[{"data":1,"prerenderedAt":4530},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-mobilni-bezpecnost":1626,"course-stats-imork":2205,"course-topics-imork":2209,"backlinks-imork-mobilni-bezpecnost":4512,"related-imork-mobilni-bezpecnost":4515},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2204},{"id":1628,"title":522,"body":1629,"course":658,"courses":659,"created":660,"description":2188,"extension":661,"meta":2189,"navigation":664,"path":2190,"seo":2191,"sources":2192,"stem":2194,"tags":2195,"type":2202,"updated":677,"__hash__":2203},"summaries\u002Fsummaries\u002Fimork-mobilni-bezpecnost.md",{"type":9,"value":1630,"toc":2171},[1631,1634,1643,1647,1703,1707,1741,1745,1748,1752,1784,1788,1813,1817,1844,1848,1995,1999,2021,2025,2029,2041,2045,2059,2063,2116,2120],[12,1632,522],{"id":1633},"mobilní-bezpečnost",[724,1635,1636,1637,1642],{},"Případová studie (35 slidů, 1.11.2021) pokrývající bezpečnost mobilních zařízení — od standardů NIST přes konkrétní útoky až po bezpečnost 5G sítí. Součást kurzu ",[207,1638,43],{"className":1639,"dataFsResolvedFilePath":1640,"href":1641},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",".",[115,1644,1646],{"id":1645},"standardy-a-doporučení","Standardy a doporučení",[16,1648,1649,1659],{},[19,1650,1651],{},[22,1652,1653,1656],{},[25,1654,1655],{},"Standard",[25,1657,1658],{},"Zaměření",[30,1660,1661,1671,1681,1692],{},[22,1662,1663,1668],{},[35,1664,1665],{},[38,1666,1667],{},"NIST SP 1800-4B\u002F4C",[35,1669,1670],{},"Bezpečnost mobilních zařízení v podnikovém prostředí",[22,1672,1673,1678],{},[35,1674,1675],{},[38,1676,1677],{},"NIST SP 1800-21",[35,1679,1680],{},"Správa mobilních zařízení (MDM)",[22,1682,1683,1689],{},[35,1684,1685,1688],{},[38,1686,1687],{},"ENISA Mobile App Privacy"," (2017)",[35,1690,1691],{},"Ochrana soukromí v mobilních aplikacích",[22,1693,1694,1700],{},[35,1695,1696,1699],{},[38,1697,1698],{},"Agile SDL"," (Microsoft)",[35,1701,1702],{},"Bezpečný životní cyklus vývoje SW — integrace bezpečnosti do agilního vývoje",[115,1704,1706],{"id":1705},"simjacker-útok","SIMJacker útok",[120,1708,1709,1716,1719,1730,1733],{},[123,1710,1711,1712,1715],{},"Zranitelnost ",[38,1713,1714],{},"S@T Browser"," (SIM Application Toolkit) — zastaralá technologie v SIM kartách",[123,1717,1718],{},"Útočník zasílá speciálně vytvořené SMS",[123,1720,1721,1722,1725,1726,1729],{},"Získání ",[38,1723,1724],{},"IMEI"," a ",[38,1727,1728],{},"polohy"," zařízení bez vědomí uživatele",[123,1731,1732],{},"Postiženy SIM karty ve více než 30 zemích",[123,1734,1735,1736,1740],{},"Propojení s ",[207,1737,1739],{"className":1738,"dataFsResolvedFilePath":576,"href":577},[210],"kybernetickou bezpečností"," mobilních sítí",[115,1742,1744],{"id":1743},"sim-swapping","SIM swapping",[724,1746,1747],{},"Podvodná výměna SIM karty — převzetí telefonního čísla oběti.",[198,1749,1751],{"id":1750},"_5-kroků-útoku","5 kroků útoku",[152,1753,1754,1760,1766,1772,1778],{},[123,1755,1756,1759],{},[38,1757,1758],{},"Průzkum"," — sběr informací o oběti (sociální sítě, OSINT)",[123,1761,1762,1765],{},[38,1763,1764],{},"Sociální inženýrství"," — kontakt operátora, přesvědčení o změně SIM",[123,1767,1768,1771],{},[38,1769,1770],{},"Převod čísla"," — aktivace nové SIM s číslem oběti",[123,1773,1774,1777],{},[38,1775,1776],{},"Přístup"," — příjem SMS kódů, 2FA obcházení",[123,1779,1780,1783],{},[38,1781,1782],{},"Zneužití"," — přístup k bankovnictví, emailu, sociálním sítím",[198,1785,1787],{"id":1786},"obrana","Obrana",[120,1789,1790,1796,1799,1802],{},[123,1791,1792,1795],{},[38,1793,1794],{},"eSIM"," — elektronická SIM bez fyzické výměny",[123,1797,1798],{},"PIN na účet u operátora",[123,1800,1801],{},"Nepoužívat SMS jako jediný faktor 2FA",[123,1803,1804,1805,1725,1809],{},"Souvisí s ",[207,1806,1808],{"className":1807,"dataFsResolvedFilePath":544,"href":545},[210],"digitální identitou",[207,1810,1812],{"className":1811,"dataFsResolvedFilePath":484,"href":485},[210],"správou přístupů",[115,1814,1816],{"id":1815},"malware-rogue-mrat","Malware Rogue (MRAT)",[120,1818,1819,1825,1831,1834,1841],{},[123,1820,1821,1824],{},[38,1822,1823],{},"Mobile Remote Access Trojan"," — vzdálený přístup k zařízení",[123,1826,1827,1828],{},"Cena na Dark Webu: ",[38,1829,1830],{},"$30–190",[123,1832,1833],{},"Distribuce přes falešné aplikace, phishing",[123,1835,1836,1837,1840],{},"Využití platformy ",[38,1838,1839],{},"Firebase"," pro C&C komunikaci",[123,1842,1843],{},"Plný přístup k zařízení: kamera, mikrofon, soubory, SMS",[115,1845,1847],{"id":1846},"_10-typů-útoků-na-mobilní-zařízení","10 typů útoků na mobilní zařízení",[16,1849,1850,1863],{},[19,1851,1852],{},[22,1853,1854,1857,1860],{},[25,1855,1856],{},"#",[25,1858,1859],{},"Útok",[25,1861,1862],{},"Popis",[30,1864,1865,1878,1891,1904,1917,1930,1943,1956,1969,1982],{},[22,1866,1867,1870,1875],{},[35,1868,1869],{},"1",[35,1871,1872],{},[38,1873,1874],{},"GPS špehování",[35,1876,1877],{},"Sledování polohy bez vědomí uživatele",[22,1879,1880,1883,1888],{},[35,1881,1882],{},"2",[35,1884,1885],{},[38,1886,1887],{},"SDK Igexin",[35,1889,1890],{},"Škodlivý reklamní SDK ve legitimních aplikacích",[22,1892,1893,1896,1901],{},[35,1894,1895],{},"3",[35,1897,1898],{},[38,1899,1900],{},"Foto\u002Fvideo špehování",[35,1902,1903],{},"Neoprávněný přístup ke kameře",[22,1905,1906,1909,1914],{},[35,1907,1908],{},"4",[35,1910,1911],{},[38,1912,1913],{},"Ransomware Charger",[35,1915,1916],{},"Zašifrování dat na mobilu, výkupné",[22,1918,1919,1922,1927],{},[35,1920,1921],{},"5",[35,1923,1924],{},[38,1925,1926],{},"Brain Test",[35,1928,1929],{},"Malware v Google Play s root exploitem",[22,1931,1932,1935,1940],{},[35,1933,1934],{},"6",[35,1936,1937],{},[38,1938,1939],{},"Godless exploit",[35,1941,1942],{},"Rootování zařízení přes známé zranitelnosti",[22,1944,1945,1948,1953],{},[35,1946,1947],{},"7",[35,1949,1950],{},[38,1951,1952],{},"CopyCat",[35,1954,1955],{},"Malware infikující 14M zařízení, podvodné reklamy",[22,1957,1958,1961,1966],{},[35,1959,1960],{},"8",[35,1962,1963],{},[38,1964,1965],{},"Audiotextové linky",[35,1967,1968],{},"Malware tajně volající prémiová čísla",[22,1970,1971,1974,1979],{},[35,1972,1973],{},"9",[35,1975,1976],{},[38,1977,1978],{},"MediaTek\u002FAdups firmware spyware",[35,1980,1981],{},"Spyware přímo ve firmware levných zařízení",[22,1983,1984,1987,1992],{},[35,1985,1986],{},"10",[35,1988,1989],{},[38,1990,1991],{},"Levná čínská zařízení",[35,1993,1994],{},"Předinstalovaný malware od výrobce",[115,1996,1998],{"id":1997},"chytré-hodinky-odposlech-dětí","Chytré hodinky — odposlech dětí",[120,2000,2001,2007,2010,2013],{},[123,2002,2003,2006],{},[38,2004,2005],{},"Německo"," — zákaz prodeje dětských chytrých hodinek s odposlouchávací funkcí",[123,2008,2009],{},"Rodiče mohli vzdáleně aktivovat mikrofon",[123,2011,2012],{},"Zařízení klasifikována jako nelegální odposlouchávací technika",[123,2014,2015,2016,2020],{},"Otázka ",[207,2017,2019],{"className":2018,"dataFsResolvedFilePath":601,"href":602},[210],"ochrany soukromí"," dětí vs. bezpečnosti",[115,2022,2024],{"id":2023},"_5g-bezpečnost","5G bezpečnost",[198,2026,2028],{"id":2027},"kritická-infrastruktura","Kritická infrastruktura",[120,2030,2031,2034],{},[123,2032,2033],{},"5G sítě jako páteř kritické infrastruktury (IoT, autonomní vozidla, telemedicína)",[123,2035,2036,2037],{},"Zvýšené nároky na ",[207,2038,2040],{"className":2039,"dataFsResolvedFilePath":576,"href":577},[210],"kybernetickou bezpečnost",[198,2042,2044],{"id":2043},"common-criteria-eal3","Common Criteria EAL3+",[120,2046,2047,2050,2056],{},[123,2048,2049],{},"Mezinárodní standard pro hodnocení bezpečnosti IT produktů",[123,2051,2052,2055],{},[38,2053,2054],{},"EAL3+"," — úroveň vyžadovaná pro 5G síťové prvky",[123,2057,2058],{},"Metodicky testováno a ověřováno",[198,2060,2062],{"id":2061},"zte-5g-ran-testování","ZTE 5G-RAN testování",[16,2064,2065,2075],{},[19,2066,2067],{},[22,2068,2069,2072],{},[25,2070,2071],{},"Aspekt",[25,2073,2074],{},"Detail",[30,2076,2077,2087,2096,2106],{},[22,2078,2079,2084],{},[35,2080,2081],{},[38,2082,2083],{},"Produkt",[35,2085,2086],{},"ZTE 5G-RAN (Radio Access Network)",[22,2088,2089,2094],{},[35,2090,2091],{},[38,2092,2093],{},"Certifikace",[35,2095,2044],{},[22,2097,2098,2103],{},[35,2099,2100],{},[38,2101,2102],{},"Testovací laboratoře",[35,2104,2105],{},"TÜV Rheinland, Brightsight BV",[22,2107,2108,2113],{},[35,2109,2110],{},[38,2111,2112],{},"Význam",[35,2114,2115],{},"První 5G certifikace tohoto typu",[115,2117,2119],{"id":2118},"souvislosti","Souvislosti",[120,2121,2122,2128,2135,2141,2147,2153,2159,2165],{},[123,2123,2124,2127],{},[207,2125,578],{"className":2126,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext mobilních hrozeb",[123,2129,2130,2134],{},[207,2131,2133],{"className":2132,"dataFsResolvedFilePath":544,"href":545},[210],"Digitální identita"," — autentizace na mobilních zařízeních",[123,2136,2137,2140],{},[207,2138,486],{"className":2139,"dataFsResolvedFilePath":484,"href":485},[210]," — hesla a přístupy",[123,2142,2143,2146],{},[207,2144,369],{"className":2145,"dataFsResolvedFilePath":601,"href":602},[210]," — soukromí uživatelů mobilních zařízení",[123,2148,2149,2152],{},[207,2150,477],{"className":2151,"dataFsResolvedFilePath":475,"href":476},[210]," — exfiltrace přes mobilní malware",[123,2154,2155,2158],{},[207,2156,140],{"className":2157,"dataFsResolvedFilePath":559,"href":560},[210]," — správa mobilních zařízení v organizaci (MDM\u002FEMM)",[123,2160,2161,2164],{},[207,2162,240],{"className":2163,"dataFsResolvedFilePath":585,"href":586},[210]," — bezpečnostní architektura",[123,2166,2167,2170],{},[207,2168,453],{"className":2169,"dataFsResolvedFilePath":451,"href":452},[210]," — OSINT a APT skupiny cílící na mobilní platformy",{"title":641,"searchDepth":642,"depth":642,"links":2172},[2173,2174,2175,2179,2180,2181,2182,2187],{"id":1645,"depth":642,"text":1646},{"id":1705,"depth":642,"text":1706},{"id":1743,"depth":642,"text":1744,"children":2176},[2177,2178],{"id":1750,"depth":649,"text":1751},{"id":1786,"depth":649,"text":1787},{"id":1815,"depth":642,"text":1816},{"id":1846,"depth":642,"text":1847},{"id":1997,"depth":642,"text":1998},{"id":2023,"depth":642,"text":2024,"children":2183},[2184,2185,2186],{"id":2027,"depth":649,"text":2028},{"id":2043,"depth":649,"text":2044},{"id":2061,"depth":649,"text":2062},{"id":2118,"depth":642,"text":2119},"Případová studie (35 slidů, 1.11.2021) pokrývající bezpečnost mobilních zařízení — od standardů NIST přes konkrétní útoky až po bezpečnost 5G sítí. Součást kurzu ImorK.",{},"\u002Fsummaries\u002Fimork-mobilni-bezpecnost",{"title":522,"description":2188},[2193],"raw\u002Fimork\u002F2206 VUT_Bezp_Případovka Mobilní bezpečnost-2021.pdf","summaries\u002Fimork-mobilni-bezpecnost",[658,2196,2197,2198,2199,2200,2201],"mobilni-bezpecnost","sim","5g","malware","nist","common-criteria","summary","azYZC9l9BP7AeGab4MyUWTfWKCa-dPQYk18zEMYsiH0","summaries",{"zapisku":1624,"topics":2206,"summaries":2207,"outputs":2208},6,35,0,[2210,2690,3189,3638,3918,4265],{"id":2211,"title":2212,"body":2213,"course":659,"courses":2674,"created":660,"description":641,"extension":661,"meta":2675,"navigation":664,"path":2676,"seo":2677,"sources":2678,"stem":2681,"tags":2682,"type":2688,"updated":677,"__hash__":2689},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2214,"toc":2661},[2215,2218,2227,2230,2234,2327,2331,2385,2389,2412,2416,2505,2509,2512,2516,2586,2590,2616,2620,2640,2647],[12,2216,2212],{"id":2217},"bcm-řízení-kontinuity-činnosti",[724,2219,2220],{},[2221,2222],"img",{"alt":2223,"className":2224,"src":2226},"bcm-rpo-rto",[210,2225],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2228,2229],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2231,2233],{"id":2232},"klíčové-pojmy","Klíčové pojmy",[16,2235,2236,2248],{},[19,2237,2238],{},[22,2239,2240,2243,2246],{},[25,2241,2242],{},"Pojem",[25,2244,2245],{},"Anglicky",[25,2247,1862],{},[30,2249,2250,2263,2275,2288,2301,2314],{},[22,2251,2252,2257,2260],{},[35,2253,2254],{},[38,2255,2256],{},"BCMS",[35,2258,2259],{},"Business Continuity Management System",[35,2261,2262],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2264,2265,2269,2272],{},[35,2266,2267],{},[38,2268,384],{},[35,2270,2271],{},"Business Continuity Management",[35,2273,2274],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2276,2277,2282,2285],{},[35,2278,2279],{},[38,2280,2281],{},"BIA",[35,2283,2284],{},"Business Impact Analysis",[35,2286,2287],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2289,2290,2295,2298],{},[35,2291,2292],{},[38,2293,2294],{},"MBCO",[35,2296,2297],{},"Minimum Business Continuity Objective",[35,2299,2300],{},"Minimální přijatelná úroveň služeb",[22,2302,2303,2308,2311],{},[35,2304,2305],{},[38,2306,2307],{},"RPO",[35,2309,2310],{},"Recovery Point Objective",[35,2312,2313],{},"Do jakého bodu v minulosti lze obnovit data",[22,2315,2316,2321,2324],{},[35,2317,2318],{},[38,2319,2320],{},"RTO",[35,2322,2323],{},"Recovery Time Objective",[35,2325,2326],{},"Čas potřebný pro obnovu provozu",[115,2328,2330],{"id":2329},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2332,2333,2343],{},[19,2334,2335],{},[22,2336,2337,2340],{},[25,2338,2339],{},"Fáze",[25,2341,2342],{},"Obsah",[30,2344,2345,2355,2365,2375],{},[22,2346,2347,2352],{},[35,2348,2349],{},[38,2350,2351],{},"Plan",[35,2353,2354],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2356,2357,2362],{},[35,2358,2359],{},[38,2360,2361],{},"Do",[35,2363,2364],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2366,2367,2372],{},[35,2368,2369],{},[38,2370,2371],{},"Check",[35,2373,2374],{},"Monitoring, audit, přezkoumání managementem",[22,2376,2377,2382],{},[35,2378,2379],{},[38,2380,2381],{},"Act",[35,2383,2384],{},"Nápravná opatření, neustálé zlepšování",[115,2386,2388],{"id":2387},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2390,2391,2394,2397,2400,2403,2406,2409],{},[123,2392,2393],{},"Kap. 4 — kontext organizace",[123,2395,2396],{},"Kap. 5 — vedení (leadership)",[123,2398,2399],{},"Kap. 6 — plánování (BIA, rizika)",[123,2401,2402],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2404,2405],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2407,2408],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2410,2411],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2413,2415],{"id":2414},"analýza-steeple","Analýza STEEPLE",[16,2417,2418,2428],{},[19,2419,2420],{},[22,2421,2422,2425],{},[25,2423,2424],{},"Faktor",[25,2426,2427],{},"Oblast",[30,2429,2430,2441,2452,2463,2473,2484,2495],{},[22,2431,2432,2438],{},[35,2433,2434,2437],{},[38,2435,2436],{},"S","ociální",[35,2439,2440],{},"Zaměstnanost, bezpečnost, komunity",[22,2442,2443,2449],{},[35,2444,2445,2448],{},[38,2446,2447],{},"T","echnologický",[35,2450,2451],{},"Závislost na technologiích",[22,2453,2454,2460],{},[35,2455,2456,2459],{},[38,2457,2458],{},"E","konomický",[35,2461,2462],{},"Ekonomická situace, finanční instituce",[22,2464,2465,2470],{},[35,2466,2467,2469],{},[38,2468,2458],{},"tický",[35,2471,2472],{},"Podnikatelská etika, média, veřejnost",[22,2474,2475,2481],{},[35,2476,2477,2480],{},[38,2478,2479],{},"P","olitický",[35,2482,2483],{},"Politický systém, hrozba nepokojů",[22,2485,2486,2492],{},[35,2487,2488,2491],{},[38,2489,2490],{},"L","egislativní",[35,2493,2494],{},"Předpisy, zákony",[22,2496,2497,2502],{},[35,2498,2499,2501],{},[38,2500,2458],{},"nvironmentální",[35,2503,2504],{},"Životní prostředí, přírodní hrozby",[115,2506,2508],{"id":2507},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2510,2511],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2513,2515],{"id":2514},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2517,2518,2527],{},[19,2519,2520],{},[22,2521,2522,2525],{},[25,2523,2524],{},"Tier",[25,2526,1862],{},[30,2528,2529,2537,2544,2551,2558,2565,2572,2579],{},[22,2530,2531,2534],{},[35,2532,2533],{},"0",[35,2535,2536],{},"Žádná off-site data",[22,2538,2539,2541],{},[35,2540,1869],{},[35,2542,2543],{},"Fyzická záloha + cold site",[22,2545,2546,2548],{},[35,2547,1882],{},[35,2549,2550],{},"Fyzická záloha + hot site",[22,2552,2553,2555],{},[35,2554,1895],{},[35,2556,2557],{},"Elektronický trezor (electronic vaulting)",[22,2559,2560,2562],{},[35,2561,1908],{},[35,2563,2564],{},"Point-in-time recovery",[22,2566,2567,2569],{},[35,2568,1921],{},[35,2570,2571],{},"Two-site commit (kontinuální přenos)",[22,2573,2574,2576],{},[35,2575,1934],{},[35,2577,2578],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2580,2581,2583],{},[35,2582,1947],{},[35,2584,2585],{},"Automatizovaná obnova (AI monitoring)",[198,2587,2589],{"id":2588},"cloud-dr","Cloud DR",[120,2591,2592,2598,2604,2610],{},[123,2593,2594,2597],{},[38,2595,2596],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2599,2600,2603],{},[38,2601,2602],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2605,2606,2609],{},[38,2607,2608],{},"Hot DR"," — paralelní řešení v tandemu",[123,2611,2612,2615],{},[38,2613,2614],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2617,2619],{"id":2618},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2621,2622,2628,2634],{},[123,2623,2624,2627],{},[207,2625,140],{"className":2626,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2629,2630,2633],{},[207,2631,569],{"className":2632,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2635,2636,2639],{},[207,2637,578],{"className":2638,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2641,2643,2644],{"id":2642},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2645,43],{"className":2646,"dataFsResolvedFilePath":1640,"href":1641},[210],[120,2648,2649,2655],{},[123,2650,2651],{},[207,2652,2654],{"className":2653,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2656,2657],{},[207,2658,2660],{"className":2659,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2662},[2663,2664,2665,2666,2667,2671,2672],{"id":2232,"depth":642,"text":2233},{"id":2329,"depth":642,"text":2330},{"id":2387,"depth":642,"text":2388},{"id":2414,"depth":642,"text":2415},{"id":2507,"depth":642,"text":2508,"children":2668},[2669,2670],{"id":2514,"depth":649,"text":2515},{"id":2588,"depth":649,"text":2589},{"id":2618,"depth":642,"text":2619},{"id":2642,"depth":642,"text":2673},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2212,"description":641},[2679,2680],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2683,2684,2685,2686,2687],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2691,"title":2692,"body":2693,"course":659,"courses":3176,"created":660,"description":641,"extension":661,"meta":3177,"navigation":664,"path":3178,"seo":3179,"sources":3180,"stem":3183,"tags":3184,"type":2688,"updated":677,"__hash__":3188},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2694,"toc":3161},[2695,2698,2705,2712,2715,2719,2786,2790,2794,2853,2857,2877,2881,2885,2986,2990,3013,3017,3039,3043,3050,3106,3108,3139,3144],[12,2696,2692],{"id":2697},"isms-systém-řízení-bezpečnosti-informací",[724,2699,2700],{},[2221,2701],{"alt":2702,"className":2703,"src":2704},"isms-pdca-cyklus",[210,2225],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2706,2707],{},[2221,2708],{"alt":2709,"className":2710,"src":2711},"isms-oborova-mapa",[210,2225],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2713,2714],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2716,2718],{"id":2717},"základní-pilíře","Základní pilíře",[16,2720,2721,2732],{},[19,2722,2723],{},[22,2724,2725,2728,2730],{},[25,2726,2727],{},"Pilíř",[25,2729,2245],{},[25,2731,1862],{},[30,2733,2734,2747,2760,2773],{},[22,2735,2736,2741,2744],{},[35,2737,2738],{},[38,2739,2740],{},"Důvěrnost",[35,2742,2743],{},"Confidentiality",[35,2745,2746],{},"Přístup pouze oprávněným osobám",[22,2748,2749,2754,2757],{},[35,2750,2751],{},[38,2752,2753],{},"Integrita",[35,2755,2756],{},"Integrity",[35,2758,2759],{},"Ochrana před neoprávněnou změnou",[22,2761,2762,2767,2770],{},[35,2763,2764],{},[38,2765,2766],{},"Dostupnost",[35,2768,2769],{},"Availability",[35,2771,2772],{},"Systémy a data dostupné v potřebný čas",[22,2774,2775,2780,2783],{},[35,2776,2777],{},[38,2778,2779],{},"Nepopiratelnost",[35,2781,2782],{},"Non-repudiation",[35,2784,2785],{},"Prokázání autorství akce",[115,2787,2789],{"id":2788},"normativní-rámec","Normativní rámec",[198,2791,2793],{"id":2792},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2795,2796,2802,2808,2819,2825,2835,2844],{},[123,2797,2798,2801],{},[38,2799,2800],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2803,2804,2807],{},[38,2805,2806],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2809,2810,2813,2814,2818],{},[38,2811,2812],{},"ISO\u002FIEC 27005"," — ",[207,2815,2817],{"className":2816,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2820,2821,2824],{},[38,2822,2823],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2826,2827,2830,2831],{},[38,2828,2829],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2832,2834],{"className":2833,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2836,2837,2830,2840],{},[38,2838,2839],{},"ISO\u002FIEC 27019",[207,2841,2843],{"className":2842,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2845,2846,2830,2849],{},[38,2847,2848],{},"ISO\u002FIEC 27799",[207,2850,2852],{"className":2851,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2854,2856],{"id":2855},"další-rámce","Další rámce",[120,2858,2859,2865,2871],{},[123,2860,2861,2864],{},[38,2862,2863],{},"NIST"," — americké standardy (SP 800 řada)",[123,2866,2867,2870],{},[38,2868,2869],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2872,2873,2876],{},[38,2874,2875],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2878,2880],{"id":2879},"governance-řízení","Governance (řízení)",[198,2882,2884],{"id":2883},"bezpečnostní-role","Bezpečnostní role",[16,2886,2887,2899],{},[19,2888,2889],{},[22,2890,2891,2894,2896],{},[25,2892,2893],{},"Role",[25,2895,40],{},[25,2897,2898],{},"Odpovědnost",[30,2900,2901,2912,2923,2934,2945,2956,2966,2976],{},[22,2902,2903,2906,2909],{},[35,2904,2905],{},"Chief Information Officer",[35,2907,2908],{},"CIO",[35,2910,2911],{},"Celkové řízení ICT",[22,2913,2914,2917,2920],{},[35,2915,2916],{},"Chief Information Security Officer",[35,2918,2919],{},"CISO",[35,2921,2922],{},"Řízení informační bezpečnosti",[22,2924,2925,2928,2931],{},[35,2926,2927],{},"Chief Technology Officer",[35,2929,2930],{},"CTO",[35,2932,2933],{},"Technologická strategie",[22,2935,2936,2939,2942],{},[35,2937,2938],{},"IS Security Officer",[35,2940,2941],{},"ISSO",[35,2943,2944],{},"Bezpečnost IS",[22,2946,2947,2950,2953],{},[35,2948,2949],{},"Manažer KB",[35,2951,2952],{},"—",[35,2954,2955],{},"Odpovědný za ISMS",[22,2957,2958,2961,2963],{},[35,2959,2960],{},"Architekt KB",[35,2962,2952],{},[35,2964,2965],{},"Návrh a implementace opatření",[22,2967,2968,2971,2973],{},[35,2969,2970],{},"Auditor KB",[35,2972,2952],{},[35,2974,2975],{},"Provádění auditů",[22,2977,2978,2981,2983],{},[35,2979,2980],{},"Garant aktiva",[35,2982,2952],{},[35,2984,2985],{},"Rozvoj, použití a bezpečnost aktiva",[198,2987,2989],{"id":2988},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,2991,2992,2998,3007],{},[123,2993,2994,2997],{},[38,2995,2996],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,2999,3000,3003,3004],{},[38,3001,3002],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3005,240],{"className":3006,"dataFsResolvedFilePath":585,"href":586},[210],[123,3008,3009,3012],{},[38,3010,3011],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3014,3016],{"id":3015},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3018,3019,3024,3029,3034],{},[123,3020,3021,3023],{},[38,3022,2351],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3025,3026,3028],{},[38,3027,2361],{}," — implementace opatření, řízení rizik",[123,3030,3031,3033],{},[38,3032,2371],{}," — monitorování, audit, přezkoumání",[123,3035,3036,3038],{},[38,3037,2381],{}," — nápravná opatření, neustálé zlepšování",[115,3040,3042],{"id":3041},"oborová-řešení-isms","Oborová řešení ISMS",[724,3044,3045,3046,3049],{},"Kurz ",[207,3047,43],{"className":3048,"dataFsResolvedFilePath":1640,"href":1641},[210]," pokrývá ISMS specifika pro:",[120,3051,3052,3058,3064,3071,3077,3084,3090,3096,3101],{},[123,3053,3054],{},[207,3055,3057],{"className":3056,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3059,3060,3063],{},[207,3061,282],{"className":3062,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3065,3066,3070],{},[207,3067,3069],{"className":3068,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3072,3073,3076],{},[207,3074,300],{"className":3075,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3078,3079,3083],{},[207,3080,3082],{"className":3081,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3085,3086,3089],{},[207,3087,318],{"className":3088,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3091,3092,3095],{},[207,3093,327],{"className":3094,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3097,3098],{},[207,3099,336],{"className":3100,"dataFsResolvedFilePath":334,"href":335},[210],[123,3102,3103],{},[207,3104,273],{"className":3105,"dataFsResolvedFilePath":271,"href":272},[210],[115,3107,2619],{"id":2618},[120,3109,3110,3116,3121,3127,3133],{},[123,3111,3112,3115],{},[207,3113,569],{"className":3114,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3117,3118,587],{},[207,3119,240],{"className":3120,"dataFsResolvedFilePath":585,"href":586},[210],[123,3122,3123,3126],{},[207,3124,384],{"className":3125,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3128,3129,3132],{},[207,3130,578],{"className":3131,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3134,3135,3138],{},[207,3136,369],{"className":3137,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3140,2643,3141],{"id":2642},[207,3142,43],{"className":3143,"dataFsResolvedFilePath":1640,"href":1641},[210],[120,3145,3146,3151,3156],{},[123,3147,3148],{},[207,3149,222],{"className":3150,"dataFsResolvedFilePath":220,"href":221},[210],[123,3152,3153],{},[207,3154,249],{"className":3155,"dataFsResolvedFilePath":247,"href":248},[210],[123,3157,3158],{},[207,3159,231],{"className":3160,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3162},[3163,3164,3168,3172,3173,3174,3175],{"id":2717,"depth":642,"text":2718},{"id":2788,"depth":642,"text":2789,"children":3165},[3166,3167],{"id":2792,"depth":649,"text":2793},{"id":2855,"depth":649,"text":2856},{"id":2879,"depth":642,"text":2880,"children":3169},[3170,3171],{"id":2883,"depth":649,"text":2884},{"id":2988,"depth":649,"text":2989},{"id":3015,"depth":642,"text":3016},{"id":3041,"depth":642,"text":3042},{"id":2618,"depth":642,"text":2619},{"id":2642,"depth":642,"text":2673},[658],{},"\u002Ftopics\u002Fisms",{"title":2692,"description":641},[3181,3182,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3185,3186,672,3187],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3190,"title":578,"body":3191,"course":659,"courses":3623,"created":660,"description":641,"extension":661,"meta":3624,"navigation":664,"path":3625,"seo":3626,"sources":3627,"stem":3630,"tags":3631,"type":2688,"updated":677,"__hash__":3637},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3192,"toc":3609},[3193,3196,3203,3210,3214,3252,3256,3260,3302,3306,3313,3316,3342,3346,3363,3367,3398,3402,3469,3473,3476,3493,3497,3535,3537,3574,3579],[12,3194,578],{"id":3195},"kybernetická-bezpečnost",[724,3197,3198],{},[2221,3199],{"alt":3200,"className":3201,"src":3202},"kb-defense-in-depth",[210,2225],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3204,3205,3206,3209],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3207,140],{"className":3208,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3211,3213],{"id":3212},"základní-pojmy","Základní pojmy",[120,3215,3216,3222,3228,3234,3240,3246],{},[123,3217,3218,3221],{},[38,3219,3220],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3223,3224,3227],{},[38,3225,3226],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3229,3230,3233],{},[38,3231,3232],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3235,3236,3239],{},[38,3237,3238],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3241,3242,3245],{},[38,3243,3244],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3247,3248,3251],{},[38,3249,3250],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3253,3255],{"id":3254},"typy-útoků","Typy útoků",[198,3257,3259],{"id":3258},"podle-cílení","Podle cílení",[16,3261,3262,3274],{},[19,3263,3264],{},[22,3265,3266,3269,3271],{},[25,3267,3268],{},"Typ",[25,3270,1862],{},[25,3272,3273],{},"Cíl",[30,3275,3276,3289],{},[22,3277,3278,3283,3286],{},[35,3279,3280],{},[38,3281,3282],{},"Plošný",[35,3284,3285],{},"Útočníkovi je jedno, kdo je obětí",[35,3287,3288],{},"Botnety, spam, ransomware",[22,3290,3291,3296,3299],{},[35,3292,3293],{},[38,3294,3295],{},"Cílený (APT)",[35,3297,3298],{},"Soustředěná pozornost na konkrétní cíl",[35,3300,3301],{},"Špionáž, sabotáž, krádež dat",[198,3303,3305],{"id":3304},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3307,3308],{},[2221,3309],{"alt":3310,"className":3311,"src":3312},"apt-faze-utoku",[210,2225],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3314,3315],{},"4 fáze:",[152,3317,3318,3324,3330,3336],{},[123,3319,3320,3323],{},[38,3321,3322],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3325,3326,3329],{},[38,3327,3328],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3331,3332,3335],{},[38,3333,3334],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3337,3338,3341],{},[38,3339,3340],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3343,3345],{"id":3344},"základní-vektory-útoku","Základní vektory útoku",[120,3347,3348,3351,3354,3357,3360],{},[123,3349,3350],{},"Email s přílohou (spear phishing)",[123,3352,3353],{},"Trojanizované aplikace",[123,3355,3356],{},"Drive-by download (webové exploity)",[123,3358,3359],{},"Výměnná média (BadUSB)",[123,3361,3362],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3364,3366],{"id":3365},"software-útoky","Software útoky",[120,3368,3369,3375,3381,3387,3392],{},[123,3370,3371,3374],{},[38,3372,3373],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3376,3377,3380],{},[38,3378,3379],{},"Viry"," — poškození HW\u002FSW",[123,3382,3383,3386],{},[38,3384,3385],{},"Trojské koně"," — skrytá funkčnost",[123,3388,3389,3391],{},[38,3390,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3393,3394,3397],{},[38,3395,3396],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3399,3401],{"id":3400},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3403,3404,3415],{},[19,3405,3406],{},[22,3407,3408,3410,3412],{},[25,3409,1859],{},[25,3411,3273],{},[25,3413,3414],{},"Efekt",[30,3416,3417,3428,3438,3449,3459],{},[22,3418,3419,3422,3425],{},[35,3420,3421],{},"Content Spoofing",[35,3423,3424],{},"Klient",[35,3426,3427],{},"Ztráta přihlašovacích údajů",[22,3429,3430,3433,3435],{},[35,3431,3432],{},"XSS",[35,3434,3424],{},[35,3436,3437],{},"Přístup k cookies",[22,3439,3440,3443,3446],{},[35,3441,3442],{},"SQL Injection",[35,3444,3445],{},"Server",[35,3447,3448],{},"Neoprávněný přístup do DB",[22,3450,3451,3454,3456],{},[35,3452,3453],{},"DoS\u002FDDoS",[35,3455,3445],{},[35,3457,3458],{},"Nedostupnost služby",[22,3460,3461,3464,3466],{},[35,3462,3463],{},"Path Traversal",[35,3465,3445],{},[35,3467,3468],{},"Přístup k souborům",[115,3470,3472],{"id":3471},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3474,3475],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3477,3478,3481,3484,3487,3490],{},[123,3479,3480],{},"Vydávání se za právníka",[123,3482,3483],{},"Podvod na CEO",[123,3485,3486],{},"Krádež dat (personální oddělení)",[123,3488,3489],{},"Kompromitace účtu",[123,3491,3492],{},"Falešné faktury",[115,3494,3496],{"id":3495},"obranné-technologie","Obranné technologie",[120,3498,3499,3505,3511,3517,3523,3529],{},[123,3500,3501,3504],{},[38,3502,3503],{},"NAC"," — řízení přístupu k síti",[123,3506,3507,3510],{},[38,3508,3509],{},"IDS"," — detekce průniku (pasivní)",[123,3512,3513,3516],{},[38,3514,3515],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3518,3519,3522],{},[38,3520,3521],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3524,3525,3528],{},[38,3526,3527],{},"DLP"," — prevence úniku dat",[123,3530,3531,3534],{},[38,3532,3533],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3536,2619],{"id":2618},[120,3538,3539,3545,3551,3557,3568],{},[123,3540,3541,3544],{},[207,3542,140],{"className":3543,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3546,3547,3550],{},[207,3548,569],{"className":3549,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3552,3553,3556],{},[207,3554,240],{"className":3555,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3558,3559,3562,3563,3567],{},[207,3560,384],{"className":3561,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3564,3566],{"className":3565,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3569,3570,3573],{},[207,3571,369],{"className":3572,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3575,2643,3576],{"id":2642},[207,3577,43],{"className":3578,"dataFsResolvedFilePath":1640,"href":1641},[210],[120,3580,3581,3587,3592,3597,3602],{},[123,3582,3583],{},[207,3584,3586],{"className":3585,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3588,3589],{},[207,3590,417],{"className":3591,"dataFsResolvedFilePath":415,"href":416},[210],[123,3593,3594],{},[207,3595,351],{"className":3596,"dataFsResolvedFilePath":349,"href":350},[210],[123,3598,3599],{},[207,3600,426],{"className":3601,"dataFsResolvedFilePath":424,"href":425},[210],[123,3603,3604],{},[207,3605,458],{"className":3606,"dataFsResolvedFilePath":3607,"href":3608},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3610},[3611,3612,3618,3619,3620,3621,3622],{"id":3212,"depth":642,"text":3213},{"id":3254,"depth":642,"text":3255,"children":3613},[3614,3615,3616,3617],{"id":3258,"depth":649,"text":3259},{"id":3304,"depth":649,"text":3305},{"id":3344,"depth":649,"text":3345},{"id":3365,"depth":649,"text":3366},{"id":3400,"depth":642,"text":3401},{"id":3471,"depth":642,"text":3472},{"id":3495,"depth":642,"text":3496},{"id":2618,"depth":642,"text":2619},{"id":2642,"depth":642,"text":2673},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3628,3629,3181],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3632,3633,3634,3635,3636],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3639,"title":369,"body":3640,"course":659,"courses":3901,"created":660,"description":641,"extension":661,"meta":3902,"navigation":664,"path":3903,"seo":3904,"sources":3905,"stem":3909,"tags":3910,"type":2688,"updated":677,"__hash__":3917},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3641,"toc":3887},[3642,3645,3652,3655,3659,3719,3723,3727,3738,3742,3753,3757,3765,3769,3780,3784,3789,3793,3804,3808,3828,3830,3862,3867],[12,3643,369],{"id":3644},"ochrana-dat",[724,3646,3647],{},[2221,3648],{"alt":3649,"className":3650,"src":3651},"ochrana-dat-technologie",[210,2225],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3653,3654],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3656,3658],{"id":3657},"formy-zneužití-dat","Formy zneužití dat",[16,3660,3661,3670],{},[19,3662,3663],{},[22,3664,3665,3668],{},[25,3666,3667],{},"Forma",[25,3669,1862],{},[30,3671,3672,3679,3687,3695,3703,3711],{},[22,3673,3674,3677],{},[35,3675,3676],{},"Zašifrování",[35,3678,435],{},[22,3680,3681,3684],{},[35,3682,3683],{},"Zveřejnění",[35,3685,3686],{},"Double ransomware",[22,3688,3689,3692],{},[35,3690,3691],{},"Odposlech",[35,3693,3694],{},"Pasivní sběr dat",[22,3696,3697,3700],{},[35,3698,3699],{},"Krádež",[35,3701,3702],{},"Cílená exfiltrace",[22,3704,3705,3708],{},[35,3706,3707],{},"Krádež dodavatelského řetězce",[35,3709,3710],{},"Triple ransomware",[22,3712,3713,3716],{},[35,3714,3715],{},"Prodej",[35,3717,3718],{},"Darknet marketplace",[115,3720,3722],{"id":3721},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3724,3726],{"id":3725},"nac-network-access-control","NAC (Network Access Control)",[120,3728,3729,3732,3735],{},[123,3730,3731],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3733,3734],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3736,3737],{},"Ekvivalenty: MDM, BYOD",[198,3739,3741],{"id":3740},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3743,3744,3747,3750],{},[123,3745,3746],{},"Monitoruje síťový provoz, generuje alerty",[123,3748,3749],{},"Pasivní systém — nezasahuje do provozu",[123,3751,3752],{},"Signaturová a anomální detekce",[198,3754,3756],{"id":3755},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3758,3759,3762],{},[123,3760,3761],{},"Aktivní systém — blokuje škodlivý provoz",[123,3763,3764],{},"Zařazen přímo do síťové cesty (in-line)",[198,3766,3768],{"id":3767},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3770,3771,3774,3777],{},[123,3772,3773],{},"Centralizovaná správa bezpečnostních logů",[123,3775,3776],{},"Sběr s agentem i bez agenta",[123,3778,3779],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3781,3783],{"id":3782},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3785,3786],{},[123,3787,3788],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3790,3792],{"id":3791},"šifrování","Šifrování",[120,3794,3795,3798,3801],{},[123,3796,3797],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3799,3800],{},"RSA (2048+ bit), DSS",[123,3802,3803],{},"SHA-256, SHA-1",[115,3805,3807],{"id":3806},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3809,3810,3816,3822,3825],{},[123,3811,3812,3815],{},[38,3813,3814],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3817,3818,3821],{},[38,3819,3820],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3823,3824],{},"Transportní a tunelovací režim",[123,3826,3827],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3829,2619],{"id":2618},[120,3831,3832,3838,3844,3850,3856],{},[123,3833,3834,3837],{},[207,3835,140],{"className":3836,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3839,3840,3843],{},[207,3841,578],{"className":3842,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3845,3846,3849],{},[207,3847,569],{"className":3848,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3851,3852,3855],{},[207,3853,351],{"className":3854,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3857,3858,3861],{},[207,3859,360],{"className":3860,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3863,2643,3864],{"id":2642},[207,3865,43],{"className":3866,"dataFsResolvedFilePath":1640,"href":1641},[210],[120,3868,3869,3875,3881],{},[123,3870,3871],{},[207,3872,3874],{"className":3873,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3876,3877],{},[207,3878,3880],{"className":3879,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3882,3883],{},[207,3884,3886],{"className":3885,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3888},[3889,3890,3898,3899,3900],{"id":3657,"depth":642,"text":3658},{"id":3721,"depth":642,"text":3722,"children":3891},[3892,3893,3894,3895,3896,3897],{"id":3725,"depth":649,"text":3726},{"id":3740,"depth":649,"text":3741},{"id":3755,"depth":649,"text":3756},{"id":3767,"depth":649,"text":3768},{"id":3782,"depth":649,"text":3783},{"id":3791,"depth":649,"text":3792},{"id":3806,"depth":642,"text":3807},{"id":2618,"depth":642,"text":2619},{"id":2642,"depth":642,"text":2673},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3906,3907,3908],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3644,3911,3912,3913,3914,3915,3916],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3919,"title":569,"body":3920,"course":659,"courses":4253,"created":660,"description":641,"extension":661,"meta":4254,"navigation":664,"path":4255,"seo":4256,"sources":4257,"stem":4258,"tags":4259,"type":2688,"updated":677,"__hash__":4264},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3921,"toc":4242},[3922,3925,3932,3938,3942,4005,4009,4059,4063,4068,4087,4091,4094,4098,4112,4116,4144,4148,4197,4199,4224,4229],[12,3923,569],{"id":3924},"řízení-rizik",[724,3926,3927],{},[2221,3928],{"alt":3929,"className":3930,"src":3931},"rizeni-rizik-proces",[210,2225],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3933,3934,3935,1642],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3936,140],{"className":3937,"dataFsResolvedFilePath":559,"href":560},[210],[115,3939,3941],{"id":3940},"normativní-základ","Normativní základ",[16,3943,3944,3953],{},[19,3945,3946],{},[22,3947,3948,3951],{},[25,3949,3950],{},"Norma",[25,3952,1658],{},[30,3954,3955,3965,3975,3985,3995],{},[22,3956,3957,3962],{},[35,3958,3959],{},[38,3960,3961],{},"ISO 31000:2019",[35,3963,3964],{},"Obecné smrnice pro management rizik",[22,3966,3967,3972],{},[35,3968,3969],{},[38,3970,3971],{},"ISO 31010:2020",[35,3973,3974],{},"Techniky posuzování rizik",[22,3976,3977,3982],{},[35,3978,3979],{},[38,3980,3981],{},"ISO\u002FIEC 27005:2019",[35,3983,3984],{},"Řízení rizik bezpečnosti informací",[22,3986,3987,3992],{},[35,3988,3989],{},[38,3990,3991],{},"NIST SP 800-30",[35,3993,3994],{},"Průvodce hodnocením rizik",[22,3996,3997,4002],{},[35,3998,3999],{},[38,4000,4001],{},"NIST SP 800-39",[35,4003,4004],{},"Proces řízení bezpečnostních rizik",[115,4006,4008],{"id":4007},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4010,4011,4017,4023,4029,4035,4041,4047,4053],{},[123,4012,4013,4016],{},[38,4014,4015],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4018,4019,4022],{},[38,4020,4021],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4024,4025,4028],{},[38,4026,4027],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4030,4031,4034],{},[38,4032,4033],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4036,4037,4040],{},[38,4038,4039],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4042,4043,4046],{},[38,4044,4045],{},"Akceptace rizik"," — formální rozhodnutí",[123,4048,4049,4052],{},[38,4050,4051],{},"Komunikace"," — sdílení informací o rizicích",[123,4054,4055,4058],{},[38,4056,4057],{},"Monitorování"," — průběžné přezkoumávání",[115,4060,4062],{"id":4061},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4064,4065],{},[38,4066,4067],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4069,4070,4076,4081],{},[123,4071,4072,4075],{},[38,4073,4074],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4077,4078,4080],{},[38,4079,3232],{}," — slabé místo aktiva (stupnice 1–5)",[123,4082,4083,4086],{},[38,4084,4085],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4088,4090],{"id":4089},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4092,4093],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4095,4097],{"id":4096},"klíčové-dokumenty","Klíčové dokumenty",[120,4099,4100,4106],{},[123,4101,4102,4105],{},[38,4103,4104],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4107,4108,4111],{},[38,4109,4110],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4113,4115],{"id":4114},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4117,4118,4124,4129,4134,4139],{},[123,4119,4120,4123],{},[38,4121,4122],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4125,4126,4128],{},[38,4127,2949],{}," — odpovědný za ISMS",[123,4130,4131,4133],{},[38,4132,2960],{}," — návrh a implementace opatření",[123,4135,4136,4138],{},[38,4137,2970],{}," — provádění auditů",[123,4140,4141,4143],{},[38,4142,2980],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4145,4147],{"id":4146},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4149,4150,4162],{},[19,4151,4152],{},[22,4153,4154,4157,4159],{},[25,4155,4156],{},"Úroveň",[25,4158,1658],{},[25,4160,4161],{},"Typ rizika",[30,4163,4164,4175,4186],{},[22,4165,4166,4169,4172],{},[35,4167,4168],{},"Stupeň 1",[35,4170,4171],{},"Organizace",[35,4173,4174],{},"Strategické riziko",[22,4176,4177,4180,4183],{},[35,4178,4179],{},"Stupeň 2",[35,4181,4182],{},"Poslání\u002Fobchodní procesy",[35,4184,4185],{},"Taktické riziko",[22,4187,4188,4191,4194],{},[35,4189,4190],{},"Stupeň 3",[35,4192,4193],{},"Informační systémy",[35,4195,4196],{},"Operační riziko",[115,4198,2619],{"id":2618},[120,4200,4201,4207,4213,4219],{},[123,4202,4203,4206],{},[207,4204,140],{"className":4205,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4208,4209,4212],{},[207,4210,384],{"className":4211,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4214,4215,4218],{},[207,4216,393],{"className":4217,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4220,4221,3843],{},[207,4222,578],{"className":4223,"dataFsResolvedFilePath":576,"href":577},[210],[115,4225,2643,4226],{"id":2642},[207,4227,43],{"className":4228,"dataFsResolvedFilePath":1640,"href":1641},[210],[120,4230,4231,4237],{},[123,4232,4233],{},[207,4234,4236],{"className":4235,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4238,4239],{},[207,4240,222],{"className":4241,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4243},[4244,4245,4246,4247,4248,4249,4250,4251,4252],{"id":3940,"depth":642,"text":3941},{"id":4007,"depth":642,"text":4008},{"id":4061,"depth":642,"text":4062},{"id":4089,"depth":642,"text":4090},{"id":4096,"depth":642,"text":4097},{"id":4114,"depth":642,"text":4115},{"id":4146,"depth":642,"text":4147},{"id":2618,"depth":642,"text":2619},{"id":2642,"depth":642,"text":2673},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3182,3181],"topics\u002Frizeni-rizik",[658,4260,4261,4262,2200,4263],"rizeni-rizik","iso-31000","iso-27005","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4266,"title":4267,"body":4268,"course":659,"courses":4499,"created":660,"description":641,"extension":661,"meta":4500,"navigation":664,"path":4501,"seo":4502,"sources":4503,"stem":4505,"tags":4506,"type":2688,"updated":677,"__hash__":4511},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4269,"toc":4491},[4270,4273,4280,4283,4287,4386,4390,4425,4429,4449,4453,4456,4458,4478,4483],[12,4271,4267],{"id":4272},"sae-budování-bezpečnostního-povědomí",[724,4274,4275],{},[2221,4276],{"alt":4277,"className":4278,"src":4279},"sae-pyramida",[210,2225],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4281,4282],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4284,4286],{"id":4285},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4288,4289,4306],{},[19,4290,4291],{},[22,4292,4293,4295,4298,4300,4303],{},[25,4294,4156],{},[25,4296,4297],{},"Příznak",[25,4299,3273],{},[25,4301,4302],{},"Metody",[25,4304,4305],{},"Časový rámec",[30,4307,4308,4328,4348,4368],{},[22,4309,4310,4316,4319,4322,4325],{},[35,4311,4312,4315],{},[38,4313,4314],{},"Awareness"," (povědomí)",[35,4317,4318],{},"„Co\"",[35,4320,4321],{},"Rozpoznávání",[35,4323,4324],{},"Média, videa, plakáty",[35,4326,4327],{},"Krátkodobý",[22,4329,4330,4336,4339,4342,4345],{},[35,4331,4332,4335],{},[38,4333,4334],{},"Training"," (výcvik)",[35,4337,4338],{},"„Jak\"",[35,4340,4341],{},"Dovednosti",[35,4343,4344],{},"Přednášky, případovky, cvičení",[35,4346,4347],{},"Střednědobý",[22,4349,4350,4356,4359,4362,4365],{},[35,4351,4352,4355],{},[38,4353,4354],{},"Education"," (vzdělávání)",[35,4357,4358],{},"„Proč\"",[35,4360,4361],{},"Porozumění",[35,4363,4364],{},"Semináře, diskuze, výzkum",[35,4366,4367],{},"Dlouhodobý",[22,4369,4370,4375,4377,4380,4383],{},[35,4371,4372],{},[38,4373,4374],{},"Professional Development",[35,4376,2952],{},[35,4378,4379],{},"Profesní rozvoj",[35,4381,4382],{},"Certifikace, konference",[35,4384,4385],{},"Průběžný",[115,4387,4389],{"id":4388},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4391,4392,4395,4398,4401,4404,4407,4410,4413,4416,4419,4422],{},[123,4393,4394],{},"Role a odpovědnosti v programu",[123,4396,4397],{},"Stanovení cílů pro každou fázi",[123,4399,4400],{},"Rozdělení uživatelů (analýza)",[123,4402,4403],{},"Vytvoření školících materiálů dle skupin",[123,4405,4406],{},"Určení cíle pro každou skupinu",[123,4408,4409],{},"Témata pro každou relaci\u002Fkurz",[123,4411,4412],{},"Metody nasazení (metodiky)",[123,4414,4415],{},"Dokumentace a zpětná vazba",[123,4417,4418],{},"Vyhodnocení a aktualizace materiálů",[123,4420,4421],{},"Četnost opakování",[123,4423,4424],{},"Kalkulace",[115,4426,4428],{"id":4427},"modely-řízení","Modely řízení",[120,4430,4431,4437,4443],{},[123,4432,4433,4436],{},[38,4434,4435],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4438,4439,4442],{},[38,4440,4441],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4444,4445,4448],{},[38,4446,4447],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4450,4452],{"id":4451},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4454,4455],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4457,2619],{"id":2618},[120,4459,4460,4466,4472],{},[123,4461,4462,4465],{},[207,4463,140],{"className":4464,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4467,4468,4471],{},[207,4469,578],{"className":4470,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4473,4474,4477],{},[207,4475,569],{"className":4476,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4479,2643,4480],{"id":2642},[207,4481,43],{"className":4482,"dataFsResolvedFilePath":1640,"href":1641},[210],[120,4484,4485],{},[123,4486,4487],{},[207,4488,4490],{"className":4489,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4492},[4493,4494,4495,4496,4497,4498],{"id":4285,"depth":642,"text":4286},{"id":4388,"depth":642,"text":4389},{"id":4427,"depth":642,"text":4428},{"id":4451,"depth":642,"text":4452},{"id":2618,"depth":642,"text":2619},{"id":2642,"depth":642,"text":2673},[658],{},"\u002Ftopics\u002Fsae",{"title":4267,"description":641},[4504],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4507,4508,4509,2200,4510],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4513],{"slug":658,"path":1641,"title":7,"snippet":4514},"… core - Bezpečnost plateb — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet - \u003C\u003Cimork-mobilni-bezpecnost>> — SIMJaker, SIM swapping, 5G, Common Criteria - Audio Hack — fyzická …",[4516,4518,4521,4524,4527],{"slug":4517,"title":3586,"path":407,"sharedTags":642},"imork-anatomie-utoku",{"slug":4519,"title":4520,"path":239,"sharedTags":642},"imork-sae","ImorK — Budování bezpečnostního povědomí (SAE)",{"slug":4522,"title":4523,"path":221,"sharedTags":642},"imork-manazerska-bezpecnost","ImorK — Manažerská informační bezpečnost",{"slug":4525,"title":4526,"path":248,"sharedTags":642},"imork-risk-management","ImorK — Risk Management",{"slug":4528,"title":4529,"path":326,"sharedTags":642},"imork-isp","ISMS pro ISP",1777154960473]