[{"data":1,"prerenderedAt":4560},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-ransomware":1626,"course-stats-imork":2227,"course-topics-imork":2231,"backlinks-imork-ransomware":4541,"related-imork-ransomware":4552},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2226},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2211,"navigation":664,"path":2212,"seo":2213,"sources":2214,"stem":2216,"tags":2217,"type":2224,"updated":677,"__hash__":2225},"summaries\u002Fsummaries\u002Fimork-ransomware.md","Ransomware — komplexní případová studie",{"type":9,"value":1631,"toc":2195},[1632,1635,1644,1647,1651,1765,1769,1796,1800,1804,1860,1864,1882,1886,1911,1915,1939,1943,1946,2027,2031,2063,2067,2090,2094,2121,2125,2146,2150],[12,1633,1629],{"id":1634},"ransomware-komplexní-případová-studie",[724,1636,1637],{},[1638,1639],"img",{"alt":1640,"className":1641,"src":1643},"imork-ransomware-kill-chain",[210,1642],"wikilink-broken","\u002Fwiki-assets\u002Fimork-ransomware-kill-chain.jpeg",[724,1645,1646],{},"Rozsáhlá prezentace (56 slidů) pokrývající historii, techniky, ekonomiku a obranu proti ransomware útokům.",[115,1648,1650],{"id":1649},"historie-ransomware-19892024","Historie ransomware (1989–2024)",[16,1652,1653,1665],{},[19,1654,1655],{},[22,1656,1657,1660,1662],{},[25,1658,1659],{},"Rok",[25,1661,435],{},[25,1663,1664],{},"Význam",[30,1666,1667,1680,1693,1706,1723,1735,1752],{},[22,1668,1669,1672,1677],{},[35,1670,1671],{},"1989",[35,1673,1674],{},[38,1675,1676],{},"AIDS Trojan",[35,1678,1679],{},"První známý ransomware — šířen na disketách",[22,1681,1682,1685,1690],{},[35,1683,1684],{},"2004",[35,1686,1687],{},[38,1688,1689],{},"GPCode",[35,1691,1692],{},"Šifrování RSA klíčem",[22,1694,1695,1698,1703],{},[35,1696,1697],{},"2013",[35,1699,1700],{},[38,1701,1702],{},"CryptoLocker",[35,1704,1705],{},"Průlomový — Bitcoin platby, silné šifrování",[22,1707,1708,1711,1716],{},[35,1709,1710],{},"2017",[35,1712,1713],{},[38,1714,1715],{},"WannaCry",[35,1717,1718,1719,1722],{},"Exploit ",[38,1720,1721],{},"EternalBlue"," (uniklý z NSA), 200 000+ obětí ve 150 zemích",[22,1724,1725,1727,1732],{},[35,1726,1710],{},[35,1728,1729],{},[38,1730,1731],{},"Petya \u002F NotPetya",[35,1733,1734],{},"Destruktivní wiper maskovaný jako ransomware",[22,1736,1737,1740,1745],{},[35,1738,1739],{},"2019",[35,1741,1742],{},[38,1743,1744],{},"Maze",[35,1746,1747,1748,1751],{},"Průkopník ",[38,1749,1750],{},"double extortion"," — šifrování + hrozba zveřejnění dat",[22,1753,1754,1757,1762],{},[35,1755,1756],{},"2021",[35,1758,1759],{},[38,1760,1761],{},"REvil",[35,1763,1764],{},"Masivní útoky na dodavatelské řetězce (Kaseya)",[115,1766,1768],{"id":1767},"ransomware-as-a-service-raas","Ransomware-as-a-Service (RaaS)",[120,1770,1771,1777,1783,1789],{},[123,1772,1773,1776],{},[38,1774,1775],{},"Obchodní model"," — vývojáři pronajímají ransomware afiliátům za podíl z výkupného",[123,1778,1779,1782],{},[38,1780,1781],{},"Double extortion"," — šifrování dat + hrozba jejich zveřejnění",[123,1784,1785,1788],{},[38,1786,1787],{},"Triple extortion"," — navíc DDoS útok na oběť nebo kontaktování zákazníků oběti",[123,1790,1791,1792],{},"Propojení s ",[207,1793,1795],{"className":1794,"href":443,"dataFsResolvedFilePath":442},[210],"organizovaným kybernetickým zločinem",[115,1797,1799],{"id":1798},"významné-případy-20212024","Významné případy 2021–2024",[198,1801,1803],{"id":1802},"_2021-rok-velkých-útoků","2021 — Rok velkých útoků",[16,1805,1806,1819],{},[19,1807,1808],{},[22,1809,1810,1813,1816],{},[25,1811,1812],{},"Případ",[25,1814,1815],{},"Výkupné",[25,1817,1818],{},"Detail",[30,1820,1821,1834,1847],{},[22,1822,1823,1828,1831],{},[35,1824,1825],{},[38,1826,1827],{},"Colonial Pipeline",[35,1829,1830],{},"$4,4M",[35,1832,1833],{},"Odstávka největšího palivovodu v USA",[22,1835,1836,1841,1844],{},[35,1837,1838],{},[38,1839,1840],{},"JBS Foods",[35,1842,1843],{},"$11M",[35,1845,1846],{},"Největší zpracovatel masa na světě",[22,1848,1849,1854,1857],{},[35,1850,1851],{},[38,1852,1853],{},"Kia Motors",[35,1855,1856],{},"$20M",[35,1858,1859],{},"Požadavek skupiny DoppelPaymer",[198,1861,1863],{"id":1862},"_2022-nové-trendy","2022 — Nové trendy",[120,1865,1866,1872],{},[123,1867,1868,1871],{},[38,1869,1870],{},"DeadBolt"," — cílení na QNAP NAS zařízení (domácnosti i firmy)",[123,1873,1874,1877,1878,1881],{},[38,1875,1876],{},"BlackCat \u002F ALPHV"," — triple extortion RaaS, napsaný v ",[38,1879,1880],{},"Rustu"," (první ransomware v tomto jazyce)",[198,1883,1885],{"id":1884},"_20232024-další-evoluce","2023–2024 — Další evoluce",[120,1887,1888,1899,1905],{},[123,1889,1890,1893,1894,1898],{},[38,1891,1892],{},"HardBit 2.0"," — útočníci žádají oběti o informace o pojistném krytí (",[207,1895,1897],{"className":1896,"href":568,"dataFsResolvedFilePath":567},[210],"pojistný podvod",")",[123,1900,1901,1904],{},[38,1902,1903],{},"Rorschach"," — nejrychlejší známé šifrování (dosud)",[123,1906,1907,1910],{},[38,1908,1909],{},"Phobos"," — varování CISA, cílení na SMB segment",[115,1912,1914],{"id":1913},"statistiky-a-ekonomika","Statistiky a ekonomika",[120,1916,1917,1923,1929,1936],{},[123,1918,1919,1922],{},[38,1920,1921],{},"75 %"," obětí, které zaplatí, získá data zpět",[123,1924,1925,1926],{},"Průměrné výkupné Q3\u002F2019: ",[38,1927,1928],{},"$41 000",[123,1930,1931,1932,1935],{},"Náklady na obnovu: ",[38,1933,1934],{},"7,5× výše výkupného"," (downtime, reputace, forenzní analýza)",[123,1937,1938],{},"Trend výkupného strmě stoupá — v roce 2021 průměr přes $200 000",[115,1940,1942],{"id":1941},"nistir-8374-rámec-obrany-proti-ransomware","NISTIR 8374 — rámec obrany proti ransomware",[724,1944,1945],{},"Založeno na NIST Cybersecurity Framework — 5 pilířů:",[16,1947,1948,1958],{},[19,1949,1950],{},[22,1951,1952,1955],{},[25,1953,1954],{},"Pilíř",[25,1956,1957],{},"Aktivity",[30,1959,1960,1976,1991,2001,2011],{},[22,1961,1962,1967],{},[35,1963,1964],{},[38,1965,1966],{},"Identify",[35,1968,1969,1970,1975],{},"Inventarizace aktiv, ",[207,1971,1974],{"className":1972,"href":1973},[210,1642],"\u002Fwiki\u002Frizeni-rizik\\","analýza rizik",", mapování procesů",[22,1977,1978,1983],{},[35,1979,1980],{},[38,1981,1982],{},"Protect",[35,1984,1985,1986],{},"Zálohy (pravidlo 3-2-1), segmentace, školení, ",[207,1987,1990],{"className":1988,"href":1989},[210,1642],"\u002Fwiki\u002Fisms\\","bezpečnostní politiky",[22,1992,1993,1998],{},[35,1994,1995],{},[38,1996,1997],{},"Detect",[35,1999,2000],{},"Monitoring, EDR\u002FXDR, analýza anomálií",[22,2002,2003,2008],{},[35,2004,2005],{},[38,2006,2007],{},"Respond",[35,2009,2010],{},"Incident response plán, komunikace, forenzní analýza",[22,2012,2013,2018],{},[35,2014,2015],{},[38,2016,2017],{},"Recover",[35,2019,2020,2021,2026],{},"Obnova ze záloh, ",[207,2022,2025],{"className":2023,"href":2024},[210,1642],"\u002Fwiki\u002Fbcm\\","kontinuita provozu",", poučení",[115,2028,2030],{"id":2029},"_9-krokový-plán-reakce-na-incident-ir","9-krokový plán reakce na incident (IR)",[152,2032,2033,2036,2039,2042,2045,2048,2054,2057,2060],{},[123,2034,2035],{},"Izolace napadených systémů",[123,2037,2038],{},"Identifikace varianty ransomware",[123,2040,2041],{},"Forenzní zajištění důkazů",[123,2043,2044],{},"Posouzení rozsahu napadení",[123,2046,2047],{},"Komunikace (vedení, právní, PR, regulátor)",[123,2049,2050,2051,1898],{},"Rozhodnutí o platbě (doporučení: ",[38,2052,2053],{},"neplatit",[123,2055,2056],{},"Obnova ze záloh",[123,2058,2059],{},"Monitoring — ověření, že útočník nemá stále přístup",[123,2061,2062],{},"Poučení a aktualizace bezpečnostních opatření",[115,2064,2066],{"id":2065},"proč-neplatit-výkupné","Proč neplatit výkupné",[120,2068,2069,2072,2075,2078,2084],{},[123,2070,2071],{},"Žádná záruka dešifrování",[123,2073,2074],{},"Financování dalšího zločinu",[123,2076,2077],{},"Opakované cílení na „platící\" oběti",[123,2079,2080,2083],{},[38,2081,2082],{},"Projekt No More Ransom"," (Europol + partneri) — bezplatné dešifrovací nástroje",[123,2085,2086,2089],{},[38,2087,2088],{},"Český trestní zákoník § 230"," — financování terorismu \u002F organizovaného zločinu",[115,2091,2093],{"id":2092},"pravidlo-3-2-1-pro-zálohy","Pravidlo 3-2-1 pro zálohy",[120,2095,2096,2102,2108,2114],{},[123,2097,2098,2101],{},[38,2099,2100],{},"3"," kopie dat",[123,2103,2104,2107],{},[38,2105,2106],{},"2"," různá úložná média",[123,2109,2110,2113],{},[38,2111,2112],{},"1"," kopie mimo pracoviště (offsite \u002F cloud)",[123,2115,2116,2117,2120],{},"Klíčové: zálohy musí být ",[38,2118,2119],{},"odpojené"," (air-gapped) — jinak je ransomware zašifruje také",[115,2122,2124],{"id":2123},"nástroje-obrany","Nástroje obrany",[120,2126,2127,2133,2139],{},[123,2128,2129,2132],{},[38,2130,2131],{},"Cybereason XDR"," — příklad platformy pro detekci a reakci napříč endpointy",[123,2134,2135,2138],{},[38,2136,2137],{},"NGFW"," — blokování C2 komunikace",[123,2140,2141,2145],{},[207,2142,2144],{"className":2143,"href":586,"dataFsResolvedFilePath":585},[210],"Bezpečnostní analýzy"," — pravidelné hodnocení zranitelností",[115,2147,2149],{"id":2148},"vazby-na-další-témata","Vazby na další témata",[120,2151,2152,2158,2164,2171,2177,2183,2189],{},[123,2153,2154,2157],{},[207,2155,426],{"className":2156,"href":425,"dataFsResolvedFilePath":424},[210]," — řetězec Emotet → Trickbot → Ryuk",[123,2159,2160,2163],{},[207,2161,444],{"className":2162,"href":443,"dataFsResolvedFilePath":442},[210]," — APT skupiny provozující RaaS",[123,2165,2166,2170],{},[207,2167,2169],{"className":2168,"href":503,"dataFsResolvedFilePath":502},[210],"TOR síť"," — distribuce ransomware přes Tor",[123,2172,2173,2176],{},[207,2174,384],{"className":2175,"href":594,"dataFsResolvedFilePath":593},[210]," — plán kontinuity po ransomware útoku",[123,2178,2179,2182],{},[207,2180,140],{"className":2181,"href":560,"dataFsResolvedFilePath":559},[210]," — preventivní bezpečnostní opatření",[123,2184,2185,2188],{},[207,2186,569],{"className":2187,"href":568,"dataFsResolvedFilePath":567},[210]," — pojištění kybernetických rizik",[123,2190,2191,2194],{},[207,2192,369],{"className":2193,"href":602,"dataFsResolvedFilePath":601},[210]," — zálohovací strategie",{"title":641,"searchDepth":642,"depth":642,"links":2196},[2197,2198,2199,2204,2205,2206,2207,2208,2209,2210],{"id":1649,"depth":642,"text":1650},{"id":1767,"depth":642,"text":1768},{"id":1798,"depth":642,"text":1799,"children":2200},[2201,2202,2203],{"id":1802,"depth":649,"text":1803},{"id":1862,"depth":649,"text":1863},{"id":1884,"depth":649,"text":1885},{"id":1913,"depth":642,"text":1914},{"id":1941,"depth":642,"text":1942},{"id":2029,"depth":642,"text":2030},{"id":2065,"depth":642,"text":2066},{"id":2092,"depth":642,"text":2093},{"id":2123,"depth":642,"text":2124},{"id":2148,"depth":642,"text":2149},{},"\u002Fsummaries\u002Fimork-ransomware",{"title":1629,"description":641},[2215],"raw\u002Fimork\u002FCV 06 VUT_Ransomware.pdf","summaries\u002Fimork-ransomware",[658,2218,2219,2220,2221,2222,2223],"ransomware","raas","wannacry","nistir-8374","incident-response","vykupne","summary","do-TmDt_AiR7vuiDGaXgkxXWNHW5CH4X-xOWO60-0Sg","summaries",{"zapisku":1624,"topics":2228,"summaries":2229,"outputs":2230},6,35,0,[2232,2717,3215,3664,3944,4294],{"id":2233,"title":2234,"body":2235,"course":659,"courses":2701,"created":660,"description":641,"extension":661,"meta":2702,"navigation":664,"path":2703,"seo":2704,"sources":2705,"stem":2708,"tags":2709,"type":2715,"updated":677,"__hash__":2716},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2236,"toc":2688},[2237,2240,2247,2250,2254,2348,2352,2406,2410,2433,2437,2526,2530,2533,2537,2611,2615,2641,2645,2665,2674],[12,2238,2234],{"id":2239},"bcm-řízení-kontinuity-činnosti",[724,2241,2242],{},[1638,2243],{"alt":2244,"className":2245,"src":2246},"bcm-rpo-rto",[210,1642],"\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2248,2249],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2251,2253],{"id":2252},"klíčové-pojmy","Klíčové pojmy",[16,2255,2256,2269],{},[19,2257,2258],{},[22,2259,2260,2263,2266],{},[25,2261,2262],{},"Pojem",[25,2264,2265],{},"Anglicky",[25,2267,2268],{},"Popis",[30,2270,2271,2284,2296,2309,2322,2335],{},[22,2272,2273,2278,2281],{},[35,2274,2275],{},[38,2276,2277],{},"BCMS",[35,2279,2280],{},"Business Continuity Management System",[35,2282,2283],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2285,2286,2290,2293],{},[35,2287,2288],{},[38,2289,384],{},[35,2291,2292],{},"Business Continuity Management",[35,2294,2295],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2297,2298,2303,2306],{},[35,2299,2300],{},[38,2301,2302],{},"BIA",[35,2304,2305],{},"Business Impact Analysis",[35,2307,2308],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2310,2311,2316,2319],{},[35,2312,2313],{},[38,2314,2315],{},"MBCO",[35,2317,2318],{},"Minimum Business Continuity Objective",[35,2320,2321],{},"Minimální přijatelná úroveň služeb",[22,2323,2324,2329,2332],{},[35,2325,2326],{},[38,2327,2328],{},"RPO",[35,2330,2331],{},"Recovery Point Objective",[35,2333,2334],{},"Do jakého bodu v minulosti lze obnovit data",[22,2336,2337,2342,2345],{},[35,2338,2339],{},[38,2340,2341],{},"RTO",[35,2343,2344],{},"Recovery Time Objective",[35,2346,2347],{},"Čas potřebný pro obnovu provozu",[115,2349,2351],{"id":2350},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2353,2354,2364],{},[19,2355,2356],{},[22,2357,2358,2361],{},[25,2359,2360],{},"Fáze",[25,2362,2363],{},"Obsah",[30,2365,2366,2376,2386,2396],{},[22,2367,2368,2373],{},[35,2369,2370],{},[38,2371,2372],{},"Plan",[35,2374,2375],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2377,2378,2383],{},[35,2379,2380],{},[38,2381,2382],{},"Do",[35,2384,2385],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2387,2388,2393],{},[35,2389,2390],{},[38,2391,2392],{},"Check",[35,2394,2395],{},"Monitoring, audit, přezkoumání managementem",[22,2397,2398,2403],{},[35,2399,2400],{},[38,2401,2402],{},"Act",[35,2404,2405],{},"Nápravná opatření, neustálé zlepšování",[115,2407,2409],{"id":2408},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2411,2412,2415,2418,2421,2424,2427,2430],{},[123,2413,2414],{},"Kap. 4 — kontext organizace",[123,2416,2417],{},"Kap. 5 — vedení (leadership)",[123,2419,2420],{},"Kap. 6 — plánování (BIA, rizika)",[123,2422,2423],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2425,2426],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2428,2429],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2431,2432],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2434,2436],{"id":2435},"analýza-steeple","Analýza STEEPLE",[16,2438,2439,2449],{},[19,2440,2441],{},[22,2442,2443,2446],{},[25,2444,2445],{},"Faktor",[25,2447,2448],{},"Oblast",[30,2450,2451,2462,2473,2484,2494,2505,2516],{},[22,2452,2453,2459],{},[35,2454,2455,2458],{},[38,2456,2457],{},"S","ociální",[35,2460,2461],{},"Zaměstnanost, bezpečnost, komunity",[22,2463,2464,2470],{},[35,2465,2466,2469],{},[38,2467,2468],{},"T","echnologický",[35,2471,2472],{},"Závislost na technologiích",[22,2474,2475,2481],{},[35,2476,2477,2480],{},[38,2478,2479],{},"E","konomický",[35,2482,2483],{},"Ekonomická situace, finanční instituce",[22,2485,2486,2491],{},[35,2487,2488,2490],{},[38,2489,2479],{},"tický",[35,2492,2493],{},"Podnikatelská etika, média, veřejnost",[22,2495,2496,2502],{},[35,2497,2498,2501],{},[38,2499,2500],{},"P","olitický",[35,2503,2504],{},"Politický systém, hrozba nepokojů",[22,2506,2507,2513],{},[35,2508,2509,2512],{},[38,2510,2511],{},"L","egislativní",[35,2514,2515],{},"Předpisy, zákony",[22,2517,2518,2523],{},[35,2519,2520,2522],{},[38,2521,2479],{},"nvironmentální",[35,2524,2525],{},"Životní prostředí, přírodní hrozby",[115,2527,2529],{"id":2528},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2531,2532],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2534,2536],{"id":2535},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2538,2539,2548],{},[19,2540,2541],{},[22,2542,2543,2546],{},[25,2544,2545],{},"Tier",[25,2547,2268],{},[30,2549,2550,2558,2565,2572,2579,2587,2595,2603],{},[22,2551,2552,2555],{},[35,2553,2554],{},"0",[35,2556,2557],{},"Žádná off-site data",[22,2559,2560,2562],{},[35,2561,2112],{},[35,2563,2564],{},"Fyzická záloha + cold site",[22,2566,2567,2569],{},[35,2568,2106],{},[35,2570,2571],{},"Fyzická záloha + hot site",[22,2573,2574,2576],{},[35,2575,2100],{},[35,2577,2578],{},"Elektronický trezor (electronic vaulting)",[22,2580,2581,2584],{},[35,2582,2583],{},"4",[35,2585,2586],{},"Point-in-time recovery",[22,2588,2589,2592],{},[35,2590,2591],{},"5",[35,2593,2594],{},"Two-site commit (kontinuální přenos)",[22,2596,2597,2600],{},[35,2598,2599],{},"6",[35,2601,2602],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2604,2605,2608],{},[35,2606,2607],{},"7",[35,2609,2610],{},"Automatizovaná obnova (AI monitoring)",[198,2612,2614],{"id":2613},"cloud-dr","Cloud DR",[120,2616,2617,2623,2629,2635],{},[123,2618,2619,2622],{},[38,2620,2621],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2624,2625,2628],{},[38,2626,2627],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2630,2631,2634],{},[38,2632,2633],{},"Hot DR"," — paralelní řešení v tandemu",[123,2636,2637,2640],{},[38,2638,2639],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2642,2644],{"id":2643},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2646,2647,2653,2659],{},[123,2648,2649,2652],{},[207,2650,140],{"className":2651,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2654,2655,2658],{},[207,2656,569],{"className":2657,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2660,2661,2664],{},[207,2662,578],{"className":2663,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2666,2668,2669],{"id":2667},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2670,43],{"className":2671,"dataFsResolvedFilePath":2672,"href":2673},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2675,2676,2682],{},[123,2677,2678],{},[207,2679,2681],{"className":2680,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2683,2684],{},[207,2685,2687],{"className":2686,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2689},[2690,2691,2692,2693,2694,2698,2699],{"id":2252,"depth":642,"text":2253},{"id":2350,"depth":642,"text":2351},{"id":2408,"depth":642,"text":2409},{"id":2435,"depth":642,"text":2436},{"id":2528,"depth":642,"text":2529,"children":2695},[2696,2697],{"id":2535,"depth":649,"text":2536},{"id":2613,"depth":649,"text":2614},{"id":2643,"depth":642,"text":2644},{"id":2667,"depth":642,"text":2700},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2234,"description":641},[2706,2707],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2710,2711,2712,2713,2714],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2718,"title":2719,"body":2720,"course":659,"courses":3202,"created":660,"description":641,"extension":661,"meta":3203,"navigation":664,"path":3204,"seo":3205,"sources":3206,"stem":3209,"tags":3210,"type":2715,"updated":677,"__hash__":3214},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2721,"toc":3187},[2722,2725,2732,2739,2742,2746,2812,2816,2820,2879,2883,2903,2907,2911,3012,3016,3039,3043,3065,3069,3076,3132,3134,3165,3170],[12,2723,2719],{"id":2724},"isms-systém-řízení-bezpečnosti-informací",[724,2726,2727],{},[1638,2728],{"alt":2729,"className":2730,"src":2731},"isms-pdca-cyklus",[210,1642],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2733,2734],{},[1638,2735],{"alt":2736,"className":2737,"src":2738},"isms-oborova-mapa",[210,1642],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2740,2741],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2743,2745],{"id":2744},"základní-pilíře","Základní pilíře",[16,2747,2748,2758],{},[19,2749,2750],{},[22,2751,2752,2754,2756],{},[25,2753,1954],{},[25,2755,2265],{},[25,2757,2268],{},[30,2759,2760,2773,2786,2799],{},[22,2761,2762,2767,2770],{},[35,2763,2764],{},[38,2765,2766],{},"Důvěrnost",[35,2768,2769],{},"Confidentiality",[35,2771,2772],{},"Přístup pouze oprávněným osobám",[22,2774,2775,2780,2783],{},[35,2776,2777],{},[38,2778,2779],{},"Integrita",[35,2781,2782],{},"Integrity",[35,2784,2785],{},"Ochrana před neoprávněnou změnou",[22,2787,2788,2793,2796],{},[35,2789,2790],{},[38,2791,2792],{},"Dostupnost",[35,2794,2795],{},"Availability",[35,2797,2798],{},"Systémy a data dostupné v potřebný čas",[22,2800,2801,2806,2809],{},[35,2802,2803],{},[38,2804,2805],{},"Nepopiratelnost",[35,2807,2808],{},"Non-repudiation",[35,2810,2811],{},"Prokázání autorství akce",[115,2813,2815],{"id":2814},"normativní-rámec","Normativní rámec",[198,2817,2819],{"id":2818},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2821,2822,2828,2834,2845,2851,2861,2870],{},[123,2823,2824,2827],{},[38,2825,2826],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2829,2830,2833],{},[38,2831,2832],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2835,2836,2839,2840,2844],{},[38,2837,2838],{},"ISO\u002FIEC 27005"," — ",[207,2841,2843],{"className":2842,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2846,2847,2850],{},[38,2848,2849],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2852,2853,2856,2857],{},[38,2854,2855],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2858,2860],{"className":2859,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2862,2863,2856,2866],{},[38,2864,2865],{},"ISO\u002FIEC 27019",[207,2867,2869],{"className":2868,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2871,2872,2856,2875],{},[38,2873,2874],{},"ISO\u002FIEC 27799",[207,2876,2878],{"className":2877,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2880,2882],{"id":2881},"další-rámce","Další rámce",[120,2884,2885,2891,2897],{},[123,2886,2887,2890],{},[38,2888,2889],{},"NIST"," — americké standardy (SP 800 řada)",[123,2892,2893,2896],{},[38,2894,2895],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2898,2899,2902],{},[38,2900,2901],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2904,2906],{"id":2905},"governance-řízení","Governance (řízení)",[198,2908,2910],{"id":2909},"bezpečnostní-role","Bezpečnostní role",[16,2912,2913,2925],{},[19,2914,2915],{},[22,2916,2917,2920,2922],{},[25,2918,2919],{},"Role",[25,2921,40],{},[25,2923,2924],{},"Odpovědnost",[30,2926,2927,2938,2949,2960,2971,2982,2992,3002],{},[22,2928,2929,2932,2935],{},[35,2930,2931],{},"Chief Information Officer",[35,2933,2934],{},"CIO",[35,2936,2937],{},"Celkové řízení ICT",[22,2939,2940,2943,2946],{},[35,2941,2942],{},"Chief Information Security Officer",[35,2944,2945],{},"CISO",[35,2947,2948],{},"Řízení informační bezpečnosti",[22,2950,2951,2954,2957],{},[35,2952,2953],{},"Chief Technology Officer",[35,2955,2956],{},"CTO",[35,2958,2959],{},"Technologická strategie",[22,2961,2962,2965,2968],{},[35,2963,2964],{},"IS Security Officer",[35,2966,2967],{},"ISSO",[35,2969,2970],{},"Bezpečnost IS",[22,2972,2973,2976,2979],{},[35,2974,2975],{},"Manažer KB",[35,2977,2978],{},"—",[35,2980,2981],{},"Odpovědný za ISMS",[22,2983,2984,2987,2989],{},[35,2985,2986],{},"Architekt KB",[35,2988,2978],{},[35,2990,2991],{},"Návrh a implementace opatření",[22,2993,2994,2997,2999],{},[35,2995,2996],{},"Auditor KB",[35,2998,2978],{},[35,3000,3001],{},"Provádění auditů",[22,3003,3004,3007,3009],{},[35,3005,3006],{},"Garant aktiva",[35,3008,2978],{},[35,3010,3011],{},"Rozvoj, použití a bezpečnost aktiva",[198,3013,3015],{"id":3014},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,3017,3018,3024,3033],{},[123,3019,3020,3023],{},[38,3021,3022],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,3025,3026,3029,3030],{},[38,3027,3028],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3031,240],{"className":3032,"dataFsResolvedFilePath":585,"href":586},[210],[123,3034,3035,3038],{},[38,3036,3037],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3040,3042],{"id":3041},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3044,3045,3050,3055,3060],{},[123,3046,3047,3049],{},[38,3048,2372],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3051,3052,3054],{},[38,3053,2382],{}," — implementace opatření, řízení rizik",[123,3056,3057,3059],{},[38,3058,2392],{}," — monitorování, audit, přezkoumání",[123,3061,3062,3064],{},[38,3063,2402],{}," — nápravná opatření, neustálé zlepšování",[115,3066,3068],{"id":3067},"oborová-řešení-isms","Oborová řešení ISMS",[724,3070,3071,3072,3075],{},"Kurz ",[207,3073,43],{"className":3074,"dataFsResolvedFilePath":2672,"href":2673},[210]," pokrývá ISMS specifika pro:",[120,3077,3078,3084,3090,3097,3103,3110,3116,3122,3127],{},[123,3079,3080],{},[207,3081,3083],{"className":3082,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3085,3086,3089],{},[207,3087,282],{"className":3088,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3091,3092,3096],{},[207,3093,3095],{"className":3094,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3098,3099,3102],{},[207,3100,300],{"className":3101,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3104,3105,3109],{},[207,3106,3108],{"className":3107,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3111,3112,3115],{},[207,3113,318],{"className":3114,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3117,3118,3121],{},[207,3119,327],{"className":3120,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3123,3124],{},[207,3125,336],{"className":3126,"dataFsResolvedFilePath":334,"href":335},[210],[123,3128,3129],{},[207,3130,273],{"className":3131,"dataFsResolvedFilePath":271,"href":272},[210],[115,3133,2644],{"id":2643},[120,3135,3136,3142,3147,3153,3159],{},[123,3137,3138,3141],{},[207,3139,569],{"className":3140,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3143,3144,587],{},[207,3145,240],{"className":3146,"dataFsResolvedFilePath":585,"href":586},[210],[123,3148,3149,3152],{},[207,3150,384],{"className":3151,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3154,3155,3158],{},[207,3156,578],{"className":3157,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3160,3161,3164],{},[207,3162,369],{"className":3163,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3166,2668,3167],{"id":2667},[207,3168,43],{"className":3169,"dataFsResolvedFilePath":2672,"href":2673},[210],[120,3171,3172,3177,3182],{},[123,3173,3174],{},[207,3175,222],{"className":3176,"dataFsResolvedFilePath":220,"href":221},[210],[123,3178,3179],{},[207,3180,249],{"className":3181,"dataFsResolvedFilePath":247,"href":248},[210],[123,3183,3184],{},[207,3185,231],{"className":3186,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3188},[3189,3190,3194,3198,3199,3200,3201],{"id":2744,"depth":642,"text":2745},{"id":2814,"depth":642,"text":2815,"children":3191},[3192,3193],{"id":2818,"depth":649,"text":2819},{"id":2881,"depth":649,"text":2882},{"id":2905,"depth":642,"text":2906,"children":3195},[3196,3197],{"id":2909,"depth":649,"text":2910},{"id":3014,"depth":649,"text":3015},{"id":3041,"depth":642,"text":3042},{"id":3067,"depth":642,"text":3068},{"id":2643,"depth":642,"text":2644},{"id":2667,"depth":642,"text":2700},[658],{},"\u002Ftopics\u002Fisms",{"title":2719,"description":641},[3207,3208,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3211,3212,672,3213],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3216,"title":578,"body":3217,"course":659,"courses":3650,"created":660,"description":641,"extension":661,"meta":3651,"navigation":664,"path":3652,"seo":3653,"sources":3654,"stem":3657,"tags":3658,"type":2715,"updated":677,"__hash__":3663},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3218,"toc":3636},[3219,3222,3229,3236,3240,3278,3282,3286,3328,3332,3339,3342,3368,3372,3389,3393,3424,3428,3496,3500,3503,3520,3524,3562,3564,3601,3606],[12,3220,578],{"id":3221},"kybernetická-bezpečnost",[724,3223,3224],{},[1638,3225],{"alt":3226,"className":3227,"src":3228},"kb-defense-in-depth",[210,1642],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3230,3231,3232,3235],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3233,140],{"className":3234,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3237,3239],{"id":3238},"základní-pojmy","Základní pojmy",[120,3241,3242,3248,3254,3260,3266,3272],{},[123,3243,3244,3247],{},[38,3245,3246],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3249,3250,3253],{},[38,3251,3252],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3255,3256,3259],{},[38,3257,3258],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3261,3262,3265],{},[38,3263,3264],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3267,3268,3271],{},[38,3269,3270],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3273,3274,3277],{},[38,3275,3276],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3279,3281],{"id":3280},"typy-útoků","Typy útoků",[198,3283,3285],{"id":3284},"podle-cílení","Podle cílení",[16,3287,3288,3300],{},[19,3289,3290],{},[22,3291,3292,3295,3297],{},[25,3293,3294],{},"Typ",[25,3296,2268],{},[25,3298,3299],{},"Cíl",[30,3301,3302,3315],{},[22,3303,3304,3309,3312],{},[35,3305,3306],{},[38,3307,3308],{},"Plošný",[35,3310,3311],{},"Útočníkovi je jedno, kdo je obětí",[35,3313,3314],{},"Botnety, spam, ransomware",[22,3316,3317,3322,3325],{},[35,3318,3319],{},[38,3320,3321],{},"Cílený (APT)",[35,3323,3324],{},"Soustředěná pozornost na konkrétní cíl",[35,3326,3327],{},"Špionáž, sabotáž, krádež dat",[198,3329,3331],{"id":3330},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3333,3334],{},[1638,3335],{"alt":3336,"className":3337,"src":3338},"apt-faze-utoku",[210,1642],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3340,3341],{},"4 fáze:",[152,3343,3344,3350,3356,3362],{},[123,3345,3346,3349],{},[38,3347,3348],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3351,3352,3355],{},[38,3353,3354],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3357,3358,3361],{},[38,3359,3360],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3363,3364,3367],{},[38,3365,3366],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3369,3371],{"id":3370},"základní-vektory-útoku","Základní vektory útoku",[120,3373,3374,3377,3380,3383,3386],{},[123,3375,3376],{},"Email s přílohou (spear phishing)",[123,3378,3379],{},"Trojanizované aplikace",[123,3381,3382],{},"Drive-by download (webové exploity)",[123,3384,3385],{},"Výměnná média (BadUSB)",[123,3387,3388],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3390,3392],{"id":3391},"software-útoky","Software útoky",[120,3394,3395,3401,3407,3413,3418],{},[123,3396,3397,3400],{},[38,3398,3399],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3402,3403,3406],{},[38,3404,3405],{},"Viry"," — poškození HW\u002FSW",[123,3408,3409,3412],{},[38,3410,3411],{},"Trojské koně"," — skrytá funkčnost",[123,3414,3415,3417],{},[38,3416,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3419,3420,3423],{},[38,3421,3422],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3425,3427],{"id":3426},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3429,3430,3442],{},[19,3431,3432],{},[22,3433,3434,3437,3439],{},[25,3435,3436],{},"Útok",[25,3438,3299],{},[25,3440,3441],{},"Efekt",[30,3443,3444,3455,3465,3476,3486],{},[22,3445,3446,3449,3452],{},[35,3447,3448],{},"Content Spoofing",[35,3450,3451],{},"Klient",[35,3453,3454],{},"Ztráta přihlašovacích údajů",[22,3456,3457,3460,3462],{},[35,3458,3459],{},"XSS",[35,3461,3451],{},[35,3463,3464],{},"Přístup k cookies",[22,3466,3467,3470,3473],{},[35,3468,3469],{},"SQL Injection",[35,3471,3472],{},"Server",[35,3474,3475],{},"Neoprávněný přístup do DB",[22,3477,3478,3481,3483],{},[35,3479,3480],{},"DoS\u002FDDoS",[35,3482,3472],{},[35,3484,3485],{},"Nedostupnost služby",[22,3487,3488,3491,3493],{},[35,3489,3490],{},"Path Traversal",[35,3492,3472],{},[35,3494,3495],{},"Přístup k souborům",[115,3497,3499],{"id":3498},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3501,3502],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3504,3505,3508,3511,3514,3517],{},[123,3506,3507],{},"Vydávání se za právníka",[123,3509,3510],{},"Podvod na CEO",[123,3512,3513],{},"Krádež dat (personální oddělení)",[123,3515,3516],{},"Kompromitace účtu",[123,3518,3519],{},"Falešné faktury",[115,3521,3523],{"id":3522},"obranné-technologie","Obranné technologie",[120,3525,3526,3532,3538,3544,3550,3556],{},[123,3527,3528,3531],{},[38,3529,3530],{},"NAC"," — řízení přístupu k síti",[123,3533,3534,3537],{},[38,3535,3536],{},"IDS"," — detekce průniku (pasivní)",[123,3539,3540,3543],{},[38,3541,3542],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3545,3546,3549],{},[38,3547,3548],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3551,3552,3555],{},[38,3553,3554],{},"DLP"," — prevence úniku dat",[123,3557,3558,3561],{},[38,3559,3560],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3563,2644],{"id":2643},[120,3565,3566,3572,3578,3584,3595],{},[123,3567,3568,3571],{},[207,3569,140],{"className":3570,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3573,3574,3577],{},[207,3575,569],{"className":3576,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3579,3580,3583],{},[207,3581,240],{"className":3582,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3585,3586,3589,3590,3594],{},[207,3587,384],{"className":3588,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3591,3593],{"className":3592,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3596,3597,3600],{},[207,3598,369],{"className":3599,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3602,2668,3603],{"id":2667},[207,3604,43],{"className":3605,"dataFsResolvedFilePath":2672,"href":2673},[210],[120,3607,3608,3614,3619,3624,3629],{},[123,3609,3610],{},[207,3611,3613],{"className":3612,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3615,3616],{},[207,3617,417],{"className":3618,"dataFsResolvedFilePath":415,"href":416},[210],[123,3620,3621],{},[207,3622,351],{"className":3623,"dataFsResolvedFilePath":349,"href":350},[210],[123,3625,3626],{},[207,3627,426],{"className":3628,"dataFsResolvedFilePath":424,"href":425},[210],[123,3630,3631],{},[207,3632,458],{"className":3633,"dataFsResolvedFilePath":3634,"href":3635},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3637},[3638,3639,3645,3646,3647,3648,3649],{"id":3238,"depth":642,"text":3239},{"id":3280,"depth":642,"text":3281,"children":3640},[3641,3642,3643,3644],{"id":3284,"depth":649,"text":3285},{"id":3330,"depth":649,"text":3331},{"id":3370,"depth":649,"text":3371},{"id":3391,"depth":649,"text":3392},{"id":3426,"depth":642,"text":3427},{"id":3498,"depth":642,"text":3499},{"id":3522,"depth":642,"text":3523},{"id":2643,"depth":642,"text":2644},{"id":2667,"depth":642,"text":2700},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3655,3656,3207],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3659,3660,2218,3661,3662],"utoky","apt","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3665,"title":369,"body":3666,"course":659,"courses":3927,"created":660,"description":641,"extension":661,"meta":3928,"navigation":664,"path":3929,"seo":3930,"sources":3931,"stem":3935,"tags":3936,"type":2715,"updated":677,"__hash__":3943},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3667,"toc":3913},[3668,3671,3678,3681,3685,3745,3749,3753,3764,3768,3779,3783,3791,3795,3806,3810,3815,3819,3830,3834,3854,3856,3888,3893],[12,3669,369],{"id":3670},"ochrana-dat",[724,3672,3673],{},[1638,3674],{"alt":3675,"className":3676,"src":3677},"ochrana-dat-technologie",[210,1642],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3679,3680],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3682,3684],{"id":3683},"formy-zneužití-dat","Formy zneužití dat",[16,3686,3687,3696],{},[19,3688,3689],{},[22,3690,3691,3694],{},[25,3692,3693],{},"Forma",[25,3695,2268],{},[30,3697,3698,3705,3713,3721,3729,3737],{},[22,3699,3700,3703],{},[35,3701,3702],{},"Zašifrování",[35,3704,435],{},[22,3706,3707,3710],{},[35,3708,3709],{},"Zveřejnění",[35,3711,3712],{},"Double ransomware",[22,3714,3715,3718],{},[35,3716,3717],{},"Odposlech",[35,3719,3720],{},"Pasivní sběr dat",[22,3722,3723,3726],{},[35,3724,3725],{},"Krádež",[35,3727,3728],{},"Cílená exfiltrace",[22,3730,3731,3734],{},[35,3732,3733],{},"Krádež dodavatelského řetězce",[35,3735,3736],{},"Triple ransomware",[22,3738,3739,3742],{},[35,3740,3741],{},"Prodej",[35,3743,3744],{},"Darknet marketplace",[115,3746,3748],{"id":3747},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3750,3752],{"id":3751},"nac-network-access-control","NAC (Network Access Control)",[120,3754,3755,3758,3761],{},[123,3756,3757],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3759,3760],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3762,3763],{},"Ekvivalenty: MDM, BYOD",[198,3765,3767],{"id":3766},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3769,3770,3773,3776],{},[123,3771,3772],{},"Monitoruje síťový provoz, generuje alerty",[123,3774,3775],{},"Pasivní systém — nezasahuje do provozu",[123,3777,3778],{},"Signaturová a anomální detekce",[198,3780,3782],{"id":3781},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3784,3785,3788],{},[123,3786,3787],{},"Aktivní systém — blokuje škodlivý provoz",[123,3789,3790],{},"Zařazen přímo do síťové cesty (in-line)",[198,3792,3794],{"id":3793},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3796,3797,3800,3803],{},[123,3798,3799],{},"Centralizovaná správa bezpečnostních logů",[123,3801,3802],{},"Sběr s agentem i bez agenta",[123,3804,3805],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3807,3809],{"id":3808},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3811,3812],{},[123,3813,3814],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3816,3818],{"id":3817},"šifrování","Šifrování",[120,3820,3821,3824,3827],{},[123,3822,3823],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3825,3826],{},"RSA (2048+ bit), DSS",[123,3828,3829],{},"SHA-256, SHA-1",[115,3831,3833],{"id":3832},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3835,3836,3842,3848,3851],{},[123,3837,3838,3841],{},[38,3839,3840],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3843,3844,3847],{},[38,3845,3846],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3849,3850],{},"Transportní a tunelovací režim",[123,3852,3853],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3855,2644],{"id":2643},[120,3857,3858,3864,3870,3876,3882],{},[123,3859,3860,3863],{},[207,3861,140],{"className":3862,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3865,3866,3869],{},[207,3867,578],{"className":3868,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3871,3872,3875],{},[207,3873,569],{"className":3874,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3877,3878,3881],{},[207,3879,351],{"className":3880,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3883,3884,3887],{},[207,3885,360],{"className":3886,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3889,2668,3890],{"id":2667},[207,3891,43],{"className":3892,"dataFsResolvedFilePath":2672,"href":2673},[210],[120,3894,3895,3901,3907],{},[123,3896,3897],{},[207,3898,3900],{"className":3899,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3902,3903],{},[207,3904,3906],{"className":3905,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3908,3909],{},[207,3910,3912],{"className":3911,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3914},[3915,3916,3924,3925,3926],{"id":3683,"depth":642,"text":3684},{"id":3747,"depth":642,"text":3748,"children":3917},[3918,3919,3920,3921,3922,3923],{"id":3751,"depth":649,"text":3752},{"id":3766,"depth":649,"text":3767},{"id":3781,"depth":649,"text":3782},{"id":3793,"depth":649,"text":3794},{"id":3808,"depth":649,"text":3809},{"id":3817,"depth":649,"text":3818},{"id":3832,"depth":642,"text":3833},{"id":2643,"depth":642,"text":2644},{"id":2667,"depth":642,"text":2700},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3932,3933,3934],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3670,3937,3938,3939,3940,3941,3942],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3945,"title":569,"body":3946,"course":659,"courses":4281,"created":660,"description":641,"extension":661,"meta":4282,"navigation":664,"path":4283,"seo":4284,"sources":4285,"stem":4286,"tags":4287,"type":2715,"updated":677,"__hash__":4293},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3947,"toc":4270},[3948,3951,3958,3965,3969,4033,4037,4087,4091,4096,4115,4119,4122,4126,4140,4144,4172,4176,4225,4227,4252,4257],[12,3949,569],{"id":3950},"řízení-rizik",[724,3952,3953],{},[1638,3954],{"alt":3955,"className":3956,"src":3957},"rizeni-rizik-proces",[210,1642],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3959,3960,3961,3964],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3962,140],{"className":3963,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3966,3968],{"id":3967},"normativní-základ","Normativní základ",[16,3970,3971,3981],{},[19,3972,3973],{},[22,3974,3975,3978],{},[25,3976,3977],{},"Norma",[25,3979,3980],{},"Zaměření",[30,3982,3983,3993,4003,4013,4023],{},[22,3984,3985,3990],{},[35,3986,3987],{},[38,3988,3989],{},"ISO 31000:2019",[35,3991,3992],{},"Obecné smrnice pro management rizik",[22,3994,3995,4000],{},[35,3996,3997],{},[38,3998,3999],{},"ISO 31010:2020",[35,4001,4002],{},"Techniky posuzování rizik",[22,4004,4005,4010],{},[35,4006,4007],{},[38,4008,4009],{},"ISO\u002FIEC 27005:2019",[35,4011,4012],{},"Řízení rizik bezpečnosti informací",[22,4014,4015,4020],{},[35,4016,4017],{},[38,4018,4019],{},"NIST SP 800-30",[35,4021,4022],{},"Průvodce hodnocením rizik",[22,4024,4025,4030],{},[35,4026,4027],{},[38,4028,4029],{},"NIST SP 800-39",[35,4031,4032],{},"Proces řízení bezpečnostních rizik",[115,4034,4036],{"id":4035},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4038,4039,4045,4051,4057,4063,4069,4075,4081],{},[123,4040,4041,4044],{},[38,4042,4043],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4046,4047,4050],{},[38,4048,4049],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4052,4053,4056],{},[38,4054,4055],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4058,4059,4062],{},[38,4060,4061],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4064,4065,4068],{},[38,4066,4067],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4070,4071,4074],{},[38,4072,4073],{},"Akceptace rizik"," — formální rozhodnutí",[123,4076,4077,4080],{},[38,4078,4079],{},"Komunikace"," — sdílení informací o rizicích",[123,4082,4083,4086],{},[38,4084,4085],{},"Monitorování"," — průběžné přezkoumávání",[115,4088,4090],{"id":4089},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4092,4093],{},[38,4094,4095],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4097,4098,4104,4109],{},[123,4099,4100,4103],{},[38,4101,4102],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4105,4106,4108],{},[38,4107,3258],{}," — slabé místo aktiva (stupnice 1–5)",[123,4110,4111,4114],{},[38,4112,4113],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4116,4118],{"id":4117},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4120,4121],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4123,4125],{"id":4124},"klíčové-dokumenty","Klíčové dokumenty",[120,4127,4128,4134],{},[123,4129,4130,4133],{},[38,4131,4132],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4135,4136,4139],{},[38,4137,4138],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4141,4143],{"id":4142},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4145,4146,4152,4157,4162,4167],{},[123,4147,4148,4151],{},[38,4149,4150],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4153,4154,4156],{},[38,4155,2975],{}," — odpovědný za ISMS",[123,4158,4159,4161],{},[38,4160,2986],{}," — návrh a implementace opatření",[123,4163,4164,4166],{},[38,4165,2996],{}," — provádění auditů",[123,4168,4169,4171],{},[38,4170,3006],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4173,4175],{"id":4174},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4177,4178,4190],{},[19,4179,4180],{},[22,4181,4182,4185,4187],{},[25,4183,4184],{},"Úroveň",[25,4186,3980],{},[25,4188,4189],{},"Typ rizika",[30,4191,4192,4203,4214],{},[22,4193,4194,4197,4200],{},[35,4195,4196],{},"Stupeň 1",[35,4198,4199],{},"Organizace",[35,4201,4202],{},"Strategické riziko",[22,4204,4205,4208,4211],{},[35,4206,4207],{},"Stupeň 2",[35,4209,4210],{},"Poslání\u002Fobchodní procesy",[35,4212,4213],{},"Taktické riziko",[22,4215,4216,4219,4222],{},[35,4217,4218],{},"Stupeň 3",[35,4220,4221],{},"Informační systémy",[35,4223,4224],{},"Operační riziko",[115,4226,2644],{"id":2643},[120,4228,4229,4235,4241,4247],{},[123,4230,4231,4234],{},[207,4232,140],{"className":4233,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4236,4237,4240],{},[207,4238,384],{"className":4239,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4242,4243,4246],{},[207,4244,393],{"className":4245,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4248,4249,3869],{},[207,4250,578],{"className":4251,"dataFsResolvedFilePath":576,"href":577},[210],[115,4253,2668,4254],{"id":2667},[207,4255,43],{"className":4256,"dataFsResolvedFilePath":2672,"href":2673},[210],[120,4258,4259,4265],{},[123,4260,4261],{},[207,4262,4264],{"className":4263,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4266,4267],{},[207,4268,222],{"className":4269,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4271},[4272,4273,4274,4275,4276,4277,4278,4279,4280],{"id":3967,"depth":642,"text":3968},{"id":4035,"depth":642,"text":4036},{"id":4089,"depth":642,"text":4090},{"id":4117,"depth":642,"text":4118},{"id":4124,"depth":642,"text":4125},{"id":4142,"depth":642,"text":4143},{"id":4174,"depth":642,"text":4175},{"id":2643,"depth":642,"text":2644},{"id":2667,"depth":642,"text":2700},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3208,3207],"topics\u002Frizeni-rizik",[658,4288,4289,4290,4291,4292],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4295,"title":4296,"body":4297,"course":659,"courses":4528,"created":660,"description":641,"extension":661,"meta":4529,"navigation":664,"path":4530,"seo":4531,"sources":4532,"stem":4534,"tags":4535,"type":2715,"updated":677,"__hash__":4540},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4298,"toc":4520},[4299,4302,4309,4312,4316,4415,4419,4454,4458,4478,4482,4485,4487,4507,4512],[12,4300,4296],{"id":4301},"sae-budování-bezpečnostního-povědomí",[724,4303,4304],{},[1638,4305],{"alt":4306,"className":4307,"src":4308},"sae-pyramida",[210,1642],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4310,4311],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4313,4315],{"id":4314},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4317,4318,4335],{},[19,4319,4320],{},[22,4321,4322,4324,4327,4329,4332],{},[25,4323,4184],{},[25,4325,4326],{},"Příznak",[25,4328,3299],{},[25,4330,4331],{},"Metody",[25,4333,4334],{},"Časový rámec",[30,4336,4337,4357,4377,4397],{},[22,4338,4339,4345,4348,4351,4354],{},[35,4340,4341,4344],{},[38,4342,4343],{},"Awareness"," (povědomí)",[35,4346,4347],{},"„Co\"",[35,4349,4350],{},"Rozpoznávání",[35,4352,4353],{},"Média, videa, plakáty",[35,4355,4356],{},"Krátkodobý",[22,4358,4359,4365,4368,4371,4374],{},[35,4360,4361,4364],{},[38,4362,4363],{},"Training"," (výcvik)",[35,4366,4367],{},"„Jak\"",[35,4369,4370],{},"Dovednosti",[35,4372,4373],{},"Přednášky, případovky, cvičení",[35,4375,4376],{},"Střednědobý",[22,4378,4379,4385,4388,4391,4394],{},[35,4380,4381,4384],{},[38,4382,4383],{},"Education"," (vzdělávání)",[35,4386,4387],{},"„Proč\"",[35,4389,4390],{},"Porozumění",[35,4392,4393],{},"Semináře, diskuze, výzkum",[35,4395,4396],{},"Dlouhodobý",[22,4398,4399,4404,4406,4409,4412],{},[35,4400,4401],{},[38,4402,4403],{},"Professional Development",[35,4405,2978],{},[35,4407,4408],{},"Profesní rozvoj",[35,4410,4411],{},"Certifikace, konference",[35,4413,4414],{},"Průběžný",[115,4416,4418],{"id":4417},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4420,4421,4424,4427,4430,4433,4436,4439,4442,4445,4448,4451],{},[123,4422,4423],{},"Role a odpovědnosti v programu",[123,4425,4426],{},"Stanovení cílů pro každou fázi",[123,4428,4429],{},"Rozdělení uživatelů (analýza)",[123,4431,4432],{},"Vytvoření školících materiálů dle skupin",[123,4434,4435],{},"Určení cíle pro každou skupinu",[123,4437,4438],{},"Témata pro každou relaci\u002Fkurz",[123,4440,4441],{},"Metody nasazení (metodiky)",[123,4443,4444],{},"Dokumentace a zpětná vazba",[123,4446,4447],{},"Vyhodnocení a aktualizace materiálů",[123,4449,4450],{},"Četnost opakování",[123,4452,4453],{},"Kalkulace",[115,4455,4457],{"id":4456},"modely-řízení","Modely řízení",[120,4459,4460,4466,4472],{},[123,4461,4462,4465],{},[38,4463,4464],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4467,4468,4471],{},[38,4469,4470],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4473,4474,4477],{},[38,4475,4476],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4479,4481],{"id":4480},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4483,4484],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4486,2644],{"id":2643},[120,4488,4489,4495,4501],{},[123,4490,4491,4494],{},[207,4492,140],{"className":4493,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4496,4497,4500],{},[207,4498,578],{"className":4499,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4502,4503,4506],{},[207,4504,569],{"className":4505,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4508,2668,4509],{"id":2667},[207,4510,43],{"className":4511,"dataFsResolvedFilePath":2672,"href":2673},[210],[120,4513,4514],{},[123,4515,4516],{},[207,4517,4519],{"className":4518,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4521},[4522,4523,4524,4525,4526,4527],{"id":4314,"depth":642,"text":4315},{"id":4417,"depth":642,"text":4418},{"id":4456,"depth":642,"text":4457},{"id":4480,"depth":642,"text":4481},{"id":2643,"depth":642,"text":2644},{"id":2667,"depth":642,"text":2700},[658],{},"\u002Ftopics\u002Fsae",{"title":4296,"description":641},[4533],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4536,4537,4538,4291,4539],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4542,4544,4548],{"slug":658,"path":2673,"title":7,"snippet":4543},"… , phishing - Síťové útoky — DDoS, spoofing, Emotet→Trickbot→Ryuk - \u003C\u003Cimork-ransomware>> — historie 1989–2024, RaaS, NISTIR 8374, IR plán - [[imork-rizeny-hacking|Řízený hacking …",{"slug":4545,"path":425,"title":4546,"snippet":4547},"imork-sitove-utoky","Síťové útoky — komplexní přehled","… ng trojan stažený Emotetem, provádí průzkum sítě a krade přihlašovací údaje 3. **Ryuk** — \u003C\u003Cimork-ransomware>> nasazený po kompromitaci sítě, šifruje data a žádá výkupné Tento řetězec demonstruje, ja …",{"slug":4549,"path":503,"title":4550,"snippet":4551},"imork-tor","TOR — The Onion Router","… ečnostní rizika]] na výstupním uzlu ## Zneužití TOR pro kybernetické útoky - Distribuce \u003C\u003Cimork-ransomware>> — např. **Cerber 5.0.1** šířený přes TOR infrastrukturu - Darknetové tržiště — prodej exp …",[4553,4554,4557],{"slug":673,"title":578,"path":577,"sharedTags":642},{"slug":4555,"title":4556,"path":3635,"sharedTags":642},"imork-pripadovky","Případové studie — ImorK",{"slug":4558,"title":4559,"path":467,"sharedTags":642},"imork-nemocnice","Případovka: Kybernetické útoky na české nemocnice",1777154961450]