276,2277,2282,2285],{},[35,2278,2279],{},[38,2280,2281],{},"BCMS",[35,2283,2284],{},"Business Continuity Management System",[35,2286,2287],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2289,2290,2294,2297],{},[35,2291,2292],{},[38,2293,384],{},[35,2295,2296],{},"Business Continuity Management",[35,2298,2299],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2301,2302,2307,2310],{},[35,2303,2304],{},[38,2305,2306],{},"BIA",[35,2308,2309],{},"Business Impact Analysis",[35,2311,2312],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2314,2315,2320,2323],{},[35,2316,2317],{},[38,2318,2319],{},"MBCO",[35,2321,2322],{},"Minimum Business Continuity Objective",[35,2324,2325],{},"Minimální přijatelná úroveň služeb",[22,2327,2328,2333,2336],{},[35,2329,2330],{},[38,2331,2332],{},"RPO",[35,2334,2335],{},"Recovery Point Objective",[35,2337,2338],{},"Do jakého bodu v minulosti lze obnovit data",[22,2340,2341,2346,2349],{},[35,2342,2343],{},[38,2344,2345],{},"RTO",[35,2347,2348],{},"Recovery Time Objective",[35,2350,2351],{},"Čas potřebný pro obnovu provozu",[115,2353,2355],{"id":2354},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2357,2358,2368],{},[19,2359,2360],{},[22,2361,2362,2365],{},[25,2363,2364],{},"Fáze",[25,2366,2367],{},"Obsah",[30,2369,2370,2380,2390,2400],{},[22,2371,2372,2377],{},[35,2373,2374],{},[38,2375,2376],{},"Plan",[35,2378,2379],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2381,2382,2387],{},[35,2383,2384],{},[38,2385,2386],{},"Do",[35,2388,2389],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2391,2392,2397],{},[35,2393,2394],{},[38,2395,2396],{},"Check",[35,2398,2399],{},"Monitoring, audit, přezkoumání managementem",[22,2401,2402,2407],{},[35,2403,2404],{},[38,2405,2406],{},"Act",[35,2408,2409],{},"Nápravná opatření, neustálé zlepšování",[115,2411,2413],{"id":2412},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2415,2416,2419,2422,2425,2428,2431,2434],{},[123,2417,2418],{},"Kap. 4 — kontext organizace",[123,2420,2421],{},"Kap. 5 — vedení (leadership)",[123,2423,2424],{},"Kap. 6 — plánování (BIA, rizika)",[123,2426,2427],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2429,2430],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2432,2433],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2435,2436],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2438,2440],{"id":2439},"analýza-steeple","Analýza STEEPLE",[16,2442,2443,2453],{},[19,2444,2445],{},[22,2446,2447,2450],{},[25,2448,2449],{},"Faktor",[25,2451,2452],{},"Oblast",[30,2454,2455,2466,2477,2488,2498,2509,2520],{},[22,2456,2457,2463],{},[35,2458,2459,2462],{},[38,2460,2461],{},"S","ociální",[35,2464,2465],{},"Zaměstnanost, bezpečnost, komunity",[22,2467,2468,2474],{},[35,2469,2470,2473],{},[38,2471,2472],{},"T","echnologický",[35,2475,2476],{},"Závislost na technologiích",[22,2478,2479,2485],{},[35,2480,2481,2484],{},[38,2482,2483],{},"E","konomický",[35,2486,2487],{},"Ekonomická situace, finanční instituce",[22,2489,2490,2495],{},[35,2491,2492,2494],{},[38,2493,2483],{},"tický",[35,2496,2497],{},"Podnikatelská etika, média, veřejnost",[22,2499,2500,2506],{},[35,2501,2502,2505],{},[38,2503,2504],{},"P","olitický",[35,2507,2508],{},"Politický systém, hrozba nepokojů",[22,2510,2511,2517],{},[35,2512,2513,2516],{},[38,2514,2515],{},"L","egislativní",[35,2518,2519],{},"Předpisy, zákony",[22,2521,2522,2527],{},[35,2523,2524,2526],{},[38,2525,2483],{},"nvironmentální",[35,2528,2529],{},"Životní prostředí, přírodní hrozby",[115,2531,2533],{"id":2532},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2535,2536],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2538,2540],{"id":2539},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2542,2543,2552],{},[19,2544,2545],{},[22,2546,2547,2550],{},[25,2548,2549],{},"Tier",[25,2551,2272],{},[30,2553,2554,2562,2570,2578,2586,2594,2602,2610],{},[22,2555,2556,2559],{},[35,2557,2558],{},"0",[35,2560,2561],{},"Žádná off-site data",[22,2563,2564,2567],{},[35,2565,2566],{},"1",[35,2568,2569],{},"Fyzická záloha + cold site",[22,2571,2572,2575],{},[35,2573,2574],{},"2",[35,2576,2577],{},"Fyzická záloha + hot site",[22,2579,2580,2583],{},[35,2581,2582],{},"3",[35,2584,2585],{},"Elektronický trezor (electronic vaulting)",[22,2587,2588,2591],{},[35,2589,2590],{},"4",[35,2592,2593],{},"Point-in-time recovery",[22,2595,2596,2599],{},[35,2597,2598],{},"5",[35,2600,2601],{},"Two-site commit (kontinuální přenos)",[22,2603,2604,2607],{},[35,2605,2606],{},"6",[35,2608,2609],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2611,2612,2615],{},[35,2613,2614],{},"7",[35,2616,2617],{},"Automatizovaná obnova (AI monitoring)",[198,2619,2621],{"id":2620},"cloud-dr","Cloud DR",[120,2623,2624,2630,2636,2642],{},[123,2625,2626,2629],{},[38,2627,2628],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2631,2632,2635],{},[38,2633,2634],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2637,2638,2641],{},[38,2639,2640],{},"Hot DR"," — paralelní řešení v tandemu",[123,2643,2644,2647],{},[38,2645,2646],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2649,2651],{"id":2650},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2653,2654,2660,2666],{},[123,2655,2656,2659],{},[207,2657,140],{"className":2658,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2661,2662,2665],{},[207,2663,569],{"className":2664,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2667,2668,2671],{},[207,2669,578],{"className":2670,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2673,2675,2676],{"id":2674},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2677,43],{"className":2678,"dataFsResolvedFilePath":1642,"href":1641},[210],[120,2680,2681,2687],{},[123,2682,2683],{},[207,2684,2686],{"className":2685,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2688,2689],{},[207,2690,2692],{"className":2691,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2694},[2695,2696,2697,2698,2699,2703,2704],{"id":2256,"depth":642,"text":2257},{"id":2354,"depth":642,"text":2355},{"id":2412,"depth":642,"text":2413},{"id":2439,"depth":642,"text":2440},{"id":2532,"depth":642,"text":2533,"children":2700},[2701,2702],{"id":2539,"depth":649,"text":2540},{"id":2620,"depth":649,"text":2621},{"id":2650,"depth":642,"text":2651},{"id":2674,"depth":642,"text":2705},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2237,"description":641},[2711,2712],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2715,2716,2717,2718,2719],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2723,"title":2724,"body":2725,"course":659,"courses":3207,"created":660,"description":641,"extension":661,"meta":3208,"navigation":664,"path":3209,"seo":3210,"sources":3211,"stem":3214,"tags":3215,"type":2720,"updated":677,"__hash__":3219},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2726,"toc":3192},[2727,2730,2737,2744,2747,2751,2818,2822,2826,2884,2888,2908,2912,2916,3017,3021,3044,3048,3070,3074,3081,3137,3139,3170,3175],[12,2728,2724],{"id":2729},"isms-systém-řízení-bezpečnosti-informací",[724,2731,2732],{},[2246,2733],{"alt":2734,"className":2735,"src":2736},"isms-pdca-cyklus",[210,1722],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2738,2739],{},[2246,2740],{"alt":2741,"className":2742,"src":2743},"isms-oborova-mapa",[210,1722],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2745,2746],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2748,2750],{"id":2749},"základní-pilíře","Základní pilíře",[16,2752,2753,2764],{},[19,2754,2755],{},[22,2756,2757,2760,2762],{},[25,2758,2759],{},"Pilíř",[25,2761,2269],{},[25,2763,2272],{},[30,2765,2766,2779,2792,2805],{},[22,2767,2768,2773,2776],{},[35,2769,2770],{},[38,2771,2772],{},"Důvěrnost",[35,2774,2775],{},"Confidentiality",[35,2777,2778],{},"Přístup pouze oprávněným osobám",[22,2780,2781,2786,2789],{},[35,2782,2783],{},[38,2784,2785],{},"Integrita",[35,2787,2788],{},"Integrity",[35,2790,2791],{},"Ochrana před neoprávněnou změnou",[22,2793,2794,2799,2802],{},[35,2795,2796],{},[38,2797,2798],{},"Dostupnost",[35,2800,2801],{},"Availability",[35,2803,2804],{},"Systémy a data dostupné v potřebný čas",[22,2806,2807,2812,2815],{},[35,2808,2809],{},[38,2810,2811],{},"Nepopiratelnost",[35,2813,2814],{},"Non-repudiation",[35,2816,2817],{},"Prokázání autorství akce",[115,2819,2821],{"id":2820},"normativní-rámec","Normativní rámec",[198,2823,2825],{"id":2824},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2827,2828,2834,2840,2850,2856,2866,2875],{},[123,2829,2830,2833],{},[38,2831,2832],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2835,2836,2839],{},[38,2837,2838],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2841,2842,1827,2845,2849],{},[38,2843,2844],{},"ISO\u002FIEC 27005",[207,2846,2848],{"className":2847,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2851,2852,2855],{},[38,2853,2854],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2857,2858,2861,2862],{},[38,2859,2860],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2863,2865],{"className":2864,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2867,2868,2861,2871],{},[38,2869,2870],{},"ISO\u002FIEC 27019",[207,2872,2874],{"className":2873,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2876,2877,2861,2880],{},[38,2878,2879],{},"ISO\u002FIEC 27799",[207,2881,2883],{"className":2882,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2885,2887],{"id":2886},"další-rámce","Další rámce",[120,2889,2890,2896,2902],{},[123,2891,2892,2895],{},[38,2893,2894],{},"NIST"," — americké standardy (SP 800 řada)",[123,2897,2898,2901],{},[38,2899,2900],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2903,2904,2907],{},[38,2905,2906],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2909,2911],{"id":2910},"governance-řízení","Governance (řízení)",[198,2913,2915],{"id":2914},"bezpečnostní-role","Bezpečnostní role",[16,2917,2918,2930],{},[19,2919,2920],{},[22,2921,2922,2925,2927],{},[25,2923,2924],{},"Role",[25,2926,40],{},[25,2928,2929],{},"Odpovědnost",[30,2931,2932,2943,2954,2965,2976,2987,2997,3007],{},[22,2933,2934,2937,2940],{},[35,2935,2936],{},"Chief Information Officer",[35,2938,2939],{},"CIO",[35,2941,2942],{},"Celkové řízení ICT",[22,2944,2945,2948,2951],{},[35,2946,2947],{},"Chief Information Security Officer",[35,2949,2950],{},"CISO",[35,2952,2953],{},"Řízení informační bezpečnosti",[22,2955,2956,2959,2962],{},[35,2957,2958],{},"Chief Technology Officer",[35,2960,2961],{},"CTO",[35,2963,2964],{},"Technologická strategie",[22,2966,2967,2970,2973],{},[35,2968,2969],{},"IS Security Officer",[35,2971,2972],{},"ISSO",[35,2974,2975],{},"Bezpečnost IS",[22,2977,2978,2981,2984],{},[35,2979,2980],{},"Manažer KB",[35,2982,2983],{},"—",[35,2985,2986],{},"Odpovědný za ISMS",[22,2988,2989,2992,2994],{},[35,2990,2991],{},"Architekt KB",[35,2993,2983],{},[35,2995,2996],{},"Návrh a implementace opatření",[22,2998,2999,3002,3004],{},[35,3000,3001],{},"Auditor KB",[35,3003,2983],{},[35,3005,3006],{},"Provádění auditů",[22,3008,3009,3012,3014],{},[35,3010,3011],{},"Garant aktiva",[35,3013,2983],{},[35,3015,3016],{},"Rozvoj, použití a bezpečnost aktiva",[198,3018,3020],{"id":3019},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,3022,3023,3029,3038],{},[123,3024,3025,3028],{},[38,3026,3027],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,3030,3031,3034,3035],{},[38,3032,3033],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3036,240],{"className":3037,"dataFsResolvedFilePath":585,"href":586},[210],[123,3039,3040,3043],{},[38,3041,3042],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3045,3047],{"id":3046},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3049,3050,3055,3060,3065],{},[123,3051,3052,3054],{},[38,3053,2376],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3056,3057,3059],{},[38,3058,2386],{}," — implementace opatření, řízení rizik",[123,3061,3062,3064],{},[38,3063,2396],{}," — monitorování, audit, přezkoumání",[123,3066,3067,3069],{},[38,3068,2406],{}," — nápravná opatření, neustálé zlepšování",[115,3071,3073],{"id":3072},"oborová-řešení-isms","Oborová řešení ISMS",[724,3075,3076,3077,3080],{},"Kurz ",[207,3078,43],{"className":3079,"dataFsResolvedFilePath":1642,"href":1641},[210]," pokrývá ISMS specifika pro:",[120,3082,3083,3089,3095,3102,3108,3115,3121,3127,3132],{},[123,3084,3085],{},[207,3086,3088],{"className":3087,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3090,3091,3094],{},[207,3092,282],{"className":3093,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3096,3097,3101],{},[207,3098,3100],{"className":3099,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3103,3104,3107],{},[207,3105,300],{"className":3106,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3109,3110,3114],{},[207,3111,3113],{"className":3112,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3116,3117,3120],{},[207,3118,318],{"className":3119,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3122,3123,3126],{},[207,3124,327],{"className":3125,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3128,3129],{},[207,3130,336],{"className":3131,"dataFsResolvedFilePath":334,"href":335},[210],[123,3133,3134],{},[207,3135,273],{"className":3136,"dataFsResolvedFilePath":271,"href":272},[210],[115,3138,2651],{"id":2650},[120,3140,3141,3147,3152,3158,3164],{},[123,3142,3143,3146],{},[207,3144,569],{"className":3145,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3148,3149,587],{},[207,3150,240],{"className":3151,"dataFsResolvedFilePath":585,"href":586},[210],[123,3153,3154,3157],{},[207,3155,384],{"className":3156,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3159,3160,3163],{},[207,3161,578],{"className":3162,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3165,3166,3169],{},[207,3167,369],{"className":3168,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3171,2675,3172],{"id":2674},[207,3173,43],{"className":3174,"dataFsResolvedFilePath":1642,"href":1641},[210],[120,3176,3177,3182,3187],{},[123,3178,3179],{},[207,3180,222],{"className":3181,"dataFsResolvedFilePath":220,"href":221},[210],[123,3183,3184],{},[207,3185,249],{"className":3186,"dataFsResolvedFilePath":247,"href":248},[210],[123,3188,3189],{},[207,3190,231],{"className":3191,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3193},[3194,3195,3199,3203,3204,3205,3206],{"id":2749,"depth":642,"text":2750},{"id":2820,"depth":642,"text":2821,"children":3196},[3197,3198],{"id":2824,"depth":649,"text":2825},{"id":2886,"depth":649,"text":2887},{"id":2910,"depth":642,"text":2911,"children":3200},[3201,3202],{"id":2914,"depth":649,"text":2915},{"id":3019,"depth":649,"text":3020},{"id":3046,"depth":642,"text":3047},{"id":3072,"depth":642,"text":3073},{"id":2650,"depth":642,"text":2651},{"id":2674,"depth":642,"text":2705},[658],{},"\u002Ftopics\u002Fisms",{"title":2724,"description":641},[3212,3213,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3216,3217,672,3218],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3221,"title":578,"body":3222,"course":659,"courses":3655,"created":660,"description":641,"extension":661,"meta":3656,"navigation":664,"path":3657,"seo":3658,"sources":3659,"stem":3662,"tags":3663,"type":2720,"updated":677,"__hash__":3668},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3223,"toc":3641},[3224,3227,3234,3241,3245,3283,3287,3291,3333,3337,3344,3347,3373,3377,3394,3398,3429,3433,3501,3505,3508,3525,3529,3567,3569,3606,3611],[12,3225,578],{"id":3226},"kybernetická-bezpečnost",[724,3228,3229],{},[2246,3230],{"alt":3231,"className":3232,"src":3233},"kb-defense-in-depth",[210,1722],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3235,3236,3237,3240],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3238,140],{"className":3239,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3242,3244],{"id":3243},"základní-pojmy","Základní pojmy",[120,3246,3247,3253,3259,3265,3271,3277],{},[123,3248,3249,3252],{},[38,3250,3251],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3254,3255,3258],{},[38,3256,3257],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3260,3261,3264],{},[38,3262,3263],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3266,3267,3270],{},[38,3268,3269],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3272,3273,3276],{},[38,3274,3275],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3278,3279,3282],{},[38,3280,3281],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3284,3286],{"id":3285},"typy-útoků","Typy útoků",[198,3288,3290],{"id":3289},"podle-cílení","Podle cílení",[16,3292,3293,3305],{},[19,3294,3295],{},[22,3296,3297,3300,3302],{},[25,3298,3299],{},"Typ",[25,3301,2272],{},[25,3303,3304],{},"Cíl",[30,3306,3307,3320],{},[22,3308,3309,3314,3317],{},[35,3310,3311],{},[38,3312,3313],{},"Plošný",[35,3315,3316],{},"Útočníkovi je jedno, kdo je obětí",[35,3318,3319],{},"Botnety, spam, ransomware",[22,3321,3322,3327,3330],{},[35,3323,3324],{},[38,3325,3326],{},"Cílený (APT)",[35,3328,3329],{},"Soustředěná pozornost na konkrétní cíl",[35,3331,3332],{},"Špionáž, sabotáž, krádež dat",[198,3334,3336],{"id":3335},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3338,3339],{},[2246,3340],{"alt":3341,"className":3342,"src":3343},"apt-faze-utoku",[210,1722],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3345,3346],{},"4 fáze:",[152,3348,3349,3355,3361,3367],{},[123,3350,3351,3354],{},[38,3352,3353],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3356,3357,3360],{},[38,3358,3359],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3362,3363,3366],{},[38,3364,3365],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3368,3369,3372],{},[38,3370,3371],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3374,3376],{"id":3375},"základní-vektory-útoku","Základní vektory útoku",[120,3378,3379,3382,3385,3388,3391],{},[123,3380,3381],{},"Email s přílohou (spear phishing)",[123,3383,3384],{},"Trojanizované aplikace",[123,3386,3387],{},"Drive-by download (webové exploity)",[123,3389,3390],{},"Výměnná média (BadUSB)",[123,3392,3393],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3395,3397],{"id":3396},"software-útoky","Software útoky",[120,3399,3400,3406,3412,3418,3423],{},[123,3401,3402,3405],{},[38,3403,3404],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3407,3408,3411],{},[38,3409,3410],{},"Viry"," — poškození HW\u002FSW",[123,3413,3414,3417],{},[38,3415,3416],{},"Trojské koně"," — skrytá funkčnost",[123,3419,3420,3422],{},[38,3421,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3424,3425,3428],{},[38,3426,3427],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3430,3432],{"id":3431},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3434,3435,3447],{},[19,3436,3437],{},[22,3438,3439,3442,3444],{},[25,3440,3441],{},"Útok",[25,3443,3304],{},[25,3445,3446],{},"Efekt",[30,3448,3449,3460,3470,3481,3491],{},[22,3450,3451,3454,3457],{},[35,3452,3453],{},"Content Spoofing",[35,3455,3456],{},"Klient",[35,3458,3459],{},"Ztráta přihlašovacích údajů",[22,3461,3462,3465,3467],{},[35,3463,3464],{},"XSS",[35,3466,3456],{},[35,3468,3469],{},"Přístup k cookies",[22,3471,3472,3475,3478],{},[35,3473,3474],{},"SQL Injection",[35,3476,3477],{},"Server",[35,3479,3480],{},"Neoprávněný přístup do DB",[22,3482,3483,3486,3488],{},[35,3484,3485],{},"DoS\u002FDDoS",[35,3487,3477],{},[35,3489,3490],{},"Nedostupnost služby",[22,3492,3493,3496,3498],{},[35,3494,3495],{},"Path Traversal",[35,3497,3477],{},[35,3499,3500],{},"Přístup k souborům",[115,3502,3504],{"id":3503},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3506,3507],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3509,3510,3513,3516,3519,3522],{},[123,3511,3512],{},"Vydávání se za právníka",[123,3514,3515],{},"Podvod na CEO",[123,3517,3518],{},"Krádež dat (personální oddělení)",[123,3520,3521],{},"Kompromitace účtu",[123,3523,3524],{},"Falešné faktury",[115,3526,3528],{"id":3527},"obranné-technologie","Obranné technologie",[120,3530,3531,3537,3543,3549,3555,3561],{},[123,3532,3533,3536],{},[38,3534,3535],{},"NAC"," — řízení přístupu k síti",[123,3538,3539,3542],{},[38,3540,3541],{},"IDS"," — detekce průniku (pasivní)",[123,3544,3545,3548],{},[38,3546,3547],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3550,3551,3554],{},[38,3552,3553],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3556,3557,3560],{},[38,3558,3559],{},"DLP"," — prevence úniku dat",[123,3562,3563,3566],{},[38,3564,3565],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3568,2651],{"id":2650},[120,3570,3571,3577,3583,3589,3600],{},[123,3572,3573,3576],{},[207,3574,140],{"className":3575,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3578,3579,3582],{},[207,3580,569],{"className":3581,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3584,3585,3588],{},[207,3586,240],{"className":3587,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3590,3591,3594,3595,3599],{},[207,3592,384],{"className":3593,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3596,3598],{"className":3597,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3601,3602,3605],{},[207,3603,369],{"className":3604,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3607,2675,3608],{"id":2674},[207,3609,43],{"className":3610,"dataFsResolvedFilePath":1642,"href":1641},[210],[120,3612,3613,3619,3624,3629,3634],{},[123,3614,3615],{},[207,3616,3618],{"className":3617,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3620,3621],{},[207,3622,417],{"className":3623,"dataFsResolvedFilePath":415,"href":416},[210],[123,3625,3626],{},[207,3627,351],{"className":3628,"dataFsResolvedFilePath":349,"href":350},[210],[123,3630,3631],{},[207,3632,426],{"className":3633,"dataFsResolvedFilePath":424,"href":425},[210],[123,3635,3636],{},[207,3637,458],{"className":3638,"dataFsResolvedFilePath":3639,"href":3640},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3642},[3643,3644,3650,3651,3652,3653,3654],{"id":3243,"depth":642,"text":3244},{"id":3285,"depth":642,"text":3286,"children":3645},[3646,3647,3648,3649],{"id":3289,"depth":649,"text":3290},{"id":3335,"depth":649,"text":3336},{"id":3375,"depth":649,"text":3376},{"id":3396,"depth":649,"text":3397},{"id":3431,"depth":642,"text":3432},{"id":3503,"depth":642,"text":3504},{"id":3527,"depth":642,"text":3528},{"id":2650,"depth":642,"text":2651},{"id":2674,"depth":642,"text":2705},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3660,3661,3212],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3664,2225,3665,3666,3667],"utoky","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3670,"title":369,"body":3671,"course":659,"courses":3931,"created":660,"description":641,"extension":661,"meta":3932,"navigation":664,"path":3933,"seo":3934,"sources":3935,"stem":3939,"tags":3940,"type":2720,"updated":677,"__hash__":3947},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3672,"toc":3917},[3673,3676,3683,3686,3690,3749,3753,3757,3768,3772,3783,3787,3795,3799,3810,3814,3819,3823,3834,3838,3858,3860,3892,3897],[12,3674,369],{"id":3675},"ochrana-dat",[724,3677,3678],{},[2246,3679],{"alt":3680,"className":3681,"src":3682},"ochrana-dat-technologie",[210,1722],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3684,3685],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3687,3689],{"id":3688},"formy-zneužití-dat","Formy zneužití dat",[16,3691,3692,3701],{},[19,3693,3694],{},[22,3695,3696,3699],{},[25,3697,3698],{},"Forma",[25,3700,2272],{},[30,3702,3703,3710,3718,3725,3733,3741],{},[22,3704,3705,3708],{},[35,3706,3707],{},"Zašifrování",[35,3709,435],{},[22,3711,3712,3715],{},[35,3713,3714],{},"Zveřejnění",[35,3716,3717],{},"Double ransomware",[22,3719,3720,3722],{},[35,3721,1826],{},[35,3723,3724],{},"Pasivní sběr dat",[22,3726,3727,3730],{},[35,3728,3729],{},"Krádež",[35,3731,3732],{},"Cílená exfiltrace",[22,3734,3735,3738],{},[35,3736,3737],{},"Krádež dodavatelského řetězce",[35,3739,3740],{},"Triple ransomware",[22,3742,3743,3746],{},[35,3744,3745],{},"Prodej",[35,3747,3748],{},"Darknet marketplace",[115,3750,3752],{"id":3751},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3754,3756],{"id":3755},"nac-network-access-control","NAC (Network Access Control)",[120,3758,3759,3762,3765],{},[123,3760,3761],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3763,3764],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3766,3767],{},"Ekvivalenty: MDM, BYOD",[198,3769,3771],{"id":3770},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3773,3774,3777,3780],{},[123,3775,3776],{},"Monitoruje síťový provoz, generuje alerty",[123,3778,3779],{},"Pasivní systém — nezasahuje do provozu",[123,3781,3782],{},"Signaturová a anomální detekce",[198,3784,3786],{"id":3785},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3788,3789,3792],{},[123,3790,3791],{},"Aktivní systém — blokuje škodlivý provoz",[123,3793,3794],{},"Zařazen přímo do síťové cesty (in-line)",[198,3796,3798],{"id":3797},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3800,3801,3804,3807],{},[123,3802,3803],{},"Centralizovaná správa bezpečnostních logů",[123,3805,3806],{},"Sběr s agentem i bez agenta",[123,3808,3809],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3811,3813],{"id":3812},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3815,3816],{},[123,3817,3818],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3820,3822],{"id":3821},"šifrování","Šifrování",[120,3824,3825,3828,3831],{},[123,3826,3827],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3829,3830],{},"RSA (2048+ bit), DSS",[123,3832,3833],{},"SHA-256, SHA-1",[115,3835,3837],{"id":3836},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3839,3840,3846,3852,3855],{},[123,3841,3842,3845],{},[38,3843,3844],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3847,3848,3851],{},[38,3849,3850],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3853,3854],{},"Transportní a tunelovací režim",[123,3856,3857],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3859,2651],{"id":2650},[120,3861,3862,3868,3874,3880,3886],{},[123,3863,3864,3867],{},[207,3865,140],{"className":3866,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3869,3870,3873],{},[207,3871,578],{"className":3872,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3875,3876,3879],{},[207,3877,569],{"className":3878,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3881,3882,3885],{},[207,3883,351],{"className":3884,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3887,3888,3891],{},[207,3889,360],{"className":3890,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3893,2675,3894],{"id":2674},[207,3895,43],{"className":3896,"dataFsResolvedFilePath":1642,"href":1641},[210],[120,3898,3899,3905,3911],{},[123,3900,3901],{},[207,3902,3904],{"className":3903,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3906,3907],{},[207,3908,3910],{"className":3909,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3912,3913],{},[207,3914,3916],{"className":3915,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3918},[3919,3920,3928,3929,3930],{"id":3688,"depth":642,"text":3689},{"id":3751,"depth":642,"text":3752,"children":3921},[3922,3923,3924,3925,3926,3927],{"id":3755,"depth":649,"text":3756},{"id":3770,"depth":649,"text":3771},{"id":3785,"depth":649,"text":3786},{"id":3797,"depth":649,"text":3798},{"id":3812,"depth":649,"text":3813},{"id":3821,"depth":649,"text":3822},{"id":3836,"depth":642,"text":3837},{"id":2650,"depth":642,"text":2651},{"id":2674,"depth":642,"text":2705},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3936,3937,3938],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3675,3941,3942,3943,3944,3945,3946],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3949,"title":569,"body":3950,"course":659,"courses":4283,"created":660,"description":641,"extension":661,"meta":4284,"navigation":664,"path":4285,"seo":4286,"sources":4287,"stem":4288,"tags":4289,"type":2720,"updated":677,"__hash__":4295},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3951,"toc":4272},[3952,3955,3962,3968,3972,4035,4039,4089,4093,4098,4117,4121,4124,4128,4142,4146,4174,4178,4227,4229,4254,4259],[12,3953,569],{"id":3954},"řízení-rizik",[724,3956,3957],{},[2246,3958],{"alt":3959,"className":3960,"src":3961},"rizeni-rizik-proces",[210,1722],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3963,3964,3965,1643],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3966,140],{"className":3967,"dataFsResolvedFilePath":559,"href":560},[210],[115,3969,3971],{"id":3970},"normativní-základ","Normativní základ",[16,3973,3974,3983],{},[19,3975,3976],{},[22,3977,3978,3981],{},[25,3979,3980],{},"Norma",[25,3982,1875],{},[30,3984,3985,3995,4005,4015,4025],{},[22,3986,3987,3992],{},[35,3988,3989],{},[38,3990,3991],{},"ISO 31000:2019",[35,3993,3994],{},"Obecné smrnice pro management rizik",[22,3996,3997,4002],{},[35,3998,3999],{},[38,4000,4001],{},"ISO 31010:2020",[35,4003,4004],{},"Techniky posuzování rizik",[22,4006,4007,4012],{},[35,4008,4009],{},[38,4010,4011],{},"ISO\u002FIEC 27005:2019",[35,4013,4014],{},"Řízení rizik bezpečnosti informací",[22,4016,4017,4022],{},[35,4018,4019],{},[38,4020,4021],{},"NIST SP 800-30",[35,4023,4024],{},"Průvodce hodnocením rizik",[22,4026,4027,4032],{},[35,4028,4029],{},[38,4030,4031],{},"NIST SP 800-39",[35,4033,4034],{},"Proces řízení bezpečnostních rizik",[115,4036,4038],{"id":4037},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4040,4041,4047,4053,4059,4065,4071,4077,4083],{},[123,4042,4043,4046],{},[38,4044,4045],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4048,4049,4052],{},[38,4050,4051],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4054,4055,4058],{},[38,4056,4057],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4060,4061,4064],{},[38,4062,4063],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4066,4067,4070],{},[38,4068,4069],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4072,4073,4076],{},[38,4074,4075],{},"Akceptace rizik"," — formální rozhodnutí",[123,4078,4079,4082],{},[38,4080,4081],{},"Komunikace"," — sdílení informací o rizicích",[123,4084,4085,4088],{},[38,4086,4087],{},"Monitorování"," — průběžné přezkoumávání",[115,4090,4092],{"id":4091},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4094,4095],{},[38,4096,4097],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4099,4100,4106,4111],{},[123,4101,4102,4105],{},[38,4103,4104],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4107,4108,4110],{},[38,4109,3263],{}," — slabé místo aktiva (stupnice 1–5)",[123,4112,4113,4116],{},[38,4114,4115],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4118,4120],{"id":4119},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4122,4123],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4125,4127],{"id":4126},"klíčové-dokumenty","Klíčové dokumenty",[120,4129,4130,4136],{},[123,4131,4132,4135],{},[38,4133,4134],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4137,4138,4141],{},[38,4139,4140],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4143,4145],{"id":4144},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4147,4148,4154,4159,4164,4169],{},[123,4149,4150,4153],{},[38,4151,4152],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4155,4156,4158],{},[38,4157,2980],{}," — odpovědný za ISMS",[123,4160,4161,4163],{},[38,4162,2991],{}," — návrh a implementace opatření",[123,4165,4166,4168],{},[38,4167,3001],{}," — provádění auditů",[123,4170,4171,4173],{},[38,4172,3011],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4175,4177],{"id":4176},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4179,4180,4192],{},[19,4181,4182],{},[22,4183,4184,4187,4189],{},[25,4185,4186],{},"Úroveň",[25,4188,1875],{},[25,4190,4191],{},"Typ rizika",[30,4193,4194,4205,4216],{},[22,4195,4196,4199,4202],{},[35,4197,4198],{},"Stupeň 1",[35,4200,4201],{},"Organizace",[35,4203,4204],{},"Strategické riziko",[22,4206,4207,4210,4213],{},[35,4208,4209],{},"Stupeň 2",[35,4211,4212],{},"Poslání\u002Fobchodní procesy",[35,4214,4215],{},"Taktické riziko",[22,4217,4218,4221,4224],{},[35,4219,4220],{},"Stupeň 3",[35,4222,4223],{},"Informační systémy",[35,4225,4226],{},"Operační riziko",[115,4228,2651],{"id":2650},[120,4230,4231,4237,4243,4249],{},[123,4232,4233,4236],{},[207,4234,140],{"className":4235,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4238,4239,4242],{},[207,4240,384],{"className":4241,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4244,4245,4248],{},[207,4246,393],{"className":4247,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4250,4251,3873],{},[207,4252,578],{"className":4253,"dataFsResolvedFilePath":576,"href":577},[210],[115,4255,2675,4256],{"id":2674},[207,4257,43],{"className":4258,"dataFsResolvedFilePath":1642,"href":1641},[210],[120,4260,4261,4267],{},[123,4262,4263],{},[207,4264,4266],{"className":4265,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4268,4269],{},[207,4270,222],{"className":4271,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4273},[4274,4275,4276,4277,4278,4279,4280,4281,4282],{"id":3970,"depth":642,"text":3971},{"id":4037,"depth":642,"text":4038},{"id":4091,"depth":642,"text":4092},{"id":4119,"depth":642,"text":4120},{"id":4126,"depth":642,"text":4127},{"id":4144,"depth":642,"text":4145},{"id":4176,"depth":642,"text":4177},{"id":2650,"depth":642,"text":2651},{"id":2674,"depth":642,"text":2705},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3213,3212],"topics\u002Frizeni-rizik",[658,4290,4291,4292,4293,4294],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4297,"title":4298,"body":4299,"course":659,"courses":4530,"created":660,"description":641,"extension":661,"meta":4531,"navigation":664,"path":4532,"seo":4533,"sources":4534,"stem":4536,"tags":4537,"type":2720,"updated":677,"__hash__":4542},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4300,"toc":4522},[4301,4304,4311,4314,4318,4417,4421,4456,4460,4480,4484,4487,4489,4509,4514],[12,4302,4298],{"id":4303},"sae-budování-bezpečnostního-povědomí",[724,4305,4306],{},[2246,4307],{"alt":4308,"className":4309,"src":4310},"sae-pyramida",[210,1722],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4312,4313],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4315,4317],{"id":4316},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4319,4320,4337],{},[19,4321,4322],{},[22,4323,4324,4326,4329,4331,4334],{},[25,4325,4186],{},[25,4327,4328],{},"Příznak",[25,4330,3304],{},[25,4332,4333],{},"Metody",[25,4335,4336],{},"Časový rámec",[30,4338,4339,4359,4379,4399],{},[22,4340,4341,4347,4350,4353,4356],{},[35,4342,4343,4346],{},[38,4344,4345],{},"Awareness"," (povědomí)",[35,4348,4349],{},"„Co\"",[35,4351,4352],{},"Rozpoznávání",[35,4354,4355],{},"Média, videa, plakáty",[35,4357,4358],{},"Krátkodobý",[22,4360,4361,4367,4370,4373,4376],{},[35,4362,4363,4366],{},[38,4364,4365],{},"Training"," (výcvik)",[35,4368,4369],{},"„Jak\"",[35,4371,4372],{},"Dovednosti",[35,4374,4375],{},"Přednášky, případovky, cvičení",[35,4377,4378],{},"Střednědobý",[22,4380,4381,4387,4390,4393,4396],{},[35,4382,4383,4386],{},[38,4384,4385],{},"Education"," (vzdělávání)",[35,4388,4389],{},"„Proč\"",[35,4391,4392],{},"Porozumění",[35,4394,4395],{},"Semináře, diskuze, výzkum",[35,4397,4398],{},"Dlouhodobý",[22,4400,4401,4406,4408,4411,4414],{},[35,4402,4403],{},[38,4404,4405],{},"Professional Development",[35,4407,2983],{},[35,4409,4410],{},"Profesní rozvoj",[35,4412,4413],{},"Certifikace, konference",[35,4415,4416],{},"Průběžný",[115,4418,4420],{"id":4419},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4422,4423,4426,4429,4432,4435,4438,4441,4444,4447,4450,4453],{},[123,4424,4425],{},"Role a odpovědnosti v programu",[123,4427,4428],{},"Stanovení cílů pro každou fázi",[123,4430,4431],{},"Rozdělení uživatelů (analýza)",[123,4433,4434],{},"Vytvoření školících materiálů dle skupin",[123,4436,4437],{},"Určení cíle pro každou skupinu",[123,4439,4440],{},"Témata pro každou relaci\u002Fkurz",[123,4442,4443],{},"Metody nasazení (metodiky)",[123,4445,4446],{},"Dokumentace a zpětná vazba",[123,4448,4449],{},"Vyhodnocení a aktualizace materiálů",[123,4451,4452],{},"Četnost opakování",[123,4454,4455],{},"Kalkulace",[115,4457,4459],{"id":4458},"modely-řízení","Modely řízení",[120,4461,4462,4468,4474],{},[123,4463,4464,4467],{},[38,4465,4466],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4469,4470,4473],{},[38,4471,4472],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4475,4476,4479],{},[38,4477,4478],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4481,4483],{"id":4482},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4485,4486],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4488,2651],{"id":2650},[120,4490,4491,4497,4503],{},[123,4492,4493,4496],{},[207,4494,140],{"className":4495,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4498,4499,4502],{},[207,4500,578],{"className":4501,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4504,4505,4508],{},[207,4506,569],{"className":4507,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4510,2675,4511],{"id":2674},[207,4512,43],{"className":4513,"dataFsResolvedFilePath":1642,"href":1641},[210],[120,4515,4516],{},[123,4517,4518],{},[207,4519,4521],{"className":4520,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4523},[4524,4525,4526,4527,4528,4529],{"id":4316,"depth":642,"text":4317},{"id":4419,"depth":642,"text":4420},{"id":4458,"depth":642,"text":4459},{"id":4482,"depth":642,"text":4483},{"id":2650,"depth":642,"text":2651},{"id":2674,"depth":642,"text":2705},[658],{},"\u002Ftopics\u002Fsae",{"title":4298,"description":641},[4535],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4538,4539,4540,4293,4541],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4544,4546],{"slug":658,"path":1641,"title":7,"snippet":4545},"… - Řízený hacking \u002F APT — APT skupiny, informační válka, OSINT - \u003C\u003Cimork-internetova-bezpecnost>> — kyberprostor, OSINT, behaviorální biometrika ### Případové studie - [[imork-nemocnice| …",{"slug":4547,"path":521,"title":522,"snippet":4548},"imork-mobilni-bezpecnost","… áva mobilních zařízení v organizaci (MDM\u002FEMM) - SAE — bezpečnostní architektura - \u003C\u003Cimork-internetova-bezpecnost>> — OSINT a APT skupiny cílící na mobilní platformy",[4550,4553,4555],{"slug":4551,"title":4552,"path":443,"sharedTags":649},"imork-rizeny-hacking","Řízený hacking — Advanced Persistent Threat (APT)",{"slug":4554,"title":3618,"path":407,"sharedTags":642},"imork-anatomie-utoku",{"slug":673,"title":578,"path":577,"sharedTags":642},1777154959019]