[{"data":1,"prerenderedAt":4651},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-ochrana-dat":1626,"course-stats-imork":2325,"course-topics-imork":2329,"backlinks-imork-ochrana-dat":4628,"related-imork-ochrana-dat":4641},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2324},{"id":1628,"title":369,"body":1629,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2311,"navigation":664,"path":2312,"seo":2313,"sources":2314,"stem":2316,"tags":2317,"type":2322,"updated":677,"__hash__":2323},"summaries\u002Fsummaries\u002Fimork-ochrana-dat.md",{"type":9,"value":1630,"toc":2282},[1631,1634,1638,1652,1656,1730,1734,1737,1741,1761,1765,1768,1772,1798,1802,1806,1809,1823,1826,1830,1833,1837,1840,1844,1894,1898,1901,1905,1908,1912,1915,1919,1922,1926,1958,1962,1965,2020,2032,2036,2117,2121,2124,2128,2131,2135,2161,2165,2168,2172,2179,2183,2201,2205,2211,2231,2235,2238],[12,1632,369],{"id":1633},"ochrana-dat",[115,1635,1637],{"id":1636},"oblasti-ochrany-dat","Oblasti ochrany dat",[120,1639,1640,1646],{},[123,1641,1642,1645],{},[38,1643,1644],{},"Interní infrastruktura"," — ochrana dat uvnitř organizace",[123,1647,1648,1651],{},[38,1649,1650],{},"Internet\u002Fkyberprostor"," — ochrana dat při přenosu a v cloudu",[115,1653,1655],{"id":1654},"typy-zneužití-dat","Typy zneužití dat",[16,1657,1658,1668],{},[19,1659,1660],{},[22,1661,1662,1665],{},[25,1663,1664],{},"Typ",[25,1666,1667],{},"Popis",[30,1669,1670,1680,1690,1700,1710,1720],{},[22,1671,1672,1677],{},[35,1673,1674],{},[38,1675,1676],{},"Šifrování",[35,1678,1679],{},"Ransomware — zašifrování dat, požadavek výkupného",[22,1681,1682,1687],{},[35,1683,1684],{},[38,1685,1686],{},"Publikace",[35,1688,1689],{},"Double ransomware — hrozba zveřejnění",[22,1691,1692,1697],{},[35,1693,1694],{},[38,1695,1696],{},"Odposlech",[35,1698,1699],{},"Zachycení komunikace",[22,1701,1702,1707],{},[35,1703,1704],{},[38,1705,1706],{},"Krádež",[35,1708,1709],{},"Exfiltrace dat",[22,1711,1712,1717],{},[35,1713,1714],{},[38,1715,1716],{},"Krádež v dodavatelském řetězci",[35,1718,1719],{},"Triple ransomware — útok přes dodavatele",[22,1721,1722,1727],{},[35,1723,1724],{},[38,1725,1726],{},"Prodej",[35,1728,1729],{},"Prodej ukradených dat na dark webu",[115,1731,1733],{"id":1732},"_10-principů-hrozeb-pro-databáze","10 principů hrozeb pro databáze",[724,1735,1736],{},"Systematický přehled bezpečnostních hrozeb cílících na databázové systémy.",[115,1738,1740],{"id":1739},"statistiky-čr","Statistiky ČR",[120,1742,1743,1749,1755],{},[123,1744,1745,1748],{},[38,1746,1747],{},"34 %"," — zranitelnosti softwaru",[123,1750,1751,1754],{},[38,1752,1753],{},"27 %"," — úniky z mobilních zařízení",[123,1756,1757,1760],{},[38,1758,1759],{},"26 %"," — náhodné úniky zaměstnanců",[115,1762,1764],{"id":1763},"open-data-institute-odi","Open Data Institute (ODI)",[724,1766,1767],{},"Varování před riziky otevřených dat — nesprávné anonymizace, re-identifikace, zneužití.",[115,1769,1771],{"id":1770},"bezpečnost-ipv6","Bezpečnost IPv6",[120,1773,1774,1780,1786,1792],{},[123,1775,1776,1779],{},[38,1777,1778],{},"AH"," (Authentication Header) — autentizace a integrita paketů",[123,1781,1782,1785],{},[38,1783,1784],{},"ESP"," (Encapsulating Security Payload) — šifrování + autentizace",[123,1787,1788,1791],{},[38,1789,1790],{},"SPD"," (Security Policy Database) — pravidla pro zpracování paketů",[123,1793,1794,1797],{},[38,1795,1796],{},"Security Associations"," — parametry bezpečnostního spojení",[115,1799,1801],{"id":1800},"_7-bezpečnostních-technologií","7 bezpečnostních technologií",[198,1803,1805],{"id":1804},"_1-nac-network-access-control","1. NAC (Network Access Control)",[724,1807,1808],{},"Řízení přístupu k síti — 4 fáze:",[152,1810,1811,1814,1817,1820],{},[123,1812,1813],{},"Identifikace zařízení",[123,1815,1816],{},"Autentizace uživatele",[123,1818,1819],{},"Posouzení stavu (compliance check)",[123,1821,1822],{},"Autorizace\u002Fkaranténa",[724,1824,1825],{},"Funkční schéma: agent → policy server → enforcement point.",[198,1827,1829],{"id":1828},"_2-ids-intrusion-detection-system","2. IDS (Intrusion Detection System)",[724,1831,1832],{},"Pasivní detekce průniků — monitoruje provoz a generuje alerty.",[198,1834,1836],{"id":1835},"_3-ips-intrusion-prevention-system","3. IPS (Intrusion Prevention System)",[724,1838,1839],{},"Aktivní prevence průniků — detekuje a automaticky blokuje hrozby.",[198,1841,1843],{"id":1842},"ids-vs-ips","IDS vs. IPS",[16,1845,1846,1859],{},[19,1847,1848],{},[22,1849,1850,1853,1856],{},[25,1851,1852],{},"Vlastnost",[25,1854,1855],{},"IDS",[25,1857,1858],{},"IPS",[30,1860,1861,1872,1883],{},[22,1862,1863,1866,1869],{},[35,1864,1865],{},"Režim",[35,1867,1868],{},"Pasivní (kopie provozu)",[35,1870,1871],{},"In-line (provoz prochází)",[22,1873,1874,1877,1880],{},[35,1875,1876],{},"Reakce",[35,1878,1879],{},"Alert",[35,1881,1882],{},"Blokace",[22,1884,1885,1888,1891],{},[35,1886,1887],{},"Dopad na síť",[35,1889,1890],{},"Žádný",[35,1892,1893],{},"Možná latence",[198,1895,1897],{"id":1896},"_4-siem-security-information-and-event-management","4. SIEM (Security Information and Event Management)",[724,1899,1900],{},"Centrální sběr a korelace bezpečnostních událostí.",[198,1902,1904],{"id":1903},"_5-dlp-data-loss-prevention","5. DLP (Data Loss Prevention)",[724,1906,1907],{},"Prevence úniku dat — monitorování a blokování neoprávněného přenosu citlivých dat.",[198,1909,1911],{"id":1910},"_6-šifrování","6. Šifrování",[724,1913,1914],{},"Kryptografická ochrana dat at-rest i in-transit.",[198,1916,1918],{"id":1917},"_7-utm-unified-threat-management","7. UTM (Unified Threat Management)",[724,1920,1921],{},"Jednotná správa hrozeb — FW + IDS\u002FIPS + AV + VPN v jednom zařízení.",[198,1923,1925],{"id":1924},"siem-podrobně","SIEM podrobně",[120,1927,1928,1934,1940,1946,1952],{},[123,1929,1930,1933],{},[38,1931,1932],{},"EPS"," (Events Per Second) — klíčová metrika pro dimenzování SIEM",[123,1935,1936,1939],{},[38,1937,1938],{},"Velikost logů"," — plánování úložné kapacity dle objemu generovaných dat",[123,1941,1942,1945],{},[38,1943,1944],{},"Typy zařízení"," — síťové prvky, servery, aplikace, bezpečnostní systémy, endpointy",[123,1947,1948,1951],{},[38,1949,1950],{},"Implementace"," — začít s nejkritičtějšími zdroji logů, postupně rozšiřovat",[123,1953,1954,1957],{},[38,1955,1956],{},"Provozní příručka + BCM"," — dokumentace provozu SIEM a jeho zahrnutí do plánů kontinuity",[198,1959,1961],{"id":1960},"dlp-podrobně","DLP podrobně",[724,1963,1964],{},"Tři stavy dat:",[16,1966,1967,1979],{},[19,1968,1969],{},[22,1970,1971,1974,1976],{},[25,1972,1973],{},"Stav",[25,1975,1667],{},[25,1977,1978],{},"Ochrana",[30,1980,1981,1994,2007],{},[22,1982,1983,1988,1991],{},[35,1984,1985],{},[38,1986,1987],{},"Data in Use",[35,1989,1990],{},"Data aktivně zpracovávaná na endpointu",[35,1992,1993],{},"DLP koncových bodů",[22,1995,1996,2001,2004],{},[35,1997,1998],{},[38,1999,2000],{},"Data in Motion",[35,2002,2003],{},"Data přenášená po síti",[35,2005,2006],{},"Síťový DLP (gateway)",[22,2008,2009,2014,2017],{},[35,2010,2011],{},[38,2012,2013],{},"Data at Rest",[35,2015,2016],{},"Data uložená na discích, v databázích",[35,2018,2019],{},"Šifrování, řízení přístupu",[120,2021,2022,2027],{},[123,2023,2024,2026],{},[38,2025,2006],{}," — monitorování a blokování na úrovni síťového perimetru",[123,2028,2029,2031],{},[38,2030,1993],{}," — agent na stanici, kontrola USB, tisku, schránky, emailu",[198,2033,2035],{"id":2034},"kryptografie","Kryptografie",[16,2037,2038,2053],{},[19,2039,2040],{},[22,2041,2042,2045,2048,2050],{},[25,2043,2044],{},"Algoritmus",[25,2046,2047],{},"Rok",[25,2049,1664],{},[25,2051,2052],{},"Délka klíče",[30,2054,2055,2071,2086,2102],{},[22,2056,2057,2062,2065,2068],{},[35,2058,2059],{},[38,2060,2061],{},"DES",[35,2063,2064],{},"1975",[35,2066,2067],{},"Symetrický (blokový)",[35,2069,2070],{},"64-bit (efektivních 56)",[22,2072,2073,2078,2081,2083],{},[35,2074,2075],{},[38,2076,2077],{},"IDEA",[35,2079,2080],{},"1990",[35,2082,2067],{},[35,2084,2085],{},"128-bit",[22,2087,2088,2093,2096,2099],{},[35,2089,2090],{},[38,2091,2092],{},"RSA",[35,2094,2095],{},"1977 (MIT)",[35,2097,2098],{},"Asymetrický",[35,2100,2101],{},"1024–4096 bit",[22,2103,2104,2109,2112,2114],{},[35,2105,2106],{},[38,2107,2108],{},"AES",[35,2110,2111],{},"1997 (NIST)",[35,2113,2067],{},[35,2115,2116],{},"128\u002F192\u002F256-bit",[198,2118,2120],{"id":2119},"steganografie","Steganografie",[724,2122,2123],{},"Skrytí informace ve zdánlivě neškodné zprávě — na rozdíl od kryptografie nezakrývá obsah, ale samotnou existenci tajné komunikace. Využití v obrázcích, zvuku, videu.",[198,2125,2127],{"id":2126},"digitální-podpisy","Digitální podpisy",[724,2129,2130],{},"Ověření autora a integrity dokumentu pomocí asymetrické kryptografie.",[198,2132,2134],{"id":2133},"_4-vlastnosti-elektronického-podpisu","4 vlastnosti elektronického podpisu",[152,2136,2137,2143,2149,2155],{},[123,2138,2139,2142],{},[38,2140,2141],{},"Identifikace"," — jednoznačné určení podepisující osoby",[123,2144,2145,2148],{},[38,2146,2147],{},"Integrita"," — detekce jakékoli změny dokumentu po podpisu",[123,2150,2151,2154],{},[38,2152,2153],{},"Nepopiratelnost"," — autor nemůže popřít, že dokument podepsal",[123,2156,2157,2160],{},[38,2158,2159],{},"Nenapodobitelnost"," — podpis nelze padělat",[198,2162,2164],{"id":2163},"hašovací-funkce","Hašovací funkce",[724,2166,2167],{},"Jednosměrná funkce vytvářející otisk (hash) dokumentu — základ pro ověření integrity.",[198,2169,2171],{"id":2170},"kvalifikovaný-certifikát-v-čr","Kvalifikovaný certifikát v ČR",[724,2173,2174,2175,2178],{},"V ČR existují ",[38,2176,2177],{},"3 akreditované certifikační autority"," pro vydávání kvalifikovaných certifikátů pro elektronický podpis.",[115,2180,2182],{"id":2181},"dynamický-biometrický-podpis","Dynamický biometrický podpis",[120,2184,2185,2191,2198],{},[123,2186,2187,2190],{},[38,2188,2189],{},"ISO\u002FIEC 24745"," — ochrana biometrických šablon",[123,2192,2193,2194,2197],{},"Zachycení unikátní ",[38,2195,2196],{},"biometrické stopy"," — tlak, rychlost, sklon pera, dynamika podpisu",[123,2199,2200],{},"Každý podpis je jedinečný i při opakování — nelze jednoduše napodobit",[115,2202,2204],{"id":2203},"eidas","eIDAS",[724,2206,2207,2210],{},[38,2208,2209],{},"Nařízení EU č. 910\u002F2014"," o elektronické identifikaci a službách vytvářejících důvěru:",[120,2212,2213,2219,2225],{},[123,2214,2215,2218],{},[38,2216,2217],{},"Elektronické pečetě"," — ověření původu a integrity dokumentů právnických osob",[123,2220,2221,2224],{},[38,2222,2223],{},"Časová razítka"," — důkaz o existenci dokumentu v určitém čase",[123,2226,2227,2230],{},[38,2228,2229],{},"Služby vytvářející důvěru"," — certifikační autority, doručovací služby",[115,2232,2234],{"id":2233},"enisa-data-protection-engineering","ENISA Data Protection Engineering",[724,2236,2237],{},"Doporučení agentury ENISA pro technickou ochranu osobních údajů:",[120,2239,2240,2246,2252,2258,2264,2270,2276],{},[123,2241,2242,2245],{},[38,2243,2244],{},"Privacy by Design \u002F Default"," — ochrana soukromí zabudovaná do návrhu systému",[123,2247,2248,2251],{},[38,2249,2250],{},"DPIA"," (Data Protection Impact Assessment) — posouzení vlivu na ochranu údajů",[123,2253,2254,2257],{},[38,2255,2256],{},"PET"," (Privacy Enhancing Technologies) — technologie pro zvýšení soukromí",[123,2259,2260,2263],{},[38,2261,2262],{},"Anonymizace"," — nevratné odstranění identifikátorů",[123,2265,2266,2269],{},[38,2267,2268],{},"Differential privacy"," — matematický rámec pro sdílení statistik bez odhalení jednotlivců",[123,2271,2272,2275],{},[38,2273,2274],{},"TEE"," (Trusted Execution Environment) — bezpečné prostředí pro zpracování citlivých dat",[123,2277,2278,2281],{},[38,2279,2280],{},"Synthetic data"," — generovaná data zachovávající statistické vlastnosti bez osobních údajů",{"title":641,"searchDepth":642,"depth":642,"links":2283},[2284,2285,2286,2287,2288,2289,2290,2308,2309,2310],{"id":1636,"depth":642,"text":1637},{"id":1654,"depth":642,"text":1655},{"id":1732,"depth":642,"text":1733},{"id":1739,"depth":642,"text":1740},{"id":1763,"depth":642,"text":1764},{"id":1770,"depth":642,"text":1771},{"id":1800,"depth":642,"text":1801,"children":2291},[2292,2293,2294,2295,2296,2297,2298,2299,2300,2301,2302,2303,2304,2305,2306,2307],{"id":1804,"depth":649,"text":1805},{"id":1828,"depth":649,"text":1829},{"id":1835,"depth":649,"text":1836},{"id":1842,"depth":649,"text":1843},{"id":1896,"depth":649,"text":1897},{"id":1903,"depth":649,"text":1904},{"id":1910,"depth":649,"text":1911},{"id":1917,"depth":649,"text":1918},{"id":1924,"depth":649,"text":1925},{"id":1960,"depth":649,"text":1961},{"id":2034,"depth":649,"text":2035},{"id":2119,"depth":649,"text":2120},{"id":2126,"depth":649,"text":2127},{"id":2133,"depth":649,"text":2134},{"id":2163,"depth":649,"text":2164},{"id":2170,"depth":649,"text":2171},{"id":2181,"depth":642,"text":2182},{"id":2203,"depth":642,"text":2204},{"id":2233,"depth":642,"text":2234},{},"\u002Fsummaries\u002Fimork-ochrana-dat",{"title":369,"description":641},[2315],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","summaries\u002Fimork-ochrana-dat",[658,1633,2318,2319,2320,2321,2034,2203],"sifrovani","nac","ids","dlp","summary","RzeZLSOFDZgAo7cf1c3CqPOUUvYUtKIgkz1ECMlq3Ss","summaries",{"zapisku":1624,"topics":2326,"summaries":2327,"outputs":2328},6,35,0,[2330,2819,3316,3763,4031,4381],{"id":2331,"title":2332,"body":2333,"course":659,"courses":2803,"created":660,"description":641,"extension":661,"meta":2804,"navigation":664,"path":2805,"seo":2806,"sources":2807,"stem":2810,"tags":2811,"type":2817,"updated":677,"__hash__":2818},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2334,"toc":2790},[2335,2338,2347,2350,2354,2447,2451,2505,2509,2532,2536,2625,2629,2632,2636,2713,2717,2743,2747,2767,2776],[12,2336,2332],{"id":2337},"bcm-řízení-kontinuity-činnosti",[724,2339,2340],{},[2341,2342],"img",{"alt":2343,"className":2344,"src":2346},"bcm-rpo-rto",[210,2345],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2348,2349],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2351,2353],{"id":2352},"klíčové-pojmy","Klíčové pojmy",[16,2355,2356,2368],{},[19,2357,2358],{},[22,2359,2360,2363,2366],{},[25,2361,2362],{},"Pojem",[25,2364,2365],{},"Anglicky",[25,2367,1667],{},[30,2369,2370,2383,2395,2408,2421,2434],{},[22,2371,2372,2377,2380],{},[35,2373,2374],{},[38,2375,2376],{},"BCMS",[35,2378,2379],{},"Business Continuity Management System",[35,2381,2382],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2384,2385,2389,2392],{},[35,2386,2387],{},[38,2388,384],{},[35,2390,2391],{},"Business Continuity Management",[35,2393,2394],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2396,2397,2402,2405],{},[35,2398,2399],{},[38,2400,2401],{},"BIA",[35,2403,2404],{},"Business Impact Analysis",[35,2406,2407],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2409,2410,2415,2418],{},[35,2411,2412],{},[38,2413,2414],{},"MBCO",[35,2416,2417],{},"Minimum Business Continuity Objective",[35,2419,2420],{},"Minimální přijatelná úroveň služeb",[22,2422,2423,2428,2431],{},[35,2424,2425],{},[38,2426,2427],{},"RPO",[35,2429,2430],{},"Recovery Point Objective",[35,2432,2433],{},"Do jakého bodu v minulosti lze obnovit data",[22,2435,2436,2441,2444],{},[35,2437,2438],{},[38,2439,2440],{},"RTO",[35,2442,2443],{},"Recovery Time Objective",[35,2445,2446],{},"Čas potřebný pro obnovu provozu",[115,2448,2450],{"id":2449},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2452,2453,2463],{},[19,2454,2455],{},[22,2456,2457,2460],{},[25,2458,2459],{},"Fáze",[25,2461,2462],{},"Obsah",[30,2464,2465,2475,2485,2495],{},[22,2466,2467,2472],{},[35,2468,2469],{},[38,2470,2471],{},"Plan",[35,2473,2474],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2476,2477,2482],{},[35,2478,2479],{},[38,2480,2481],{},"Do",[35,2483,2484],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2486,2487,2492],{},[35,2488,2489],{},[38,2490,2491],{},"Check",[35,2493,2494],{},"Monitoring, audit, přezkoumání managementem",[22,2496,2497,2502],{},[35,2498,2499],{},[38,2500,2501],{},"Act",[35,2503,2504],{},"Nápravná opatření, neustálé zlepšování",[115,2506,2508],{"id":2507},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2510,2511,2514,2517,2520,2523,2526,2529],{},[123,2512,2513],{},"Kap. 4 — kontext organizace",[123,2515,2516],{},"Kap. 5 — vedení (leadership)",[123,2518,2519],{},"Kap. 6 — plánování (BIA, rizika)",[123,2521,2522],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2524,2525],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2527,2528],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2530,2531],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2533,2535],{"id":2534},"analýza-steeple","Analýza STEEPLE",[16,2537,2538,2548],{},[19,2539,2540],{},[22,2541,2542,2545],{},[25,2543,2544],{},"Faktor",[25,2546,2547],{},"Oblast",[30,2549,2550,2561,2572,2583,2593,2604,2615],{},[22,2551,2552,2558],{},[35,2553,2554,2557],{},[38,2555,2556],{},"S","ociální",[35,2559,2560],{},"Zaměstnanost, bezpečnost, komunity",[22,2562,2563,2569],{},[35,2564,2565,2568],{},[38,2566,2567],{},"T","echnologický",[35,2570,2571],{},"Závislost na technologiích",[22,2573,2574,2580],{},[35,2575,2576,2579],{},[38,2577,2578],{},"E","konomický",[35,2581,2582],{},"Ekonomická situace, finanční instituce",[22,2584,2585,2590],{},[35,2586,2587,2589],{},[38,2588,2578],{},"tický",[35,2591,2592],{},"Podnikatelská etika, média, veřejnost",[22,2594,2595,2601],{},[35,2596,2597,2600],{},[38,2598,2599],{},"P","olitický",[35,2602,2603],{},"Politický systém, hrozba nepokojů",[22,2605,2606,2612],{},[35,2607,2608,2611],{},[38,2609,2610],{},"L","egislativní",[35,2613,2614],{},"Předpisy, zákony",[22,2616,2617,2622],{},[35,2618,2619,2621],{},[38,2620,2578],{},"nvironmentální",[35,2623,2624],{},"Životní prostředí, přírodní hrozby",[115,2626,2628],{"id":2627},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2630,2631],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2633,2635],{"id":2634},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2637,2638,2647],{},[19,2639,2640],{},[22,2641,2642,2645],{},[25,2643,2644],{},"Tier",[25,2646,1667],{},[30,2648,2649,2657,2665,2673,2681,2689,2697,2705],{},[22,2650,2651,2654],{},[35,2652,2653],{},"0",[35,2655,2656],{},"Žádná off-site data",[22,2658,2659,2662],{},[35,2660,2661],{},"1",[35,2663,2664],{},"Fyzická záloha + cold site",[22,2666,2667,2670],{},[35,2668,2669],{},"2",[35,2671,2672],{},"Fyzická záloha + hot site",[22,2674,2675,2678],{},[35,2676,2677],{},"3",[35,2679,2680],{},"Elektronický trezor (electronic vaulting)",[22,2682,2683,2686],{},[35,2684,2685],{},"4",[35,2687,2688],{},"Point-in-time recovery",[22,2690,2691,2694],{},[35,2692,2693],{},"5",[35,2695,2696],{},"Two-site commit (kontinuální přenos)",[22,2698,2699,2702],{},[35,2700,2701],{},"6",[35,2703,2704],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2706,2707,2710],{},[35,2708,2709],{},"7",[35,2711,2712],{},"Automatizovaná obnova (AI monitoring)",[198,2714,2716],{"id":2715},"cloud-dr","Cloud DR",[120,2718,2719,2725,2731,2737],{},[123,2720,2721,2724],{},[38,2722,2723],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2726,2727,2730],{},[38,2728,2729],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2732,2733,2736],{},[38,2734,2735],{},"Hot DR"," — paralelní řešení v tandemu",[123,2738,2739,2742],{},[38,2740,2741],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2744,2746],{"id":2745},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2748,2749,2755,2761],{},[123,2750,2751,2754],{},[207,2752,140],{"className":2753,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2756,2757,2760],{},[207,2758,569],{"className":2759,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2762,2763,2766],{},[207,2764,578],{"className":2765,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2768,2770,2771],{"id":2769},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2772,43],{"className":2773,"dataFsResolvedFilePath":2774,"href":2775},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2777,2778,2784],{},[123,2779,2780],{},[207,2781,2783],{"className":2782,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2785,2786],{},[207,2787,2789],{"className":2788,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2791},[2792,2793,2794,2795,2796,2800,2801],{"id":2352,"depth":642,"text":2353},{"id":2449,"depth":642,"text":2450},{"id":2507,"depth":642,"text":2508},{"id":2534,"depth":642,"text":2535},{"id":2627,"depth":642,"text":2628,"children":2797},[2798,2799],{"id":2634,"depth":649,"text":2635},{"id":2715,"depth":649,"text":2716},{"id":2745,"depth":642,"text":2746},{"id":2769,"depth":642,"text":2802},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2332,"description":641},[2808,2809],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2812,2813,2814,2815,2816],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2820,"title":2821,"body":2822,"course":659,"courses":3303,"created":660,"description":641,"extension":661,"meta":3304,"navigation":664,"path":3305,"seo":3306,"sources":3307,"stem":3310,"tags":3311,"type":2817,"updated":677,"__hash__":3315},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2823,"toc":3288},[2824,2827,2834,2841,2844,2848,2913,2917,2921,2980,2984,3004,3008,3012,3113,3117,3140,3144,3166,3170,3177,3233,3235,3266,3271],[12,2825,2821],{"id":2826},"isms-systém-řízení-bezpečnosti-informací",[724,2828,2829],{},[2341,2830],{"alt":2831,"className":2832,"src":2833},"isms-pdca-cyklus",[210,2345],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2835,2836],{},[2341,2837],{"alt":2838,"className":2839,"src":2840},"isms-oborova-mapa",[210,2345],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2842,2843],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2845,2847],{"id":2846},"základní-pilíře","Základní pilíře",[16,2849,2850,2861],{},[19,2851,2852],{},[22,2853,2854,2857,2859],{},[25,2855,2856],{},"Pilíř",[25,2858,2365],{},[25,2860,1667],{},[30,2862,2863,2876,2888,2901],{},[22,2864,2865,2870,2873],{},[35,2866,2867],{},[38,2868,2869],{},"Důvěrnost",[35,2871,2872],{},"Confidentiality",[35,2874,2875],{},"Přístup pouze oprávněným osobám",[22,2877,2878,2882,2885],{},[35,2879,2880],{},[38,2881,2147],{},[35,2883,2884],{},"Integrity",[35,2886,2887],{},"Ochrana před neoprávněnou změnou",[22,2889,2890,2895,2898],{},[35,2891,2892],{},[38,2893,2894],{},"Dostupnost",[35,2896,2897],{},"Availability",[35,2899,2900],{},"Systémy a data dostupné v potřebný čas",[22,2902,2903,2907,2910],{},[35,2904,2905],{},[38,2906,2153],{},[35,2908,2909],{},"Non-repudiation",[35,2911,2912],{},"Prokázání autorství akce",[115,2914,2916],{"id":2915},"normativní-rámec","Normativní rámec",[198,2918,2920],{"id":2919},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2922,2923,2929,2935,2946,2952,2962,2971],{},[123,2924,2925,2928],{},[38,2926,2927],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2930,2931,2934],{},[38,2932,2933],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2936,2937,2940,2941,2945],{},[38,2938,2939],{},"ISO\u002FIEC 27005"," — ",[207,2942,2944],{"className":2943,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2947,2948,2951],{},[38,2949,2950],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2953,2954,2957,2958],{},[38,2955,2956],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2959,2961],{"className":2960,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2963,2964,2957,2967],{},[38,2965,2966],{},"ISO\u002FIEC 27019",[207,2968,2970],{"className":2969,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2972,2973,2957,2976],{},[38,2974,2975],{},"ISO\u002FIEC 27799",[207,2977,2979],{"className":2978,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2981,2983],{"id":2982},"další-rámce","Další rámce",[120,2985,2986,2992,2998],{},[123,2987,2988,2991],{},[38,2989,2990],{},"NIST"," — americké standardy (SP 800 řada)",[123,2993,2994,2997],{},[38,2995,2996],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2999,3000,3003],{},[38,3001,3002],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,3005,3007],{"id":3006},"governance-řízení","Governance (řízení)",[198,3009,3011],{"id":3010},"bezpečnostní-role","Bezpečnostní role",[16,3013,3014,3026],{},[19,3015,3016],{},[22,3017,3018,3021,3023],{},[25,3019,3020],{},"Role",[25,3022,40],{},[25,3024,3025],{},"Odpovědnost",[30,3027,3028,3039,3050,3061,3072,3083,3093,3103],{},[22,3029,3030,3033,3036],{},[35,3031,3032],{},"Chief Information Officer",[35,3034,3035],{},"CIO",[35,3037,3038],{},"Celkové řízení ICT",[22,3040,3041,3044,3047],{},[35,3042,3043],{},"Chief Information Security Officer",[35,3045,3046],{},"CISO",[35,3048,3049],{},"Řízení informační bezpečnosti",[22,3051,3052,3055,3058],{},[35,3053,3054],{},"Chief Technology Officer",[35,3056,3057],{},"CTO",[35,3059,3060],{},"Technologická strategie",[22,3062,3063,3066,3069],{},[35,3064,3065],{},"IS Security Officer",[35,3067,3068],{},"ISSO",[35,3070,3071],{},"Bezpečnost IS",[22,3073,3074,3077,3080],{},[35,3075,3076],{},"Manažer KB",[35,3078,3079],{},"—",[35,3081,3082],{},"Odpovědný za ISMS",[22,3084,3085,3088,3090],{},[35,3086,3087],{},"Architekt KB",[35,3089,3079],{},[35,3091,3092],{},"Návrh a implementace opatření",[22,3094,3095,3098,3100],{},[35,3096,3097],{},"Auditor KB",[35,3099,3079],{},[35,3101,3102],{},"Provádění auditů",[22,3104,3105,3108,3110],{},[35,3106,3107],{},"Garant aktiva",[35,3109,3079],{},[35,3111,3112],{},"Rozvoj, použití a bezpečnost aktiva",[198,3114,3116],{"id":3115},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,3118,3119,3125,3134],{},[123,3120,3121,3124],{},[38,3122,3123],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,3126,3127,3130,3131],{},[38,3128,3129],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3132,240],{"className":3133,"dataFsResolvedFilePath":585,"href":586},[210],[123,3135,3136,3139],{},[38,3137,3138],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3141,3143],{"id":3142},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3145,3146,3151,3156,3161],{},[123,3147,3148,3150],{},[38,3149,2471],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3152,3153,3155],{},[38,3154,2481],{}," — implementace opatření, řízení rizik",[123,3157,3158,3160],{},[38,3159,2491],{}," — monitorování, audit, přezkoumání",[123,3162,3163,3165],{},[38,3164,2501],{}," — nápravná opatření, neustálé zlepšování",[115,3167,3169],{"id":3168},"oborová-řešení-isms","Oborová řešení ISMS",[724,3171,3172,3173,3176],{},"Kurz ",[207,3174,43],{"className":3175,"dataFsResolvedFilePath":2774,"href":2775},[210]," pokrývá ISMS specifika pro:",[120,3178,3179,3185,3191,3198,3204,3211,3217,3223,3228],{},[123,3180,3181],{},[207,3182,3184],{"className":3183,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3186,3187,3190],{},[207,3188,282],{"className":3189,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3192,3193,3197],{},[207,3194,3196],{"className":3195,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3199,3200,3203],{},[207,3201,300],{"className":3202,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3205,3206,3210],{},[207,3207,3209],{"className":3208,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3212,3213,3216],{},[207,3214,318],{"className":3215,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3218,3219,3222],{},[207,3220,327],{"className":3221,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3224,3225],{},[207,3226,336],{"className":3227,"dataFsResolvedFilePath":334,"href":335},[210],[123,3229,3230],{},[207,3231,273],{"className":3232,"dataFsResolvedFilePath":271,"href":272},[210],[115,3234,2746],{"id":2745},[120,3236,3237,3243,3248,3254,3260],{},[123,3238,3239,3242],{},[207,3240,569],{"className":3241,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3244,3245,587],{},[207,3246,240],{"className":3247,"dataFsResolvedFilePath":585,"href":586},[210],[123,3249,3250,3253],{},[207,3251,384],{"className":3252,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3255,3256,3259],{},[207,3257,578],{"className":3258,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3261,3262,3265],{},[207,3263,369],{"className":3264,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3267,2770,3268],{"id":2769},[207,3269,43],{"className":3270,"dataFsResolvedFilePath":2774,"href":2775},[210],[120,3272,3273,3278,3283],{},[123,3274,3275],{},[207,3276,222],{"className":3277,"dataFsResolvedFilePath":220,"href":221},[210],[123,3279,3280],{},[207,3281,249],{"className":3282,"dataFsResolvedFilePath":247,"href":248},[210],[123,3284,3285],{},[207,3286,231],{"className":3287,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3289},[3290,3291,3295,3299,3300,3301,3302],{"id":2846,"depth":642,"text":2847},{"id":2915,"depth":642,"text":2916,"children":3292},[3293,3294],{"id":2919,"depth":649,"text":2920},{"id":2982,"depth":649,"text":2983},{"id":3006,"depth":642,"text":3007,"children":3296},[3297,3298],{"id":3010,"depth":649,"text":3011},{"id":3115,"depth":649,"text":3116},{"id":3142,"depth":642,"text":3143},{"id":3168,"depth":642,"text":3169},{"id":2745,"depth":642,"text":2746},{"id":2769,"depth":642,"text":2802},[658],{},"\u002Ftopics\u002Fisms",{"title":2821,"description":641},[3308,3309,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3312,3313,672,3314],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3317,"title":578,"body":3318,"course":659,"courses":3748,"created":660,"description":641,"extension":661,"meta":3749,"navigation":664,"path":3750,"seo":3751,"sources":3752,"stem":3755,"tags":3756,"type":2817,"updated":677,"__hash__":3762},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3319,"toc":3734},[3320,3323,3330,3337,3341,3379,3383,3387,3428,3432,3439,3442,3468,3472,3489,3493,3524,3528,3596,3600,3603,3620,3624,3660,3662,3699,3704],[12,3321,578],{"id":3322},"kybernetická-bezpečnost",[724,3324,3325],{},[2341,3326],{"alt":3327,"className":3328,"src":3329},"kb-defense-in-depth",[210,2345],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3331,3332,3333,3336],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3334,140],{"className":3335,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3338,3340],{"id":3339},"základní-pojmy","Základní pojmy",[120,3342,3343,3349,3355,3361,3367,3373],{},[123,3344,3345,3348],{},[38,3346,3347],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3350,3351,3354],{},[38,3352,3353],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3356,3357,3360],{},[38,3358,3359],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3362,3363,3366],{},[38,3364,3365],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3368,3369,3372],{},[38,3370,3371],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3374,3375,3378],{},[38,3376,3377],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3380,3382],{"id":3381},"typy-útoků","Typy útoků",[198,3384,3386],{"id":3385},"podle-cílení","Podle cílení",[16,3388,3389,3400],{},[19,3390,3391],{},[22,3392,3393,3395,3397],{},[25,3394,1664],{},[25,3396,1667],{},[25,3398,3399],{},"Cíl",[30,3401,3402,3415],{},[22,3403,3404,3409,3412],{},[35,3405,3406],{},[38,3407,3408],{},"Plošný",[35,3410,3411],{},"Útočníkovi je jedno, kdo je obětí",[35,3413,3414],{},"Botnety, spam, ransomware",[22,3416,3417,3422,3425],{},[35,3418,3419],{},[38,3420,3421],{},"Cílený (APT)",[35,3423,3424],{},"Soustředěná pozornost na konkrétní cíl",[35,3426,3427],{},"Špionáž, sabotáž, krádež dat",[198,3429,3431],{"id":3430},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3433,3434],{},[2341,3435],{"alt":3436,"className":3437,"src":3438},"apt-faze-utoku",[210,2345],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3440,3441],{},"4 fáze:",[152,3443,3444,3450,3456,3462],{},[123,3445,3446,3449],{},[38,3447,3448],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3451,3452,3455],{},[38,3453,3454],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3457,3458,3461],{},[38,3459,3460],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3463,3464,3467],{},[38,3465,3466],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3469,3471],{"id":3470},"základní-vektory-útoku","Základní vektory útoku",[120,3473,3474,3477,3480,3483,3486],{},[123,3475,3476],{},"Email s přílohou (spear phishing)",[123,3478,3479],{},"Trojanizované aplikace",[123,3481,3482],{},"Drive-by download (webové exploity)",[123,3484,3485],{},"Výměnná média (BadUSB)",[123,3487,3488],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3490,3492],{"id":3491},"software-útoky","Software útoky",[120,3494,3495,3501,3507,3513,3518],{},[123,3496,3497,3500],{},[38,3498,3499],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3502,3503,3506],{},[38,3504,3505],{},"Viry"," — poškození HW\u002FSW",[123,3508,3509,3512],{},[38,3510,3511],{},"Trojské koně"," — skrytá funkčnost",[123,3514,3515,3517],{},[38,3516,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3519,3520,3523],{},[38,3521,3522],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3525,3527],{"id":3526},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3529,3530,3542],{},[19,3531,3532],{},[22,3533,3534,3537,3539],{},[25,3535,3536],{},"Útok",[25,3538,3399],{},[25,3540,3541],{},"Efekt",[30,3543,3544,3555,3565,3576,3586],{},[22,3545,3546,3549,3552],{},[35,3547,3548],{},"Content Spoofing",[35,3550,3551],{},"Klient",[35,3553,3554],{},"Ztráta přihlašovacích údajů",[22,3556,3557,3560,3562],{},[35,3558,3559],{},"XSS",[35,3561,3551],{},[35,3563,3564],{},"Přístup k cookies",[22,3566,3567,3570,3573],{},[35,3568,3569],{},"SQL Injection",[35,3571,3572],{},"Server",[35,3574,3575],{},"Neoprávněný přístup do DB",[22,3577,3578,3581,3583],{},[35,3579,3580],{},"DoS\u002FDDoS",[35,3582,3572],{},[35,3584,3585],{},"Nedostupnost služby",[22,3587,3588,3591,3593],{},[35,3589,3590],{},"Path Traversal",[35,3592,3572],{},[35,3594,3595],{},"Přístup k souborům",[115,3597,3599],{"id":3598},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3601,3602],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3604,3605,3608,3611,3614,3617],{},[123,3606,3607],{},"Vydávání se za právníka",[123,3609,3610],{},"Podvod na CEO",[123,3612,3613],{},"Krádež dat (personální oddělení)",[123,3615,3616],{},"Kompromitace účtu",[123,3618,3619],{},"Falešné faktury",[115,3621,3623],{"id":3622},"obranné-technologie","Obranné technologie",[120,3625,3626,3632,3637,3642,3648,3654],{},[123,3627,3628,3631],{},[38,3629,3630],{},"NAC"," — řízení přístupu k síti",[123,3633,3634,3636],{},[38,3635,1855],{}," — detekce průniku (pasivní)",[123,3638,3639,3641],{},[38,3640,1858],{}," — prevence průniku (aktivní, in-line)",[123,3643,3644,3647],{},[38,3645,3646],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3649,3650,3653],{},[38,3651,3652],{},"DLP"," — prevence úniku dat",[123,3655,3656,3659],{},[38,3657,3658],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3661,2746],{"id":2745},[120,3663,3664,3670,3676,3682,3693],{},[123,3665,3666,3669],{},[207,3667,140],{"className":3668,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3671,3672,3675],{},[207,3673,569],{"className":3674,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3677,3678,3681],{},[207,3679,240],{"className":3680,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3683,3684,3687,3688,3692],{},[207,3685,384],{"className":3686,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3689,3691],{"className":3690,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3694,3695,3698],{},[207,3696,369],{"className":3697,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3700,2770,3701],{"id":2769},[207,3702,43],{"className":3703,"dataFsResolvedFilePath":2774,"href":2775},[210],[120,3705,3706,3712,3717,3722,3727],{},[123,3707,3708],{},[207,3709,3711],{"className":3710,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3713,3714],{},[207,3715,417],{"className":3716,"dataFsResolvedFilePath":415,"href":416},[210],[123,3718,3719],{},[207,3720,351],{"className":3721,"dataFsResolvedFilePath":349,"href":350},[210],[123,3723,3724],{},[207,3725,426],{"className":3726,"dataFsResolvedFilePath":424,"href":425},[210],[123,3728,3729],{},[207,3730,458],{"className":3731,"dataFsResolvedFilePath":3732,"href":3733},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3735},[3736,3737,3743,3744,3745,3746,3747],{"id":3339,"depth":642,"text":3340},{"id":3381,"depth":642,"text":3382,"children":3738},[3739,3740,3741,3742],{"id":3385,"depth":649,"text":3386},{"id":3430,"depth":649,"text":3431},{"id":3470,"depth":649,"text":3471},{"id":3491,"depth":649,"text":3492},{"id":3526,"depth":642,"text":3527},{"id":3598,"depth":642,"text":3599},{"id":3622,"depth":642,"text":3623},{"id":2745,"depth":642,"text":2746},{"id":2769,"depth":642,"text":2802},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3753,3754,3308],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3757,3758,3759,3760,3761],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3764,"title":369,"body":3765,"course":659,"courses":4019,"created":660,"description":641,"extension":661,"meta":4020,"navigation":664,"path":4021,"seo":4022,"sources":4023,"stem":4026,"tags":4027,"type":2817,"updated":677,"__hash__":4030},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3766,"toc":4005},[3767,3769,3776,3779,3783,3840,3844,3848,3859,3863,3874,3878,3886,3890,3901,3905,3910,3913,3924,3928,3946,3948,3980,3985],[12,3768,369],{"id":1633},[724,3770,3771],{},[2341,3772],{"alt":3773,"className":3774,"src":3775},"ochrana-dat-technologie",[210,2345],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3777,3778],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3780,3782],{"id":3781},"formy-zneužití-dat","Formy zneužití dat",[16,3784,3785,3794],{},[19,3786,3787],{},[22,3788,3789,3792],{},[25,3790,3791],{},"Forma",[25,3793,1667],{},[30,3795,3796,3803,3811,3818,3825,3833],{},[22,3797,3798,3801],{},[35,3799,3800],{},"Zašifrování",[35,3802,435],{},[22,3804,3805,3808],{},[35,3806,3807],{},"Zveřejnění",[35,3809,3810],{},"Double ransomware",[22,3812,3813,3815],{},[35,3814,1696],{},[35,3816,3817],{},"Pasivní sběr dat",[22,3819,3820,3822],{},[35,3821,1706],{},[35,3823,3824],{},"Cílená exfiltrace",[22,3826,3827,3830],{},[35,3828,3829],{},"Krádež dodavatelského řetězce",[35,3831,3832],{},"Triple ransomware",[22,3834,3835,3837],{},[35,3836,1726],{},[35,3838,3839],{},"Darknet marketplace",[115,3841,3843],{"id":3842},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3845,3847],{"id":3846},"nac-network-access-control","NAC (Network Access Control)",[120,3849,3850,3853,3856],{},[123,3851,3852],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3854,3855],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3857,3858],{},"Ekvivalenty: MDM, BYOD",[198,3860,3862],{"id":3861},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3864,3865,3868,3871],{},[123,3866,3867],{},"Monitoruje síťový provoz, generuje alerty",[123,3869,3870],{},"Pasivní systém — nezasahuje do provozu",[123,3872,3873],{},"Signaturová a anomální detekce",[198,3875,3877],{"id":3876},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3879,3880,3883],{},[123,3881,3882],{},"Aktivní systém — blokuje škodlivý provoz",[123,3884,3885],{},"Zařazen přímo do síťové cesty (in-line)",[198,3887,3889],{"id":3888},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3891,3892,3895,3898],{},[123,3893,3894],{},"Centralizovaná správa bezpečnostních logů",[123,3896,3897],{},"Sběr s agentem i bez agenta",[123,3899,3900],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3902,3904],{"id":3903},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3906,3907],{},[123,3908,3909],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3911,1676],{"id":3912},"šifrování",[120,3914,3915,3918,3921],{},[123,3916,3917],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3919,3920],{},"RSA (2048+ bit), DSS",[123,3922,3923],{},"SHA-256, SHA-1",[115,3925,3927],{"id":3926},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3929,3930,3935,3940,3943],{},[123,3931,3932,3934],{},[38,3933,1778],{}," (Authentication Header) — ověření odesílatele a integrity",[123,3936,3937,3939],{},[38,3938,1784],{}," (Encapsulating Security Payload) — šifrování dat",[123,3941,3942],{},"Transportní a tunelovací režim",[123,3944,3945],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3947,2746],{"id":2745},[120,3949,3950,3956,3962,3968,3974],{},[123,3951,3952,3955],{},[207,3953,140],{"className":3954,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3957,3958,3961],{},[207,3959,578],{"className":3960,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3963,3964,3967],{},[207,3965,569],{"className":3966,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3969,3970,3973],{},[207,3971,351],{"className":3972,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3975,3976,3979],{},[207,3977,360],{"className":3978,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3981,2770,3982],{"id":2769},[207,3983,43],{"className":3984,"dataFsResolvedFilePath":2774,"href":2775},[210],[120,3986,3987,3993,3999],{},[123,3988,3989],{},[207,3990,3992],{"className":3991,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3994,3995],{},[207,3996,3998],{"className":3997,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,4000,4001],{},[207,4002,4004],{"className":4003,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":4006},[4007,4008,4016,4017,4018],{"id":3781,"depth":642,"text":3782},{"id":3842,"depth":642,"text":3843,"children":4009},[4010,4011,4012,4013,4014,4015],{"id":3846,"depth":649,"text":3847},{"id":3861,"depth":649,"text":3862},{"id":3876,"depth":649,"text":3877},{"id":3888,"depth":649,"text":3889},{"id":3903,"depth":649,"text":3904},{"id":3912,"depth":649,"text":1676},{"id":3926,"depth":642,"text":3927},{"id":2745,"depth":642,"text":2746},{"id":2769,"depth":642,"text":2802},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[2315,4024,4025],"raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,1633,2318,2319,2320,4028,2321,4029],"ips","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":4032,"title":569,"body":4033,"course":659,"courses":4368,"created":660,"description":641,"extension":661,"meta":4369,"navigation":664,"path":4370,"seo":4371,"sources":4372,"stem":4373,"tags":4374,"type":2817,"updated":677,"__hash__":4380},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":4034,"toc":4357},[4035,4038,4045,4052,4056,4120,4124,4174,4178,4183,4202,4206,4209,4213,4227,4231,4259,4263,4312,4314,4339,4344],[12,4036,569],{"id":4037},"řízení-rizik",[724,4039,4040],{},[2341,4041],{"alt":4042,"className":4043,"src":4044},"rizeni-rizik-proces",[210,2345],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,4046,4047,4048,4051],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,4049,140],{"className":4050,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,4053,4055],{"id":4054},"normativní-základ","Normativní základ",[16,4057,4058,4068],{},[19,4059,4060],{},[22,4061,4062,4065],{},[25,4063,4064],{},"Norma",[25,4066,4067],{},"Zaměření",[30,4069,4070,4080,4090,4100,4110],{},[22,4071,4072,4077],{},[35,4073,4074],{},[38,4075,4076],{},"ISO 31000:2019",[35,4078,4079],{},"Obecné smrnice pro management rizik",[22,4081,4082,4087],{},[35,4083,4084],{},[38,4085,4086],{},"ISO 31010:2020",[35,4088,4089],{},"Techniky posuzování rizik",[22,4091,4092,4097],{},[35,4093,4094],{},[38,4095,4096],{},"ISO\u002FIEC 27005:2019",[35,4098,4099],{},"Řízení rizik bezpečnosti informací",[22,4101,4102,4107],{},[35,4103,4104],{},[38,4105,4106],{},"NIST SP 800-30",[35,4108,4109],{},"Průvodce hodnocením rizik",[22,4111,4112,4117],{},[35,4113,4114],{},[38,4115,4116],{},"NIST SP 800-39",[35,4118,4119],{},"Proces řízení bezpečnostních rizik",[115,4121,4123],{"id":4122},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4125,4126,4132,4138,4144,4150,4156,4162,4168],{},[123,4127,4128,4131],{},[38,4129,4130],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4133,4134,4137],{},[38,4135,4136],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4139,4140,4143],{},[38,4141,4142],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4145,4146,4149],{},[38,4147,4148],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4151,4152,4155],{},[38,4153,4154],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4157,4158,4161],{},[38,4159,4160],{},"Akceptace rizik"," — formální rozhodnutí",[123,4163,4164,4167],{},[38,4165,4166],{},"Komunikace"," — sdílení informací o rizicích",[123,4169,4170,4173],{},[38,4171,4172],{},"Monitorování"," — průběžné přezkoumávání",[115,4175,4177],{"id":4176},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4179,4180],{},[38,4181,4182],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4184,4185,4191,4196],{},[123,4186,4187,4190],{},[38,4188,4189],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4192,4193,4195],{},[38,4194,3359],{}," — slabé místo aktiva (stupnice 1–5)",[123,4197,4198,4201],{},[38,4199,4200],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4203,4205],{"id":4204},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4207,4208],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4210,4212],{"id":4211},"klíčové-dokumenty","Klíčové dokumenty",[120,4214,4215,4221],{},[123,4216,4217,4220],{},[38,4218,4219],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4222,4223,4226],{},[38,4224,4225],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4228,4230],{"id":4229},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4232,4233,4239,4244,4249,4254],{},[123,4234,4235,4238],{},[38,4236,4237],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4240,4241,4243],{},[38,4242,3076],{}," — odpovědný za ISMS",[123,4245,4246,4248],{},[38,4247,3087],{}," — návrh a implementace opatření",[123,4250,4251,4253],{},[38,4252,3097],{}," — provádění auditů",[123,4255,4256,4258],{},[38,4257,3107],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4260,4262],{"id":4261},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4264,4265,4277],{},[19,4266,4267],{},[22,4268,4269,4272,4274],{},[25,4270,4271],{},"Úroveň",[25,4273,4067],{},[25,4275,4276],{},"Typ rizika",[30,4278,4279,4290,4301],{},[22,4280,4281,4284,4287],{},[35,4282,4283],{},"Stupeň 1",[35,4285,4286],{},"Organizace",[35,4288,4289],{},"Strategické riziko",[22,4291,4292,4295,4298],{},[35,4293,4294],{},"Stupeň 2",[35,4296,4297],{},"Poslání\u002Fobchodní procesy",[35,4299,4300],{},"Taktické riziko",[22,4302,4303,4306,4309],{},[35,4304,4305],{},"Stupeň 3",[35,4307,4308],{},"Informační systémy",[35,4310,4311],{},"Operační riziko",[115,4313,2746],{"id":2745},[120,4315,4316,4322,4328,4334],{},[123,4317,4318,4321],{},[207,4319,140],{"className":4320,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4323,4324,4327],{},[207,4325,384],{"className":4326,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4329,4330,4333],{},[207,4331,393],{"className":4332,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4335,4336,3961],{},[207,4337,578],{"className":4338,"dataFsResolvedFilePath":576,"href":577},[210],[115,4340,2770,4341],{"id":2769},[207,4342,43],{"className":4343,"dataFsResolvedFilePath":2774,"href":2775},[210],[120,4345,4346,4352],{},[123,4347,4348],{},[207,4349,4351],{"className":4350,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4353,4354],{},[207,4355,222],{"className":4356,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4358},[4359,4360,4361,4362,4363,4364,4365,4366,4367],{"id":4054,"depth":642,"text":4055},{"id":4122,"depth":642,"text":4123},{"id":4176,"depth":642,"text":4177},{"id":4204,"depth":642,"text":4205},{"id":4211,"depth":642,"text":4212},{"id":4229,"depth":642,"text":4230},{"id":4261,"depth":642,"text":4262},{"id":2745,"depth":642,"text":2746},{"id":2769,"depth":642,"text":2802},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3309,3308],"topics\u002Frizeni-rizik",[658,4375,4376,4377,4378,4379],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4382,"title":4383,"body":4384,"course":659,"courses":4615,"created":660,"description":641,"extension":661,"meta":4616,"navigation":664,"path":4617,"seo":4618,"sources":4619,"stem":4621,"tags":4622,"type":2817,"updated":677,"__hash__":4627},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4385,"toc":4607},[4386,4389,4396,4399,4403,4502,4506,4541,4545,4565,4569,4572,4574,4594,4599],[12,4387,4383],{"id":4388},"sae-budování-bezpečnostního-povědomí",[724,4390,4391],{},[2341,4392],{"alt":4393,"className":4394,"src":4395},"sae-pyramida",[210,2345],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4397,4398],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4400,4402],{"id":4401},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4404,4405,4422],{},[19,4406,4407],{},[22,4408,4409,4411,4414,4416,4419],{},[25,4410,4271],{},[25,4412,4413],{},"Příznak",[25,4415,3399],{},[25,4417,4418],{},"Metody",[25,4420,4421],{},"Časový rámec",[30,4423,4424,4444,4464,4484],{},[22,4425,4426,4432,4435,4438,4441],{},[35,4427,4428,4431],{},[38,4429,4430],{},"Awareness"," (povědomí)",[35,4433,4434],{},"„Co\"",[35,4436,4437],{},"Rozpoznávání",[35,4439,4440],{},"Média, videa, plakáty",[35,4442,4443],{},"Krátkodobý",[22,4445,4446,4452,4455,4458,4461],{},[35,4447,4448,4451],{},[38,4449,4450],{},"Training"," (výcvik)",[35,4453,4454],{},"„Jak\"",[35,4456,4457],{},"Dovednosti",[35,4459,4460],{},"Přednášky, případovky, cvičení",[35,4462,4463],{},"Střednědobý",[22,4465,4466,4472,4475,4478,4481],{},[35,4467,4468,4471],{},[38,4469,4470],{},"Education"," (vzdělávání)",[35,4473,4474],{},"„Proč\"",[35,4476,4477],{},"Porozumění",[35,4479,4480],{},"Semináře, diskuze, výzkum",[35,4482,4483],{},"Dlouhodobý",[22,4485,4486,4491,4493,4496,4499],{},[35,4487,4488],{},[38,4489,4490],{},"Professional Development",[35,4492,3079],{},[35,4494,4495],{},"Profesní rozvoj",[35,4497,4498],{},"Certifikace, konference",[35,4500,4501],{},"Průběžný",[115,4503,4505],{"id":4504},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4507,4508,4511,4514,4517,4520,4523,4526,4529,4532,4535,4538],{},[123,4509,4510],{},"Role a odpovědnosti v programu",[123,4512,4513],{},"Stanovení cílů pro každou fázi",[123,4515,4516],{},"Rozdělení uživatelů (analýza)",[123,4518,4519],{},"Vytvoření školících materiálů dle skupin",[123,4521,4522],{},"Určení cíle pro každou skupinu",[123,4524,4525],{},"Témata pro každou relaci\u002Fkurz",[123,4527,4528],{},"Metody nasazení (metodiky)",[123,4530,4531],{},"Dokumentace a zpětná vazba",[123,4533,4534],{},"Vyhodnocení a aktualizace materiálů",[123,4536,4537],{},"Četnost opakování",[123,4539,4540],{},"Kalkulace",[115,4542,4544],{"id":4543},"modely-řízení","Modely řízení",[120,4546,4547,4553,4559],{},[123,4548,4549,4552],{},[38,4550,4551],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4554,4555,4558],{},[38,4556,4557],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4560,4561,4564],{},[38,4562,4563],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4566,4568],{"id":4567},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4570,4571],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4573,2746],{"id":2745},[120,4575,4576,4582,4588],{},[123,4577,4578,4581],{},[207,4579,140],{"className":4580,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4583,4584,4587],{},[207,4585,578],{"className":4586,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4589,4590,4593],{},[207,4591,569],{"className":4592,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4595,2770,4596],{"id":2769},[207,4597,43],{"className":4598,"dataFsResolvedFilePath":2774,"href":2775},[210],[120,4600,4601],{},[123,4602,4603],{},[207,4604,4606],{"className":4605,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4608},[4609,4610,4611,4612,4613,4614],{"id":4401,"depth":642,"text":4402},{"id":4504,"depth":642,"text":4505},{"id":4543,"depth":642,"text":4544},{"id":4567,"depth":642,"text":4568},{"id":2745,"depth":642,"text":2746},{"id":2769,"depth":642,"text":2802},[658],{},"\u002Ftopics\u002Fsae",{"title":4383,"description":641},[4620],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4623,4624,4625,4378,4626],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4629,4631,4635,4639],{"slug":658,"path":2775,"title":7,"snippet":4630},"… n, XSS, Solid - Bezpečnost emailu — SPF, DKIM, DMARC, S\u002FMIME, šifrování - \u003C\u003Cimork-ochrana-dat>> — NAC, IDS\u002FIPS, SIEM, DLP, IPv6 ### Kontinuita a obnova - BCM — ISO 22301, …",{"slug":4632,"path":545,"title":4633,"snippet":4634},"imork-digitalni-identita","Digitální identita a digitální stopa","… erealizovatelné** — lze pouze minimalizovat (např. TOR) ## Propojení s dalšími tématy - \u003C\u003Cimork-ochrana-dat>> — technologie ochrany osobních údajů - Bezpečnost webu — online identita a …",{"slug":4636,"path":3733,"title":4637,"snippet":4638},"imork-pripadovky","Případové studie — ImorK","… vaná verze 2025 ### Krádež dat (2109) - Scénáře krádeže dat v organizacích - Propojení s \u003C\u003Cimork-ochrana-dat>> ### Řízený hacking (2201) - Penetrační testování a etický hacking - Metodiky a nástroje …",{"slug":1633,"path":602,"title":369,"snippet":4640},"… mork-email|Bezpečnost emailu]] — emailové protokoly ## Zdroje v kurzu ImorK - \u003C\u003Cimork-ochrana-dat>> - Bezpečnost webových služeb - Bezpečnost emailových služeb …",[4642,4643,4645,4648],{"slug":1633,"title":369,"path":602,"sharedTags":2326},{"slug":4644,"title":4004,"path":359,"sharedTags":642},"imork-email",{"slug":4646,"title":4647,"path":476,"sharedTags":642},"imork-kradez-dat","Případovka: Ochrana osobních údajů — Krádež dat",{"slug":4649,"title":4650,"path":503,"sharedTags":642},"imork-tor","TOR — The Onion Router",1777154960630]