[{"data":1,"prerenderedAt":4738},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-manazerska-bezpecnost":1626,"course-stats-imork":2417,"course-topics-imork":2421,"backlinks-imork-manazerska-bezpecnost":4716,"related-imork-manazerska-bezpecnost":4726},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2416},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2402,"navigation":664,"path":2403,"seo":2404,"sources":2405,"stem":2407,"tags":2408,"type":2414,"updated":677,"__hash__":2415},"summaries\u002Fsummaries\u002Fimork-manazerska-bezpecnost.md","ImorK — Manažerská informační bezpečnost",{"type":9,"value":1631,"toc":2356},[1632,1635,1644,1648,1651,1665,1669,1723,1727,1751,1755,1758,1762,1782,1786,1829,1833,1837,1852,1856,1867,1871,1881,1907,1911,1914,1931,1935,1939,1953,1957,1960,1985,1989,1992,1996,2022,2026,2030,2033,2037,2040,2044,2108,2112,2116,2119,2123,2143,2147,2173,2177,2191,2195,2198,2202,2205,2209,2212,2216,2236,2240,2243,2247,2251,2254,2258,2278,2281,2285,2288,2292,2338,2342],[12,1633,1629],{"id":1634},"imork-manažerská-informační-bezpečnost",[724,1636,1637],{},[1638,1639],"img",{"alt":1640,"className":1641,"src":1643},"imork-isms-role",[210,1642],"wikilink-broken","\u002Fwiki-assets\u002Fimork-isms-role.jpeg",[115,1645,1647],{"id":1646},"governance-informační-bezpečnosti","Governance informační bezpečnosti",[724,1649,1650],{},"Rámce pro řízení informační bezpečnosti na úrovni vedení organizace:",[120,1652,1653,1659],{},[123,1654,1655,1658],{},[38,1656,1657],{},"ISO\u002FIEC 27014"," — governance informační bezpečnosti",[123,1660,1661,1664],{},[38,1662,1663],{},"NIST SP 800-100"," — Information Security Handbook pro management",[115,1666,1668],{"id":1667},"bezpečnostní-role","Bezpečnostní role",[16,1670,1671,1681],{},[19,1672,1673],{},[22,1674,1675,1678],{},[25,1676,1677],{},"Role",[25,1679,1680],{},"Odpovědnost",[30,1682,1683,1693,1703,1713],{},[22,1684,1685,1690],{},[35,1686,1687],{},[38,1688,1689],{},"CISO",[35,1691,1692],{},"Hlavní odpovědnost za IB, reporting vedení",[22,1694,1695,1700],{},[35,1696,1697],{},[38,1698,1699],{},"CIO",[35,1701,1702],{},"Řízení IT strategie",[22,1704,1705,1710],{},[35,1706,1707],{},[38,1708,1709],{},"CTO",[35,1711,1712],{},"Technologická architektura",[22,1714,1715,1720],{},[35,1716,1717],{},[38,1718,1719],{},"ISSO",[35,1721,1722],{},"Operativní bezpečnost systémů",[115,1724,1726],{"id":1725},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,1728,1729,1739,1745],{},[123,1730,1731,1734,1735],{},[38,1732,1733],{},"Manažerská"," — governance, politiky, ",[207,1736,1738],{"className":1737,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik",[123,1740,1741,1744],{},[38,1742,1743],{},"Provozní (Operations)"," — procesy, incidenty, kontinuita",[123,1746,1747,1750],{},[38,1748,1749],{},"Technická"," — šifrování, řízení přístupu, síťová bezpečnost",[115,1752,1754],{"id":1753},"strom-počítačové-bezpečnosti","Strom počítačové bezpečnosti",[724,1756,1757],{},"Hierarchická dekompozice oblastí IB — od strategického řízení přes provozní opatření po technické kontroly.",[115,1759,1761],{"id":1760},"řízení-rizik-normativní-rámec","Řízení rizik — normativní rámec",[120,1763,1764,1773,1779],{},[123,1765,1766,1769,1770],{},[38,1767,1768],{},"ISO 31000"," — obecný rámec ",[207,1771,1738],{"className":1772,"dataFsResolvedFilePath":567,"href":568},[210],[123,1774,1775,1778],{},[38,1776,1777],{},"ISO\u002FIEC 27005"," — řízení rizik specificky pro IB",[123,1780,1781],{},"Vazba na aktiva, hrozby a zranitelnosti",[115,1783,1785],{"id":1784},"události-vs-incidenty","Události vs. incidenty",[16,1787,1788,1801],{},[19,1789,1790],{},[22,1791,1792,1795,1798],{},[25,1793,1794],{},"Pojem",[25,1796,1797],{},"ISO 27001",[25,1799,1800],{},"NIST 800-61",[30,1802,1803,1816],{},[22,1804,1805,1810,1813],{},[35,1806,1807],{},[38,1808,1809],{},"Událost (event)",[35,1811,1812],{},"Identifikovaný výskyt stavu systému",[35,1814,1815],{},"Jakákoli pozorovatelná událost v systému",[22,1817,1818,1823,1826],{},[35,1819,1820],{},[38,1821,1822],{},"Incident",[35,1824,1825],{},"Nežádoucí událost s pravděpodobným dopadem na IB",[35,1827,1828],{},"Porušení bezpečnostní politiky",[115,1830,1832],{"id":1831},"siem-a-log-management","SIEM a Log Management",[198,1834,1836],{"id":1835},"log-management-nist-sp-800-92","Log Management (NIST SP 800-92)",[120,1838,1839,1842,1849],{},[123,1840,1841],{},"Sběr, ukládání a analýza logů",[123,1843,1844,1845,1848],{},"Protokol ",[38,1846,1847],{},"syslog"," jako standard",[123,1850,1851],{},"Centralizované vs. distribuované řešení",[198,1853,1855],{"id":1854},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,1857,1858,1861,1864],{},[123,1859,1860],{},"Korelace událostí z více zdrojů",[123,1862,1863],{},"Real-time monitoring a alerting",[123,1865,1866],{},"Forenzní analýza",[115,1868,1870],{"id":1869},"ochranné-bezpečnostní-vrstvy","Ochranné bezpečnostní vrstvy",[1872,1873,1878],"pre",{"className":1874,"code":1876,"language":1877},[1875],"language-text","Firewall → IDS\u002FIPS → Antivirus → Event Management → SIEM\n","text",[1879,1880,1876],"code",{"__ignoreMap":641},[120,1882,1883,1889,1895,1901],{},[123,1884,1885,1888],{},[38,1886,1887],{},"Firewall (FW)"," — řízení síťového provozu",[123,1890,1891,1894],{},[38,1892,1893],{},"IDS\u002FIPS"," — detekce\u002Fprevence průniků",[123,1896,1897,1900],{},[38,1898,1899],{},"Antivirus"," — ochrana před malwarem",[123,1902,1903,1906],{},[38,1904,1905],{},"Event management"," — správa bezpečnostních událostí",[115,1908,1910],{"id":1909},"nba-network-behavior-analysis","NBA (Network Behavior Analysis)",[724,1912,1913],{},"Detekce hrozeb na základě chování sítě — na rozdíl od signaturových metod dokáže identifikovat:",[120,1915,1916,1922,1928],{},[123,1917,1918,1921],{},[38,1919,1920],{},"Zero-day útoky"," — dosud neznámé hrozby bez existující signatury",[123,1923,1924,1927],{},[38,1925,1926],{},"Polymorfní malware"," — škodlivý kód měnící svou podobu při každém spuštění",[123,1929,1930],{},"Analýza anomálií v síťovém provozu (objemy, vzory komunikace, neobvyklé protokoly)",[115,1932,1934],{"id":1933},"incident-management","Incident management",[198,1936,1938],{"id":1937},"normativní-rámce","Normativní rámce",[120,1940,1941,1947],{},[123,1942,1943,1946],{},[38,1944,1945],{},"ISO\u002FIEC 27035"," — řízení incidentů informační bezpečnosti",[123,1948,1949,1952],{},[38,1950,1951],{},"NIST SP 800-61r2"," — Computer Security Incident Handling Guide",[198,1954,1956],{"id":1955},"csirt-computer-security-incident-response-team","CSIRT (Computer Security Incident Response Team)",[724,1958,1959],{},"Role CSIRT:",[120,1961,1962,1968,1974,1979],{},[123,1963,1964,1967],{},[38,1965,1966],{},"Detekce"," — identifikace bezpečnostních incidentů",[123,1969,1970,1973],{},[38,1971,1972],{},"Poradenství"," — doporučení pro řešení a prevenci",[123,1975,1976,1978],{},[38,1977,240],{}," (Security Awareness Education) — zvyšování povědomí o bezpečnosti",[123,1980,1981,1984],{},[38,1982,1983],{},"Sdílení informací"," — výměna poznatků s dalšími týmy a organizacemi",[198,1986,1988],{"id":1987},"klasifikace-incidentů","Klasifikace incidentů",[724,1990,1991],{},"Tři třídy závažnosti incidentů pro určení priority reakce a eskalace.",[198,1993,1995],{"id":1994},"irp-životní-cyklus-incident-response-plan","IRP životní cyklus (Incident Response Plan)",[152,1997,1998,2004,2010,2016],{},[123,1999,2000,2003],{},[38,2001,2002],{},"Příprava"," — politiky, školení, nástroje",[123,2005,2006,2009],{},[38,2007,2008],{},"Detekce a analýza"," — identifikace a posouzení incidentu",[123,2011,2012,2015],{},[38,2013,2014],{},"Odstranění a obnova"," — eliminace hrozby, obnova systémů",[123,2017,2018,2021],{},[38,2019,2020],{},"Poučení"," — dokumentace, lessons learned, úprava procesů",[115,2023,2025],{"id":2024},"správa-klíčů","Správa klíčů",[198,2027,2029],{"id":2028},"nist-sp-800-57","NIST SP 800-57",[724,2031,2032],{},"Doporučení pro správu kryptografických klíčů — životní cyklus klíčů (generování, distribuce, ukládání, rotace, zničení).",[198,2034,2036],{"id":2035},"pki-public-key-infrastructure","PKI (Public Key Infrastructure)",[724,2038,2039],{},"Infrastruktura veřejných klíčů — certifikační autority, digitální certifikáty, registrační autority.",[198,2041,2043],{"id":2042},"protokoly-využívající-správu-klíčů","Protokoly využívající správu klíčů",[16,2045,2046,2056],{},[19,2047,2048],{},[22,2049,2050,2053],{},[25,2051,2052],{},"Protokol",[25,2054,2055],{},"Použití",[30,2057,2058,2068,2078,2088,2098],{},[22,2059,2060,2065],{},[35,2061,2062],{},[38,2063,2064],{},"IPsec",[35,2066,2067],{},"Bezpečnost síťové komunikace (L3)",[22,2069,2070,2075],{},[35,2071,2072],{},[38,2073,2074],{},"TLS",[35,2076,2077],{},"Šifrování transportní vrstvy (L4)",[22,2079,2080,2085],{},[35,2081,2082],{},[38,2083,2084],{},"S\u002FMIME",[35,2086,2087],{},"End-to-end šifrování emailu",[22,2089,2090,2095],{},[35,2091,2092],{},[38,2093,2094],{},"Kerberos",[35,2096,2097],{},"Autentizace v doménových sítích",[22,2099,2100,2105],{},[35,2101,2102],{},[38,2103,2104],{},"DNSSEC",[35,2106,2107],{},"Ověření integrity DNS záznamů",[115,2109,2111],{"id":2110},"testování-bezpečnosti","Testování bezpečnosti",[198,2113,2115],{"id":2114},"nist-sp-800-115","NIST SP 800-115",[724,2117,2118],{},"Technical Guide to Information Security Testing and Assessment.",[198,2120,2122],{"id":2121},"typy-testů","Typy testů",[120,2124,2125,2131,2137],{},[123,2126,2127,2130],{},[38,2128,2129],{},"Externí testy"," — simulace útoku z vnější sítě",[123,2132,2133,2136],{},[38,2134,2135],{},"Interní testy"," — hodnocení bezpečnosti zevnitř organizace",[123,2138,2139,2142],{},[38,2140,2141],{},"Lámání hesel"," — ověření síly heselných politik",[198,2144,2146],{"id":2145},"penetrační-testy-4-fáze","Penetrační testy — 4 fáze",[152,2148,2149,2155,2161,2167],{},[123,2150,2151,2154],{},[38,2152,2153],{},"Plánování"," — definice rozsahu, pravidel a cílů",[123,2156,2157,2160],{},[38,2158,2159],{},"Průzkum (Discovery)"," — sběr informací o cíli",[123,2162,2163,2166],{},[38,2164,2165],{},"Exploitace"," — pokus o průnik a zneužití zranitelností",[123,2168,2169,2172],{},[38,2170,2171],{},"Reporting"," — dokumentace nálezů a doporučení",[198,2174,2176],{"id":2175},"nástroje","Nástroje",[120,2178,2179,2185],{},[123,2180,2181,2184],{},[38,2182,2183],{},"SCAP"," (Security Content Automation Protocol) — automatizované hodnocení bezpečnosti",[123,2186,2187,2190],{},[38,2188,2189],{},"BackTrack \u002F Kali Linux"," — distribuce pro penetrační testování",[115,2192,2194],{"id":2193},"iam-idm-identity-and-access-management","IAM \u002F IdM (Identity and Access Management)",[724,2196,2197],{},"Řízení identit a přístupu — správa životního cyklu digitálních identit v organizaci.",[198,2199,2201],{"id":2200},"životní-cyklus-identity","Životní cyklus identity",[724,2203,2204],{},"Vytvoření → Správa → Použití → Deaktivace → Smazání.",[198,2206,2208],{"id":2207},"itu-t-y2720","ITU-T Y.2720",[724,2210,2211],{},"Rámec pro řízení identit v NGN (Next Generation Networks).",[198,2213,2215],{"id":2214},"konektory-pro-integraci","Konektory pro integraci",[120,2217,2218,2224,2230],{},[123,2219,2220,2223],{},[38,2221,2222],{},"LDAP"," — adresářové služby",[123,2225,2226,2229],{},[38,2227,2228],{},"SQL"," — databázové systémy",[123,2231,2232,2235],{},[38,2233,2234],{},"Web services"," — webové služby (SOAP, REST)",[198,2237,2239],{"id":2238},"nasazení-idm","Nasazení IdM",[724,2241,2242],{},"Implementace probíhá v postupných krocích — od pilotního nasazení přes integraci klíčových systémů po plný provoz.",[115,2244,2246],{"id":2245},"access-control-řízení-přístupu","Access Control (Řízení přístupu)",[198,2248,2250],{"id":2249},"síťový-přístup","Síťový přístup",[724,2252,2253],{},"Řízení přístupu k síťovým prostředkům — autentizace, autorizace, accounting (AAA).",[198,2255,2257],{"id":2256},"fyzický-přístup-čsn-p-734450-1","Fyzický přístup — ČSN P 734450-1",[120,2259,2260,2266,2272],{},[123,2261,2262,2265],{},[38,2263,2264],{},"STO"," (Systém technické ochrany) — technické prostředky fyzické bezpečnosti",[123,2267,2268,2271],{},[38,2269,2270],{},"EPS"," (Elektrická požární signalizace) — detekce a signalizace požáru",[123,2273,2274,2277],{},[38,2275,2276],{},"Kategorizace objektů"," — klasifikace dle úrovně požadované ochrany",[115,2279,522],{"id":2280},"mobilní-bezpečnost",[198,2282,2284],{"id":2283},"byod-bring-your-own-device","BYOD (Bring Your Own Device)",[724,2286,2287],{},"Politika umožňující zaměstnancům používat vlastní zařízení — přináší rizika úniku dat a nedostatečné kontroly.",[198,2289,2291],{"id":2290},"řešení-pro-správu-mobilních-zařízení","Řešení pro správu mobilních zařízení",[16,2293,2294,2304],{},[19,2295,2296],{},[22,2297,2298,2301],{},[25,2299,2300],{},"Řešení",[25,2302,2303],{},"Rozsah",[30,2305,2306,2317,2328],{},[22,2307,2308,2314],{},[35,2309,2310,2313],{},[38,2311,2312],{},"MDM"," (Mobile Device Management)",[35,2315,2316],{},"Správa zařízení — vzdálené vymazání, vynucení politik",[22,2318,2319,2325],{},[35,2320,2321,2324],{},[38,2322,2323],{},"EMM"," (Enterprise Mobility Management)",[35,2326,2327],{},"Rozšířená správa — aplikace, obsah, identita",[22,2329,2330,2335],{},[35,2331,2332],{},[38,2333,2334],{},"Kontejnerizace",[35,2336,2337],{},"Oddělení firemních a soukromých dat na zařízení",[115,2339,2341],{"id":2340},"certifikace-isaca","Certifikace ISACA",[120,2343,2344,2347,2350,2353],{},[123,2345,2346],{},"CISA (Certified Information Systems Auditor)",[123,2348,2349],{},"CISM (Certified Information Security Manager)",[123,2351,2352],{},"CRISC (Certified in Risk and Information Systems Control)",[123,2354,2355],{},"CGEIT (Certified in Governance of Enterprise IT)",{"title":641,"searchDepth":642,"depth":642,"links":2357},[2358,2359,2360,2361,2362,2363,2364,2368,2369,2370,2376,2381,2387,2393,2397,2401],{"id":1646,"depth":642,"text":1647},{"id":1667,"depth":642,"text":1668},{"id":1725,"depth":642,"text":1726},{"id":1753,"depth":642,"text":1754},{"id":1760,"depth":642,"text":1761},{"id":1784,"depth":642,"text":1785},{"id":1831,"depth":642,"text":1832,"children":2365},[2366,2367],{"id":1835,"depth":649,"text":1836},{"id":1854,"depth":649,"text":1855},{"id":1869,"depth":642,"text":1870},{"id":1909,"depth":642,"text":1910},{"id":1933,"depth":642,"text":1934,"children":2371},[2372,2373,2374,2375],{"id":1937,"depth":649,"text":1938},{"id":1955,"depth":649,"text":1956},{"id":1987,"depth":649,"text":1988},{"id":1994,"depth":649,"text":1995},{"id":2024,"depth":642,"text":2025,"children":2377},[2378,2379,2380],{"id":2028,"depth":649,"text":2029},{"id":2035,"depth":649,"text":2036},{"id":2042,"depth":649,"text":2043},{"id":2110,"depth":642,"text":2111,"children":2382},[2383,2384,2385,2386],{"id":2114,"depth":649,"text":2115},{"id":2121,"depth":649,"text":2122},{"id":2145,"depth":649,"text":2146},{"id":2175,"depth":649,"text":2176},{"id":2193,"depth":642,"text":2194,"children":2388},[2389,2390,2391,2392],{"id":2200,"depth":649,"text":2201},{"id":2207,"depth":649,"text":2208},{"id":2214,"depth":649,"text":2215},{"id":2238,"depth":649,"text":2239},{"id":2245,"depth":642,"text":2246,"children":2394},[2395,2396],{"id":2249,"depth":649,"text":2250},{"id":2256,"depth":649,"text":2257},{"id":2280,"depth":642,"text":522,"children":2398},[2399,2400],{"id":2283,"depth":649,"text":2284},{"id":2290,"depth":649,"text":2291},{"id":2340,"depth":642,"text":2341},{},"\u002Fsummaries\u002Fimork-manazerska-bezpecnost",{"title":1629,"description":641},[2406],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","summaries\u002Fimork-manazerska-bezpecnost",[658,671,2409,2410,1933,2411,2412,2413],"governance","siem","iam","mobilni-bezpecnost","penetracni-testy","summary","81m8ZqTNcDH3yRuS-NiuCtjC52bYge3UYQt3bTOeIsA","summaries",{"zapisku":1624,"topics":2418,"summaries":2419,"outputs":2420},6,35,0,[2422,2909,3392,3841,4119,4469],{"id":2423,"title":2424,"body":2425,"course":659,"courses":2893,"created":660,"description":641,"extension":661,"meta":2894,"navigation":664,"path":2895,"seo":2896,"sources":2897,"stem":2900,"tags":2901,"type":2907,"updated":677,"__hash__":2908},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2426,"toc":2880},[2427,2430,2437,2440,2444,2537,2541,2595,2599,2622,2626,2715,2719,2722,2726,2803,2807,2833,2837,2857,2866],[12,2428,2424],{"id":2429},"bcm-řízení-kontinuity-činnosti",[724,2431,2432],{},[1638,2433],{"alt":2434,"className":2435,"src":2436},"bcm-rpo-rto",[210,1642],"\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2438,2439],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2441,2443],{"id":2442},"klíčové-pojmy","Klíčové pojmy",[16,2445,2446,2458],{},[19,2447,2448],{},[22,2449,2450,2452,2455],{},[25,2451,1794],{},[25,2453,2454],{},"Anglicky",[25,2456,2457],{},"Popis",[30,2459,2460,2473,2485,2498,2511,2524],{},[22,2461,2462,2467,2470],{},[35,2463,2464],{},[38,2465,2466],{},"BCMS",[35,2468,2469],{},"Business Continuity Management System",[35,2471,2472],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2474,2475,2479,2482],{},[35,2476,2477],{},[38,2478,384],{},[35,2480,2481],{},"Business Continuity Management",[35,2483,2484],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2486,2487,2492,2495],{},[35,2488,2489],{},[38,2490,2491],{},"BIA",[35,2493,2494],{},"Business Impact Analysis",[35,2496,2497],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2499,2500,2505,2508],{},[35,2501,2502],{},[38,2503,2504],{},"MBCO",[35,2506,2507],{},"Minimum Business Continuity Objective",[35,2509,2510],{},"Minimální přijatelná úroveň služeb",[22,2512,2513,2518,2521],{},[35,2514,2515],{},[38,2516,2517],{},"RPO",[35,2519,2520],{},"Recovery Point Objective",[35,2522,2523],{},"Do jakého bodu v minulosti lze obnovit data",[22,2525,2526,2531,2534],{},[35,2527,2528],{},[38,2529,2530],{},"RTO",[35,2532,2533],{},"Recovery Time Objective",[35,2535,2536],{},"Čas potřebný pro obnovu provozu",[115,2538,2540],{"id":2539},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2542,2543,2553],{},[19,2544,2545],{},[22,2546,2547,2550],{},[25,2548,2549],{},"Fáze",[25,2551,2552],{},"Obsah",[30,2554,2555,2565,2575,2585],{},[22,2556,2557,2562],{},[35,2558,2559],{},[38,2560,2561],{},"Plan",[35,2563,2564],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2566,2567,2572],{},[35,2568,2569],{},[38,2570,2571],{},"Do",[35,2573,2574],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2576,2577,2582],{},[35,2578,2579],{},[38,2580,2581],{},"Check",[35,2583,2584],{},"Monitoring, audit, přezkoumání managementem",[22,2586,2587,2592],{},[35,2588,2589],{},[38,2590,2591],{},"Act",[35,2593,2594],{},"Nápravná opatření, neustálé zlepšování",[115,2596,2598],{"id":2597},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2600,2601,2604,2607,2610,2613,2616,2619],{},[123,2602,2603],{},"Kap. 4 — kontext organizace",[123,2605,2606],{},"Kap. 5 — vedení (leadership)",[123,2608,2609],{},"Kap. 6 — plánování (BIA, rizika)",[123,2611,2612],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2614,2615],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2617,2618],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2620,2621],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2623,2625],{"id":2624},"analýza-steeple","Analýza STEEPLE",[16,2627,2628,2638],{},[19,2629,2630],{},[22,2631,2632,2635],{},[25,2633,2634],{},"Faktor",[25,2636,2637],{},"Oblast",[30,2639,2640,2651,2662,2673,2683,2694,2705],{},[22,2641,2642,2648],{},[35,2643,2644,2647],{},[38,2645,2646],{},"S","ociální",[35,2649,2650],{},"Zaměstnanost, bezpečnost, komunity",[22,2652,2653,2659],{},[35,2654,2655,2658],{},[38,2656,2657],{},"T","echnologický",[35,2660,2661],{},"Závislost na technologiích",[22,2663,2664,2670],{},[35,2665,2666,2669],{},[38,2667,2668],{},"E","konomický",[35,2671,2672],{},"Ekonomická situace, finanční instituce",[22,2674,2675,2680],{},[35,2676,2677,2679],{},[38,2678,2668],{},"tický",[35,2681,2682],{},"Podnikatelská etika, média, veřejnost",[22,2684,2685,2691],{},[35,2686,2687,2690],{},[38,2688,2689],{},"P","olitický",[35,2692,2693],{},"Politický systém, hrozba nepokojů",[22,2695,2696,2702],{},[35,2697,2698,2701],{},[38,2699,2700],{},"L","egislativní",[35,2703,2704],{},"Předpisy, zákony",[22,2706,2707,2712],{},[35,2708,2709,2711],{},[38,2710,2668],{},"nvironmentální",[35,2713,2714],{},"Životní prostředí, přírodní hrozby",[115,2716,2718],{"id":2717},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2720,2721],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2723,2725],{"id":2724},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2727,2728,2737],{},[19,2729,2730],{},[22,2731,2732,2735],{},[25,2733,2734],{},"Tier",[25,2736,2457],{},[30,2738,2739,2747,2755,2763,2771,2779,2787,2795],{},[22,2740,2741,2744],{},[35,2742,2743],{},"0",[35,2745,2746],{},"Žádná off-site data",[22,2748,2749,2752],{},[35,2750,2751],{},"1",[35,2753,2754],{},"Fyzická záloha + cold site",[22,2756,2757,2760],{},[35,2758,2759],{},"2",[35,2761,2762],{},"Fyzická záloha + hot site",[22,2764,2765,2768],{},[35,2766,2767],{},"3",[35,2769,2770],{},"Elektronický trezor (electronic vaulting)",[22,2772,2773,2776],{},[35,2774,2775],{},"4",[35,2777,2778],{},"Point-in-time recovery",[22,2780,2781,2784],{},[35,2782,2783],{},"5",[35,2785,2786],{},"Two-site commit (kontinuální přenos)",[22,2788,2789,2792],{},[35,2790,2791],{},"6",[35,2793,2794],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2796,2797,2800],{},[35,2798,2799],{},"7",[35,2801,2802],{},"Automatizovaná obnova (AI monitoring)",[198,2804,2806],{"id":2805},"cloud-dr","Cloud DR",[120,2808,2809,2815,2821,2827],{},[123,2810,2811,2814],{},[38,2812,2813],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2816,2817,2820],{},[38,2818,2819],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2822,2823,2826],{},[38,2824,2825],{},"Hot DR"," — paralelní řešení v tandemu",[123,2828,2829,2832],{},[38,2830,2831],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2834,2836],{"id":2835},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2838,2839,2845,2851],{},[123,2840,2841,2844],{},[207,2842,140],{"className":2843,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2846,2847,2850],{},[207,2848,569],{"className":2849,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2852,2853,2856],{},[207,2854,578],{"className":2855,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2858,2860,2861],{"id":2859},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2862,43],{"className":2863,"dataFsResolvedFilePath":2864,"href":2865},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2867,2868,2874],{},[123,2869,2870],{},[207,2871,2873],{"className":2872,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2875,2876],{},[207,2877,2879],{"className":2878,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2881},[2882,2883,2884,2885,2886,2890,2891],{"id":2442,"depth":642,"text":2443},{"id":2539,"depth":642,"text":2540},{"id":2597,"depth":642,"text":2598},{"id":2624,"depth":642,"text":2625},{"id":2717,"depth":642,"text":2718,"children":2887},[2888,2889],{"id":2724,"depth":649,"text":2725},{"id":2805,"depth":649,"text":2806},{"id":2835,"depth":642,"text":2836},{"id":2859,"depth":642,"text":2892},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2424,"description":641},[2898,2899],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2902,2903,2904,2905,2906],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2910,"title":2911,"body":2912,"course":659,"courses":3381,"created":660,"description":641,"extension":661,"meta":3382,"navigation":664,"path":3383,"seo":3384,"sources":3385,"stem":3387,"tags":3388,"type":2907,"updated":677,"__hash__":3391},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2913,"toc":3366},[2914,2917,2924,2931,2934,2938,3005,3009,3013,3069,3073,3093,3097,3099,3194,3196,3218,3222,3244,3248,3255,3311,3313,3344,3349],[12,2915,2911],{"id":2916},"isms-systém-řízení-bezpečnosti-informací",[724,2918,2919],{},[1638,2920],{"alt":2921,"className":2922,"src":2923},"isms-pdca-cyklus",[210,1642],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2925,2926],{},[1638,2927],{"alt":2928,"className":2929,"src":2930},"isms-oborova-mapa",[210,1642],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2932,2933],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2935,2937],{"id":2936},"základní-pilíře","Základní pilíře",[16,2939,2940,2951],{},[19,2941,2942],{},[22,2943,2944,2947,2949],{},[25,2945,2946],{},"Pilíř",[25,2948,2454],{},[25,2950,2457],{},[30,2952,2953,2966,2979,2992],{},[22,2954,2955,2960,2963],{},[35,2956,2957],{},[38,2958,2959],{},"Důvěrnost",[35,2961,2962],{},"Confidentiality",[35,2964,2965],{},"Přístup pouze oprávněným osobám",[22,2967,2968,2973,2976],{},[35,2969,2970],{},[38,2971,2972],{},"Integrita",[35,2974,2975],{},"Integrity",[35,2977,2978],{},"Ochrana před neoprávněnou změnou",[22,2980,2981,2986,2989],{},[35,2982,2983],{},[38,2984,2985],{},"Dostupnost",[35,2987,2988],{},"Availability",[35,2990,2991],{},"Systémy a data dostupné v potřebný čas",[22,2993,2994,2999,3002],{},[35,2995,2996],{},[38,2997,2998],{},"Nepopiratelnost",[35,3000,3001],{},"Non-repudiation",[35,3003,3004],{},"Prokázání autorství akce",[115,3006,3008],{"id":3007},"normativní-rámec","Normativní rámec",[198,3010,3012],{"id":3011},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,3014,3015,3021,3027,3036,3041,3051,3060],{},[123,3016,3017,3020],{},[38,3018,3019],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,3022,3023,3026],{},[38,3024,3025],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,3028,3029,3031,3032,3035],{},[38,3030,1777],{}," — ",[207,3033,1738],{"className":3034,"dataFsResolvedFilePath":567,"href":568},[210]," bezpečnosti informací",[123,3037,3038,3040],{},[38,3039,1657],{}," — governance bezpečnosti informací",[123,3042,3043,3046,3047],{},[38,3044,3045],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,3048,3050],{"className":3049,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,3052,3053,3046,3056],{},[38,3054,3055],{},"ISO\u002FIEC 27019",[207,3057,3059],{"className":3058,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,3061,3062,3046,3065],{},[38,3063,3064],{},"ISO\u002FIEC 27799",[207,3066,3068],{"className":3067,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,3070,3072],{"id":3071},"další-rámce","Další rámce",[120,3074,3075,3081,3087],{},[123,3076,3077,3080],{},[38,3078,3079],{},"NIST"," — americké standardy (SP 800 řada)",[123,3082,3083,3086],{},[38,3084,3085],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,3088,3089,3092],{},[38,3090,3091],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,3094,3096],{"id":3095},"governance-řízení","Governance (řízení)",[198,3098,1668],{"id":1667},[16,3100,3101,3111],{},[19,3102,3103],{},[22,3104,3105,3107,3109],{},[25,3106,1677],{},[25,3108,40],{},[25,3110,1680],{},[30,3112,3113,3123,3133,3143,3153,3164,3174,3184],{},[22,3114,3115,3118,3120],{},[35,3116,3117],{},"Chief Information Officer",[35,3119,1699],{},[35,3121,3122],{},"Celkové řízení ICT",[22,3124,3125,3128,3130],{},[35,3126,3127],{},"Chief Information Security Officer",[35,3129,1689],{},[35,3131,3132],{},"Řízení informační bezpečnosti",[22,3134,3135,3138,3140],{},[35,3136,3137],{},"Chief Technology Officer",[35,3139,1709],{},[35,3141,3142],{},"Technologická strategie",[22,3144,3145,3148,3150],{},[35,3146,3147],{},"IS Security Officer",[35,3149,1719],{},[35,3151,3152],{},"Bezpečnost IS",[22,3154,3155,3158,3161],{},[35,3156,3157],{},"Manažer KB",[35,3159,3160],{},"—",[35,3162,3163],{},"Odpovědný za ISMS",[22,3165,3166,3169,3171],{},[35,3167,3168],{},"Architekt KB",[35,3170,3160],{},[35,3172,3173],{},"Návrh a implementace opatření",[22,3175,3176,3179,3181],{},[35,3177,3178],{},"Auditor KB",[35,3180,3160],{},[35,3182,3183],{},"Provádění auditů",[22,3185,3186,3189,3191],{},[35,3187,3188],{},"Garant aktiva",[35,3190,3160],{},[35,3192,3193],{},"Rozvoj, použití a bezpečnost aktiva",[198,3195,1726],{"id":1725},[152,3197,3198,3204,3213],{},[123,3199,3200,3203],{},[38,3201,3202],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,3205,3206,3209,3210],{},[38,3207,3208],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3211,240],{"className":3212,"dataFsResolvedFilePath":585,"href":586},[210],[123,3214,3215,3217],{},[38,3216,1749],{}," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3219,3221],{"id":3220},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3223,3224,3229,3234,3239],{},[123,3225,3226,3228],{},[38,3227,2561],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3230,3231,3233],{},[38,3232,2571],{}," — implementace opatření, řízení rizik",[123,3235,3236,3238],{},[38,3237,2581],{}," — monitorování, audit, přezkoumání",[123,3240,3241,3243],{},[38,3242,2591],{}," — nápravná opatření, neustálé zlepšování",[115,3245,3247],{"id":3246},"oborová-řešení-isms","Oborová řešení ISMS",[724,3249,3250,3251,3254],{},"Kurz ",[207,3252,43],{"className":3253,"dataFsResolvedFilePath":2864,"href":2865},[210]," pokrývá ISMS specifika pro:",[120,3256,3257,3263,3269,3276,3282,3289,3295,3301,3306],{},[123,3258,3259],{},[207,3260,3262],{"className":3261,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3264,3265,3268],{},[207,3266,282],{"className":3267,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3270,3271,3275],{},[207,3272,3274],{"className":3273,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3277,3278,3281],{},[207,3279,300],{"className":3280,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3283,3284,3288],{},[207,3285,3287],{"className":3286,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3290,3291,3294],{},[207,3292,318],{"className":3293,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3296,3297,3300],{},[207,3298,327],{"className":3299,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3302,3303],{},[207,3304,336],{"className":3305,"dataFsResolvedFilePath":334,"href":335},[210],[123,3307,3308],{},[207,3309,273],{"className":3310,"dataFsResolvedFilePath":271,"href":272},[210],[115,3312,2836],{"id":2835},[120,3314,3315,3321,3326,3332,3338],{},[123,3316,3317,3320],{},[207,3318,569],{"className":3319,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3322,3323,587],{},[207,3324,240],{"className":3325,"dataFsResolvedFilePath":585,"href":586},[210],[123,3327,3328,3331],{},[207,3329,384],{"className":3330,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3333,3334,3337],{},[207,3335,578],{"className":3336,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3339,3340,3343],{},[207,3341,369],{"className":3342,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3345,2860,3346],{"id":2859},[207,3347,43],{"className":3348,"dataFsResolvedFilePath":2864,"href":2865},[210],[120,3350,3351,3356,3361],{},[123,3352,3353],{},[207,3354,222],{"className":3355,"dataFsResolvedFilePath":220,"href":221},[210],[123,3357,3358],{},[207,3359,249],{"className":3360,"dataFsResolvedFilePath":247,"href":248},[210],[123,3362,3363],{},[207,3364,231],{"className":3365,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3367},[3368,3369,3373,3377,3378,3379,3380],{"id":2936,"depth":642,"text":2937},{"id":3007,"depth":642,"text":3008,"children":3370},[3371,3372],{"id":3011,"depth":649,"text":3012},{"id":3071,"depth":649,"text":3072},{"id":3095,"depth":642,"text":3096,"children":3374},[3375,3376],{"id":1667,"depth":649,"text":1668},{"id":1725,"depth":649,"text":1726},{"id":3220,"depth":642,"text":3221},{"id":3246,"depth":642,"text":3247},{"id":2835,"depth":642,"text":2836},{"id":2859,"depth":642,"text":2892},[658],{},"\u002Ftopics\u002Fisms",{"title":2911,"description":641},[2406,3386,668],"raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3389,3390,672,2409],"iso-27001","iso-27002","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3393,"title":578,"body":3394,"course":659,"courses":3826,"created":660,"description":641,"extension":661,"meta":3827,"navigation":664,"path":3828,"seo":3829,"sources":3830,"stem":3833,"tags":3834,"type":2907,"updated":677,"__hash__":3840},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3395,"toc":3812},[3396,3399,3406,3413,3417,3455,3459,3463,3505,3509,3516,3519,3544,3548,3565,3569,3600,3604,3672,3676,3679,3696,3700,3738,3740,3777,3782],[12,3397,578],{"id":3398},"kybernetická-bezpečnost",[724,3400,3401],{},[1638,3402],{"alt":3403,"className":3404,"src":3405},"kb-defense-in-depth",[210,1642],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3407,3408,3409,3412],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3410,140],{"className":3411,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3414,3416],{"id":3415},"základní-pojmy","Základní pojmy",[120,3418,3419,3425,3431,3437,3443,3449],{},[123,3420,3421,3424],{},[38,3422,3423],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3426,3427,3430],{},[38,3428,3429],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3432,3433,3436],{},[38,3434,3435],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3438,3439,3442],{},[38,3440,3441],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3444,3445,3448],{},[38,3446,3447],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3450,3451,3454],{},[38,3452,3453],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3456,3458],{"id":3457},"typy-útoků","Typy útoků",[198,3460,3462],{"id":3461},"podle-cílení","Podle cílení",[16,3464,3465,3477],{},[19,3466,3467],{},[22,3468,3469,3472,3474],{},[25,3470,3471],{},"Typ",[25,3473,2457],{},[25,3475,3476],{},"Cíl",[30,3478,3479,3492],{},[22,3480,3481,3486,3489],{},[35,3482,3483],{},[38,3484,3485],{},"Plošný",[35,3487,3488],{},"Útočníkovi je jedno, kdo je obětí",[35,3490,3491],{},"Botnety, spam, ransomware",[22,3493,3494,3499,3502],{},[35,3495,3496],{},[38,3497,3498],{},"Cílený (APT)",[35,3500,3501],{},"Soustředěná pozornost na konkrétní cíl",[35,3503,3504],{},"Špionáž, sabotáž, krádež dat",[198,3506,3508],{"id":3507},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3510,3511],{},[1638,3512],{"alt":3513,"className":3514,"src":3515},"apt-faze-utoku",[210,1642],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3517,3518],{},"4 fáze:",[152,3520,3521,3526,3532,3538],{},[123,3522,3523,3525],{},[38,3524,2002],{}," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3527,3528,3531],{},[38,3529,3530],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3533,3534,3537],{},[38,3535,3536],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3539,3540,3543],{},[38,3541,3542],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3545,3547],{"id":3546},"základní-vektory-útoku","Základní vektory útoku",[120,3549,3550,3553,3556,3559,3562],{},[123,3551,3552],{},"Email s přílohou (spear phishing)",[123,3554,3555],{},"Trojanizované aplikace",[123,3557,3558],{},"Drive-by download (webové exploity)",[123,3560,3561],{},"Výměnná média (BadUSB)",[123,3563,3564],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3566,3568],{"id":3567},"software-útoky","Software útoky",[120,3570,3571,3577,3583,3589,3594],{},[123,3572,3573,3576],{},[38,3574,3575],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3578,3579,3582],{},[38,3580,3581],{},"Viry"," — poškození HW\u002FSW",[123,3584,3585,3588],{},[38,3586,3587],{},"Trojské koně"," — skrytá funkčnost",[123,3590,3591,3593],{},[38,3592,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3595,3596,3599],{},[38,3597,3598],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3601,3603],{"id":3602},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3605,3606,3618],{},[19,3607,3608],{},[22,3609,3610,3613,3615],{},[25,3611,3612],{},"Útok",[25,3614,3476],{},[25,3616,3617],{},"Efekt",[30,3619,3620,3631,3641,3652,3662],{},[22,3621,3622,3625,3628],{},[35,3623,3624],{},"Content Spoofing",[35,3626,3627],{},"Klient",[35,3629,3630],{},"Ztráta přihlašovacích údajů",[22,3632,3633,3636,3638],{},[35,3634,3635],{},"XSS",[35,3637,3627],{},[35,3639,3640],{},"Přístup k cookies",[22,3642,3643,3646,3649],{},[35,3644,3645],{},"SQL Injection",[35,3647,3648],{},"Server",[35,3650,3651],{},"Neoprávněný přístup do DB",[22,3653,3654,3657,3659],{},[35,3655,3656],{},"DoS\u002FDDoS",[35,3658,3648],{},[35,3660,3661],{},"Nedostupnost služby",[22,3663,3664,3667,3669],{},[35,3665,3666],{},"Path Traversal",[35,3668,3648],{},[35,3670,3671],{},"Přístup k souborům",[115,3673,3675],{"id":3674},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3677,3678],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3680,3681,3684,3687,3690,3693],{},[123,3682,3683],{},"Vydávání se za právníka",[123,3685,3686],{},"Podvod na CEO",[123,3688,3689],{},"Krádež dat (personální oddělení)",[123,3691,3692],{},"Kompromitace účtu",[123,3694,3695],{},"Falešné faktury",[115,3697,3699],{"id":3698},"obranné-technologie","Obranné technologie",[120,3701,3702,3708,3714,3720,3726,3732],{},[123,3703,3704,3707],{},[38,3705,3706],{},"NAC"," — řízení přístupu k síti",[123,3709,3710,3713],{},[38,3711,3712],{},"IDS"," — detekce průniku (pasivní)",[123,3715,3716,3719],{},[38,3717,3718],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3721,3722,3725],{},[38,3723,3724],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3727,3728,3731],{},[38,3729,3730],{},"DLP"," — prevence úniku dat",[123,3733,3734,3737],{},[38,3735,3736],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3739,2836],{"id":2835},[120,3741,3742,3748,3754,3760,3771],{},[123,3743,3744,3747],{},[207,3745,140],{"className":3746,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3749,3750,3753],{},[207,3751,569],{"className":3752,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3755,3756,3759],{},[207,3757,240],{"className":3758,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3761,3762,3765,3766,3770],{},[207,3763,384],{"className":3764,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3767,3769],{"className":3768,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3772,3773,3776],{},[207,3774,369],{"className":3775,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3778,2860,3779],{"id":2859},[207,3780,43],{"className":3781,"dataFsResolvedFilePath":2864,"href":2865},[210],[120,3783,3784,3790,3795,3800,3805],{},[123,3785,3786],{},[207,3787,3789],{"className":3788,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3791,3792],{},[207,3793,417],{"className":3794,"dataFsResolvedFilePath":415,"href":416},[210],[123,3796,3797],{},[207,3798,351],{"className":3799,"dataFsResolvedFilePath":349,"href":350},[210],[123,3801,3802],{},[207,3803,426],{"className":3804,"dataFsResolvedFilePath":424,"href":425},[210],[123,3806,3807],{},[207,3808,458],{"className":3809,"dataFsResolvedFilePath":3810,"href":3811},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3813},[3814,3815,3821,3822,3823,3824,3825],{"id":3415,"depth":642,"text":3416},{"id":3457,"depth":642,"text":3458,"children":3816},[3817,3818,3819,3820],{"id":3461,"depth":649,"text":3462},{"id":3507,"depth":649,"text":3508},{"id":3546,"depth":649,"text":3547},{"id":3567,"depth":649,"text":3568},{"id":3602,"depth":642,"text":3603},{"id":3674,"depth":642,"text":3675},{"id":3698,"depth":642,"text":3699},{"id":2835,"depth":642,"text":2836},{"id":2859,"depth":642,"text":2892},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3831,3832,2406],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3835,3836,3837,3838,3839],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3842,"title":369,"body":3843,"course":659,"courses":4102,"created":660,"description":641,"extension":661,"meta":4103,"navigation":664,"path":4104,"seo":4105,"sources":4106,"stem":4110,"tags":4111,"type":2907,"updated":677,"__hash__":4118},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3844,"toc":4088},[3845,3848,3855,3858,3862,3922,3926,3930,3941,3945,3956,3960,3968,3970,3981,3985,3990,3994,4005,4009,4029,4031,4063,4068],[12,3846,369],{"id":3847},"ochrana-dat",[724,3849,3850],{},[1638,3851],{"alt":3852,"className":3853,"src":3854},"ochrana-dat-technologie",[210,1642],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3856,3857],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3859,3861],{"id":3860},"formy-zneužití-dat","Formy zneužití dat",[16,3863,3864,3873],{},[19,3865,3866],{},[22,3867,3868,3871],{},[25,3869,3870],{},"Forma",[25,3872,2457],{},[30,3874,3875,3882,3890,3898,3906,3914],{},[22,3876,3877,3880],{},[35,3878,3879],{},"Zašifrování",[35,3881,435],{},[22,3883,3884,3887],{},[35,3885,3886],{},"Zveřejnění",[35,3888,3889],{},"Double ransomware",[22,3891,3892,3895],{},[35,3893,3894],{},"Odposlech",[35,3896,3897],{},"Pasivní sběr dat",[22,3899,3900,3903],{},[35,3901,3902],{},"Krádež",[35,3904,3905],{},"Cílená exfiltrace",[22,3907,3908,3911],{},[35,3909,3910],{},"Krádež dodavatelského řetězce",[35,3912,3913],{},"Triple ransomware",[22,3915,3916,3919],{},[35,3917,3918],{},"Prodej",[35,3920,3921],{},"Darknet marketplace",[115,3923,3925],{"id":3924},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3927,3929],{"id":3928},"nac-network-access-control","NAC (Network Access Control)",[120,3931,3932,3935,3938],{},[123,3933,3934],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3936,3937],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3939,3940],{},"Ekvivalenty: MDM, BYOD",[198,3942,3944],{"id":3943},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3946,3947,3950,3953],{},[123,3948,3949],{},"Monitoruje síťový provoz, generuje alerty",[123,3951,3952],{},"Pasivní systém — nezasahuje do provozu",[123,3954,3955],{},"Signaturová a anomální detekce",[198,3957,3959],{"id":3958},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3961,3962,3965],{},[123,3963,3964],{},"Aktivní systém — blokuje škodlivý provoz",[123,3966,3967],{},"Zařazen přímo do síťové cesty (in-line)",[198,3969,1855],{"id":1854},[120,3971,3972,3975,3978],{},[123,3973,3974],{},"Centralizovaná správa bezpečnostních logů",[123,3976,3977],{},"Sběr s agentem i bez agenta",[123,3979,3980],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3982,3984],{"id":3983},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3986,3987],{},[123,3988,3989],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3991,3993],{"id":3992},"šifrování","Šifrování",[120,3995,3996,3999,4002],{},[123,3997,3998],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,4000,4001],{},"RSA (2048+ bit), DSS",[123,4003,4004],{},"SHA-256, SHA-1",[115,4006,4008],{"id":4007},"ipv6-bezpečnost","IPv6 bezpečnost",[120,4010,4011,4017,4023,4026],{},[123,4012,4013,4016],{},[38,4014,4015],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,4018,4019,4022],{},[38,4020,4021],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,4024,4025],{},"Transportní a tunelovací režim",[123,4027,4028],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,4030,2836],{"id":2835},[120,4032,4033,4039,4045,4051,4057],{},[123,4034,4035,4038],{},[207,4036,140],{"className":4037,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,4040,4041,4044],{},[207,4042,578],{"className":4043,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,4046,4047,4050],{},[207,4048,569],{"className":4049,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,4052,4053,4056],{},[207,4054,351],{"className":4055,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,4058,4059,4062],{},[207,4060,360],{"className":4061,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,4064,2860,4065],{"id":2859},[207,4066,43],{"className":4067,"dataFsResolvedFilePath":2864,"href":2865},[210],[120,4069,4070,4076,4082],{},[123,4071,4072],{},[207,4073,4075],{"className":4074,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,4077,4078],{},[207,4079,4081],{"className":4080,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,4083,4084],{},[207,4085,4087],{"className":4086,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":4089},[4090,4091,4099,4100,4101],{"id":3860,"depth":642,"text":3861},{"id":3924,"depth":642,"text":3925,"children":4092},[4093,4094,4095,4096,4097,4098],{"id":3928,"depth":649,"text":3929},{"id":3943,"depth":649,"text":3944},{"id":3958,"depth":649,"text":3959},{"id":1854,"depth":649,"text":1855},{"id":3983,"depth":649,"text":3984},{"id":3992,"depth":649,"text":3993},{"id":4007,"depth":642,"text":4008},{"id":2835,"depth":642,"text":2836},{"id":2859,"depth":642,"text":2892},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[4107,4108,4109],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3847,4112,4113,4114,4115,4116,4117],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":4120,"title":569,"body":4121,"course":659,"courses":4456,"created":660,"description":641,"extension":661,"meta":4457,"navigation":664,"path":4458,"seo":4459,"sources":4460,"stem":4461,"tags":4462,"type":2907,"updated":677,"__hash__":4468},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":4122,"toc":4445},[4123,4126,4133,4140,4144,4208,4212,4262,4266,4271,4290,4294,4297,4301,4315,4319,4347,4351,4400,4402,4427,4432],[12,4124,569],{"id":4125},"řízení-rizik",[724,4127,4128],{},[1638,4129],{"alt":4130,"className":4131,"src":4132},"rizeni-rizik-proces",[210,1642],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,4134,4135,4136,4139],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,4137,140],{"className":4138,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,4141,4143],{"id":4142},"normativní-základ","Normativní základ",[16,4145,4146,4156],{},[19,4147,4148],{},[22,4149,4150,4153],{},[25,4151,4152],{},"Norma",[25,4154,4155],{},"Zaměření",[30,4157,4158,4168,4178,4188,4198],{},[22,4159,4160,4165],{},[35,4161,4162],{},[38,4163,4164],{},"ISO 31000:2019",[35,4166,4167],{},"Obecné smrnice pro management rizik",[22,4169,4170,4175],{},[35,4171,4172],{},[38,4173,4174],{},"ISO 31010:2020",[35,4176,4177],{},"Techniky posuzování rizik",[22,4179,4180,4185],{},[35,4181,4182],{},[38,4183,4184],{},"ISO\u002FIEC 27005:2019",[35,4186,4187],{},"Řízení rizik bezpečnosti informací",[22,4189,4190,4195],{},[35,4191,4192],{},[38,4193,4194],{},"NIST SP 800-30",[35,4196,4197],{},"Průvodce hodnocením rizik",[22,4199,4200,4205],{},[35,4201,4202],{},[38,4203,4204],{},"NIST SP 800-39",[35,4206,4207],{},"Proces řízení bezpečnostních rizik",[115,4209,4211],{"id":4210},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4213,4214,4220,4226,4232,4238,4244,4250,4256],{},[123,4215,4216,4219],{},[38,4217,4218],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4221,4222,4225],{},[38,4223,4224],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4227,4228,4231],{},[38,4229,4230],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4233,4234,4237],{},[38,4235,4236],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4239,4240,4243],{},[38,4241,4242],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4245,4246,4249],{},[38,4247,4248],{},"Akceptace rizik"," — formální rozhodnutí",[123,4251,4252,4255],{},[38,4253,4254],{},"Komunikace"," — sdílení informací o rizicích",[123,4257,4258,4261],{},[38,4259,4260],{},"Monitorování"," — průběžné přezkoumávání",[115,4263,4265],{"id":4264},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4267,4268],{},[38,4269,4270],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4272,4273,4279,4284],{},[123,4274,4275,4278],{},[38,4276,4277],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4280,4281,4283],{},[38,4282,3435],{}," — slabé místo aktiva (stupnice 1–5)",[123,4285,4286,4289],{},[38,4287,4288],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4291,4293],{"id":4292},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4295,4296],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4298,4300],{"id":4299},"klíčové-dokumenty","Klíčové dokumenty",[120,4302,4303,4309],{},[123,4304,4305,4308],{},[38,4306,4307],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4310,4311,4314],{},[38,4312,4313],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4316,4318],{"id":4317},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4320,4321,4327,4332,4337,4342],{},[123,4322,4323,4326],{},[38,4324,4325],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4328,4329,4331],{},[38,4330,3157],{}," — odpovědný za ISMS",[123,4333,4334,4336],{},[38,4335,3168],{}," — návrh a implementace opatření",[123,4338,4339,4341],{},[38,4340,3178],{}," — provádění auditů",[123,4343,4344,4346],{},[38,4345,3188],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4348,4350],{"id":4349},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4352,4353,4365],{},[19,4354,4355],{},[22,4356,4357,4360,4362],{},[25,4358,4359],{},"Úroveň",[25,4361,4155],{},[25,4363,4364],{},"Typ rizika",[30,4366,4367,4378,4389],{},[22,4368,4369,4372,4375],{},[35,4370,4371],{},"Stupeň 1",[35,4373,4374],{},"Organizace",[35,4376,4377],{},"Strategické riziko",[22,4379,4380,4383,4386],{},[35,4381,4382],{},"Stupeň 2",[35,4384,4385],{},"Poslání\u002Fobchodní procesy",[35,4387,4388],{},"Taktické riziko",[22,4390,4391,4394,4397],{},[35,4392,4393],{},"Stupeň 3",[35,4395,4396],{},"Informační systémy",[35,4398,4399],{},"Operační riziko",[115,4401,2836],{"id":2835},[120,4403,4404,4410,4416,4422],{},[123,4405,4406,4409],{},[207,4407,140],{"className":4408,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4411,4412,4415],{},[207,4413,384],{"className":4414,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4417,4418,4421],{},[207,4419,393],{"className":4420,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4423,4424,4044],{},[207,4425,578],{"className":4426,"dataFsResolvedFilePath":576,"href":577},[210],[115,4428,2860,4429],{"id":2859},[207,4430,43],{"className":4431,"dataFsResolvedFilePath":2864,"href":2865},[210],[120,4433,4434,4440],{},[123,4435,4436],{},[207,4437,4439],{"className":4438,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4441,4442],{},[207,4443,222],{"className":4444,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4446},[4447,4448,4449,4450,4451,4452,4453,4454,4455],{"id":4142,"depth":642,"text":4143},{"id":4210,"depth":642,"text":4211},{"id":4264,"depth":642,"text":4265},{"id":4292,"depth":642,"text":4293},{"id":4299,"depth":642,"text":4300},{"id":4317,"depth":642,"text":4318},{"id":4349,"depth":642,"text":4350},{"id":2835,"depth":642,"text":2836},{"id":2859,"depth":642,"text":2892},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3386,2406],"topics\u002Frizeni-rizik",[658,4463,4464,4465,4466,4467],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4470,"title":4471,"body":4472,"course":659,"courses":4703,"created":660,"description":641,"extension":661,"meta":4704,"navigation":664,"path":4705,"seo":4706,"sources":4707,"stem":4709,"tags":4710,"type":2907,"updated":677,"__hash__":4715},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4473,"toc":4695},[4474,4477,4484,4487,4491,4590,4594,4629,4633,4653,4657,4660,4662,4682,4687],[12,4475,4471],{"id":4476},"sae-budování-bezpečnostního-povědomí",[724,4478,4479],{},[1638,4480],{"alt":4481,"className":4482,"src":4483},"sae-pyramida",[210,1642],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4485,4486],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4488,4490],{"id":4489},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4492,4493,4510],{},[19,4494,4495],{},[22,4496,4497,4499,4502,4504,4507],{},[25,4498,4359],{},[25,4500,4501],{},"Příznak",[25,4503,3476],{},[25,4505,4506],{},"Metody",[25,4508,4509],{},"Časový rámec",[30,4511,4512,4532,4552,4572],{},[22,4513,4514,4520,4523,4526,4529],{},[35,4515,4516,4519],{},[38,4517,4518],{},"Awareness"," (povědomí)",[35,4521,4522],{},"„Co\"",[35,4524,4525],{},"Rozpoznávání",[35,4527,4528],{},"Média, videa, plakáty",[35,4530,4531],{},"Krátkodobý",[22,4533,4534,4540,4543,4546,4549],{},[35,4535,4536,4539],{},[38,4537,4538],{},"Training"," (výcvik)",[35,4541,4542],{},"„Jak\"",[35,4544,4545],{},"Dovednosti",[35,4547,4548],{},"Přednášky, případovky, cvičení",[35,4550,4551],{},"Střednědobý",[22,4553,4554,4560,4563,4566,4569],{},[35,4555,4556,4559],{},[38,4557,4558],{},"Education"," (vzdělávání)",[35,4561,4562],{},"„Proč\"",[35,4564,4565],{},"Porozumění",[35,4567,4568],{},"Semináře, diskuze, výzkum",[35,4570,4571],{},"Dlouhodobý",[22,4573,4574,4579,4581,4584,4587],{},[35,4575,4576],{},[38,4577,4578],{},"Professional Development",[35,4580,3160],{},[35,4582,4583],{},"Profesní rozvoj",[35,4585,4586],{},"Certifikace, konference",[35,4588,4589],{},"Průběžný",[115,4591,4593],{"id":4592},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4595,4596,4599,4602,4605,4608,4611,4614,4617,4620,4623,4626],{},[123,4597,4598],{},"Role a odpovědnosti v programu",[123,4600,4601],{},"Stanovení cílů pro každou fázi",[123,4603,4604],{},"Rozdělení uživatelů (analýza)",[123,4606,4607],{},"Vytvoření školících materiálů dle skupin",[123,4609,4610],{},"Určení cíle pro každou skupinu",[123,4612,4613],{},"Témata pro každou relaci\u002Fkurz",[123,4615,4616],{},"Metody nasazení (metodiky)",[123,4618,4619],{},"Dokumentace a zpětná vazba",[123,4621,4622],{},"Vyhodnocení a aktualizace materiálů",[123,4624,4625],{},"Četnost opakování",[123,4627,4628],{},"Kalkulace",[115,4630,4632],{"id":4631},"modely-řízení","Modely řízení",[120,4634,4635,4641,4647],{},[123,4636,4637,4640],{},[38,4638,4639],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4642,4643,4646],{},[38,4644,4645],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4648,4649,4652],{},[38,4650,4651],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4654,4656],{"id":4655},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4658,4659],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4661,2836],{"id":2835},[120,4663,4664,4670,4676],{},[123,4665,4666,4669],{},[207,4667,140],{"className":4668,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4671,4672,4675],{},[207,4673,578],{"className":4674,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4677,4678,4681],{},[207,4679,569],{"className":4680,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4683,2860,4684],{"id":2859},[207,4685,43],{"className":4686,"dataFsResolvedFilePath":2864,"href":2865},[210],[120,4688,4689],{},[123,4690,4691],{},[207,4692,4694],{"className":4693,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4696},[4697,4698,4699,4700,4701,4702],{"id":4489,"depth":642,"text":4490},{"id":4592,"depth":642,"text":4593},{"id":4631,"depth":642,"text":4632},{"id":4655,"depth":642,"text":4656},{"id":2835,"depth":642,"text":2836},{"id":2859,"depth":642,"text":2892},[658],{},"\u002Ftopics\u002Fsae",{"title":4471,"description":641},[4708],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4711,4712,4713,4466,4714],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4717,4719,4722,4724],{"slug":658,"path":2865,"title":7,"snippet":4718},"… ášky - Detail předmětu — sylabus kurzu, hodnocení, literatura - \u003C\u003Cimork-manazerska-bezpecnost>> — governance, SIEM, log management, bezpečnostní role - [[imork-bezpecnostni-strategie|Be …",{"slug":4720,"path":230,"title":231,"snippet":4721},"imork-bezpecnostni-strategie","… — strategická analýza hrozeb - SAE — strategický cíl č. 5 (zvyšování povědomí) - \u003C\u003Cimork-manazerska-bezpecnost>> — governance a role ## Zdroj v kurzu ImorK - Přednáška 2101 — Bezpečnostní st …",{"slug":671,"path":560,"title":2911,"snippet":4723},"… [ochrana-dat|Ochrana dat]] — technologická opatření ## Zdroje v kurzu ImorK - \u003C\u003Cimork-manazerska-bezpecnost>> - Risk Management - [[imork-bezpecnostni-strategie|Bezpečnostní …",{"slug":4463,"path":568,"title":569,"snippet":4725},"… kurzu ImorK - Risk Management — shrnutí přednášky - \u003C\u003Cimork-manazerska-bezpecnost>>",[4727,4728,4731,4732,4735],{"slug":671,"title":2911,"path":560,"sharedTags":649},{"slug":4729,"title":4730,"path":317,"sharedTags":642},"imork-automotive","Automotive bezpečnost",{"slug":4720,"title":231,"path":230,"sharedTags":642},{"slug":4733,"title":4734,"path":212,"sharedTags":642},"imork-detail-predmetu","ImorK — Detail předmětu",{"slug":4736,"title":4737,"path":263,"sharedTags":642},"imork-akademicke-prostredi","ImorK — ISMS v akademickém prostředí",1777154960008]