[{"data":1,"prerenderedAt":6899},["ShallowReactive",2],{"courses-with-stats":3,"all-tag-counts":24,"wiki-imork-normy-prehled":1003,"course-stats-imork":3072,"course-topics-imork":3074,"backlinks-imork-normy-prehled":6879,"related-imork-normy-prehled":6886},[4,8,12,16,20],{"slug":5,"title":6,"count":7},"imork","Management oborových řešení (ImorK)",43,{"slug":9,"title":10,"count":11},"imek","Matematická ekonomie (ImeK)",22,{"slug":13,"title":14,"count":15},"mikk","Mikroekonomie 2 (mikK)",31,{"slug":17,"title":18,"count":19},"ipmrk","Pokročilé metody v rozhodování (IpmrK)",24,{"slug":21,"title":22,"count":23},"irmank","Risk management (IrmanK)",30,[25,27,30,32,33,34,36,39,42,44,46,49,51,54,56,59,61,63,65,67,69,71,74,76,78,80,82,84,86,88,90,92,94,96,98,101,103,105,107,109,111,113,115,117,119,121,123,125,127,129,131,133,135,137,139,141,143,146,148,150,152,154,156,158,160,162,164,166,168,170,172,174,176,178,180,182,184,186,188,190,192,194,196,198,200,202,204,206,208,210,212,214,216,218,220,222,224,226,228,230,232,234,236,238,240,242,244,246,248,250,252,254,256,258,260,262,264,266,268,270,272,274,276,278,280,282,284,286,288,290,292,294,296,298,300,302,304,306,308,310,312,314,316,318,320,322,324,326,328,330,332,334,336,338,340,342,344,346,348,350,352,355,357,359,361,363,365,367,369,371,373,375,377,379,381,383,385,387,389,391,393,395,397,399,401,403,405,407,409,411,413,415,417,419,421,423,425,427,429,431,433,435,437,439,441,443,445,447,449,451,453,455,457,459,461,463,465,467,469,471,473,475,477,479,481,483,485,487,489,491,493,495,497,499,501,503,505,507,509,511,513,515,517,519,521,523,525,527,529,531,533,535,537,539,541,543,545,547,549,551,553,555,557,559,561,563,565,567,569,571,573,575,577,579,581,583,585,587,589,591,593,595,597,599,601,603,605,607,609,611,613,615,617,619,621,623,625,627,629,631,633,635,637,639,641,643,645,647,649,651,653,655,657,659,661,663,665,667,669,671,673,675,677,679,681,683,685,687,689,691,693,695,697,699,701,703,705,707,709,711,713,715,717,719,721,723,725,727,729,731,733,735,737,739,741,743,745,747,749,751,753,755,757,759,761,763,765,767,769,771,773,775,777,779,781,783,785,787,789,791,793,795,797,799,801,803,805,807,809,811,813,815,817,819,821,823,825,827,829,831,833,835,837,839,841,843,845,847,849,851,853,855,857,859,861,863,865,867,869,871,873,875,877,879,881,883,885,887,889,891,893,895,897,899,901,903,905,907,909,911,913,915,917,919,921,923,925,927,929,931,933,935,937,939,941,943,945,947,949,951,953,955,957,959,961,963,965,967,969,971,973,975,977,979,981,983,985,987,989,991,993,995,997,999,1001],{"tag":5,"count":26},44,{"tag":28,"count":29},"mikroekonomie",33,{"tag":13,"count":31},32,{"tag":21,"count":15},{"tag":17,"count":19},{"tag":9,"count":35},23,{"tag":37,"count":38},"isms",15,{"tag":40,"count":41},"neuronove-site",8,{"tag":43,"count":41},"oligopol",{"tag":45,"count":41},"optimalizace",{"tag":47,"count":48},"nist",7,{"tag":50,"count":48},"riziko",{"tag":52,"count":53},"fuzzy",6,{"tag":55,"count":53},"makroekonomie",{"tag":57,"count":58},"behavior",5,{"tag":60,"count":58},"geneticke-algoritmy",{"tag":62,"count":58},"kyberneticka-bezpecnost",{"tag":64,"count":58},"lagrange",{"tag":66,"count":58},"lewin",{"tag":68,"count":58},"mapa-rizik",{"tag":70,"count":58},"ochrana-dat",{"tag":72,"count":73},"apt",4,{"tag":75,"count":73},"cenova-diskriminace",{"tag":77,"count":73},"chaos",{"tag":79,"count":73},"cpm-pert",{"tag":81,"count":73},"datamining",{"tag":83,"count":73},"elasticita",{"tag":85,"count":73},"evolucni-algoritmy",{"tag":87,"count":73},"monopol",{"tag":89,"count":73},"npv",{"tag":91,"count":73},"oborova-reseni",{"tag":93,"count":73},"predikce",{"tag":95,"count":73},"sifrovani",{"tag":97,"count":73},"uzitecnost",{"tag":99,"count":100},"backpropagation",3,{"tag":102,"count":100},"cobb-douglas",{"tag":104,"count":100},"delphi",{"tag":106,"count":100},"derivace",{"tag":108,"count":100},"gdpr",{"tag":110,"count":100},"governance",{"tag":112,"count":100},"indiferencni-krivky",{"tag":114,"count":100},"informacni-bezpecnost",{"tag":116,"count":100},"integral",{"tag":118,"count":100},"is-lm",{"tag":120,"count":100},"iso-31000",{"tag":122,"count":100},"kaizen",{"tag":124,"count":100},"klastrovani",{"tag":126,"count":100},"koluze",{"tag":128,"count":100},"matlab",{"tag":130,"count":100},"multiplikator",{"tag":132,"count":100},"phishing",{"tag":134,"count":100},"poptavka-nabidka",{"tag":136,"count":100},"prednaska",{"tag":138,"count":100},"ransomware",{"tag":140,"count":100},"vzorce",{"tag":142,"count":100},"zdravotnictvi",{"tag":144,"count":145},"5g",2,{"tag":147,"count":145},"aco",{"tag":149,"count":145},"akreditiv",{"tag":151,"count":145},"anfis",{"tag":153,"count":145},"apriori",{"tag":155,"count":145},"atraktory",{"tag":157,"count":145},"autentizace",{"tag":159,"count":145},"bcm",{"tag":161,"count":145},"bec",{"tag":163,"count":145},"bertrand",{"tag":165,"count":145},"bezpecnostni-povedomi",{"tag":167,"count":145},"bia",{"tag":169,"count":145},"box-jenkins",{"tag":171,"count":145},"cournot",{"tag":173,"count":145},"crisp-dm",{"tag":175,"count":145},"cyert-march",{"tag":177,"count":145},"diferencial",{"tag":179,"count":145},"disaster-recovery",{"tag":181,"count":145},"dlp",{"tag":183,"count":145},"doyle",{"tag":185,"count":145},"dualita",{"tag":187,"count":145},"duchodova-elasticita",{"tag":189,"count":145},"ehealth",{"tag":191,"count":145},"energetika",{"tag":193,"count":145},"enisa",{"tag":195,"count":145},"expertni-systemy",{"tag":197,"count":145},"exportni-financovani",{"tag":199,"count":145},"faktoring",{"tag":201,"count":145},"fmincon",{"tag":203,"count":145},"fraktaly",{"tag":205,"count":145},"funkce-clenstvi",{"tag":207,"count":145},"ga",{"tag":209,"count":145},"glosar",{"tag":211,"count":145},"gnp",{"tag":213,"count":145},"hicks",{"tag":215,"count":145},"hurst",{"tag":217,"count":145},"inference",{"tag":219,"count":145},"iot",{"tag":221,"count":145},"iso-22301",{"tag":223,"count":145},"iso-27000",{"tag":225,"count":145},"iso-27005",{"tag":227,"count":145},"iso-27701",{"tag":229,"count":145},"izokvanty",{"tag":231,"count":145},"kniha",{"tag":233,"count":145},"kontinuita-cinnosti",{"tag":235,"count":145},"kriticka-infrastruktura",{"tag":237,"count":145},"kriticke-faktory",{"tag":239,"count":145},"krizeni",{"tag":241,"count":145},"krizova-elasticita",{"tag":243,"count":145},"link-analyza",{"tag":245,"count":145},"linprog",{"tag":247,"count":145},"logisticka-funkce",{"tag":249,"count":145},"malware",{"tag":251,"count":145},"metaheuristiky",{"tag":253,"count":145},"mobilni-bezpecnost",{"tag":255,"count":145},"monopolisticka-konkurence",{"tag":257,"count":145},"motyli-efekt",{"tag":259,"count":145},"mrs",{"tag":261,"count":145},"mrts",{"tag":263,"count":145},"mrtva-vaha",{"tag":265,"count":145},"mutace",{"tag":267,"count":145},"narodni-duchod",{"tag":269,"count":145},"nash",{"tag":271,"count":145},"nukib",{"tag":273,"count":145},"osint",{"tag":275,"count":145},"owasp",{"tag":277,"count":145},"perceptron",{"tag":279,"count":145},"pii",{"tag":281,"count":145},"pravidla",{"tag":283,"count":145},"prebytek",{"tag":285,"count":145},"predterminy",{"tag":287,"count":145},"prehled",{"tag":289,"count":145},"privacy-by-design",{"tag":291,"count":145},"produkce",{"tag":293,"count":145},"pso",{"tag":295,"count":145},"redukce",{"tag":297,"count":145},"retence",{"tag":299,"count":145},"rizeni-rizik",{"tag":301,"count":145},"rovnovaha",{"tag":303,"count":145},"rozhodovaci-stromy",{"tag":305,"count":145},"ryuk",{"tag":307,"count":145},"sae",{"tag":309,"count":145},"selekce",{"tag":311,"count":145},"siem",{"tag":313,"count":145},"sigma",{"tag":315,"count":145},"simon",{"tag":317,"count":145},"simulated-annealing",{"tag":319,"count":145},"sitova-analyza",{"tag":321,"count":145},"skoleni",{"tag":323,"count":145},"slutsky",{"tag":325,"count":145},"smart-grid",{"tag":327,"count":145},"soma",{"tag":329,"count":145},"spotrebitel",{"tag":331,"count":145},"stackelberg",{"tag":333,"count":145},"sylabus",{"tag":335,"count":145},"tabu-search",{"tag":337,"count":145},"ucelova-funkce",{"tag":339,"count":145},"uceni",{"tag":341,"count":145},"volatilita",{"tag":343,"count":145},"witness-miner",{"tag":345,"count":145},"zdaneni",{"tag":347,"count":145},"zkouska",{"tag":349,"count":145},"zkousky",{"tag":351,"count":145},"zmena",{"tag":353,"count":354},"agent-zmeny",1,{"tag":356,"count":354},"ai",{"tag":358,"count":354},"aktivacni-funkce",{"tag":360,"count":354},"alternativni-cile",{"tag":362,"count":354},"analyza",{"tag":364,"count":354},"analyza-rizik",{"tag":366,"count":354},"anonymizace",{"tag":368,"count":354},"aplikacni-portfolio",{"tag":370,"count":354},"automotive",{"tag":372,"count":354},"bandwagon",{"tag":374,"count":354},"banky",{"tag":376,"count":354},"baumol",{"tag":378,"count":354},"bcmaas",{"tag":380,"count":354},"bez-recourse",{"tag":382,"count":354},"bezpecnost",{"tag":384,"count":354},"biometrika",{"tag":386,"count":354},"blockchain",{"tag":388,"count":354},"body-zvratu",{"tag":390,"count":354},"bot",{"tag":392,"count":354},"botnet",{"tag":394,"count":354},"buchta",{"tag":396,"count":354},"buffett",{"tag":398,"count":354},"bundling",{"tag":400,"count":354},"can-bus",{"tag":402,"count":354},"cash-flow",{"tag":404,"count":354},"casove-rady",{"tag":406,"count":354},"cenova-elasticita",{"tag":408,"count":354},"cenova-konkurence",{"tag":410,"count":354},"cenova-tuhost",{"tag":412,"count":354},"cenovy-vudce",{"tag":414,"count":354},"ces",{"tag":416,"count":354},"ceteris-paribus",{"tag":418,"count":354},"chamberlin",{"tag":420,"count":354},"ciste-spekulativni",{"tag":422,"count":354},"citlivostni-analyza",{"tag":424,"count":354},"cloud",{"tag":426,"count":354},"cmmc",{"tag":428,"count":354},"cobweb",{"tag":430,"count":354},"common-criteria",{"tag":432,"count":354},"cs",{"tag":434,"count":354},"cve",{"tag":436,"count":354},"dane",{"tag":438,"count":354},"danove-bremeno",{"tag":440,"count":354},"darknet",{"tag":442,"count":354},"data-diodes",{"tag":444,"count":354},"ddos",{"tag":446,"count":354},"debt-netting",{"tag":448,"count":354},"deep-learning",{"tag":450,"count":354},"defuzzifikace",{"tag":452,"count":354},"dekompozice",{"tag":454,"count":354},"deming",{"tag":456,"count":354},"desatero",{"tag":458,"count":354},"detail-predmetu",{"tag":460,"count":354},"deterministicke-modely",{"tag":462,"count":354},"digitalni-identita",{"tag":464,"count":354},"digitalni-stopa",{"tag":466,"count":354},"diverzifikace",{"tag":468,"count":354},"dkim",{"tag":470,"count":354},"dlt",{"tag":472,"count":354},"dmarc",{"tag":474,"count":354},"dodavatelska",{"tag":476,"count":354},"dokumenty",{"tag":478,"count":354},"doprava",{"tag":480,"count":354},"dora",{"tag":482,"count":354},"dos",{"tag":484,"count":354},"dostupnost",{"tag":486,"count":354},"dpia",{"tag":488,"count":354},"dr",{"tag":490,"count":354},"draas",{"tag":492,"count":354},"duopol",{"tag":494,"count":354},"dynamicke-staticke",{"tag":496,"count":354},"efqm",{"tag":498,"count":354},"ehr",{"tag":500,"count":354},"eidas",{"tag":502,"count":354},"ekonomie",{"tag":504,"count":354},"elektronicka-preskripce",{"tag":506,"count":354},"email",{"tag":508,"count":354},"emotet",{"tag":510,"count":354},"emv",{"tag":512,"count":354},"endogenni",{"tag":514,"count":354},"engel",{"tag":516,"count":354},"eu",{"tag":518,"count":354},"euler",{"tag":520,"count":354},"excel",{"tag":522,"count":354},"exogenni",{"tag":524,"count":354},"exploit",{"tag":526,"count":354},"extremy",{"tag":528,"count":354},"factory-support",{"tag":530,"count":354},"fancy-bear",{"tag":532,"count":354},"fel-expert",{"tag":534,"count":354},"force-field",{"tag":536,"count":354},"forfaiting",{"tag":538,"count":354},"fuzzy-system",{"tag":540,"count":354},"fyzicky-utok",{"tag":542,"count":354},"geograficka",{"tag":544,"count":354},"giffen",{"tag":546,"count":354},"hdd",{"tag":548,"count":354},"hedging",{"tag":550,"count":354},"hesla",{"tag":552,"count":354},"hhi",{"tag":554,"count":354},"hipaa",{"tag":556,"count":354},"hodnoceni",{"tag":558,"count":354},"hodnoceni-rizik",{"tag":560,"count":354},"horizontalni",{"tag":562,"count":354},"hotelling",{"tag":564,"count":354},"hybridni-system",{"tag":566,"count":354},"iam",{"tag":568,"count":354},"icc",{"tag":570,"count":354},"identifikace",{"tag":572,"count":354},"ids",{"tag":574,"count":354},"iec-61850",{"tag":576,"count":354},"iec-62351",{"tag":578,"count":354},"implicitni-funkce",{"tag":580,"count":354},"incident-management",{"tag":582,"count":354},"incident-response",{"tag":584,"count":354},"info",{"tag":586,"count":354},"informacni-valka",{"tag":588,"count":354},"inovace",{"tag":590,"count":354},"integraly",{"tag":592,"count":354},"internet",{"tag":594,"count":354},"intervence",{"tag":596,"count":354},"intervencni-strategie",{"tag":598,"count":354},"intlinprog",{"tag":600,"count":354},"investice",{"tag":602,"count":354},"investicni-rozhodovani",{"tag":604,"count":354},"ips",{"tag":606,"count":354},"ipsec",{"tag":608,"count":354},"irr",{"tag":610,"count":354},"is-it-strategie",{"tag":612,"count":354},"iso-11898",{"tag":614,"count":354},"iso-27001",{"tag":616,"count":354},"iso-27002",{"tag":618,"count":354},"iso-27011",{"tag":620,"count":354},"iso-27799",{"tag":622,"count":354},"isp",{"tag":624,"count":354},"kalkul",{"tag":626,"count":354},"kampus",{"tag":628,"count":354},"kartel",{"tag":630,"count":354},"katalog-rizik",{"tag":632,"count":354},"klasifikace",{"tag":634,"count":354},"klasifikace-rizik",{"tag":636,"count":354},"knapsack",{"tag":638,"count":354},"koeficient-variace",{"tag":640,"count":354},"komparativni-statika",{"tag":642,"count":354},"koncentrace",{"tag":644,"count":354},"kriticka-analyza",{"tag":646,"count":354},"kriticka-cesta",{"tag":648,"count":354},"kriticka-zona",{"tag":650,"count":354},"krizove-rizeni",{"tag":652,"count":354},"kryptografie",{"tag":654,"count":354},"kupon",{"tag":656,"count":354},"kursove-riziko",{"tag":658,"count":354},"kyberneticka-hygiena",{"tag":660,"count":354},"kyberprostor",{"tag":662,"count":354},"leasing",{"tag":664,"count":354},"lerner",{"tag":666,"count":354},"letter-of-credit",{"tag":668,"count":354},"lidske-zdroje",{"tag":670,"count":354},"linearni-programovani",{"tag":672,"count":354},"literatura",{"tag":674,"count":354},"lorenz",{"tag":676,"count":354},"manazerske-modely",{"tag":678,"count":354},"markup",{"tag":680,"count":354},"marshall",{"tag":682,"count":354},"maurer",{"tag":684,"count":354},"maximalizace-zisku",{"tag":686,"count":354},"mcfarlan",{"tag":688,"count":354},"mckinsey-7s",{"tag":690,"count":354},"mcn",{"tag":692,"count":354},"mereni-rizika",{"tag":694,"count":354},"mezni-naklady",{"tag":696,"count":354},"mezni-uzitecnost",{"tag":698,"count":354},"meznik",{"tag":700,"count":354},"mica",{"tag":702,"count":354},"minimalizace-vydaju",{"tag":704,"count":354},"mitm",{"tag":706,"count":354},"mobilni-platby",{"tag":708,"count":354},"model",{"tag":710,"count":354},"model-hrozeb",{"tag":712,"count":354},"modely",{"tag":714,"count":354},"monopson",{"tag":716,"count":354},"mpc",{"tag":718,"count":354},"mpl-apl",{"tag":720,"count":354},"mps",{"tag":722,"count":354},"mr-tr",{"tag":724,"count":354},"mrcs",{"tag":726,"count":354},"mzdova-diskriminace",{"tag":728,"count":354},"nabidka",{"tag":730,"count":354},"nabidka-firmy",{"tag":732,"count":354},"nac",{"tag":734,"count":354},"naklady",{"tag":736,"count":354},"ncpi",{"tag":738,"count":354},"ncss",{"tag":740,"count":354},"nejistota",{"tag":742,"count":354},"nemocnice",{"tag":744,"count":354},"neurcity",{"tag":746,"count":354},"neuspesny-manazer",{"tag":748,"count":354},"nfc",{"tag":750,"count":354},"ngn",{"tag":752,"count":354},"nistir-7628",{"tag":754,"count":354},"nistir-8374",{"tag":756,"count":354},"non-recourse",{"tag":758,"count":354},"normy",{"tag":760,"count":354},"nsa",{"tag":762,"count":354},"odhad-poptavky",{"tag":764,"count":354},"odpor",{"tag":766,"count":354},"ofenzivni-rizeni",{"tag":768,"count":354},"omezeni",{"tag":770,"count":354},"opec",{"tag":772,"count":354},"operacni-vyzkum",{"tag":774,"count":354},"optimalizace-spotrebitele",{"tag":776,"count":354},"pacs",{"tag":778,"count":354},"parcialni-derivace",{"tag":780,"count":354},"pcc",{"tag":782,"count":354},"pci-dss",{"tag":784,"count":354},"penetracni-testy",{"tag":786,"count":354},"peters-waterman",{"tag":788,"count":354},"pgp",{"tag":790,"count":354},"platby",{"tag":792,"count":354},"plc",{"tag":794,"count":354},"podnikatelske-riziko",{"tag":796,"count":354},"pohledavky",{"tag":798,"count":354},"pojisteni",{"tag":800,"count":354},"polaroid",{"tag":802,"count":354},"poptavka",{"tag":804,"count":354},"poptavka-spotrebitele",{"tag":806,"count":354},"postoj-k-riziku",{"tag":808,"count":354},"posun-krivek",{"tag":810,"count":354},"preference",{"tag":812,"count":354},"prenos",{"tag":814,"count":354},"prijatelna-zona",{"tag":816,"count":354},"prijem",{"tag":818,"count":354},"prijem-naklady-zisk",{"tag":820,"count":354},"priklady",{"tag":822,"count":354},"primitivni-funkce",{"tag":824,"count":354},"priprava",{"tag":826,"count":354},"prirozeny-monopol",{"tag":828,"count":354},"privilegovane-ucty",{"tag":830,"count":354},"produkcni-funkce",{"tag":832,"count":354},"prognoza",{"tag":834,"count":354},"prognozovani",{"tag":836,"count":354},"projekt",{"tag":838,"count":354},"projektove-rizeni",{"tag":840,"count":354},"ps",{"tag":842,"count":354},"raas",{"tag":844,"count":354},"reakcni-krivka",{"tag":846,"count":354},"recourse",{"tag":848,"count":354},"reference",{"tag":850,"count":354},"regulace",{"tag":852,"count":354},"reseni",{"tag":854,"count":354},"rozmrazeni",{"tag":856,"count":354},"rozpoctove-omezeni",{"tag":858,"count":354},"rpo",{"tag":860,"count":354},"rto",{"tag":862,"count":354},"samostatna-prace",{"tag":864,"count":354},"satisficing",{"tag":866,"count":354},"scada",{"tag":868,"count":354},"scoring",{"tag":870,"count":354},"shephard",{"tag":872,"count":354},"sim",{"tag":874,"count":354},"sitove-utoky",{"tag":876,"count":354},"slovnik",{"tag":878,"count":354},"sniffing",{"tag":880,"count":354},"snizovani-rizika",{"tag":882,"count":354},"socialni-inzenyrstvi",{"tag":884,"count":354},"soukromi",{"tag":886,"count":354},"spf",{"tag":888,"count":354},"spolehlivost",{"tag":890,"count":354},"sponzor",{"tag":892,"count":354},"spoofing",{"tag":894,"count":354},"srovnani",{"tag":896,"count":354},"ssl",{"tag":898,"count":354},"strategicke",{"tag":900,"count":354},"strategie",{"tag":902,"count":354},"supply-chain",{"tag":904,"count":354},"sweezy",{"tag":906,"count":354},"taktiky",{"tag":908,"count":354},"tc-z-mc",{"tag":910,"count":354},"telekomunikace",{"tag":912,"count":354},"telemedicina",{"tag":914,"count":354},"teorie-her",{"tag":916,"count":354},"tisax",{"tag":918,"count":354},"tls",{"tag":920,"count":354},"tokenizace",{"tag":922,"count":354},"tor",{"tag":924,"count":354},"tr-z-mr",{"tag":926,"count":354},"trenovani",{"tag":928,"count":354},"trh-penez",{"tag":930,"count":354},"trh-prace",{"tag":932,"count":354},"trh-zbozi",{"tag":934,"count":354},"tsp",{"tag":936,"count":354},"two-part-tariff",{"tag":938,"count":354},"univerzity",{"tag":940,"count":354},"urcity",{"tag":942,"count":354},"urokova-mira",{"tag":944,"count":354},"utoky",{"tag":946,"count":354},"uvod-do-matematicke-ekonomie",{"tag":948,"count":354},"vazane-extremy",{"tag":950,"count":354},"veblen",{"tag":952,"count":354},"vertikalni",{"tag":954,"count":354},"vezno-dilema",{"tag":956,"count":354},"vicevrstve-site",{"tag":958,"count":354},"vnm",{"tag":960,"count":354},"vodni-elektrarna",{"tag":962,"count":354},"volne-extremy",{"tag":964,"count":354},"vs",{"tag":966,"count":354},"vyhodnoceni",{"tag":968,"count":354},"vykupne",{"tag":970,"count":354},"vyrobce",{"tag":972,"count":354},"vyvarovani",{"tag":974,"count":354},"vzor",{"tag":976,"count":354},"walton",{"tag":978,"count":354},"wannacry",{"tag":980,"count":354},"ward",{"tag":982,"count":354},"web",{"tag":984,"count":354},"wifi",{"tag":986,"count":354},"williamson",{"tag":988,"count":354},"wormgpt",{"tag":990,"count":354},"xml-security",{"tag":992,"count":354},"zalomena-poptavka",{"tag":994,"count":354},"zamestnanecka-firma",{"tag":996,"count":354},"zavazna-zona",{"tag":998,"count":354},"zeleznice",{"tag":1000,"count":354},"zisk",{"tag":1002,"count":354},"zranitelnost",{"page":1004,"collection":3071},{"id":1005,"title":1006,"body":1007,"course":5,"courses":3052,"created":3053,"description":3054,"extension":3055,"meta":3056,"navigation":3057,"path":3058,"seo":3059,"sources":3060,"stem":3067,"tags":3068,"type":3069,"updated":3053,"__hash__":3070},"outputs\u002Foutputs\u002Fimork-normy-prehled.md","ImorK — Přehled norem a standardů podle sektoru",{"type":1008,"value":1009,"toc":3038},"minimark",[1010,1014,1032,1037,1040,1309,1313,1316,1604,1608,1848,1852,1855,2149,2153,2286,2290,2522,2526,2650,2654,2657,2811,2815,2905,2909,2992,2996],[1011,1012,1006],"h1",{"id":1013},"imork-přehled-norem-a-standardů-podle-sektoru",[1015,1016,1017,1018,1026,1027,1031],"p",{},"Referenční tabulka všech bezpečnostních norem, standardů, regulací a metodik probíraných v kurzu ",[1019,1020,1025],"a",{"className":1021,"href":1023,"dataFsResolvedFilePath":1024},[1022],"wikilink","\u002Fwiki\u002Fimork","courses\u002Fimork.md","ImorK",". Slouží jako rychlý lookup k orientaci ve změti zkratek — pro každou normu uvedeno ",[1028,1029,1030],"em",{},"co normalizuje, kde se v kurzu objevuje, jaký zdroj v repozitáři ji rozebírá",".",[1033,1034,1036],"h2",{"id":1035},"rodina-isoiec-27000","Rodina ISO\u002FIEC 27000",[1015,1038,1039],{},"Mezinárodní normy pro řízení informační bezpečnosti.",[1041,1042,1043,1059],"table",{},[1044,1045,1046],"thead",{},[1047,1048,1049,1053,1056],"tr",{},[1050,1051,1052],"th",{},"Norma",[1050,1054,1055],{},"Co normalizuje",[1050,1057,1058],{},"Kontext v kurzu",[1060,1061,1062,1083,1098,1122,1139,1156,1173,1190,1206,1228,1245,1263,1278,1294],"tbody",{},[1047,1063,1064,1071,1074],{},[1065,1066,1067],"td",{},[1068,1069,1070],"strong",{},"ISO\u002FIEC 27001",[1065,1072,1073],{},"Požadavky na ISMS — certifikační norma",[1065,1075,1076,1077],{},"Jádro kurzu, ",[1019,1078,1082],{"className":1079,"href":1081},[1022,1080],"wikilink-broken","\u002Fwiki\u002Fisms\\","ISMS",[1047,1084,1085,1090,1093],{},[1065,1086,1087],{},[1068,1088,1089],{},"ISO\u002FIEC 27002",[1065,1091,1092],{},"Soubor bezpečnostních opatření (best practices)",[1065,1094,1095],{},[1019,1096,1082],{"className":1097,"href":1081},[1022,1080],[1047,1099,1100,1105,1108],{},[1065,1101,1102],{},[1068,1103,1104],{},"ISO\u002FIEC 27005:2022",[1065,1106,1107],{},"Řízení rizik bezpečnosti informací",[1065,1109,1110,1115,1116],{},[1019,1111,1114],{"className":1112,"href":1113},[1022,1080],"\u002Fwiki\u002Frizeni-rizik\\","Řízení rizik",", ",[1019,1117,1121],{"className":1118,"href":1119,"dataFsResolvedFilePath":1120},[1022],"\u002Fwiki\u002Fimork-risk-management","summaries\u002Fimork-risk-management.md","imork-risk-management",[1047,1123,1124,1129,1132],{},[1065,1125,1126],{},[1068,1127,1128],{},"ISO\u002FIEC 27011:2024",[1065,1130,1131],{},"ISMS pro telekomunikační organizace",[1065,1133,1134],{},[1019,1135,1138],{"className":1136,"href":1137},[1022,1080],"\u002Fwiki\u002Fimork-isp\\","ISP a telekomunikace",[1047,1140,1141,1146,1149],{},[1065,1142,1143],{},[1068,1144,1145],{},"ISO\u002FIEC 27014:2020",[1065,1147,1148],{},"Governance bezpečnosti informací",[1065,1150,1151],{},[1019,1152,1155],{"className":1153,"href":1154},[1022,1080],"\u002Fwiki\u002Fimork-manazerska-bezpecnost\\","Manažerská bezpečnost",[1047,1157,1158,1163,1166],{},[1065,1159,1160],{},[1068,1161,1162],{},"ISO\u002FIEC 27019:2024",[1065,1164,1165],{},"ISMS pro energetický průmysl",[1065,1167,1168],{},[1019,1169,1172],{"className":1170,"href":1171},[1022,1080],"\u002Fwiki\u002Fimork-energetika\\","Energetika",[1047,1174,1175,1180,1183],{},[1065,1176,1177],{},[1068,1178,1179],{},"ISO\u002FIEC 27031:2025",[1065,1181,1182],{},"Připravenost ICT pro kontinuitu podnikání",[1065,1184,1185],{},[1019,1186,1189],{"className":1187,"href":1188},[1022,1080],"\u002Fwiki\u002Fbcm\\","BCM",[1047,1191,1192,1197,1200],{},[1065,1193,1194],{},[1068,1195,1196],{},"ISO\u002FIEC 27035",[1065,1198,1199],{},"Řízení incidentů informační bezpečnosti (multipart: -1:2023, -2:2023, -3:2020, -4:2024)",[1065,1201,1202],{},[1019,1203,1205],{"className":1204,"href":1154},[1022,1080],"Incident management",[1047,1207,1208,1213,1216],{},[1065,1209,1210],{},[1068,1211,1212],{},"ISO\u002FIEC 27701:2025",[1065,1214,1215],{},"Privacy Information Management System (PIMS); 1. vydání 2019",[1065,1217,1218,1115,1223],{},[1019,1219,1222],{"className":1220,"href":1221},[1022,1080],"\u002Fwiki\u002Fgdpr\\","GDPR",[1019,1224,1227],{"className":1225,"href":1226},[1022,1080],"\u002Fwiki\u002Fimork-kradez-dat\\","Krádež dat",[1047,1229,1230,1235,1238],{},[1065,1231,1232],{},[1068,1233,1234],{},"ISO 27799:2025",[1065,1236,1237],{},"ISMS pro zdravotnictví (publikováno samostatně, ne ISO\u002FIEC)",[1065,1239,1240],{},[1019,1241,1244],{"className":1242,"href":1243},[1022,1080],"\u002Fwiki\u002Fimork-zdravotnictvi\\","Zdravotnictví",[1047,1246,1247,1252,1255],{},[1065,1248,1249],{},[1068,1250,1251],{},"ISO\u002FIEC 24745:2022",[1065,1253,1254],{},"Ochrana biometrických šablon",[1065,1256,1257,1262],{},[1019,1258,1261],{"className":1259,"href":1260},[1022,1080],"\u002Fwiki\u002Fochrana-dat\\","Ochrana dat"," (biometrický podpis)",[1047,1264,1265,1270,1273],{},[1065,1266,1267],{},[1068,1268,1269],{},"ISO 22301:2019",[1065,1271,1272],{},"Požadavky na BCMS — kontinuita činnosti (Amd. 1:2024)",[1065,1274,1275],{},[1019,1276,1189],{"className":1277,"href":1188},[1022,1080],[1047,1279,1280,1285,1288],{},[1065,1281,1282],{},[1068,1283,1284],{},"ISO 31000:2018",[1065,1286,1287],{},"Obecné principy řízení rizik",[1065,1289,1290,1293],{},[1019,1291,1114],{"className":1292,"href":1113},[1022,1080]," (umbrella)",[1047,1295,1296,1301,1304],{},[1065,1297,1298],{},[1068,1299,1300],{},"IEC 31010:2019",[1065,1302,1303],{},"Techniky posuzování rizik",[1065,1305,1306],{},[1019,1307,1114],{"className":1308,"href":1113},[1022,1080],[1033,1310,1312],{"id":1311},"normy-podle-oborového-sektoru","Normy podle oborového sektoru",[1015,1314,1315],{},"Která ISO\u002Fsektorová norma platí pro který sektor — tabulka pro rychlou disambiguaci.",[1041,1317,1318,1334],{},[1044,1319,1320],{},[1047,1321,1322,1325,1328,1331],{},[1050,1323,1324],{},"Sektor",[1050,1326,1327],{},"Hlavní norma",[1050,1329,1330],{},"Doplňující normy\u002Fregulace",[1050,1332,1333],{},"Stránka",[1060,1335,1336,1356,1374,1394,1415,1436,1457,1478,1499,1520,1541,1562,1583],{},[1047,1337,1338,1343,1345,1348],{},[1065,1339,1340],{},[1068,1341,1342],{},"Zdravotnictví (EU)",[1065,1344,1234],{},[1065,1346,1347],{},"GDPR (zvláštní kategorie); ENISA medical",[1065,1349,1350],{},[1019,1351,1355],{"className":1352,"href":1353,"dataFsResolvedFilePath":1354},[1022],"\u002Fwiki\u002Fimork-zdravotnictvi","summaries\u002Fimork-zdravotnictvi.md","imork-zdravotnictvi",[1047,1357,1358,1363,1366,1369],{},[1065,1359,1360],{},[1068,1361,1362],{},"Zdravotnictví (USA)",[1065,1364,1365],{},"HIPAA (5 titulů I–V)",[1065,1367,1368],{},"HITECH Act",[1065,1370,1371],{},[1019,1372,1355],{"className":1373,"href":1353,"dataFsResolvedFilePath":1354},[1022],[1047,1375,1376,1380,1383,1386],{},[1065,1377,1378],{},[1068,1379,1172],{},[1065,1381,1382],{},"ISO\u002FIEC 27019",[1065,1384,1385],{},"IEC 61850, IEC 62351, IEC TC57",[1065,1387,1388],{},[1019,1389,1393],{"className":1390,"href":1391,"dataFsResolvedFilePath":1392},[1022],"\u002Fwiki\u002Fimork-energetika","summaries\u002Fimork-energetika.md","imork-energetika",[1047,1395,1396,1401,1404,1407],{},[1065,1397,1398],{},[1068,1399,1400],{},"Smart Grid",[1065,1402,1403],{},"NISTIR 7628",[1065,1405,1406],{},"IEC 62351",[1065,1408,1409],{},[1019,1410,1414],{"className":1411,"href":1412,"dataFsResolvedFilePath":1413},[1022],"\u002Fwiki\u002Fimork-smart-grid","summaries\u002Fimork-smart-grid.md","imork-smart-grid",[1047,1416,1417,1422,1425,1428],{},[1065,1418,1419],{},[1068,1420,1421],{},"Doprava (železnice)",[1065,1423,1424],{},"CLC\u002FTS 50701",[1065,1426,1427],{},"ENISA Railway, kritická infrastruktura ČR",[1065,1429,1430],{},[1019,1431,1435],{"className":1432,"href":1433,"dataFsResolvedFilePath":1434},[1022],"\u002Fwiki\u002Fimork-doprava","summaries\u002Fimork-doprava.md","imork-doprava",[1047,1437,1438,1443,1446,1449],{},[1065,1439,1440],{},[1068,1441,1442],{},"Automotive",[1065,1444,1445],{},"TISAX",[1065,1447,1448],{},"UN Regulation 155 (CSMS), ISO\u002FSAE 21434, CHT",[1065,1450,1451],{},[1019,1452,1456],{"className":1453,"href":1454,"dataFsResolvedFilePath":1455},[1022],"\u002Fwiki\u002Fimork-automotive","summaries\u002Fimork-automotive.md","imork-automotive",[1047,1458,1459,1464,1467,1470],{},[1065,1460,1461],{},[1068,1462,1463],{},"ISP \u002F telekomunikace",[1065,1465,1466],{},"ISO\u002FIEC 27011",[1065,1468,1469],{},"NGN, IMS, RTBH",[1065,1471,1472],{},[1019,1473,1477],{"className":1474,"href":1475,"dataFsResolvedFilePath":1476},[1022],"\u002Fwiki\u002Fimork-isp","summaries\u002Fimork-isp.md","imork-isp",[1047,1479,1480,1485,1488,1491],{},[1065,1481,1482],{},[1068,1483,1484],{},"Mission Critical Networks",[1065,1486,1487],{},"ITU-T X.805 (model hrozeb)",[1065,1489,1490],{},"NCPI",[1065,1492,1493],{},[1019,1494,1498],{"className":1495,"href":1496,"dataFsResolvedFilePath":1497},[1022],"\u002Fwiki\u002Fimork-mcn","summaries\u002Fimork-mcn.md","imork-mcn",[1047,1500,1501,1506,1509,1512],{},[1065,1502,1503],{},[1068,1504,1505],{},"Akademické prostředí",[1065,1507,1508],{},"BICSI 001\u002F004\u002F007\u002F008",[1065,1510,1511],{},"Vyhl. 360\u002F2020 Sb. (VIS), TLP",[1065,1513,1514],{},[1019,1515,1519],{"className":1516,"href":1517,"dataFsResolvedFilePath":1518},[1022],"\u002Fwiki\u002Fimork-akademicke-prostredi","summaries\u002Fimork-akademicke-prostredi.md","imork-akademicke-prostredi",[1047,1521,1522,1527,1530,1533],{},[1065,1523,1524],{},[1068,1525,1526],{},"Finanční sektor (EU)",[1065,1528,1529],{},"DORA (2022\u002F2554)",[1065,1531,1532],{},"MiCA, NIS2",[1065,1534,1535],{},[1019,1536,1540],{"className":1537,"href":1538,"dataFsResolvedFilePath":1539},[1022],"\u002Fwiki\u002Fimork-financni-sektor","summaries\u002Fimork-financni-sektor.md","imork-financni-sektor",[1047,1542,1543,1548,1551,1554],{},[1065,1544,1545],{},[1068,1546,1547],{},"Platební služby",[1065,1549,1550],{},"PCI DSS v4.0.1 (od 6\u002F2024; v4.0 vyřazena 31. 12. 2024)",[1065,1552,1553],{},"EMV, eIDAS",[1065,1555,1556],{},[1019,1557,1561],{"className":1558,"href":1559,"dataFsResolvedFilePath":1560},[1022],"\u002Fwiki\u002Fimork-payment","summaries\u002Fimork-payment.md","imork-payment",[1047,1563,1564,1569,1572,1575],{},[1065,1565,1566],{},[1068,1567,1568],{},"Web",[1065,1570,1571],{},"NIST SP 800-95, OWASP Top 10",[1065,1573,1574],{},"W3C Web Services",[1065,1576,1577],{},[1019,1578,1582],{"className":1579,"href":1580,"dataFsResolvedFilePath":1581},[1022],"\u002Fwiki\u002Fimork-www","summaries\u002Fimork-www.md","imork-www",[1047,1584,1585,1590,1593,1596],{},[1065,1586,1587],{},[1068,1588,1589],{},"Email",[1065,1591,1592],{},"RFC 7208 (SPF), 6376 (DKIM), 7489 (DMARC)",[1065,1594,1595],{},"RFC 8461 (MTA-STS)",[1065,1597,1598],{},[1019,1599,1603],{"className":1600,"href":1601,"dataFsResolvedFilePath":1602},[1022],"\u002Fwiki\u002Fimork-email","summaries\u002Fimork-email.md","imork-email",[1033,1605,1607],{"id":1606},"další-iso-itu-t-iec-normy","Další ISO \u002F ITU-T \u002F IEC normy",[1041,1609,1610,1620],{},[1044,1611,1612],{},[1047,1613,1614,1616,1618],{},[1050,1615,1052],{},[1050,1617,1055],{},[1050,1619,1058],{},[1060,1621,1622,1639,1656,1674,1690,1706,1721,1740,1755,1770,1785,1800,1815,1830],{},[1047,1623,1624,1629,1632],{},[1065,1625,1626],{},[1068,1627,1628],{},"ISO\u002FIEC 20000",[1065,1630,1631],{},"IT Service Management System (ITSM)",[1065,1633,1634,1638],{},[1019,1635,1505],{"className":1636,"href":1637},[1022,1080],"\u002Fwiki\u002Fimork-akademicke-prostredi\\"," (kombinace s ISO 27001)",[1047,1640,1641,1646,1649],{},[1065,1642,1643],{},[1068,1644,1645],{},"ISO\u002FIEC 15408",[1065,1647,1648],{},"Common Criteria — kritéria hodnocení bezpečnosti (EAL 1–7)",[1065,1650,1651],{},[1019,1652,1655],{"className":1653,"href":1654},[1022,1080],"\u002Fwiki\u002Fimork-mobilni-bezpecnost\\","Mobilní bezpečnost",[1047,1657,1658,1663,1666],{},[1065,1659,1660],{},[1068,1661,1662],{},"ISA\u002FIEC 62443",[1065,1664,1665],{},"Cybersecurity for Industrial Automation and Control Systems",[1065,1667,1668,1673],{},[1019,1669,1672],{"className":1670,"href":1671},[1022,1080],"\u002Fwiki\u002Fimork-doprava\\","Doprava",", průmyslové řídicí systémy",[1047,1675,1676,1681,1684],{},[1065,1677,1678],{},[1068,1679,1680],{},"ISO 11898",[1065,1682,1683],{},"Standard CAN bus — sériová sběrnice ve vozidlech",[1065,1685,1686],{},[1019,1687,1442],{"className":1688,"href":1689},[1022,1080],"\u002Fwiki\u002Fimork-automotive\\",[1047,1691,1692,1697,1700],{},[1065,1693,1694],{},[1068,1695,1696],{},"ITU-T X.1051",[1065,1698,1699],{},"ISMS guidelines pro telekomunikační organizace (mirror ISO 27011)",[1065,1701,1702],{},[1019,1703,1705],{"className":1704,"href":1137},[1022,1080],"ISP",[1047,1707,1708,1713,1716],{},[1065,1709,1710],{},[1068,1711,1712],{},"ITU-T Y.2001",[1065,1714,1715],{},"Next Generation Networks — obecná architektura",[1065,1717,1718],{},[1019,1719,1705],{"className":1720,"href":1137},[1022,1080],[1047,1722,1723,1728,1731],{},[1065,1724,1725],{},[1068,1726,1727],{},"ITU-T Y.2720",[1065,1729,1730],{},"NGN identity management framework",[1065,1732,1733,1115,1736],{},[1019,1734,1705],{"className":1735,"href":1137},[1022,1080],[1019,1737,1739],{"className":1738,"href":1154},[1022,1080],"IAM",[1047,1741,1742,1747,1750],{},[1065,1743,1744],{},[1068,1745,1746],{},"EU 93\u002F42\u002FEEC",[1065,1748,1749],{},"Medical Devices Directive — zdravotnické prostředky",[1065,1751,1752],{},[1019,1753,1244],{"className":1754,"href":1243},[1022,1080],[1047,1756,1757,1762,1765],{},[1065,1758,1759],{},[1068,1760,1761],{},"EU 93\u002F68\u002FEEC",[1065,1763,1764],{},"CE marking — označování shody",[1065,1766,1767],{},[1019,1768,1244],{"className":1769,"href":1243},[1022,1080],[1047,1771,1772,1777,1780],{},[1065,1773,1774],{},[1068,1775,1776],{},"BICSI 001-2017",[1065,1778,1779],{},"Vzdělávací instituce — kabeláž, infrastruktura",[1065,1781,1782],{},[1019,1783,1505],{"className":1784,"href":1637},[1022,1080],[1047,1786,1787,1792,1795],{},[1065,1788,1789],{},[1068,1790,1791],{},"BICSI 004",[1065,1793,1794],{},"Healthcare Facilities — infrastruktura zdravotnických zařízení",[1065,1796,1797],{},[1019,1798,1244],{"className":1799,"href":1243},[1022,1080],[1047,1801,1802,1807,1810],{},[1065,1803,1804],{},[1068,1805,1806],{},"BICSI 002",[1065,1808,1809],{},"Data Center Design — návrh datových center",[1065,1811,1812],{},[1019,1813,1477],{"className":1814,"href":1475,"dataFsResolvedFilePath":1476},[1022],[1047,1816,1817,1822,1825],{},[1065,1818,1819],{},[1068,1820,1821],{},"BICSI 007",[1065,1823,1824],{},"Inteligentní budovy",[1065,1826,1827],{},[1019,1828,1519],{"className":1829,"href":1517,"dataFsResolvedFilePath":1518},[1022],[1047,1831,1832,1837,1840],{},[1065,1833,1834],{},[1068,1835,1836],{},"BICSI 008",[1065,1838,1839],{},"Wireless \u002F WLAN",[1065,1841,1842,1115,1845],{},[1019,1843,1519],{"className":1844,"href":1517,"dataFsResolvedFilePath":1518},[1022],[1019,1846,1477],{"className":1847,"href":1475,"dataFsResolvedFilePath":1476},[1022],[1033,1849,1851],{"id":1850},"nist-special-publications-sp-800","NIST Special Publications (SP 800)",[1015,1853,1854],{},"Americké standardy pro federální systémy, široce používané jako de facto best practices.",[1041,1856,1857,1869],{},[1044,1858,1859],{},[1047,1860,1861,1864,1867],{},[1050,1862,1863],{},"SP",[1050,1865,1866],{},"Téma",[1050,1868,1058],{},[1060,1870,1871,1892,1907,1922,1938,1953,1969,1984,2001,2017,2034,2050,2066,2082,2101,2117,2132],{},[1047,1872,1873,1878,1885],{},[1065,1874,1875],{},[1068,1876,1877],{},"800-16",[1065,1879,1880,1881,1884],{},"IT Security Training Requirements (1998; ",[1068,1882,1883],{},"vyřazeno 12. 9. 2024",", sloučeno do 800-50r1)",[1065,1886,1887],{},[1019,1888,1891],{"className":1889,"href":1890},[1022,1080],"\u002Fwiki\u002Fsae\\","SAE",[1047,1893,1894,1899,1902],{},[1065,1895,1896],{},[1068,1897,1898],{},"800-30 Rev. 1",[1065,1900,1901],{},"Guide for Conducting Risk Assessments (2012)",[1065,1903,1904],{},[1019,1905,1114],{"className":1906,"href":1113},[1022,1080],[1047,1908,1909,1914,1917],{},[1065,1910,1911],{},[1068,1912,1913],{},"800-39",[1065,1915,1916],{},"Managing Information Security Risk (2011) — 3 úrovně: organizace \u002F mise \u002F IS",[1065,1918,1919],{},[1019,1920,1114],{"className":1921,"href":1113},[1022,1080],[1047,1923,1924,1929,1932],{},[1065,1925,1926],{},[1068,1927,1928],{},"800-45 v2",[1065,1930,1931],{},"Guidelines on Electronic Mail Security (2007)",[1065,1933,1934],{},[1019,1935,1589],{"className":1936,"href":1937},[1022,1080],"\u002Fwiki\u002Fimork-email\\",[1047,1939,1940,1945,1948],{},[1065,1941,1942],{},[1068,1943,1944],{},"800-50 Rev. 1",[1065,1946,1947],{},"Building a Cybersecurity and Privacy Learning Program (2024; nahrazuje původní 800-50 a 800-16)",[1065,1949,1950],{},[1019,1951,1891],{"className":1952,"href":1890},[1022,1080],[1047,1954,1955,1960,1963],{},[1065,1956,1957],{},[1068,1958,1959],{},"800-57",[1065,1961,1962],{},"Recommendation for Key Management (Part 1 Rev. 5)",[1065,1964,1965],{},[1019,1966,1968],{"className":1967,"href":1154},[1022,1080],"Správa klíčů",[1047,1970,1971,1976,1979],{},[1065,1972,1973],{},[1068,1974,1975],{},"800-61 Rev. 3",[1065,1977,1978],{},"Incident Response Recommendations (4\u002F2025; CSF 2.0 Community Profile)",[1065,1980,1981],{},[1019,1982,1205],{"className":1983,"href":1154},[1022,1080],[1047,1985,1986,1991,1994],{},[1065,1987,1988],{},[1068,1989,1990],{},"800-63 Rev. 4",[1065,1992,1993],{},"Digital Identity Guidelines (7\u002F2025; suite 800-63 + 800-63A\u002FB\u002FC)",[1065,1995,1996],{},[1019,1997,2000],{"className":1998,"href":1999},[1022,1080],"\u002Fwiki\u002Fimork-sprava-login\\","Správa přihlašování",[1047,2002,2003,2008,2011],{},[1065,2004,2005],{},[1068,2006,2007],{},"800-92",[1065,2009,2010],{},"Guide to Computer Security Log Management (2006; Rev. 1 v draftu)",[1065,2012,2013],{},[1019,2014,2016],{"className":2015,"href":1154},[1022,1080],"SIEM\u002FLog mgmt",[1047,2018,2019,2024,2027],{},[1065,2020,2021],{},[1068,2022,2023],{},"800-95",[1065,2025,2026],{},"Guide to Secure Web Services (2007, dlouho neaktualizováno)",[1065,2028,2029],{},[1019,2030,2033],{"className":2031,"href":2032},[1022,1080],"\u002Fwiki\u002Fimork-www\\","Bezpečnost webu",[1047,2035,2036,2041,2044],{},[1065,2037,2038],{},[1068,2039,2040],{},"800-100",[1065,2042,2043],{},"Information Security Handbook for Managers",[1065,2045,2046],{},[1019,2047,2049],{"className":2048,"href":1154},[1022,1080],"Governance",[1047,2051,2052,2057,2060],{},[1065,2053,2054],{},[1068,2055,2056],{},"800-115",[1065,2058,2059],{},"Technical Guide to Information Security Testing",[1065,2061,2062],{},[1019,2063,2065],{"className":2064,"href":1154},[1022,1080],"Penetrační testy",[1047,2067,2068,2073,2076],{},[1065,2069,2070],{},[1068,2071,2072],{},"800-122",[1065,2074,2075],{},"Guide to Protecting Confidentiality of PII (2010)",[1065,2077,2078,2081],{},[1019,2079,1222],{"className":2080,"href":1221},[1022,1080]," (americký analog)",[1047,2083,2084,2089,2096],{},[1065,2085,2086],{},[1068,2087,2088],{},"500-172",[1065,2090,2091,2092,2095],{},"Computer Security Training Guidelines (1989; ",[1068,2093,2094],{},"vyřazeno 1998",", historický)",[1065,2097,2098],{},[1019,2099,1891],{"className":2100,"href":1890},[1022,1080],[1047,2102,2103,2108,2111],{},[1065,2104,2105],{},[1068,2106,2107],{},"NISTIR 7628 Rev. 1",[1065,2109,2110],{},"Smart Grid Cybersecurity (2014)",[1065,2112,2113],{},[1019,2114,1400],{"className":2115,"href":2116},[1022,1080],"\u002Fwiki\u002Fimork-smart-grid\\",[1047,2118,2119,2124,2127],{},[1065,2120,2121],{},[1068,2122,2123],{},"NISTIR 8062",[1065,2125,2126],{},"Privacy Engineering and Risk Management (2017)",[1065,2128,2129],{},[1019,2130,1222],{"className":2131,"href":1221},[1022,1080],[1047,2133,2134,2139,2142],{},[1065,2135,2136],{},[1068,2137,2138],{},"NISTIR 8374",[1065,2140,2141],{},"Ransomware Risk Management Framework (2\u002F2022; profil CSF 1.1)",[1065,2143,2144],{},[1019,2145,2148],{"className":2146,"href":2147},[1022,1080],"\u002Fwiki\u002Fimork-ransomware\\","Ransomware",[1033,2150,2152],{"id":2151},"eu-regulace-a-směrnice","EU regulace a směrnice",[1041,2154,2155,2170],{},[1044,2156,2157],{},[1047,2158,2159,2162,2165,2168],{},[1050,2160,2161],{},"Regulace",[1050,2163,2164],{},"Plné označení",[1050,2166,2167],{},"Oblast",[1050,2169,1333],{},[1060,2171,2172,2189,2211,2230,2250,2268],{},[1047,2173,2174,2178,2181,2184],{},[1065,2175,2176],{},[1068,2177,1222],{},[1065,2179,2180],{},"Nařízení (EU) 2016\u002F679",[1065,2182,2183],{},"Ochrana osobních údajů (od 25. 5. 2018)",[1065,2185,2186],{},[1019,2187,1222],{"className":2188,"href":1221},[1022,1080],[1047,2190,2191,2196,2203,2206],{},[1065,2192,2193],{},[1068,2194,2195],{},"eIDAS",[1065,2197,2198,2199,2202],{},"Nařízení (EU) 910\u002F2014, novelizováno ",[1068,2200,2201],{},"(EU) 2024\u002F1183 — „eIDAS 2.0\""," od 5\u002F2024",[1065,2204,2205],{},"Elektronická identifikace a služby vytvářející důvěru; eIDAS 2.0 zavádí EUDI Wallet",[1065,2207,2208],{},[1019,2209,1261],{"className":2210,"href":1260},[1022,1080],[1047,2212,2213,2218,2221,2224],{},[1065,2214,2215],{},[1068,2216,2217],{},"NIS2",[1065,2219,2220],{},"Směrnice (EU) 2022\u002F2555",[1065,2222,2223],{},"Kybernetická bezpečnost provozovatelů kritických služeb",[1065,2225,2226,2229],{},[1019,2227,1222],{"className":2228,"href":1221},[1022,1080]," (cross-link)",[1047,2231,2232,2237,2240,2243],{},[1065,2233,2234],{},[1068,2235,2236],{},"DORA",[1065,2238,2239],{},"Nařízení (EU) 2022\u002F2554",[1065,2241,2242],{},"Digital Operational Resilience pro finanční sektor",[1065,2244,2245],{},[1019,2246,2249],{"className":2247,"href":2248},[1022,1080],"\u002Fwiki\u002Fimork-financni-sektor\\","Finanční sektor",[1047,2251,2252,2257,2260,2263],{},[1065,2253,2254],{},[1068,2255,2256],{},"MiCA",[1065,2258,2259],{},"Nařízení (EU) 2023\u002F1114",[1065,2261,2262],{},"Markets in Crypto-Assets",[1065,2264,2265],{},[1019,2266,2249],{"className":2267,"href":2248},[1022,1080],[1047,2269,2270,2275,2278,2281],{},[1065,2271,2272],{},[1068,2273,2274],{},"UN R155",[1065,2276,2277],{},"UN Regulation No. 155",[1065,2279,2280],{},"Cybersecurity Management System pro vozidla",[1065,2282,2283],{},[1019,2284,1442],{"className":2285,"href":1689},[1022,1080],[1033,2287,2289],{"id":2288},"české-právní-předpisy","České právní předpisy",[1041,2291,2292,2306],{},[1044,2293,2294],{},[1047,2295,2296,2299,2302,2304],{},[1050,2297,2298],{},"Předpis",[1050,2300,2301],{},"Plný název",[1050,2303,2167],{},[1050,2305,1333],{},[1060,2307,2308,2334,2358,2379,2397,2415,2435,2450,2468,2485,2502],{},[1047,2309,2310,2315,2318,2324],{},[1065,2311,2312],{},[1068,2313,2314],{},"ZKB (původní)",[1065,2316,2317],{},"Zákon č. 181\u002F2014 Sb.",[1065,2319,2320,2321],{},"Kybernetická bezpečnost (KII, VIS); ",[1068,2322,2323],{},"zrušen 1. 11. 2025",[1065,2325,2326,1115,2329],{},[1019,2327,1114],{"className":2328,"href":1113},[1022,1080],[1019,2330,37],{"className":2331,"href":2332,"dataFsResolvedFilePath":2333},[1022],"\u002Fwiki\u002Fisms","topics\u002Fisms.md",[1047,2335,2336,2341,2344,2350],{},[1065,2337,2338],{},[1068,2339,2340],{},"ZKB (nový)",[1065,2342,2343],{},"Zákon č. 264\u002F2025 Sb.",[1065,2345,2346,2347,2349],{},"Nový zákon o kybernetické bezpečnosti — transpozice ",[1068,2348,2217],{},", účinný od 1. 11. 2025",[1065,2351,2352,1115,2355],{},[1019,2353,1114],{"className":2354,"href":1113},[1022,1080],[1019,2356,37],{"className":2357,"href":2332,"dataFsResolvedFilePath":2333},[1022],[1047,2359,2360,2365,2368,2374],{},[1065,2361,2362],{},[1068,2363,2364],{},"VKB (původní)",[1065,2366,2367],{},"Vyhláška č. 82\u002F2018 Sb.",[1065,2369,2370,2371],{},"Provádění ZKB; §15 = BCM požadavky; ",[1068,2372,2373],{},"zrušena 1. 11. 2025",[1065,2375,2376],{},[1019,2377,1189],{"className":2378,"href":1188},[1022,1080],[1047,2380,2381,2386,2389,2392],{},[1065,2382,2383],{},[1068,2384,2385],{},"Nová prováděcí vyhláška",[1065,2387,2388],{},"Vyhláška č. 409\u002F2025 Sb.",[1065,2390,2391],{},"Bezpečnostní opatření poskytovatele regulované služby v režimu vyšších povinností; Příloha č. 6 = doporučená témata SAE; účinná 1. 11. 2025",[1065,2393,2394],{},[1019,2395,1891],{"className":2396,"href":1890},[1022,1080],[1047,2398,2399,2402,2405,2410],{},[1065,2400,2401],{},"—",[1065,2403,2404],{},"Vyhláška č. 360\u002F2020 Sb.",[1065,2406,2407,2408],{},"Významné informační systémy (VIS); ",[1068,2409,2373],{},[1065,2411,2412],{},[1019,2413,1519],{"className":2414,"href":1517,"dataFsResolvedFilePath":1518},[1022],[1047,2416,2417,2419,2422,2427],{},[1065,2418,2401],{},[1065,2420,2421],{},"Vyhláška č. 437\u002F2017 Sb.",[1065,2423,2424,2425],{},"Kritéria pro určení provozovatele základní služby (vč. zdravotnictví); novelizována 12\u002F2020 po útocích na nemocnice; ",[1068,2426,2373],{},[1065,2428,2429],{},[1019,2430,2434],{"className":2431,"href":2432,"dataFsResolvedFilePath":2433},[1022],"\u002Fwiki\u002Fimork-nemocnice","summaries\u002Fimork-nemocnice.md","imork-nemocnice",[1047,2436,2437,2439,2442,2445],{},[1065,2438,2401],{},[1065,2440,2441],{},"Zákon č. 110\u002F2019 Sb.",[1065,2443,2444],{},"Zpracování osobních údajů (doplněk GDPR v ČR)",[1065,2446,2447],{},[1019,2448,1222],{"className":2449,"href":1221},[1022,1080],[1047,2451,2452,2457,2460,2463],{},[1065,2453,2454],{},[1068,2455,2456],{},"TZ §312d",[1065,2458,2459],{},"Trestní zákoník (zák. č. 40\u002F2009 Sb.)",[1065,2461,2462],{},"Financování terorismu — riziko při platbě ransomu APT\u002FRaaS skupinám",[1065,2464,2465],{},[1019,2466,2148],{"className":2467,"href":2147},[1022,1080],[1047,2469,2470,2475,2477,2480],{},[1065,2471,2472],{},[1068,2473,2474],{},"TZ §361",[1065,2476,2459],{},[1065,2478,2479],{},"Účast na organizované zločinecké skupině — riziko při platbě RaaS",[1065,2481,2482],{},[1019,2483,2148],{"className":2484,"href":2147},[1022,1080],[1047,2486,2487,2492,2494,2497],{},[1065,2488,2489],{},[1068,2490,2491],{},"TZ §216",[1065,2493,2459],{},[1065,2495,2496],{},"Legalizace výnosů z trestné činnosti — riziko při platbě ransomu",[1065,2498,2499],{},[1019,2500,2148],{"className":2501,"href":2147},[1022,1080],[1047,2503,2504,2509,2511,2514],{},[1065,2505,2506],{},[1068,2507,2508],{},"TZ §230",[1065,2510,2459],{},[1065,2512,2513],{},"Neoprávněný přístup k počítačovému systému — trestnost útočníka",[1065,2515,2516],{},[1019,2517,2521],{"className":2518,"href":2519,"dataFsResolvedFilePath":2520},[1022],"\u002Fwiki\u002Fimork-anatomie-utoku","summaries\u002Fimork-anatomie-utoku.md","imork-anatomie-utoku",[1033,2523,2525],{"id":2524},"frameworky-a-metodiky","Frameworky a metodiky",[1041,2527,2528,2541],{},[1044,2529,2530],{},[1047,2531,2532,2535,2538],{},[1050,2533,2534],{},"Framework",[1050,2536,2537],{},"Vydavatel",[1050,2539,2540],{},"Účel",[1060,2542,2543,2560,2573,2586,2599,2612,2625,2638],{},[1047,2544,2545,2551,2554],{},[1065,2546,2547,2550],{},[1068,2548,2549],{},"NIST CSF 2.0"," (2024)",[1065,2552,2553],{},"NIST",[1065,2555,2556,2559],{},[1068,2557,2558],{},"6 funkcí",": Govern (nová od 2.0), Identify, Protect, Detect, Respond, Recover",[1047,2561,2562,2567,2570],{},[1065,2563,2564],{},[1068,2565,2566],{},"MITRE ATT&CK",[1065,2568,2569],{},"MITRE Corp.",[1065,2571,2572],{},"Znalostní báze taktik a technik útočníků",[1047,2574,2575,2580,2583],{},[1065,2576,2577],{},[1068,2578,2579],{},"OWASP Top 10",[1065,2581,2582],{},"OWASP",[1065,2584,2585],{},"10 nejkritičtějších rizik webových aplikací",[1047,2587,2588,2593,2596],{},[1065,2589,2590],{},[1068,2591,2592],{},"CIS Controls",[1065,2594,2595],{},"Center for Internet Security",[1065,2597,2598],{},"18 (v8) prioritizovaných kontrol",[1047,2600,2601,2606,2609],{},[1065,2602,2603],{},[1068,2604,2605],{},"CMMC 2.0",[1065,2607,2608],{},"DoD (USA)",[1065,2610,2611],{},"Cybersecurity Maturity Model Certification — 3 úrovně (Foundational \u002F Advanced \u002F Expert); 48 CFR final rule účinný 10. 11. 2025",[1047,2613,2614,2619,2622],{},[1065,2615,2616],{},[1068,2617,2618],{},"ENISA NCSS",[1065,2620,2621],{},"ENISA",[1065,2623,2624],{},"National Cyber Security Strategy guidance",[1047,2626,2627,2632,2635],{},[1065,2628,2629],{},[1068,2630,2631],{},"CRISP-DM",[1065,2633,2634],{},"konsorcium",[1065,2636,2637],{},"Cross-Industry Standard Process for Data Mining",[1047,2639,2640,2645,2647],{},[1065,2641,2642],{},[1068,2643,2644],{},"STEEPLE",[1065,2646,2401],{},[1065,2648,2649],{},"Analýza vnějšího prostředí pro BCM (Social\u002FTech\u002FEcon\u002FEthical\u002FPolit\u002FLegisl\u002FEnviron)",[1033,2651,2653],{"id":2652},"bezpečnostní-role-governance","Bezpečnostní role (governance)",[1015,2655,2656],{},"Standardní role v ISMS organizaci.",[1041,2658,2659,2674],{},[1044,2660,2661],{},[1047,2662,2663,2666,2669,2672],{},[1050,2664,2665],{},"Role",[1050,2667,2668],{},"Anglicky",[1050,2670,2671],{},"Odpovědnost",[1050,2673,1052],{},[1060,2675,2676,2692,2707,2722,2737,2753,2768,2782,2796],{},[1047,2677,2678,2683,2686,2689],{},[1065,2679,2680],{},[1068,2681,2682],{},"CIO",[1065,2684,2685],{},"Chief Information Officer",[1065,2687,2688],{},"Celkové řízení ICT",[1065,2690,2691],{},"obecná",[1047,2693,2694,2699,2702,2705],{},[1065,2695,2696],{},[1068,2697,2698],{},"CISO",[1065,2700,2701],{},"Chief Information Security Officer",[1065,2703,2704],{},"Řízení informační bezpečnosti, reporting vedení",[1065,2706,2691],{},[1047,2708,2709,2714,2717,2720],{},[1065,2710,2711],{},[1068,2712,2713],{},"CTO",[1065,2715,2716],{},"Chief Technology Officer",[1065,2718,2719],{},"Technologická strategie",[1065,2721,2691],{},[1047,2723,2724,2729,2732,2735],{},[1065,2725,2726],{},[1068,2727,2728],{},"ISSO",[1065,2730,2731],{},"Information System Security Officer",[1065,2733,2734],{},"Operativní bezpečnost systémů",[1065,2736,2553],{},[1047,2738,2739,2744,2747,2750],{},[1065,2740,2741],{},[1068,2742,2743],{},"DPO",[1065,2745,2746],{},"Data Protection Officer",[1065,2748,2749],{},"Pověřenec pro ochranu osobních údajů",[1065,2751,2752],{},"GDPR (čl. 37–39)",[1047,2754,2755,2760,2762,2765],{},[1065,2756,2757],{},[1068,2758,2759],{},"Manažer KB",[1065,2761,2401],{},[1065,2763,2764],{},"Odpovědný za ISMS",[1065,2766,2767],{},"ZKB",[1047,2769,2770,2775,2777,2780],{},[1065,2771,2772],{},[1068,2773,2774],{},"Architekt KB",[1065,2776,2401],{},[1065,2778,2779],{},"Návrh a implementace opatření",[1065,2781,2767],{},[1047,2783,2784,2789,2791,2794],{},[1065,2785,2786],{},[1068,2787,2788],{},"Auditor KB",[1065,2790,2401],{},[1065,2792,2793],{},"Provádění auditů",[1065,2795,2767],{},[1047,2797,2798,2803,2806,2809],{},[1065,2799,2800],{},[1068,2801,2802],{},"Garant aktiva",[1065,2804,2805],{},"Asset owner",[1065,2807,2808],{},"Rozvoj, použití a bezpečnost aktiva",[1065,2810,2767],{},[1033,2812,2814],{"id":2813},"profesní-certifikace-isaca-isc","Profesní certifikace ISACA \u002F (ISC)²",[1041,2816,2817,2829],{},[1044,2818,2819],{},[1047,2820,2821,2824,2826],{},[1050,2822,2823],{},"Cert",[1050,2825,2537],{},[1050,2827,2828],{},"Zaměření",[1060,2830,2831,2844,2856,2868,2880,2893],{},[1047,2832,2833,2838,2841],{},[1065,2834,2835],{},[1068,2836,2837],{},"CISA",[1065,2839,2840],{},"ISACA",[1065,2842,2843],{},"Certified Information Systems Auditor",[1047,2845,2846,2851,2853],{},[1065,2847,2848],{},[1068,2849,2850],{},"CISM",[1065,2852,2840],{},[1065,2854,2855],{},"Certified Information Security Manager",[1047,2857,2858,2863,2865],{},[1065,2859,2860],{},[1068,2861,2862],{},"CRISC",[1065,2864,2840],{},[1065,2866,2867],{},"Risk and Information Systems Control",[1047,2869,2870,2875,2877],{},[1065,2871,2872],{},[1068,2873,2874],{},"CGEIT",[1065,2876,2840],{},[1065,2878,2879],{},"Governance of Enterprise IT",[1047,2881,2882,2887,2890],{},[1065,2883,2884],{},[1068,2885,2886],{},"CISSP",[1065,2888,2889],{},"(ISC)²",[1065,2891,2892],{},"Certified Information Systems Security Professional",[1047,2894,2895,2900,2902],{},[1065,2896,2897],{},[1068,2898,2899],{},"Common Criteria EAL",[1065,2901,1645],{},[1065,2903,2904],{},"Evaluation Assurance Level (EAL1–7)",[1033,2906,2908],{"id":2907},"architektonické-referenční-modely","Architektonické referenční modely",[1041,2910,2911,2923],{},[1044,2912,2913],{},[1047,2914,2915,2918,2921],{},[1050,2916,2917],{},"Model",[1050,2919,2920],{},"Vrstvy \u002F dimenze",[1050,2922,1333],{},[1060,2924,2925,2946,2963,2978],{},[1047,2926,2927,2932,2935],{},[1065,2928,2929],{},[1068,2930,2931],{},"ISO\u002FOSI",[1065,2933,2934],{},"7 vrstev (L1 fyzická → L7 aplikační)",[1065,2936,2937,1115,2940],{},[1019,2938,2521],{"className":2939,"href":2519,"dataFsResolvedFilePath":2520},[1022],[1019,2941,2945],{"className":2942,"href":2943,"dataFsResolvedFilePath":2944},[1022],"\u002Fwiki\u002Fimork-sitove-utoky","summaries\u002Fimork-sitove-utoky.md","imork-sitove-utoky",[1047,2947,2948,2953,2956],{},[1065,2949,2950],{},[1068,2951,2952],{},"ITU-T X.805",[1065,2954,2955],{},"Bezpečnostní dimenze, vrstvy, plány",[1065,2957,2958],{},[1019,2959,2962],{"className":2960,"href":2961},[1022,1080],"\u002Fwiki\u002Fimork-mcn\\","MCN",[1047,2964,2965,2970,2973],{},[1065,2966,2967],{},[1068,2968,2969],{},"IEC 61850",[1065,2971,2972],{},"3 úrovně: stanice \u002F stanové \u002F procesní",[1065,2974,2975],{},[1019,2976,1172],{"className":2977,"href":1171},[1022,1080],[1047,2979,2980,2984,2987],{},[1065,2981,2982],{},[1068,2983,1490],{},[1065,2985,2986],{},"Network Critical Physical Infrastructure",[1065,2988,2989],{},[1019,2990,2962],{"className":2991,"href":2961},[1022,1080],[1033,2993,2995],{"id":2994},"související-stránky","Související stránky",[2997,2998,2999,3007,3016,3022,3030],"ul",{},[3000,3001,3002,3006],"li",{},[1019,3003,3005],{"className":3004,"href":1023,"dataFsResolvedFilePath":1024},[1022],"ImorK course hub"," — výchozí bod do všech 34 záznamů přednášek",[3000,3008,3009,3015],{},[1019,3010,3014],{"className":3011,"href":3012,"dataFsResolvedFilePath":3013},[1022],"\u002Fwiki\u002Fimork-glosar","outputs\u002Fimork-glosar.md","ImorK — Glosář pojmů"," — abecední slovník zkratek a klíčových konceptů",[3000,3017,3018,3021],{},[1019,3019,1082],{"className":3020,"href":2332,"dataFsResolvedFilePath":2333},[1022]," — manažerský rámec, který tyto normy sjednocuje",[3000,3023,3024,3029],{},[1019,3025,1114],{"className":3026,"href":3027,"dataFsResolvedFilePath":3028},[1022],"\u002Fwiki\u002Frizeni-rizik","topics\u002Frizeni-rizik.md"," — metodika napříč ISO 27005 \u002F 31000 \u002F NIST 800-30",[3000,3031,3032,3037],{},[1019,3033,1222],{"className":3034,"href":3035,"dataFsResolvedFilePath":3036},[1022],"\u002Fwiki\u002Fgdpr","topics\u002Fgdpr.md"," — nejčastěji odkazovaná regulace v kurzu",{"title":3039,"searchDepth":145,"depth":145,"links":3040},"",[3041,3042,3043,3044,3045,3046,3047,3048,3049,3050,3051],{"id":1035,"depth":145,"text":1036},{"id":1311,"depth":145,"text":1312},{"id":1606,"depth":145,"text":1607},{"id":1850,"depth":145,"text":1851},{"id":2151,"depth":145,"text":2152},{"id":2288,"depth":145,"text":2289},{"id":2524,"depth":145,"text":2525},{"id":2652,"depth":145,"text":2653},{"id":2813,"depth":145,"text":2814},{"id":2907,"depth":145,"text":2908},{"id":2994,"depth":145,"text":2995},null,"2026-05-04","Referenční tabulka všech bezpečnostních norem, standardů, regulací a metodik probíraných v kurzu ImorK. Slouží jako rychlý lookup k orientaci ve změti zkratek — pro každou normu uvedeno co normalizuje, kde se v kurzu objevuje, jaký zdroj v repozitáři ji rozebírá.","md",{},true,"\u002Foutputs\u002Fimork-normy-prehled",{"title":1006,"description":3054},[3061,3062,3063,3064,3065,3066],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002FDetail předmětu.md","outputs\u002Fimork-normy-prehled",[5,37,758,223,47,91,110],"output","sC6p6o2TljLd8z7AbAo23hPXYOSw5N5dpmZpAQ4GCGQ","outputs",{"zapisku":7,"topics":48,"summaries":3073,"outputs":145},34,[3075,3830,4557,5032,5571,6094,6585],{"id":3076,"title":3077,"body":3078,"course":3052,"courses":3819,"created":3820,"description":3039,"extension":3055,"meta":3821,"navigation":3057,"path":3822,"seo":3823,"sources":3824,"stem":3826,"tags":3827,"type":3828,"updated":3053,"__hash__":3829},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":1008,"value":3079,"toc":3792},[3080,3083,3091,3094,3098,3191,3195,3249,3253,3276,3280,3368,3372,3377,3392,3396,3418,3422,3442,3446,3450,3476,3480,3506,3510,3514,3524,3528,3571,3582,3586,3592,3609,3616,3619,3622,3625,3631,3635,3638,3642,3719,3723,3749,3751],[1011,3081,3077],{"id":3082},"bcm-řízení-kontinuity-činnosti",[1015,3084,3085],{},[3086,3087],"img",{"alt":3088,"className":3089,"src":3090},"bcm-rpo-rto",[1022,1080],"\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[1015,3092,3093],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[1033,3095,3097],{"id":3096},"klíčové-pojmy","Klíčové pojmy",[1041,3099,3100,3112],{},[1044,3101,3102],{},[1047,3103,3104,3107,3109],{},[1050,3105,3106],{},"Pojem",[1050,3108,2668],{},[1050,3110,3111],{},"Popis",[1060,3113,3114,3127,3139,3152,3165,3178],{},[1047,3115,3116,3121,3124],{},[1065,3117,3118],{},[1068,3119,3120],{},"BCMS",[1065,3122,3123],{},"Business Continuity Management System",[1065,3125,3126],{},"Plánovaný, kontinuální a dokumentovaný systém",[1047,3128,3129,3133,3136],{},[1065,3130,3131],{},[1068,3132,1189],{},[1065,3134,3135],{},"Business Continuity Management",[1065,3137,3138],{},"Činnost identifikující dopady a zajišťující kontinuitu",[1047,3140,3141,3146,3149],{},[1065,3142,3143],{},[1068,3144,3145],{},"BIA",[1065,3147,3148],{},"Business Impact Analysis",[1065,3150,3151],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[1047,3153,3154,3159,3162],{},[1065,3155,3156],{},[1068,3157,3158],{},"MBCO",[1065,3160,3161],{},"Minimum Business Continuity Objective",[1065,3163,3164],{},"Minimální přijatelná úroveň služeb",[1047,3166,3167,3172,3175],{},[1065,3168,3169],{},[1068,3170,3171],{},"RPO",[1065,3173,3174],{},"Recovery Point Objective",[1065,3176,3177],{},"Do jakého bodu v minulosti lze obnovit data",[1047,3179,3180,3185,3188],{},[1065,3181,3182],{},[1068,3183,3184],{},"RTO",[1065,3186,3187],{},"Recovery Time Objective",[1065,3189,3190],{},"Čas potřebný pro obnovu provozu",[1033,3192,3194],{"id":3193},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[1041,3196,3197,3207],{},[1044,3198,3199],{},[1047,3200,3201,3204],{},[1050,3202,3203],{},"Fáze",[1050,3205,3206],{},"Obsah",[1060,3208,3209,3219,3229,3239],{},[1047,3210,3211,3216],{},[1065,3212,3213],{},[1068,3214,3215],{},"Plan",[1065,3217,3218],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[1047,3220,3221,3226],{},[1065,3222,3223],{},[1068,3224,3225],{},"Do",[1065,3227,3228],{},"Strategie kontinuity, implementace plánů, cvičení",[1047,3230,3231,3236],{},[1065,3232,3233],{},[1068,3234,3235],{},"Check",[1065,3237,3238],{},"Monitoring, audit, přezkoumání managementem",[1047,3240,3241,3246],{},[1065,3242,3243],{},[1068,3244,3245],{},"Act",[1065,3247,3248],{},"Nápravná opatření, neustálé zlepšování",[1033,3250,3252],{"id":3251},"iso-223012019-struktura","ISO 22301:2019 — struktura",[2997,3254,3255,3258,3261,3264,3267,3270,3273],{},[3000,3256,3257],{},"Kap. 4 — kontext organizace",[3000,3259,3260],{},"Kap. 5 — vedení (leadership)",[3000,3262,3263],{},"Kap. 6 — plánování (BIA, rizika)",[3000,3265,3266],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[3000,3268,3269],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[3000,3271,3272],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[3000,3274,3275],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[1033,3277,3279],{"id":3278},"analýza-steeple","Analýza STEEPLE",[1041,3281,3282,3291],{},[1044,3283,3284],{},[1047,3285,3286,3289],{},[1050,3287,3288],{},"Faktor",[1050,3290,2167],{},[1060,3292,3293,3304,3315,3326,3336,3347,3358],{},[1047,3294,3295,3301],{},[1065,3296,3297,3300],{},[1068,3298,3299],{},"S","ociální",[1065,3302,3303],{},"Zaměstnanost, bezpečnost, komunity",[1047,3305,3306,3312],{},[1065,3307,3308,3311],{},[1068,3309,3310],{},"T","echnologický",[1065,3313,3314],{},"Závislost na technologiích",[1047,3316,3317,3323],{},[1065,3318,3319,3322],{},[1068,3320,3321],{},"E","konomický",[1065,3324,3325],{},"Ekonomická situace, finanční instituce",[1047,3327,3328,3333],{},[1065,3329,3330,3332],{},[1068,3331,3321],{},"tický",[1065,3334,3335],{},"Podnikatelská etika, média, veřejnost",[1047,3337,3338,3344],{},[1065,3339,3340,3343],{},[1068,3341,3342],{},"P","olitický",[1065,3345,3346],{},"Politický systém, hrozba nepokojů",[1047,3348,3349,3355],{},[1065,3350,3351,3354],{},[1068,3352,3353],{},"L","egislativní",[1065,3356,3357],{},"Předpisy, zákony",[1047,3359,3360,3365],{},[1065,3361,3362,3364],{},[1068,3363,3321],{},"nvironmentální",[1065,3366,3367],{},"Životní prostředí, přírodní hrozby",[1033,3369,3371],{"id":3370},"bia-business-impact-analysis","BIA (Business Impact Analysis)",[3373,3374,3376],"h3",{"id":3375},"dva-způsoby-provedení","Dva způsoby provedení",[3378,3379,3380,3386],"ol",{},[3000,3381,3382,3385],{},[1068,3383,3384],{},"Bottom-up"," — sběr od provozních manažerů směrem nahoru; detailní znalost procesů, ale časově náročné.",[3000,3387,3388,3391],{},[1068,3389,3390],{},"Top-down"," — od vyššího managementu; rychlejší, ale může opomenout provozní detaily.",[3373,3393,3395],{"id":3394},"principy-bia","Principy BIA",[2997,3397,3398,3412],{},[3000,3399,3400,3401,3404,3405,3408,3409,1031],{},"Orientace na ",[1068,3402,3403],{},"dopad",", ne na příčinu — nezkoumá ",[1028,3406,3407],{},"co se stane",", ale ",[1028,3410,3411],{},"jaké budou následky",[3000,3413,3414,3417],{},[1068,3415,3416],{},"Kalendář klíčových ročních událostí"," — identifikuje období se zvýšenou kritičností (uzávěrky, sezónní špičky).",[1033,3419,3421],{"id":3420},"mapování-procesů","Mapování procesů",[2997,3423,3424,3430,3436],{},[3000,3425,3426,3429],{},[1068,3427,3428],{},"Víceúrovňové mapování"," — od strategických procesů po operativní detaily.",[3000,3431,3432,3435],{},[1068,3433,3434],{},"Identifikace zdrojů"," — lidé, technologie, prostory, dodavatelé potřební pro každý proces.",[3000,3437,3438,3441],{},[1068,3439,3440],{},"SPoF"," (Single Point of Failure) — identifikace jediných bodů selhání, jejichž výpadek zastaví celý proces.",[1033,3443,3445],{"id":3444},"strategie-kontinuity","Strategie kontinuity",[3373,3447,3449],{"id":3448},"_4-kroky-strategie","4 kroky strategie",[3378,3451,3452,3458,3464,3470],{},[3000,3453,3454,3457],{},[1068,3455,3456],{},"Reakce na incident"," — okamžitá odezva, aktivace krizového řízení.",[3000,3459,3460,3463],{},[1068,3461,3462],{},"Obnova kritických činností"," — prioritní obnovení klíčových procesů dle BIA.",[3000,3465,3466,3469],{},[1068,3467,3468],{},"Vztahy se stakeholdery"," — komunikace se zainteresovanými stranami.",[3000,3471,3472,3475],{},[1068,3473,3474],{},"Nekritické činnosti"," — postupná obnova ostatních procesů.",[3373,3477,3479],{"id":3478},"_4-scénáře-narušení","4 scénáře narušení",[3378,3481,3482,3488,3494,3500],{},[3000,3483,3484,3487],{},[1068,3485,3486],{},"Zamezení přístupu"," — nedostupnost budov\u002Fprostor (požár, povodeň).",[3000,3489,3490,3493],{},[1068,3491,3492],{},"Nedostatek pracovníků"," — pandemie, hromadná absence.",[3000,3495,3496,3499],{},[1068,3497,3498],{},"Selhání technologie"," — výpadek ICT, kybernetický útok.",[3000,3501,3502,3505],{},[1068,3503,3504],{},"Selhání dodavatele"," — přerušení dodavatelského řetězce.",[1033,3507,3509],{"id":3508},"implementace-plánů","Implementace plánů",[3373,3511,3513],{"id":3512},"obsah-plánu-kontinuity","Obsah plánu kontinuity",[1015,3515,3516,3517,3520,3521,1031],{},"Účel a rozsah, role a odpovědnosti, aktivační kritéria, ",[1068,3518,3519],{},"DRP"," (Disaster Recovery Plan) pro IT infrastrukturu, kontaktní seznamy, priority obnovy dle BIA. Dlouhodobá obnova je řízena jako ",[1068,3522,3523],{},"samostatný projekt",[1033,3525,3527],{"id":3526},"testování-bcm","Testování BCM",[1041,3529,3530,3539],{},[1044,3531,3532],{},[1047,3533,3534,3537],{},[1050,3535,3536],{},"Forma",[1050,3538,3111],{},[1060,3540,3541,3551,3561],{},[1047,3542,3543,3548],{},[1065,3544,3545],{},[1068,3546,3547],{},"Tabletop review",[1065,3549,3550],{},"Teoretické procházení scénářů",[1047,3552,3553,3558],{},[1065,3554,3555],{},[1068,3556,3557],{},"Walkthrough",[1065,3559,3560],{},"Krokové ověření postupů s účastníky",[1047,3562,3563,3568],{},[1065,3564,3565],{},[1068,3566,3567],{},"Full exercise",[1065,3569,3570],{},"Simulace reálného incidentu",[1015,3572,3573,3574,3577,3578,3581],{},"Zásady: ",[1068,3575,3576],{},"neočekávané testy"," pro ověření reálné připravenosti; v krizové situaci ",[1068,3579,3580],{},"direktivní řízení pod tlakem"," (centralizované rozhodování).",[1033,3583,3585],{"id":3584},"vkb-vyhláška-o-kybernetické-bezpečnosti","VKB — Vyhláška o kybernetické bezpečnosti",[1015,3587,3588,3591],{},[1068,3589,3590],{},"§15 vyhlášky č. 82\u002F2018 Sb."," vyžaduje:",[2997,3593,3594,3599,3604],{},[3000,3595,3596,3598],{},[1068,3597,3158],{}," — minimální úroveň služeb pro kontinuitu",[3000,3600,3601,3603],{},[1068,3602,3184],{}," — maximální přípustná doba výpadku",[3000,3605,3606,3608],{},[1068,3607,3171],{}," — maximální přípustná ztráta dat",[1015,3610,3611,3612,3615],{},"Příloha č. 5, bod ",[1068,3613,3614],{},"1.23 Politika řízení kontinuity"," — požadavky na dokumentaci a řízení BCM.",[1033,3617,1179],{"id":3618},"isoiec-270312025",[1015,3620,3621],{},"Připravenost ICT pro kontinuitu podnikání — propojení mezi kritickou infrastrukturou a BCMS. Aktuální vydání 2025 (první 2011, dlouho jediné, novelizace 2025).",[1033,3623,3624],{"id":378},"BCMaaS",[1015,3626,3627,3630],{},[1068,3628,3629],{},"BCM as a Service"," — cloudový model poskytování BCM, outsourcing plánování a řízení kontinuity, vhodný zejména pro menší organizace bez vlastních kapacit.",[1033,3632,3634],{"id":3633},"disaster-recovery-dr","Disaster Recovery (DR)",[1015,3636,3637],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[3373,3639,3641],{"id":3640},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[1041,3643,3644,3653],{},[1044,3645,3646],{},[1047,3647,3648,3651],{},[1050,3649,3650],{},"Tier",[1050,3652,3111],{},[1060,3654,3655,3663,3671,3679,3687,3695,3703,3711],{},[1047,3656,3657,3660],{},[1065,3658,3659],{},"0",[1065,3661,3662],{},"Žádná off-site data",[1047,3664,3665,3668],{},[1065,3666,3667],{},"1",[1065,3669,3670],{},"Fyzická záloha + cold site",[1047,3672,3673,3676],{},[1065,3674,3675],{},"2",[1065,3677,3678],{},"Fyzická záloha + hot site",[1047,3680,3681,3684],{},[1065,3682,3683],{},"3",[1065,3685,3686],{},"Elektronický trezor (electronic vaulting)",[1047,3688,3689,3692],{},[1065,3690,3691],{},"4",[1065,3693,3694],{},"Point-in-time recovery",[1047,3696,3697,3700],{},[1065,3698,3699],{},"5",[1065,3701,3702],{},"Two-site commit (kontinuální přenos)",[1047,3704,3705,3708],{},[1065,3706,3707],{},"6",[1065,3709,3710],{},"Minimální až nulová ztráta dat (zrcadlení)",[1047,3712,3713,3716],{},[1065,3714,3715],{},"7",[1065,3717,3718],{},"Automatizovaná obnova (AI monitoring)",[3373,3720,3722],{"id":3721},"cloud-dr","Cloud DR",[2997,3724,3725,3731,3737,3743],{},[3000,3726,3727,3730],{},[1068,3728,3729],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[3000,3732,3733,3736],{},[1068,3734,3735],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[3000,3738,3739,3742],{},[1068,3740,3741],{},"Hot DR"," — paralelní řešení v tandemu",[3000,3744,3745,3748],{},[1068,3746,3747],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[1033,3750,2995],{"id":2994},[2997,3752,3753,3759,3765,3774,3783],{},[3000,3754,3755,3758],{},[1019,3756,1082],{"className":3757,"dataFsResolvedFilePath":2333,"href":2332},[1022]," — BCM jako součást bezpečnostního systému",[3000,3760,3761,3764],{},[1019,3762,1114],{"className":3763,"dataFsResolvedFilePath":3028,"href":3027},[1022]," — krizové plány pro zbytková rizika",[3000,3766,3767,3773],{},[1019,3768,3772],{"className":3769,"dataFsResolvedFilePath":3770,"href":3771},[1022],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — reakce na incidenty",[3000,3775,3776,3782],{},[1019,3777,3781],{"className":3778,"dataFsResolvedFilePath":3779,"href":3780},[1022],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","Záznam přednášky BCM"," — bibliografická karta zdroje",[3000,3784,3785,3791],{},[1019,3786,3790],{"className":3787,"dataFsResolvedFilePath":3788,"href":3789},[1022],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery — záznam přednášky"," — DR detail",{"title":3039,"searchDepth":145,"depth":145,"links":3793},[3794,3795,3796,3797,3798,3802,3803,3807,3810,3811,3812,3813,3814,3818],{"id":3096,"depth":145,"text":3097},{"id":3193,"depth":145,"text":3194},{"id":3251,"depth":145,"text":3252},{"id":3278,"depth":145,"text":3279},{"id":3370,"depth":145,"text":3371,"children":3799},[3800,3801],{"id":3375,"depth":100,"text":3376},{"id":3394,"depth":100,"text":3395},{"id":3420,"depth":145,"text":3421},{"id":3444,"depth":145,"text":3445,"children":3804},[3805,3806],{"id":3448,"depth":100,"text":3449},{"id":3478,"depth":100,"text":3479},{"id":3508,"depth":145,"text":3509,"children":3808},[3809],{"id":3512,"depth":100,"text":3513},{"id":3526,"depth":145,"text":3527},{"id":3584,"depth":145,"text":3585},{"id":3618,"depth":145,"text":1179},{"id":378,"depth":145,"text":3624},{"id":3633,"depth":145,"text":3634,"children":3815},[3816,3817],{"id":3640,"depth":100,"text":3641},{"id":3721,"depth":100,"text":3722},{"id":2994,"depth":145,"text":2995},[5],"2026-04-12",{},"\u002Ftopics\u002Fbcm",{"title":3077,"description":3039},[3064,3825],"raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[5,159,233,221,167,179],"topic","rJjmVpDFUwXpFJbeYeMpWko7IyhV7LFx3l9BUUkj0VY",{"id":3831,"title":3832,"body":3833,"course":3052,"courses":4544,"created":3053,"description":4545,"extension":3055,"meta":4546,"navigation":3057,"path":4547,"seo":4548,"sources":4549,"stem":4554,"tags":4555,"type":3828,"updated":3053,"__hash__":4556},"topics\u002Ftopics\u002Fgdpr.md","GDPR — Obecné nařízení o ochraně osobních údajů",{"type":1008,"value":3834,"toc":4524},[3835,3838,3852,3889,3891,3995,3999,4037,4044,4048,4051,4089,4093,4142,4146,4149,4153,4164,4168,4211,4215,4232,4236,4256,4260,4311,4315,4318,4332,4336,4354,4358,4416,4420,4446,4453,4486,4488],[1011,3836,3832],{"id":3837},"gdpr-obecné-nařízení-o-ochraně-osobních-údajů",[1015,3839,3840,3843,3844,3847,3848,3851],{},[1068,3841,3842],{},"Nařízení Evropského parlamentu a Rady (EU) 2016\u002F679"," — General Data Protection Regulation. Účinnost od ",[1068,3845,3846],{},"25. května 2018"," ve všech členských státech EU bez nutnosti transpozice. Pro Českou republiku doplněno ",[1068,3849,3850],{},"zákonem č. 110\u002F2019 Sb."," o zpracování osobních údajů.",[1015,3853,3854,3855,3858,3859,3865,3866,1115,3870,3874,3875,3881,3882,3888],{},"GDPR je v kurzu ",[1019,3856,1025],{"className":3857,"dataFsResolvedFilePath":1024,"href":1023},[1022]," napříč více oblastmi: legislativní rámec ",[1019,3860,3864],{"className":3861,"dataFsResolvedFilePath":3862,"href":3863},[1022],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat","ochrany dat",", povinný kontext pro ",[1019,3867,3869],{"className":3868,"dataFsResolvedFilePath":1354,"href":1353},[1022],"zdravotnická data",[1019,3871,3873],{"className":3872,"dataFsResolvedFilePath":1560,"href":1559},[1022],"platební údaje"," a ",[1019,3876,3880],{"className":3877,"dataFsResolvedFilePath":3878,"href":3879},[1022],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," služby, a operační rámec definovaný v ",[1019,3883,3887],{"className":3884,"dataFsResolvedFilePath":3885,"href":3886},[1022],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","případové studii o krádeži dat"," (DPIA, Privacy by Design, ISO 27701).",[1033,3890,3097],{"id":3096},[1041,3892,3893,3904],{},[1044,3894,3895],{},[1047,3896,3897,3899,3901],{},[1050,3898,3106],{},[1050,3900,2668],{},[1050,3902,3903],{},"Definice",[1060,3905,3906,3919,3932,3945,3958,3971,3982],{},[1047,3907,3908,3913,3916],{},[1065,3909,3910],{},[1068,3911,3912],{},"Osobní údaj",[1065,3914,3915],{},"Personal data",[1065,3917,3918],{},"Jakákoli informace identifikující nebo umožňující identifikaci žijící fyzické osoby",[1047,3920,3921,3926,3929],{},[1065,3922,3923],{},[1068,3924,3925],{},"Zvláštní kategorie",[1065,3927,3928],{},"Special category",[1065,3930,3931],{},"Citlivá data: zdraví, biometrika, etnicita, sexuální orientace, politické názory, náboženství, členství v odborech",[1047,3933,3934,3939,3942],{},[1065,3935,3936],{},[1068,3937,3938],{},"Subjekt údajů",[1065,3940,3941],{},"Data subject",[1065,3943,3944],{},"Fyzická osoba, k níž se osobní údaje vztahují",[1047,3946,3947,3952,3955],{},[1065,3948,3949],{},[1068,3950,3951],{},"Správce",[1065,3953,3954],{},"Controller",[1065,3956,3957],{},"Subjekt, který určuje účely a prostředky zpracování",[1047,3959,3960,3965,3968],{},[1065,3961,3962],{},[1068,3963,3964],{},"Zpracovatel",[1065,3966,3967],{},"Processor",[1065,3969,3970],{},"Subjekt zpracovávající osobní údaje na pokyn správce",[1047,3972,3973,3977,3979],{},[1065,3974,3975],{},[1068,3976,2743],{},[1065,3978,2746],{},[1065,3980,3981],{},"Pověřenec pro ochranu osobních údajů — povinný pro orgány veřejné moci a velké zpracovatele",[1047,3983,3984,3989,3992],{},[1065,3985,3986],{},[1068,3987,3988],{},"PII",[1065,3990,3991],{},"Personally Identifiable Information",[1065,3993,3994],{},"Pojem z NIST SP 800-122; v EU se používá ekvivalentní „osobní údaj\"",[1033,3996,3998],{"id":3997},"šest-zásad-zpracování-čl-5","Šest zásad zpracování (čl. 5)",[3378,4000,4001,4007,4013,4019,4025,4031],{},[3000,4002,4003,4006],{},[1068,4004,4005],{},"Zákonnost, korektnost, transparentnost"," (lawfulness, fairness, transparency)",[3000,4008,4009,4012],{},[1068,4010,4011],{},"Účelové omezení"," (purpose limitation) — sběr pouze pro stanovené účely",[3000,4014,4015,4018],{},[1068,4016,4017],{},"Minimalizace údajů"," (data minimisation) — jen nezbytné údaje",[3000,4020,4021,4024],{},[1068,4022,4023],{},"Přesnost"," (accuracy) — udržovat aktuální, opravovat nepřesné",[3000,4026,4027,4030],{},[1068,4028,4029],{},"Omezení uložení"," (storage limitation) — uchovávat ne déle než nutné",[3000,4032,4033,4036],{},[1068,4034,4035],{},"Integrita a důvěrnost"," (integrity, confidentiality) — bezpečnost zpracování",[1015,4038,4039,4040,4043],{},"Sedmá zásada ",[1068,4041,4042],{},"odpovědnost"," (accountability, čl. 5 odst. 2) — správce musí být schopen svůj soulad doložit.",[1033,4045,4047],{"id":4046},"šest-právních-titulů-čl-6","Šest právních titulů (čl. 6)",[1015,4049,4050],{},"Zpracování je zákonné jen, je-li založeno na jednom ze šesti důvodů:",[3378,4052,4053,4059,4065,4071,4077,4083],{},[3000,4054,4055,4058],{},[1068,4056,4057],{},"Souhlas"," subjektu údajů",[3000,4060,4061,4064],{},[1068,4062,4063],{},"Plnění smlouvy"," se subjektem",[3000,4066,4067,4070],{},[1068,4068,4069],{},"Zákonná povinnost"," správce",[3000,4072,4073,4076],{},[1068,4074,4075],{},"Životně důležité zájmy"," subjektu nebo jiné osoby",[3000,4078,4079,4082],{},[1068,4080,4081],{},"Veřejný zájem"," nebo výkon veřejné moci",[3000,4084,4085,4088],{},[1068,4086,4087],{},"Oprávněné zájmy"," správce (s testem proporcionality)",[1033,4090,4092],{"id":4091},"práva-subjektů-údajů-čl-1522","Práva subjektů údajů (čl. 15–22)",[2997,4094,4095,4101,4107,4113,4119,4124,4130,4136],{},[3000,4096,4097,4100],{},[1068,4098,4099],{},"Právo na informace"," — kdo, proč, na základě čeho, jak dlouho zpracovává",[3000,4102,4103,4106],{},[1068,4104,4105],{},"Právo na přístup"," k osobním údajům",[3000,4108,4109,4112],{},[1068,4110,4111],{},"Právo na opravu"," nepřesných údajů",[3000,4114,4115,4118],{},[1068,4116,4117],{},"Právo na výmaz"," („right to be forgotten\", čl. 17)",[3000,4120,4121],{},[1068,4122,4123],{},"Právo na omezení zpracování",[3000,4125,4126,4129],{},[1068,4127,4128],{},"Právo na přenositelnost údajů"," ke konkurenci (čl. 20)",[3000,4131,4132,4135],{},[1068,4133,4134],{},"Právo vznést námitku"," proti zpracování",[3000,4137,4138,4141],{},[1068,4139,4140],{},"Právo nebýt předmětem automatizovaného rozhodování"," vč. profilování (čl. 22)",[1033,4143,4145],{"id":4144},"dpia-data-protection-impact-assessment-čl-35","DPIA — Data Protection Impact Assessment (čl. 35)",[1015,4147,4148],{},"Posouzení vlivu na ochranu osobních údajů — povinné, pokud zpracování pravděpodobně způsobí vysoké riziko pro práva a svobody subjektů.",[3373,4150,4152],{"id":4151},"kdy-je-dpia-povinná","Kdy je DPIA povinná",[2997,4154,4155,4158,4161],{},[3000,4156,4157],{},"Systematické a rozsáhlé hodnocení osobních aspektů (profilování)",[3000,4159,4160],{},"Rozsáhlé zpracování zvláštních kategorií údajů",[3000,4162,4163],{},"Rozsáhlé sledování veřejně přístupných míst (kamery v ulicích, MHD)",[3373,4165,4167],{"id":4166},"tři-analýzy-dpia-per-iso-27701","Tři analýzy DPIA (per ISO 27701)",[1041,4169,4170,4179],{},[1044,4171,4172],{},[1047,4173,4174,4177],{},[1050,4175,4176],{},"Analýza",[1050,4178,2828],{},[1060,4180,4181,4191,4201],{},[1047,4182,4183,4188],{},[1065,4184,4185],{},[1068,4186,4187],{},"DPIA",[1065,4189,4190],{},"Posouzení dopadu na svobody a práva osob (čl. 35 GDPR)",[1047,4192,4193,4198],{},[1065,4194,4195],{},[1068,4196,4197],{},"Datová",[1065,4199,4200],{},"Význam dat, vazby, identifikace osobních a citlivých dat",[1047,4202,4203,4208],{},[1065,4204,4205],{},[1068,4206,4207],{},"Procesní",[1065,4209,4210],{},"Kdo a jak přistupuje k osobním datům, automatizované zpracování",[3373,4212,4214],{"id":4213},"pět-kroků-hodnocení-rizik","Pět kroků hodnocení rizik",[3378,4216,4217,4220,4223,4226,4229],{},[3000,4218,4219],{},"Definice operace zpracování a kontextu",[3000,4221,4222],{},"Pochopení a hodnocení dopadu (CIA)",[3000,4224,4225],{},"Definice hrozeb a hodnocení pravděpodobnosti",[3000,4227,4228],{},"Vyhodnocení rizika (matice pravděpodobnost × dopad)",[3000,4230,4231],{},"Výběr bezpečnostních opatření",[1033,4233,4235],{"id":4234},"privacy-by-design-privacy-by-default-čl-25","Privacy by Design & Privacy by Default (čl. 25)",[2997,4237,4238,4244,4250],{},[3000,4239,4240,4243],{},[1068,4241,4242],{},"Privacy by Design"," — proaktivní zahrnutí ochrany od počátku návrhu systému; ochrana zabudovaná do architektury, ne dolepovaná",[3000,4245,4246,4249],{},[1068,4247,4248],{},"Privacy by Default"," — výchozí nastavení musí chránit; ověření účelu, rozsahu, sdílení a možností anonymizace před zpracováním",[3000,4251,3400,4252,4255],{},[1068,4253,4254],{},"subjekt údajů"," — analýza rizik z pohledu jednotlivce, ne organizace",[1033,4257,4259],{"id":4258},"oznamovací-povinnost-při-porušení-zabezpečení-čl-3334","Oznamovací povinnost při porušení zabezpečení (čl. 33–34)",[1041,4261,4262,4275],{},[1044,4263,4264],{},[1047,4265,4266,4269,4272],{},[1050,4267,4268],{},"Příjemce",[1050,4270,4271],{},"Lhůta",[1050,4273,4274],{},"Podmínka",[1060,4276,4277,4294],{},[1047,4278,4279,4285,4291],{},[1065,4280,4281,4284],{},[1068,4282,4283],{},"Dozorový úřad"," (ÚOOÚ v ČR)",[1065,4286,4287,4290],{},[1068,4288,4289],{},"72 hodin"," od zjištění",[1065,4292,4293],{},"Vždy, pokud existuje pravděpodobnost rizika pro subjekty",[1047,4295,4296,4301,4304],{},[1065,4297,4298],{},[1068,4299,4300],{},"Subjekty údajů",[1065,4302,4303],{},"Bez zbytečného odkladu",[1065,4305,4306,4307,4310],{},"Pokud existuje ",[1068,4308,4309],{},"vysoké"," riziko pro jejich práva",[1033,4312,4314],{"id":4313},"sankce-čl-83","Sankce (čl. 83)",[1015,4316,4317],{},"Pokuty ve dvou pásmech:",[2997,4319,4320,4326],{},[3000,4321,4322,4325],{},[1068,4323,4324],{},"Až 10 mil. EUR nebo 2 % celosvětového ročního obratu"," (vyšší z obou) — porušení procesních povinností (DPO, smlouva se zpracovatelem, oznámení porušení, DPIA)",[3000,4327,4328,4331],{},[1068,4329,4330],{},"Až 20 mil. EUR nebo 4 % celosvětového ročního obratu"," — porušení zásad zpracování, práv subjektů, podmínek souhlasu, předávání mimo EU",[1033,4333,4335],{"id":4334},"isoiec-27701-pims","ISO\u002FIEC 27701 — PIMS",[1015,4337,4338,4339,4342,4343,4346,4347,4350,4351,1031],{},"Privacy Information Management System — rozšíření ISO 27001\u002F27002 o správu osobních informací. První vydání ",[1068,4340,4341],{},"2019",", aktuální vydání ",[1068,4344,4345],{},"2025",". Mapuje požadavky GDPR na konkrétní opatření a slouží jako certifikovatelný průvodce souladem. Zavádí DPIA, datovou a procesní analýzu jako standardní postupy. Detail v ",[1019,4348,3887],{"className":4349,"dataFsResolvedFilePath":3885,"href":3886},[1022]," a v hub topiku ",[1019,4352,70],{"className":4353,"dataFsResolvedFilePath":3862,"href":3863},[1022],[1033,4355,4357],{"id":4356},"vztah-k-dalším-normám-a-regulacím","Vztah k dalším normám a regulacím",[2997,4359,4360,4366,4371,4377,4394,4399,4407],{},[3000,4361,4362,4365],{},[1068,4363,4364],{},"NIST SP 800-122"," (2010) — Guide to Protecting PII Confidentiality (americký analog)",[3000,4367,4368,4370],{},[1068,4369,2123],{}," (2017) — Privacy Engineering and Risk Management",[3000,4372,4373,4376],{},[1068,4374,4375],{},"FIPP"," — Fair Information Practice Principles (univerzální zásady, předchůdce GDPR)",[3000,4378,4379,4381,4382,4385,4386,4389,4390,4393],{},[1068,4380,2195],{}," (nařízení EU 910\u002F2014, novelizováno ",[1068,4383,4384],{},"nařízením (EU) 2024\u002F1183 — „eIDAS 2.0\"",", v účinnosti od května 2024) — elektronická identifikace a služby vytvářející důvěru; eIDAS 2.0 zavádí ",[1068,4387,4388],{},"evropskou peněženku digitální identity (EUDI Wallet)",". Doplňuje GDPR pro digitální identitu (viz ",[1019,4391,1261],{"className":4392,"dataFsResolvedFilePath":3862,"href":3863},[1022],")",[3000,4395,4396,4398],{},[1068,4397,2217],{}," (směrnice 2022\u002F2555) — kybernetická bezpečnost, povinnosti hlášení překrývají GDPR čl. 33",[3000,4400,4401,4403,4404],{},[1068,4402,2236],{}," (nařízení EU 2022\u002F2554) — finanční sektor, viz ",[1019,4405,2249],{"className":4406,"dataFsResolvedFilePath":1539,"href":1538},[1022],[3000,4408,4409,4412,4413],{},[1068,4410,4411],{},"HIPAA"," (USA) — americký analog pro zdravotnictví, viz ",[1019,4414,1244],{"className":4415,"dataFsResolvedFilePath":1354,"href":1353},[1022],[1033,4417,4419],{"id":4418},"předávání-údajů-mimo-eu-kap-v-gdpr","Předávání údajů mimo EU (kap. V GDPR)",[2997,4421,4422,4428,4434,4440],{},[3000,4423,4424,4427],{},[1068,4425,4426],{},"Adekvátní rozhodnutí Komise"," — země s odpovídající úrovní ochrany: Andorra, Argentina, Brazílie, Faerské ostrovy, Guernsey, Isle of Man, Izrael, Japonsko, Jersey, Jižní Korea, Kanada (komerční subjekty), Nový Zéland, Spojené království, Švýcarsko, Uruguay, USA (EU-US Data Privacy Framework)",[3000,4429,4430,4433],{},[1068,4431,4432],{},"Standardní smluvní doložky"," (SCC) — od 2021 nová verze po Schrems II",[3000,4435,4436,4439],{},[1068,4437,4438],{},"Závazná podniková pravidla"," (BCR) pro nadnárodní skupiny",[3000,4441,4442,4445],{},[1068,4443,4444],{},"Výjimky"," — výslovný souhlas, plnění smlouvy, životně důležité zájmy",[1033,4447,4449,4450],{"id":4448},"aplikační-oblasti-v-kurzu-imork","Aplikační oblasti v kurzu ",[1019,4451,1025],{"className":4452,"dataFsResolvedFilePath":1024,"href":1023},[1022],[2997,4454,4455,4461,4467,4474,4480],{},[3000,4456,4457,4460],{},[1019,4458,1244],{"className":4459,"dataFsResolvedFilePath":1354,"href":1353},[1022]," — zvláštní kategorie (zdravotní data); ISO 27799 + GDPR",[3000,4462,4463,4466],{},[1019,4464,3880],{"className":4465,"dataFsResolvedFilePath":3878,"href":3879},[1022]," — soulad s legislativou jako jeden ze tří pilířů důvěryhodnosti elektronického zdravotnictví",[3000,4468,4469,4473],{},[1019,4470,4472],{"className":4471,"dataFsResolvedFilePath":1560,"href":1559},[1022],"Bezpečnost plateb"," — platební údaje a PCI DSS v kombinaci s GDPR",[3000,4475,4476,4479],{},[1019,4477,1505],{"className":4478,"dataFsResolvedFilePath":1518,"href":1517},[1022]," — soulad s GDPR jako cíl bezpečnostní politiky univerzity",[3000,4481,4482,4485],{},[1019,4483,1227],{"className":4484,"dataFsResolvedFilePath":3885,"href":3886},[1022]," — provozní implementace GDPR přes ISO 27701, DPIA, Privacy by Design",[1033,4487,2995],{"id":2994},[2997,4489,4490,4496,4502,4508,4515],{},[3000,4491,4492,4495],{},[1019,4493,1261],{"className":4494,"dataFsResolvedFilePath":3862,"href":3863},[1022]," — technologická vrstva (DLP, šifrování, anonymizace)",[3000,4497,4498,4501],{},[1019,4499,1082],{"className":4500,"dataFsResolvedFilePath":2333,"href":2332},[1022]," — manažerský rámec, ISO 27701 jako rozšíření 27001",[3000,4503,4504,4507],{},[1019,4505,1114],{"className":4506,"dataFsResolvedFilePath":3028,"href":3027},[1022]," — DPIA jako analýza rizik z pohledu subjektů údajů",[3000,4509,4510,4514],{},[1019,4511,4513],{"className":4512,"dataFsResolvedFilePath":3885,"href":3886},[1022],"Krádež dat — případová studie"," — primární zdroj operačního výkladu",[3000,4516,4517,4523],{},[1019,4518,4522],{"className":4519,"dataFsResolvedFilePath":4520,"href":4521},[1022],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — PII a digitální stopa",{"title":3039,"searchDepth":145,"depth":145,"links":4525},[4526,4527,4528,4529,4530,4535,4536,4537,4538,4539,4540,4541,4543],{"id":3096,"depth":145,"text":3097},{"id":3997,"depth":145,"text":3998},{"id":4046,"depth":145,"text":4047},{"id":4091,"depth":145,"text":4092},{"id":4144,"depth":145,"text":4145,"children":4531},[4532,4533,4534],{"id":4151,"depth":100,"text":4152},{"id":4166,"depth":100,"text":4167},{"id":4213,"depth":100,"text":4214},{"id":4234,"depth":145,"text":4235},{"id":4258,"depth":145,"text":4259},{"id":4313,"depth":145,"text":4314},{"id":4334,"depth":145,"text":4335},{"id":4356,"depth":145,"text":4357},{"id":4418,"depth":145,"text":4419},{"id":4448,"depth":145,"text":4542},"Aplikační oblasti v kurzu ImorK",{"id":2994,"depth":145,"text":2995},[5],"Nařízení Evropského parlamentu a Rady (EU) 2016\u002F679 — General Data Protection Regulation. Účinnost od 25. května 2018 ve všech členských státech EU bez nutnosti transpozice. Pro Českou republiku doplněno zákonem č. 110\u002F2019 Sb. o zpracování osobních údajů.",{},"\u002Ftopics\u002Fgdpr",{"title":3832,"description":4545},[4550,3065,4551,4552,4553],"raw\u002Fimork\u002F2109 VUT_Bezp Případovka Krádež dat_2020.pdf","raw\u002Fimork\u002F2105 VUT_Bezp_Případovka eHealth_2021.pdf","raw\u002Fimork\u002F2204 VUT_Bezp_Případovka Payment_2022.pdf","raw\u002Fimork\u002F2004 VUT_Bezp akademici-2021.pdf","topics\u002Fgdpr",[5,108,70,279,486,227,289],"M4sDZtUlYB9tZD2S8vr1U1cLByMC2HCaUhLokavtRLk",{"id":4558,"title":4559,"body":4560,"course":3052,"courses":5024,"created":3820,"description":3039,"extension":3055,"meta":5025,"navigation":3057,"path":5026,"seo":5027,"sources":5028,"stem":5029,"tags":5030,"type":3828,"updated":3053,"__hash__":5031},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":1008,"value":4561,"toc":5010},[4562,4565,4572,4579,4582,4586,4653,4657,4661,4716,4720,4737,4741,4745,4827,4831,4856,4860,4882,4886,4893,4950,4952],[1011,4563,4559],{"id":4564},"isms-systém-řízení-bezpečnosti-informací",[1015,4566,4567],{},[3086,4568],{"alt":4569,"className":4570,"src":4571},"isms-pdca-cyklus",[1022,1080],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[1015,4573,4574],{},[3086,4575],{"alt":4576,"className":4577,"src":4578},"isms-oborova-mapa",[1022,1080],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[1015,4580,4581],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[1033,4583,4585],{"id":4584},"základní-pilíře","Základní pilíře",[1041,4587,4588,4599],{},[1044,4589,4590],{},[1047,4591,4592,4595,4597],{},[1050,4593,4594],{},"Pilíř",[1050,4596,2668],{},[1050,4598,3111],{},[1060,4600,4601,4614,4627,4640],{},[1047,4602,4603,4608,4611],{},[1065,4604,4605],{},[1068,4606,4607],{},"Důvěrnost",[1065,4609,4610],{},"Confidentiality",[1065,4612,4613],{},"Přístup pouze oprávněným osobám",[1047,4615,4616,4621,4624],{},[1065,4617,4618],{},[1068,4619,4620],{},"Integrita",[1065,4622,4623],{},"Integrity",[1065,4625,4626],{},"Ochrana před neoprávněnou změnou",[1047,4628,4629,4634,4637],{},[1065,4630,4631],{},[1068,4632,4633],{},"Dostupnost",[1065,4635,4636],{},"Availability",[1065,4638,4639],{},"Systémy a data dostupné v potřebný čas",[1047,4641,4642,4647,4650],{},[1065,4643,4644],{},[1068,4645,4646],{},"Nepopiratelnost",[1065,4648,4649],{},"Non-repudiation",[1065,4651,4652],{},"Prokázání autorství akce",[1033,4654,4656],{"id":4655},"normativní-rámec","Normativní rámec",[3373,4658,4660],{"id":4659},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[2997,4662,4663,4668,4673,4684,4690,4698,4706],{},[3000,4664,4665,4667],{},[1068,4666,1070],{}," — požadavky na ISMS (certifikační norma)",[3000,4669,4670,4672],{},[1068,4671,1089],{}," — soubor bezpečnostních opatření (best practices)",[3000,4674,4675,4678,4679,4683],{},[1068,4676,4677],{},"ISO\u002FIEC 27005"," — ",[1019,4680,4682],{"className":4681,"dataFsResolvedFilePath":3028,"href":3027},[1022],"řízení rizik"," bezpečnosti informací",[3000,4685,4686,4689],{},[1068,4687,4688],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[3000,4691,4692,4694,4695],{},[1068,4693,1466],{}," — ISMS pro ",[1019,4696,910],{"className":4697,"dataFsResolvedFilePath":1476,"href":1475},[1022],[3000,4699,4700,4694,4702],{},[1068,4701,1382],{},[1019,4703,4705],{"className":4704,"dataFsResolvedFilePath":1392,"href":1391},[1022],"energetiku",[3000,4707,4708,4694,4711,4715],{},[1068,4709,4710],{},"ISO 27799",[1019,4712,4714],{"className":4713,"dataFsResolvedFilePath":1354,"href":1353},[1022],"zdravotnictví"," (publikováno samostatně, ne ISO\u002FIEC)",[3373,4717,4719],{"id":4718},"další-rámce","Další rámce",[2997,4721,4722,4727,4732],{},[3000,4723,4724,4726],{},[1068,4725,2553],{}," — americké standardy (SP 800 řada)",[3000,4728,4729,4731],{},[1068,4730,2840],{}," — profesní certifikace (CISM, CISA)",[3000,4733,4734,4736],{},[1068,4735,2621],{}," — evropská agentura pro kybernetickou bezpečnost",[1033,4738,4740],{"id":4739},"governance-řízení","Governance (řízení)",[3373,4742,4744],{"id":4743},"bezpečnostní-role","Bezpečnostní role",[1041,4746,4747,4758],{},[1044,4748,4749],{},[1047,4750,4751,4753,4756],{},[1050,4752,2665],{},[1050,4754,4755],{},"Zkratka",[1050,4757,2671],{},[1060,4759,4760,4768,4777,4785,4795,4803,4811,4819],{},[1047,4761,4762,4764,4766],{},[1065,4763,2685],{},[1065,4765,2682],{},[1065,4767,2688],{},[1047,4769,4770,4772,4774],{},[1065,4771,2701],{},[1065,4773,2698],{},[1065,4775,4776],{},"Řízení informační bezpečnosti",[1047,4778,4779,4781,4783],{},[1065,4780,2716],{},[1065,4782,2713],{},[1065,4784,2719],{},[1047,4786,4787,4790,4792],{},[1065,4788,4789],{},"IS Security Officer",[1065,4791,2728],{},[1065,4793,4794],{},"Bezpečnost IS",[1047,4796,4797,4799,4801],{},[1065,4798,2759],{},[1065,4800,2401],{},[1065,4802,2764],{},[1047,4804,4805,4807,4809],{},[1065,4806,2774],{},[1065,4808,2401],{},[1065,4810,2779],{},[1047,4812,4813,4815,4817],{},[1065,4814,2788],{},[1065,4816,2401],{},[1065,4818,2793],{},[1047,4820,4821,4823,4825],{},[1065,4822,2802],{},[1065,4824,2401],{},[1065,4826,2808],{},[3373,4828,4830],{"id":4829},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[3378,4832,4833,4839,4850],{},[3000,4834,4835,4838],{},[1068,4836,4837],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[3000,4840,4841,4844,4845],{},[1068,4842,4843],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[1019,4846,1891],{"className":4847,"dataFsResolvedFilePath":4848,"href":4849},[1022],"topics\u002Fsae.md","\u002Fwiki\u002Fsae",[3000,4851,4852,4855],{},[1068,4853,4854],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[1033,4857,4859],{"id":4858},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[3378,4861,4862,4867,4872,4877],{},[3000,4863,4864,4866],{},[1068,4865,3215],{}," — stanovení kontextu, politiky, rozsahu ISMS",[3000,4868,4869,4871],{},[1068,4870,3225],{}," — implementace opatření, řízení rizik",[3000,4873,4874,4876],{},[1068,4875,3235],{}," — monitorování, audit, přezkoumání",[3000,4878,4879,4881],{},[1068,4880,3245],{}," — nápravná opatření, neustálé zlepšování",[1033,4883,4885],{"id":4884},"oborová-řešení-isms","Oborová řešení ISMS",[1015,4887,4888,4889,4892],{},"Kurz ",[1019,4890,1025],{"className":4891,"dataFsResolvedFilePath":1024,"href":1023},[1022]," pokrývá ISMS specifika pro:",[2997,4894,4895,4901,4907,4914,4920,4927,4933,4940,4945],{},[3000,4896,4897],{},[1019,4898,4900],{"className":4899,"dataFsResolvedFilePath":1518,"href":1517},[1022],"Akademické\u002Funiverzitní prostředí",[3000,4902,4903,4906],{},[1019,4904,1244],{"className":4905,"dataFsResolvedFilePath":1354,"href":1353},[1022]," (HIPAA, ISO 27799)",[3000,4908,4909,4913],{},[1019,4910,4912],{"className":4911,"dataFsResolvedFilePath":1392,"href":1391},[1022],"Energetiku"," (ISO 27019, IEC 61850)",[3000,4915,4916,4919],{},[1019,4917,1400],{"className":4918,"dataFsResolvedFilePath":1413,"href":1412},[1022]," (NISTIR 7628)",[3000,4921,4922,4926],{},[1019,4923,4925],{"className":4924,"dataFsResolvedFilePath":1434,"href":1433},[1022],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[3000,4928,4929,4932],{},[1019,4930,1442],{"className":4931,"dataFsResolvedFilePath":1455,"href":1454},[1022]," (TISAX)",[3000,4934,4935,4939],{},[1019,4936,4938],{"className":4937,"dataFsResolvedFilePath":1476,"href":1475},[1022],"ISP\u002Ftelekomunikace"," (ISO 27011)",[3000,4941,4942],{},[1019,4943,1484],{"className":4944,"dataFsResolvedFilePath":1497,"href":1496},[1022],[3000,4946,4947],{},[1019,4948,2249],{"className":4949,"dataFsResolvedFilePath":1539,"href":1538},[1022],[1033,4951,2995],{"id":2994},[2997,4953,4954,4960,4966,4974,4980,4986,4994,5001],{},[3000,4955,4956,4959],{},[1019,4957,1114],{"className":4958,"dataFsResolvedFilePath":3028,"href":3027},[1022]," — jádro ISMS procesu",[3000,4961,4962,4965],{},[1019,4963,1891],{"className":4964,"dataFsResolvedFilePath":4848,"href":4849},[1022]," — budování bezpečnostního povědomí",[3000,4967,4968,4973],{},[1019,4969,1189],{"className":4970,"dataFsResolvedFilePath":4971,"href":4972},[1022],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — kontinuita činnosti",[3000,4975,4976,4979],{},[1019,4977,3772],{"className":4978,"dataFsResolvedFilePath":3770,"href":3771},[1022]," — širší kontext",[3000,4981,4982,4985],{},[1019,4983,1261],{"className":4984,"dataFsResolvedFilePath":3862,"href":3863},[1022]," — technologická opatření",[3000,4987,4988,4993],{},[1019,4989,1155],{"className":4990,"dataFsResolvedFilePath":4991,"href":4992},[1022],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost"," — governance kontext",[3000,4995,4996,5000],{},[1019,4997,4999],{"className":4998,"dataFsResolvedFilePath":1120,"href":1119},[1022],"Záznam přednášky Risk Management"," — bibliografická karta",[3000,5002,5003,5009],{},[1019,5004,5008],{"className":5005,"dataFsResolvedFilePath":5006,"href":5007},[1022],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — ENISA NCSS, NÚKIB strategie",{"title":3039,"searchDepth":145,"depth":145,"links":5011},[5012,5013,5017,5021,5022,5023],{"id":4584,"depth":145,"text":4585},{"id":4655,"depth":145,"text":4656,"children":5014},[5015,5016],{"id":4659,"depth":100,"text":4660},{"id":4718,"depth":100,"text":4719},{"id":4739,"depth":145,"text":4740,"children":5018},[5019,5020],{"id":4743,"depth":100,"text":4744},{"id":4829,"depth":100,"text":4830},{"id":4858,"depth":145,"text":4859},{"id":4884,"depth":145,"text":4885},{"id":2994,"depth":145,"text":2995},[5],{},"\u002Ftopics\u002Fisms",{"title":4559,"description":3039},[3061,3063,3066],"topics\u002Fisms",[5,37,614,616,114,110],"MAuUW-ktk0wWc5AS56HRZFpDbys8Z-J8r3mjMNbPNWc",{"id":5033,"title":3772,"body":5034,"course":3052,"courses":5561,"created":3820,"description":3039,"extension":3055,"meta":5562,"navigation":3057,"path":5563,"seo":5564,"sources":5565,"stem":5568,"tags":5569,"type":3828,"updated":3053,"__hash__":5570},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":1008,"value":5035,"toc":5545},[5036,5039,5046,5053,5057,5095,5099,5103,5145,5149,5156,5159,5185,5189,5206,5210,5241,5245,5313,5317,5320,5337,5341,5379,5381,5418,5422,5480,5484],[1011,5037,3772],{"id":5038},"kybernetická-bezpečnost",[1015,5040,5041],{},[3086,5042],{"alt":5043,"className":5044,"src":5045},"kb-defense-in-depth",[1022,1080],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[1015,5047,5048,5049,5052],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[1019,5050,1082],{"className":5051,"dataFsResolvedFilePath":2333,"href":2332},[1022]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[1033,5054,5056],{"id":5055},"základní-pojmy","Základní pojmy",[2997,5058,5059,5065,5071,5077,5083,5089],{},[3000,5060,5061,5064],{},[1068,5062,5063],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[3000,5066,5067,5070],{},[1068,5068,5069],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[3000,5072,5073,5076],{},[1068,5074,5075],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[3000,5078,5079,5082],{},[1068,5080,5081],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[3000,5084,5085,5088],{},[1068,5086,5087],{},"Payload"," — kód spuštěný po úspěšném exploitu",[3000,5090,5091,5094],{},[1068,5092,5093],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[1033,5096,5098],{"id":5097},"typy-útoků","Typy útoků",[3373,5100,5102],{"id":5101},"podle-cílení","Podle cílení",[1041,5104,5105,5117],{},[1044,5106,5107],{},[1047,5108,5109,5112,5114],{},[1050,5110,5111],{},"Typ",[1050,5113,3111],{},[1050,5115,5116],{},"Cíl",[1060,5118,5119,5132],{},[1047,5120,5121,5126,5129],{},[1065,5122,5123],{},[1068,5124,5125],{},"Plošný",[1065,5127,5128],{},"Útočníkovi je jedno, kdo je obětí",[1065,5130,5131],{},"Botnety, spam, ransomware",[1047,5133,5134,5139,5142],{},[1065,5135,5136],{},[1068,5137,5138],{},"Cílený (APT)",[1065,5140,5141],{},"Soustředěná pozornost na konkrétní cíl",[1065,5143,5144],{},"Špionáž, sabotáž, krádež dat",[3373,5146,5148],{"id":5147},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[1015,5150,5151],{},[3086,5152],{"alt":5153,"className":5154,"src":5155},"apt-faze-utoku",[1022,1080],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[1015,5157,5158],{},"4 fáze:",[3378,5160,5161,5167,5173,5179],{},[3000,5162,5163,5166],{},[1068,5164,5165],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[3000,5168,5169,5172],{},[1068,5170,5171],{},"Průnik"," — spear phishing, watering hole, malvertising",[3000,5174,5175,5178],{},[1068,5176,5177],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[3000,5180,5181,5184],{},[1068,5182,5183],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[3373,5186,5188],{"id":5187},"základní-vektory-útoku","Základní vektory útoku",[2997,5190,5191,5194,5197,5200,5203],{},[3000,5192,5193],{},"Email s přílohou (spear phishing)",[3000,5195,5196],{},"Trojanizované aplikace",[3000,5198,5199],{},"Drive-by download (webové exploity)",[3000,5201,5202],{},"Výměnná média (BadUSB)",[3000,5204,5205],{},"Watering hole (kompromitace důvěryhodného webu)",[3373,5207,5209],{"id":5208},"software-útoky","Software útoky",[2997,5211,5212,5218,5224,5230,5235],{},[3000,5213,5214,5217],{},[1068,5215,5216],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[3000,5219,5220,5223],{},[1068,5221,5222],{},"Viry"," — poškození HW\u002FSW",[3000,5225,5226,5229],{},[1068,5227,5228],{},"Trojské koně"," — skrytá funkčnost",[3000,5231,5232,5234],{},[1068,5233,2148],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[3000,5236,5237,5240],{},[1068,5238,5239],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[1033,5242,5244],{"id":5243},"webové-útoky-owasp","Webové útoky (OWASP)",[1041,5246,5247,5259],{},[1044,5248,5249],{},[1047,5250,5251,5254,5256],{},[1050,5252,5253],{},"Útok",[1050,5255,5116],{},[1050,5257,5258],{},"Efekt",[1060,5260,5261,5272,5282,5293,5303],{},[1047,5262,5263,5266,5269],{},[1065,5264,5265],{},"Content Spoofing",[1065,5267,5268],{},"Klient",[1065,5270,5271],{},"Ztráta přihlašovacích údajů",[1047,5273,5274,5277,5279],{},[1065,5275,5276],{},"XSS",[1065,5278,5268],{},[1065,5280,5281],{},"Přístup k cookies",[1047,5283,5284,5287,5290],{},[1065,5285,5286],{},"SQL Injection",[1065,5288,5289],{},"Server",[1065,5291,5292],{},"Neoprávněný přístup do DB",[1047,5294,5295,5298,5300],{},[1065,5296,5297],{},"DoS\u002FDDoS",[1065,5299,5289],{},[1065,5301,5302],{},"Nedostupnost služby",[1047,5304,5305,5308,5310],{},[1065,5306,5307],{},"Path Traversal",[1065,5309,5289],{},[1065,5311,5312],{},"Přístup k souborům",[1033,5314,5316],{"id":5315},"bec-business-email-compromise","BEC — Business Email Compromise",[1015,5318,5319],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[3378,5321,5322,5325,5328,5331,5334],{},[3000,5323,5324],{},"Vydávání se za právníka",[3000,5326,5327],{},"Podvod na CEO",[3000,5329,5330],{},"Krádež dat (personální oddělení)",[3000,5332,5333],{},"Kompromitace účtu",[3000,5335,5336],{},"Falešné faktury",[1033,5338,5340],{"id":5339},"obranné-technologie","Obranné technologie",[2997,5342,5343,5349,5355,5361,5367,5373],{},[3000,5344,5345,5348],{},[1068,5346,5347],{},"NAC"," — řízení přístupu k síti",[3000,5350,5351,5354],{},[1068,5352,5353],{},"IDS"," — detekce průniku (pasivní)",[3000,5356,5357,5360],{},[1068,5358,5359],{},"IPS"," — prevence průniku (aktivní, in-line)",[3000,5362,5363,5366],{},[1068,5364,5365],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[3000,5368,5369,5372],{},[1068,5370,5371],{},"DLP"," — prevence úniku dat",[3000,5374,5375,5378],{},[1068,5376,5377],{},"FW\u002FVPN"," — perimetrová ochrana",[1033,5380,2995],{"id":2994},[2997,5382,5383,5389,5395,5401,5412],{},[3000,5384,5385,5388],{},[1019,5386,1082],{"className":5387,"dataFsResolvedFilePath":2333,"href":2332},[1022]," — manažerský rámec bezpečnosti",[3000,5390,5391,5394],{},[1019,5392,1114],{"className":5393,"dataFsResolvedFilePath":3028,"href":3027},[1022]," — hodnocení hrozeb a zranitelností",[3000,5396,5397,5400],{},[1019,5398,1891],{"className":5399,"dataFsResolvedFilePath":4848,"href":4849},[1022]," — budování povědomí jako obrana č. 1",[3000,5402,5403,5406,5407,5411],{},[1019,5404,1189],{"className":5405,"dataFsResolvedFilePath":4971,"href":4972},[1022]," \u002F ",[1019,5408,5410],{"className":5409,"dataFsResolvedFilePath":3788,"href":3789},[1022],"DR"," — reakce na incidenty a obnova",[3000,5413,5414,5417],{},[1019,5415,1261],{"className":5416,"dataFsResolvedFilePath":3862,"href":3863},[1022]," — technologická ochrana",[3373,5419,5421],{"id":5420},"záznamy-přednášek-a-útočné-techniky","Záznamy přednášek a útočné techniky",[2997,5423,5424,5431,5440,5447,5455,5464,5473],{},[3000,5425,5426,5430],{},[1019,5427,5429],{"className":5428,"dataFsResolvedFilePath":2520,"href":2519},[1022],"Anatomie kybernetického útoku"," — APT, vektory, MITRE ATT&CK",[3000,5432,5433,5439],{},[1019,5434,5438],{"className":5435,"dataFsResolvedFilePath":5436,"href":5437},[1022],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky a obrana"," — WormGPT, BEC",[3000,5441,5442,5446],{},[1019,5443,5445],{"className":5444,"dataFsResolvedFilePath":2944,"href":2943},[1022],"Síťové útoky"," — DDoS, spoofing, ISO\u002FOSI L1–L7",[3000,5448,5449,5454],{},[1019,5450,2148],{"className":5451,"dataFsResolvedFilePath":5452,"href":5453},[1022],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware"," — historie, RaaS, NISTIR 8374",[3000,5456,5457,5463],{},[1019,5458,5462],{"className":5459,"dataFsResolvedFilePath":5460,"href":5461},[1022],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking a APT skupiny"," — APT28\u002F29\u002F41",[3000,5465,5466,5472],{},[1019,5467,5471],{"className":5468,"dataFsResolvedFilePath":5469,"href":5470},[1022],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — OSINT, behaviorální biometrika",[3000,5474,5475,5479],{},[1019,5476,5478],{"className":5477,"dataFsResolvedFilePath":1581,"href":1580},[1022],"Bezpečnost webových služeb"," — OWASP, XSS, SQL injection",[3373,5481,5483],{"id":5482},"případové-studie","Případové studie",[2997,5485,5486,5493,5499,5507,5513,5521,5530,5539],{},[3000,5487,5488,5492],{},[1019,5489,5491],{"className":5490,"dataFsResolvedFilePath":2433,"href":2432},[1022],"Útoky na nemocnice"," — Benešov, FN Brno, Nymburk",[3000,5494,5495,5498],{},[1019,5496,1227],{"className":5497,"dataFsResolvedFilePath":3885,"href":3886},[1022]," — PII, ISO 27701",[3000,5500,5501,5506],{},[1019,5502,2000],{"className":5503,"dataFsResolvedFilePath":5504,"href":5505},[1022],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login"," — privilegované účty, NIST SP 800-63",[3000,5508,5509,5512],{},[1019,5510,4472],{"className":5511,"dataFsResolvedFilePath":1560,"href":1559},[1022]," — PCI DSS v4.0.1",[3000,5514,5515,5520],{},[1019,5516,1655],{"className":5517,"dataFsResolvedFilePath":5518,"href":5519},[1022],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost"," — SIMJaker, 5G",[3000,5522,5523,5529],{},[1019,5524,5528],{"className":5525,"dataFsResolvedFilePath":5526,"href":5527},[1022],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR síť"," — onion routing, dark web",[3000,5531,5532,5538],{},[1019,5533,5537],{"className":5534,"dataFsResolvedFilePath":5535,"href":5536},[1022],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — CVE-2022-38392",[3000,5540,5541,5544],{},[1019,5542,3880],{"className":5543,"dataFsResolvedFilePath":3878,"href":3879},[1022]," — telemedicína, NSeZ",{"title":3039,"searchDepth":145,"depth":145,"links":5546},[5547,5548,5554,5555,5556,5557],{"id":5055,"depth":145,"text":5056},{"id":5097,"depth":145,"text":5098,"children":5549},[5550,5551,5552,5553],{"id":5101,"depth":100,"text":5102},{"id":5147,"depth":100,"text":5148},{"id":5187,"depth":100,"text":5188},{"id":5208,"depth":100,"text":5209},{"id":5243,"depth":145,"text":5244},{"id":5315,"depth":145,"text":5316},{"id":5339,"depth":145,"text":5340},{"id":2994,"depth":145,"text":2995,"children":5558},[5559,5560],{"id":5420,"depth":100,"text":5421},{"id":5482,"depth":100,"text":5483},[5],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":3772,"description":3039},[5566,5567,3061],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[5,62,944,72,138,132,275],"ZGXpTQk1lM-ZV0_FuXL-vNa95AogiXG3M6yEOrni_vI",{"id":5572,"title":1261,"body":5573,"course":3052,"courses":6084,"created":3820,"description":3039,"extension":3055,"meta":6085,"navigation":3057,"path":6086,"seo":6087,"sources":6088,"stem":6091,"tags":6092,"type":3828,"updated":3053,"__hash__":6093},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":1008,"value":5574,"toc":6061},[5575,5577,5584,5587,5591,5650,5654,5658,5669,5673,5684,5688,5696,5700,5711,5715,5720,5724,5735,5739,5742,5746,5778,5782,5837,5841,5922,5926,5929,5933,5940,5947,5951,5957,5959,5965,5969,5994,5998,6018,6020],[1011,5576,1261],{"id":70},[1015,5578,5579],{},[3086,5580],{"alt":5581,"className":5582,"src":5583},"ochrana-dat-technologie",[1022,1080],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[1015,5585,5586],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[1033,5588,5590],{"id":5589},"formy-zneužití-dat","Formy zneužití dat",[1041,5592,5593,5601],{},[1044,5594,5595],{},[1047,5596,5597,5599],{},[1050,5598,3536],{},[1050,5600,3111],{},[1060,5602,5603,5610,5618,5626,5634,5642],{},[1047,5604,5605,5608],{},[1065,5606,5607],{},"Zašifrování",[1065,5609,2148],{},[1047,5611,5612,5615],{},[1065,5613,5614],{},"Zveřejnění",[1065,5616,5617],{},"Double ransomware",[1047,5619,5620,5623],{},[1065,5621,5622],{},"Odposlech",[1065,5624,5625],{},"Pasivní sběr dat",[1047,5627,5628,5631],{},[1065,5629,5630],{},"Krádež",[1065,5632,5633],{},"Cílená exfiltrace",[1047,5635,5636,5639],{},[1065,5637,5638],{},"Krádež dodavatelského řetězce",[1065,5640,5641],{},"Triple ransomware",[1047,5643,5644,5647],{},[1065,5645,5646],{},"Prodej",[1065,5648,5649],{},"Darknet marketplace",[1033,5651,5653],{"id":5652},"bezpečnostní-technologie","Bezpečnostní technologie",[3373,5655,5657],{"id":5656},"nac-network-access-control","NAC (Network Access Control)",[2997,5659,5660,5663,5666],{},[3000,5661,5662],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[3000,5664,5665],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[3000,5667,5668],{},"Ekvivalenty: MDM, BYOD",[3373,5670,5672],{"id":5671},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[2997,5674,5675,5678,5681],{},[3000,5676,5677],{},"Monitoruje síťový provoz, generuje alerty",[3000,5679,5680],{},"Pasivní systém — nezasahuje do provozu",[3000,5682,5683],{},"Signaturová a anomální detekce",[3373,5685,5687],{"id":5686},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[2997,5689,5690,5693],{},[3000,5691,5692],{},"Aktivní systém — blokuje škodlivý provoz",[3000,5694,5695],{},"Zařazen přímo do síťové cesty (in-line)",[3373,5697,5699],{"id":5698},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[2997,5701,5702,5705,5708],{},[3000,5703,5704],{},"Centralizovaná správa bezpečnostních logů",[3000,5706,5707],{},"Sběr s agentem i bez agenta",[3000,5709,5710],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[3373,5712,5714],{"id":5713},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[2997,5716,5717],{},[3000,5718,5719],{},"Klasifikace citlivých dat a vynucení ochrany",[3373,5721,5723],{"id":5722},"šifrování","Šifrování",[2997,5725,5726,5729,5732],{},[3000,5727,5728],{},"AES (128\u002F192\u002F256 bit), 3DES",[3000,5730,5731],{},"RSA (2048+ bit), DSS",[3000,5733,5734],{},"SHA-256, SHA-1",[3373,5736,5738],{"id":5737},"utm-unified-threat-management","UTM (Unified Threat Management)",[1015,5740,5741],{},"Jednotná správa hrozeb — FW + IDS\u002FIPS + AV + VPN v jednom zařízení.",[1033,5743,5745],{"id":5744},"siem-podrobně","SIEM podrobně",[2997,5747,5748,5754,5760,5766,5772],{},[3000,5749,5750,5753],{},[1068,5751,5752],{},"EPS"," (Events Per Second) — klíčová metrika pro dimenzování SIEM.",[3000,5755,5756,5759],{},[1068,5757,5758],{},"Velikost logů"," — plánování úložné kapacity dle objemu generovaných dat.",[3000,5761,5762,5765],{},[1068,5763,5764],{},"Typy zařízení"," — síťové prvky, servery, aplikace, bezpečnostní systémy, endpointy.",[3000,5767,5768,5771],{},[1068,5769,5770],{},"Implementace"," — začít s nejkritičtějšími zdroji logů, postupně rozšiřovat.",[3000,5773,5774,5777],{},[1068,5775,5776],{},"Provozní příručka + BCM"," — dokumentace provozu SIEM a jeho zahrnutí do plánů kontinuity.",[1033,5779,5781],{"id":5780},"dlp-tři-stavy-dat","DLP — tři stavy dat",[1041,5783,5784,5796],{},[1044,5785,5786],{},[1047,5787,5788,5791,5793],{},[1050,5789,5790],{},"Stav",[1050,5792,3111],{},[1050,5794,5795],{},"Ochrana",[1060,5797,5798,5811,5824],{},[1047,5799,5800,5805,5808],{},[1065,5801,5802],{},[1068,5803,5804],{},"Data in Use",[1065,5806,5807],{},"Aktivně zpracovávaná na endpointu",[1065,5809,5810],{},"DLP koncových bodů (agent na stanici, kontrola USB, tisk, schránka, email)",[1047,5812,5813,5818,5821],{},[1065,5814,5815],{},[1068,5816,5817],{},"Data in Motion",[1065,5819,5820],{},"Přenášená po síti",[1065,5822,5823],{},"Síťový DLP (gateway), monitorování a blokování na perimetru",[1047,5825,5826,5831,5834],{},[1065,5827,5828],{},[1068,5829,5830],{},"Data at Rest",[1065,5832,5833],{},"Uložená na discích, v databázích",[1065,5835,5836],{},"Šifrování, řízení přístupu",[1033,5838,5840],{"id":5839},"kryptografie-historický-přehled","Kryptografie — historický přehled",[1041,5842,5843,5858],{},[1044,5844,5845],{},[1047,5846,5847,5850,5853,5855],{},[1050,5848,5849],{},"Algoritmus",[1050,5851,5852],{},"Rok",[1050,5854,5111],{},[1050,5856,5857],{},"Délka klíče",[1060,5859,5860,5876,5891,5907],{},[1047,5861,5862,5867,5870,5873],{},[1065,5863,5864],{},[1068,5865,5866],{},"DES",[1065,5868,5869],{},"1975",[1065,5871,5872],{},"Symetrický (blokový)",[1065,5874,5875],{},"64-bit (efektivních 56)",[1047,5877,5878,5883,5886,5888],{},[1065,5879,5880],{},[1068,5881,5882],{},"IDEA",[1065,5884,5885],{},"1990",[1065,5887,5872],{},[1065,5889,5890],{},"128-bit",[1047,5892,5893,5898,5901,5904],{},[1065,5894,5895],{},[1068,5896,5897],{},"RSA",[1065,5899,5900],{},"1977 (MIT)",[1065,5902,5903],{},"Asymetrický",[1065,5905,5906],{},"1024–4096 bit",[1047,5908,5909,5914,5917,5919],{},[1065,5910,5911],{},[1068,5912,5913],{},"AES",[1065,5915,5916],{},"1997 (NIST)",[1065,5918,5872],{},[1065,5920,5921],{},"128\u002F192\u002F256-bit",[3373,5923,5925],{"id":5924},"steganografie","Steganografie",[1015,5927,5928],{},"Skrytí informace ve zdánlivě neškodné zprávě — na rozdíl od kryptografie nezakrývá obsah, ale samotnou existenci tajné komunikace. Využití v obrázcích, zvuku, videu.",[3373,5930,5932],{"id":5931},"digitální-podpisy-a-hašovací-funkce","Digitální podpisy a hašovací funkce",[1015,5934,5935,5936,5939],{},"Ověření autora a integrity dokumentu pomocí asymetrické kryptografie. Hašovací funkce vytváří jednosměrný otisk dokumentu — základ pro ověření integrity. ",[1068,5937,5938],{},"4 vlastnosti elektronického podpisu",": identifikace, integrita, nepopiratelnost, nenapodobitelnost.",[1015,5941,5942,5943,5946],{},"V ČR existují ",[1068,5944,5945],{},"3 akreditované certifikační autority"," pro vydávání kvalifikovaných certifikátů.",[3373,5948,5950],{"id":5949},"dynamický-biometrický-podpis","Dynamický biometrický podpis",[1015,5952,5953,5956],{},[1068,5954,5955],{},"ISO\u002FIEC 24745"," — ochrana biometrických šablon. Zachycuje unikátní biometrickou stopu (tlak, rychlost, sklon pera, dynamika) — každý podpis je jedinečný i při opakování.",[3373,5958,2195],{"id":500},[1015,5960,5961,5964],{},[1068,5962,5963],{},"Nařízení EU č. 910\u002F2014"," o elektronické identifikaci a službách vytvářejících důvěru — elektronické pečetě, časová razítka, služby vytvářející důvěru (certifikační autority, doručovací služby).",[3373,5966,5968],{"id":5967},"enisa-data-protection-engineering","ENISA Data Protection Engineering",[1015,5970,5971,5972,1115,5975,5977,5978,5981,5982,1115,5984,1115,5987,5990,5991,1031],{},"Doporučení pro technickou ochranu osobních údajů: ",[1068,5973,5974],{},"Privacy by Design \u002F Default",[1068,5976,4187],{}," (Data Protection Impact Assessment), ",[1068,5979,5980],{},"PET"," (Privacy Enhancing Technologies), ",[1068,5983,366],{},[1068,5985,5986],{},"differential privacy",[1068,5988,5989],{},"TEE"," (Trusted Execution Environment), ",[1068,5992,5993],{},"synthetic data",[1033,5995,5997],{"id":5996},"ipv6-bezpečnost","IPv6 bezpečnost",[2997,5999,6000,6006,6012,6015],{},[3000,6001,6002,6005],{},[1068,6003,6004],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[3000,6007,6008,6011],{},[1068,6009,6010],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[3000,6013,6014],{},"Transportní a tunelovací režim",[3000,6016,6017],{},"SPD (Security Policy Database), bezpečnostní asociace",[1033,6019,2995],{"id":2994},[2997,6021,6022,6028,6034,6040,6046,6053],{},[3000,6023,6024,6027],{},[1019,6025,1082],{"className":6026,"dataFsResolvedFilePath":2333,"href":2332},[1022]," — ochrana dat jako technická vrstva ISMS",[3000,6029,6030,6033],{},[1019,6031,3772],{"className":6032,"dataFsResolvedFilePath":3770,"href":3771},[1022]," — kontext hrozeb",[3000,6035,6036,6039],{},[1019,6037,1114],{"className":6038,"dataFsResolvedFilePath":3028,"href":3027},[1022]," — hodnocení aktiv a hrozeb",[3000,6041,6042,6045],{},[1019,6043,2033],{"className":6044,"dataFsResolvedFilePath":1581,"href":1580},[1022]," — webové útoky a obrana",[3000,6047,6048,6052],{},[1019,6049,6051],{"className":6050,"dataFsResolvedFilePath":1602,"href":1601},[1022],"Bezpečnost emailu"," — emailové protokoly",[3000,6054,6055,3782],{},[1019,6056,6060],{"className":6057,"dataFsResolvedFilePath":6058,"href":6059},[1022],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Záznam přednášky Ochrana dat",{"title":3039,"searchDepth":145,"depth":145,"links":6062},[6063,6064,6073,6074,6075,6082,6083],{"id":5589,"depth":145,"text":5590},{"id":5652,"depth":145,"text":5653,"children":6065},[6066,6067,6068,6069,6070,6071,6072],{"id":5656,"depth":100,"text":5657},{"id":5671,"depth":100,"text":5672},{"id":5686,"depth":100,"text":5687},{"id":5698,"depth":100,"text":5699},{"id":5713,"depth":100,"text":5714},{"id":5722,"depth":100,"text":5723},{"id":5737,"depth":100,"text":5738},{"id":5744,"depth":145,"text":5745},{"id":5780,"depth":145,"text":5781},{"id":5839,"depth":145,"text":5840,"children":6076},[6077,6078,6079,6080,6081],{"id":5924,"depth":100,"text":5925},{"id":5931,"depth":100,"text":5932},{"id":5949,"depth":100,"text":5950},{"id":500,"depth":100,"text":2195},{"id":5967,"depth":100,"text":5968},{"id":5996,"depth":145,"text":5997},{"id":2994,"depth":145,"text":2995},[5],{},"\u002Ftopics\u002Fochrana-dat",{"title":1261,"description":3039},[3065,6089,6090],"raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[5,70,95,732,572,604,181,108],"M650k0ZNR2BPigQlhjBZfiXYtu5pDBHhmlFhIKtM8X0",{"id":6095,"title":1114,"body":6096,"course":3052,"courses":6577,"created":3820,"description":3039,"extension":3055,"meta":6578,"navigation":3057,"path":6579,"seo":6580,"sources":6581,"stem":6582,"tags":6583,"type":3828,"updated":3053,"__hash__":6584},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":1008,"value":6097,"toc":6566},[6098,6101,6108,6114,6250,6254,6311,6315,6365,6369,6374,6393,6397,6400,6404,6418,6422,6429,6443,6447,6475,6479,6528,6530],[1011,6099,1114],{"id":6100},"řízení-rizik",[1015,6102,6103],{},[3086,6104],{"alt":6105,"className":6106,"src":6107},"rizeni-rizik-proces",[1022,1080],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[1015,6109,6110,6111,1031],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[1019,6112,1082],{"className":6113,"dataFsResolvedFilePath":2333,"href":2332},[1022],[6115,6116,6120,6140,6155,6243],"aside",{"className":6117,"dataCallout":584},[6118,6119],"callout","callout-info",[1015,6121,6124,6132,6133,6139],{"className":6122},[6123],"callout-title",[6125,6126],"span",{"className":6127,"ariaHidden":6131},[6128,6129,6130],"iconify","i-lucide:info","callout-icon","true","Související pohled v kurzu ",[1019,6134,6138],{"className":6135,"dataFsResolvedFilePath":6136,"href":6137},[1022],"courses\u002Firmank.md","\u002Fwiki\u002Firmank","IrmanK"," — Risk management",[1015,6141,6142,6143,6146,6147,6150,6151,6154],{},"Tento topic pokrývá ",[1068,6144,6145],{},"kybernetické \u002F informační"," riziko podle ISO\u002FIEC 27005. Pro ",[1068,6148,6149],{},"podnikové (enterprise) riziko"," v širším smyslu (finanční, strategické, change-driven) viz odpovídající stránky kurzu ",[1019,6152,6138],{"className":6153,"dataFsResolvedFilePath":6136,"href":6137},[1022],":",[2997,6156,6157,6166,6174,6217,6226,6234],{},[3000,6158,6159,6165],{},[1019,6160,6164],{"className":6161,"dataFsResolvedFilePath":6162,"href":6163},[1022],"topics\u002Fdefinice-rizika.md","\u002Fwiki\u002Fdefinice-rizika","definice-rizika"," — 10 definic rizika, podnikatelské riziko, postoj k riziku",[3000,6167,6168,6173],{},[1019,6169,692],{"className":6170,"dataFsResolvedFilePath":6171,"href":6172},[1022],"topics\u002Fmereni-rizika.md","\u002Fwiki\u002Fmereni-rizika"," — statistické charakteristiky (σ, σ², KV)",[3000,6175,6176,4678,6181,6216],{},[1019,6177,68],{"className":6178,"dataFsResolvedFilePath":6179,"href":6180},[1022],"topics\u002Fmapa-rizik.md","\u002Fwiki\u002Fmapa-rizik",[6125,6182,6185],{"className":6183},[6184],"katex",[6186,6187,6189],"math",{"xmlns":6188},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[6190,6191,6192,6211],"semantics",{},[6193,6194,6195,6199,6203,6206,6209],"mrow",{},[6196,6197,6198],"mi",{},"R",[6200,6201,6202],"mo",{},"=",[6196,6204,6205],{},"D",[6200,6207,6208],{},"×",[6196,6210,3342],{},[6212,6213,6215],"annotation",{"encoding":6214},"application\u002Fx-tex","R = D \\times P",", matice 5×5, tři barevné zóny",[3000,6218,6219,6225],{},[1019,6220,6224],{"className":6221,"dataFsResolvedFilePath":6222,"href":6223},[1022],"topics\u002Ftaktiky-rizeni-rizik.md","\u002Fwiki\u002Ftaktiky-rizeni-rizik","taktiky-rizeni-rizik"," — vyvárování \u002F udržení \u002F redukce \u002F přenos",[3000,6227,6228,6233],{},[1019,6229,634],{"className":6230,"dataFsResolvedFilePath":6231,"href":6232},[1022],"topics\u002Fklasifikace-rizik.md","\u002Fwiki\u002Fklasifikace-rizik"," — kritické × důležité × běžné; dynamické × statické; čisté × spekulativní",[3000,6235,6236,6242],{},[1019,6237,6241],{"className":6238,"dataFsResolvedFilePath":6239,"href":6240},[1022],"topics\u002Fmetody-snizovani-rizika.md","\u002Fwiki\u002Fmetody-snizovani-rizika","metody-snizovani-rizika"," — 6 strategií, ofenzivní řízení",[1015,6244,6245,6246,6249],{},"Oba pohledy se doplňují: ISMS \u002F ISO 27005 je specializace pro ",[1068,6247,6248],{},"informační rizika",", IrmanK je obecné podnikové riziko.",[1033,6251,6253],{"id":6252},"normativní-základ","Normativní základ",[1041,6255,6256,6264],{},[1044,6257,6258],{},[1047,6259,6260,6262],{},[1050,6261,1052],{},[1050,6263,2828],{},[1060,6265,6266,6275,6283,6291,6301],{},[1047,6267,6268,6272],{},[1065,6269,6270],{},[1068,6271,1284],{},[1065,6273,6274],{},"Obecné směrnice pro management rizik",[1047,6276,6277,6281],{},[1065,6278,6279],{},[1068,6280,1300],{},[1065,6282,1303],{},[1047,6284,6285,6289],{},[1065,6286,6287],{},[1068,6288,1104],{},[1065,6290,1107],{},[1047,6292,6293,6298],{},[1065,6294,6295],{},[1068,6296,6297],{},"NIST SP 800-30",[1065,6299,6300],{},"Průvodce hodnocením rizik",[1047,6302,6303,6308],{},[1065,6304,6305],{},[1068,6306,6307],{},"NIST SP 800-39",[1065,6309,6310],{},"Proces řízení bezpečnostních rizik",[1033,6312,6314],{"id":6313},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[3378,6316,6317,6323,6329,6335,6341,6347,6353,6359],{},[3000,6318,6319,6322],{},[1068,6320,6321],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[3000,6324,6325,6328],{},[1068,6326,6327],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[3000,6330,6331,6334],{},[1068,6332,6333],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[3000,6336,6337,6340],{},[1068,6338,6339],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[3000,6342,6343,6346],{},[1068,6344,6345],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[3000,6348,6349,6352],{},[1068,6350,6351],{},"Akceptace rizik"," — formální rozhodnutí",[3000,6354,6355,6358],{},[1068,6356,6357],{},"Komunikace"," — sdílení informací o rizicích",[3000,6360,6361,6364],{},[1068,6362,6363],{},"Monitorování"," — průběžné přezkoumávání",[1033,6366,6368],{"id":6367},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[1015,6370,6371],{},[1068,6372,6373],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[2997,6375,6376,6382,6387],{},[3000,6377,6378,6381],{},[1068,6379,6380],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[3000,6383,6384,6386],{},[1068,6385,5075],{}," — slabé místo aktiva (stupnice 1–5)",[3000,6388,6389,6392],{},[1068,6390,6391],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[1033,6394,6396],{"id":6395},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[1015,6398,6399],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[1033,6401,6403],{"id":6402},"klíčové-dokumenty","Klíčové dokumenty",[2997,6405,6406,6412],{},[3000,6407,6408,6411],{},[1068,6409,6410],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s vybranými opatřeními pro jednotlivá rizika, odpovědnými osobami, termíny implementace, potřebnými zdroji.",[3000,6413,6414,6417],{},[1068,6415,6416],{},"SoA \u002F PoA"," (Statement of Applicability \u002F Prohlášení o aplikovatelnosti) — seznam všech opatření z Přílohy A normy ISO 27001 s uvedením, zda je opatření aplikováno, zdůvodnění zahrnutí\u002Fvyloučení a stavu implementace.",[1033,6419,6421],{"id":6420},"metodika-pro-organizace-s-kii-vis","Metodika pro organizace s KII \u002F VIS",[1015,6423,6424,6425,6428],{},"Specifický postup hodnocení rizik dle požadavků zákona o kybernetické bezpečnosti (",[1068,6426,6427],{},"ZKB 181\u002F2014 Sb.",") a prováděcích vyhlášek pro organizace provozující:",[2997,6430,6431,6437],{},[3000,6432,6433,6436],{},[1068,6434,6435],{},"KII"," — kritickou informační infrastrukturu",[3000,6438,6439,6442],{},[1068,6440,6441],{},"VIS"," — významné informační systémy",[1033,6444,6446],{"id":6445},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[2997,6448,6449,6455,6460,6465,6470],{},[3000,6450,6451,6454],{},[1068,6452,6453],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[3000,6456,6457,6459],{},[1068,6458,2759],{}," — odpovědný za ISMS",[3000,6461,6462,6464],{},[1068,6463,2774],{}," — návrh a implementace opatření",[3000,6466,6467,6469],{},[1068,6468,2788],{}," — provádění auditů",[3000,6471,6472,6474],{},[1068,6473,2802],{}," — zajištění rozvoje a bezpečnosti aktiva",[1033,6476,6478],{"id":6477},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[1041,6480,6481,6493],{},[1044,6482,6483],{},[1047,6484,6485,6488,6490],{},[1050,6486,6487],{},"Úroveň",[1050,6489,2828],{},[1050,6491,6492],{},"Typ rizika",[1060,6494,6495,6506,6517],{},[1047,6496,6497,6500,6503],{},[1065,6498,6499],{},"Stupeň 1",[1065,6501,6502],{},"Organizace",[1065,6504,6505],{},"Strategické riziko",[1047,6507,6508,6511,6514],{},[1065,6509,6510],{},"Stupeň 2",[1065,6512,6513],{},"Poslání\u002Fobchodní procesy",[1065,6515,6516],{},"Taktické riziko",[1047,6518,6519,6522,6525],{},[1065,6520,6521],{},"Stupeň 3",[1065,6523,6524],{},"Informační systémy",[1065,6526,6527],{},"Operační riziko",[1033,6529,2995],{"id":2994},[2997,6531,6532,6538,6544,6551,6556,6561],{},[3000,6533,6534,6537],{},[1019,6535,1082],{"className":6536,"dataFsResolvedFilePath":2333,"href":2332},[1022]," — řízení rizik jako součást systému",[3000,6539,6540,6543],{},[1019,6541,1189],{"className":6542,"dataFsResolvedFilePath":4971,"href":4972},[1022]," — kontinuita činnosti při materializaci rizik",[3000,6545,6546,6550],{},[1019,6547,6549],{"className":6548,"dataFsResolvedFilePath":3788,"href":3789},[1022],"Disaster Recovery"," — obnova po havárii",[3000,6552,6553,6033],{},[1019,6554,3772],{"className":6555,"dataFsResolvedFilePath":3770,"href":3771},[1022],[3000,6557,6558,3782],{},[1019,6559,4999],{"className":6560,"dataFsResolvedFilePath":1120,"href":1119},[1022],[3000,6562,6563,4993],{},[1019,6564,1155],{"className":6565,"dataFsResolvedFilePath":4991,"href":4992},[1022],{"title":3039,"searchDepth":145,"depth":145,"links":6567},[6568,6569,6570,6571,6572,6573,6574,6575,6576],{"id":6252,"depth":145,"text":6253},{"id":6313,"depth":145,"text":6314},{"id":6367,"depth":145,"text":6368},{"id":6395,"depth":145,"text":6396},{"id":6402,"depth":145,"text":6403},{"id":6420,"depth":145,"text":6421},{"id":6445,"depth":145,"text":6446},{"id":6477,"depth":145,"text":6478},{"id":2994,"depth":145,"text":2995},[5],{},"\u002Ftopics\u002Frizeni-rizik",{"title":1114,"description":3039},[3063,3061],"topics\u002Frizeni-rizik",[5,299,120,225,47,558],"B2O-5KFFyDd3C5ghtPpboBxcyKKtHedHtDlkrl4iqPA",{"id":6586,"title":6587,"body":6588,"course":3052,"courses":6871,"created":3820,"description":3039,"extension":3055,"meta":6872,"navigation":3057,"path":6873,"seo":6874,"sources":6875,"stem":6876,"tags":6877,"type":3828,"updated":3053,"__hash__":6878},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":1008,"value":6589,"toc":6860},[6590,6593,6600,6617,6621,6624,6628,6727,6731,6766,6770,6790,6794,6797,6801,6804,6808,6811,6815,6830,6832],[1011,6591,6587],{"id":6592},"sae-budování-bezpečnostního-povědomí",[1015,6594,6595],{},[3086,6596],{"alt":6597,"className":6598,"src":6599},"sae-pyramida",[1022,1080],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[1015,6601,6602,6603,6606,6607,3874,6610,6606,6613,6616],{},"Program definovaný doporučeními NIST řady SP 800 (zejména ",[1068,6604,6605],{},"NIST SP 800-50"," ",[1028,6608,6609],{},"Building an IT Security Awareness and Training Program",[1068,6611,6612],{},"NIST SP 800-16",[1028,6614,6615],{},"IT Security Training Requirements","), sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[1033,6618,6620],{"id":6619},"sae-continuum-model","SAE Continuum Model",[1015,6622,6623],{},"Postupný rozvoj od základního povědomí přes školení a vzdělávání až po profesní specializaci. Každá úroveň staví na předchozí — uživatel nejprve rozpoznává hrozbu, pak ji umí řešit, posléze rozumí proč a nakonec vede ostatní.",[1033,6625,6627],{"id":6626},"čtyři-úrovně-sae","Čtyři úrovně SAE",[1041,6629,6630,6647],{},[1044,6631,6632],{},[1047,6633,6634,6636,6639,6641,6644],{},[1050,6635,6487],{},[1050,6637,6638],{},"Příznak",[1050,6640,5116],{},[1050,6642,6643],{},"Metody",[1050,6645,6646],{},"Časový rámec",[1060,6648,6649,6669,6689,6709],{},[1047,6650,6651,6657,6660,6663,6666],{},[1065,6652,6653,6656],{},[1068,6654,6655],{},"Awareness"," (povědomí)",[1065,6658,6659],{},"„Co\"",[1065,6661,6662],{},"Rozpoznávání",[1065,6664,6665],{},"Média, videa, plakáty",[1065,6667,6668],{},"Krátkodobý",[1047,6670,6671,6677,6680,6683,6686],{},[1065,6672,6673,6676],{},[1068,6674,6675],{},"Training"," (výcvik)",[1065,6678,6679],{},"„Jak\"",[1065,6681,6682],{},"Dovednosti",[1065,6684,6685],{},"Přednášky, případovky, cvičení",[1065,6687,6688],{},"Střednědobý",[1047,6690,6691,6697,6700,6703,6706],{},[1065,6692,6693,6696],{},[1068,6694,6695],{},"Education"," (vzdělávání)",[1065,6698,6699],{},"„Proč\"",[1065,6701,6702],{},"Porozumění",[1065,6704,6705],{},"Semináře, diskuze, výzkum",[1065,6707,6708],{},"Dlouhodobý",[1047,6710,6711,6716,6718,6721,6724],{},[1065,6712,6713],{},[1068,6714,6715],{},"Professional Development",[1065,6717,2401],{},[1065,6719,6720],{},"Profesní rozvoj",[1065,6722,6723],{},"Certifikace, konference",[1065,6725,6726],{},"Průběžný",[1033,6728,6730],{"id":6729},"sae-plán-11-kroků","SAE plán (11 kroků)",[3378,6732,6733,6736,6739,6742,6745,6748,6751,6754,6757,6760,6763],{},[3000,6734,6735],{},"Role a odpovědnosti v programu",[3000,6737,6738],{},"Stanovení cílů pro každou fázi",[3000,6740,6741],{},"Rozdělení uživatelů (analýza)",[3000,6743,6744],{},"Vytvoření školících materiálů dle skupin",[3000,6746,6747],{},"Určení cíle pro každou skupinu",[3000,6749,6750],{},"Témata pro každou relaci\u002Fkurz",[3000,6752,6753],{},"Metody nasazení (metodiky)",[3000,6755,6756],{},"Dokumentace a zpětná vazba",[3000,6758,6759],{},"Vyhodnocení a aktualizace materiálů",[3000,6761,6762],{},"Četnost opakování",[3000,6764,6765],{},"Kalkulace",[1033,6767,6769],{"id":6768},"modely-řízení","Modely řízení",[2997,6771,6772,6778,6784],{},[3000,6773,6774,6777],{},[1068,6775,6776],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[3000,6779,6780,6783],{},[1068,6781,6782],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[3000,6785,6786,6789],{},[1068,6787,6788],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[1033,6791,6793],{"id":6792},"doporučená-témata-dle-vyhlášky-č-4092025-sb","Doporučená témata dle vyhlášky č. 409\u002F2025 Sb.",[1015,6795,6796],{},"Vyhláška o bezpečnostních opatřeních poskytovatele regulované služby v režimu vyšších povinností (prováděcí předpis k novému ZKB č. 264\u002F2025 Sb. — transpozice NIS2; účinná od 1. 11. 2025). Příloha č. 6 obsahuje doporučená témata SAE: bezpečné chování na internetu, rozpoznání phishingu a sociálního inženýrství, práce s hesly a vícefaktorová autentizace, klasifikace informací, hlášení incidentů, BYOD, cloud, firewall, malware, VPN, šifrování, zálohování, fyzická bezpečnost, mobilní zařízení.",[1033,6798,6800],{"id":6799},"matice-školení-nist-sp-500-172","Matice školení (NIST SP 500-172)",[1015,6802,6803],{},"Mapuje role v organizaci na požadované úrovně znalostí a dovedností v oblasti informační bezpečnosti — od běžného uživatele přes IT správce a manažery až po bezpečnostní specialisty.",[1033,6805,6807],{"id":6806},"rozšíření-na-dodavatelský-řetězec","Rozšíření na dodavatelský řetězec",[1015,6809,6810],{},"SAE se netýká jen interních zaměstnanců — zahrnuje i dodavatele, partnery a třetí strany s přístupem k informačním systémům. Smluvně lze požadovat doložení absolvovaného školení.",[1033,6812,6814],{"id":6813},"související-certifikace-isaca","Související certifikace ISACA",[1015,6816,6817,6818,6820,6821,6823,6824,6826,6827,6829],{},"Pro profesionály v oblasti SAE a bezpečnostního řízení: ",[1068,6819,2850],{}," (Certified Information Security Manager), ",[1068,6822,2837],{}," (Certified Information Systems Auditor), ",[1068,6825,2862],{}," (Certified in Risk and Information Systems Control), ",[1068,6828,2874],{}," (Certified in Governance of Enterprise IT).",[1033,6831,2995],{"id":2994},[2997,6833,6834,6840,6846,6852],{},[3000,6835,6836,6839],{},[1019,6837,1082],{"className":6838,"dataFsResolvedFilePath":2333,"href":2332},[1022]," — SAE jako součást provozní bezpečnosti",[3000,6841,6842,6845],{},[1019,6843,3772],{"className":6844,"dataFsResolvedFilePath":3770,"href":3771},[1022]," — povědomí jako obrana č. 1",[3000,6847,6848,6851],{},[1019,6849,1114],{"className":6850,"dataFsResolvedFilePath":3028,"href":3027},[1022]," — snižování rizika lidského faktoru",[3000,6853,6854,3782],{},[1019,6855,6859],{"className":6856,"dataFsResolvedFilePath":6857,"href":6858},[1022],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","Záznam přednášky SAE",{"title":3039,"searchDepth":145,"depth":145,"links":6861},[6862,6863,6864,6865,6866,6867,6868,6869,6870],{"id":6619,"depth":145,"text":6620},{"id":6626,"depth":145,"text":6627},{"id":6729,"depth":145,"text":6730},{"id":6768,"depth":145,"text":6769},{"id":6792,"depth":145,"text":6793},{"id":6799,"depth":145,"text":6800},{"id":6806,"depth":145,"text":6807},{"id":6813,"depth":145,"text":6814},{"id":2994,"depth":145,"text":2995},[5],{},"\u002Ftopics\u002Fsae",{"title":6587,"description":3039},[3062],"topics\u002Fsae",[5,307,165,321,47,658],"9ygPXUfrcjQxY_kfJ3wM_ro1kNaCShu4p8WUZC4FYmI",[6880,6882],{"slug":5,"path":1023,"title":6,"snippet":6881},"… ]] — nařízení (EU) 2016\u002F679, DPIA, Privacy by Design, ISO 27701 ## Referenční výstupy - \u003C\u003Cimork-normy-prehled>> — rodina ISO 27000, NIST SP 800, EU regulace (GDPR, NIS2, DORA, MiCA), české předpisy (ZK …",{"slug":6883,"path":3012,"title":6884,"snippet":6885},"imork-glosar","ImorK — Glosář pojmů a zkratek","… y, krátká definice, odkaz na stránku s plným výkladem*. Pro normy a regulace primárně viz \u003C\u003Cimork-normy-prehled>> — tady jsou jen zařazeny pro hledání v Ctrl-F. ## Čísla \u002F Numerické - **5G** — Pátá gen …",[6887,6888,6889,6893,6896],{"slug":6883,"title":6884,"path":3012,"sharedTags":100},{"slug":37,"title":4559,"path":2332,"sharedTags":100},{"slug":6890,"title":6891,"path":6892,"sharedTags":100},"imork-detail-predmetu","Management oborových řešení — Detail předmětu","\u002Fwiki\u002Fimork-detail-predmetu",{"slug":6894,"title":6895,"path":4992,"sharedTags":100},"imork-manazerska-bezpecnost","Manažerská informační bezpečnost",{"slug":6897,"title":6898,"path":5505,"sharedTags":100},"imork-sprava-login","Správa přihlašování — případová studie",1777893162913]