[{"data":1,"prerenderedAt":4399},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-sitove-utoky":1626,"course-stats-imork":2063,"course-topics-imork":2067,"backlinks-imork-sitove-utoky":4374,"related-imork-sitove-utoky":4395},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2062},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":1637,"extension":661,"meta":2046,"navigation":664,"path":2047,"seo":2048,"sources":2049,"stem":2051,"tags":2052,"type":2060,"updated":677,"__hash__":2061},"summaries\u002Fsummaries\u002Fimork-sitove-utoky.md","Síťové útoky — komplexní přehled",{"type":9,"value":1631,"toc":2035},[1632,1635,1638,1642,1676,1680,1712,1721,1725,1809,1813,1848,1852,1888,1892,1918,1922,1929,1954,1962,1966,1991,1995],[12,1633,1629],{"id":1634},"síťové-útoky-komplexní-přehled",[724,1636,1637],{},"Cvičení zaměřené na klasifikaci, techniky a obranu proti síťovým útokům napříč vrstvami modelu ISO\u002FOSI.",[115,1639,1641],{"id":1640},"klasifikace-útoků","Klasifikace útoků",[16,1643,1644,1654],{},[19,1645,1646],{},[22,1647,1648,1651],{},[25,1649,1650],{},"Typ",[25,1652,1653],{},"Popis",[30,1655,1656,1666],{},[22,1657,1658,1663],{},[35,1659,1660],{},[38,1661,1662],{},"Pasivní",[35,1664,1665],{},"Odposlech, monitoring provozu — útočník nemodifikuje data",[22,1667,1668,1673],{},[35,1669,1670],{},[38,1671,1672],{},"Aktivní",[35,1674,1675],{},"Modifikace, injekce, přerušení komunikace",[115,1677,1679],{"id":1678},"hlavní-kategorie-síťových-útoků","Hlavní kategorie síťových útoků",[120,1681,1682,1688,1694,1700,1706],{},[123,1683,1684,1687],{},[38,1685,1686],{},"Bombing"," — zahlcení cíle zprávami (e-mail bombing, SMS bombing)",[123,1689,1690,1693],{},[38,1691,1692],{},"DoS \u002F DDoS"," — odepření služby, distribuovaný útok z mnoha zdrojů",[123,1695,1696,1699],{},[38,1697,1698],{},"MitM (Man-in-the-Middle)"," — vložení útočníka do komunikace mezi dvě strany",[123,1701,1702,1705],{},[38,1703,1704],{},"Sniffing"," — pasivní zachytávání síťových paketů",[123,1707,1708,1711],{},[38,1709,1710],{},"Spoofing"," — podvržení identity (IP, MAC, DNS, e-mail)",[724,1713,1714],{},[1715,1716],"img",{"alt":1717,"className":1718,"src":1720},"imork-iso-osi-utoky",[210,1719],"wikilink-broken","\u002Fwiki-assets\u002Fimork-iso-osi-utoky.jpeg",[115,1722,1724],{"id":1723},"útoky-podle-vrstev-isoosi","Útoky podle vrstev ISO\u002FOSI",[16,1726,1727,1737],{},[19,1728,1729],{},[22,1730,1731,1734],{},[25,1732,1733],{},"Vrstva",[25,1735,1736],{},"Příklady útoků",[30,1738,1739,1749,1759,1769,1779,1789,1799],{},[22,1740,1741,1746],{},[35,1742,1743],{},[38,1744,1745],{},"L1 — Fyzická",[35,1747,1748],{},"Odpojení kabelu, rušení signálu, odposlech optického vlákna",[22,1750,1751,1756],{},[35,1752,1753],{},[38,1754,1755],{},"L2 — Linková",[35,1757,1758],{},"MAC flooding, ARP spoofing, VLAN hopping",[22,1760,1761,1766],{},[35,1762,1763],{},[38,1764,1765],{},"L3 — Síťová",[35,1767,1768],{},"IP spoofing, ICMP flood, Smurf attack, route poisoning",[22,1770,1771,1776],{},[35,1772,1773],{},[38,1774,1775],{},"L4 — Transportní",[35,1777,1778],{},"SYN flood, UDP flood, TCP session hijacking",[22,1780,1781,1786],{},[35,1782,1783],{},[38,1784,1785],{},"L5 — Relační",[35,1787,1788],{},"Session hijacking, SSL stripping",[22,1790,1791,1796],{},[35,1792,1793],{},[38,1794,1795],{},"L6 — Prezentační",[35,1797,1798],{},"SSL\u002FTLS exploity, šifrování malwarem",[22,1800,1801,1806],{},[35,1802,1803],{},[38,1804,1805],{},"L7 — Aplikační",[35,1807,1808],{},"HTTP flood, SQL injection, XSS, DNS amplification",[115,1810,1812],{"id":1811},"spoofing-podrobně","Spoofing — podrobně",[120,1814,1815,1842],{},[123,1816,1817,1820,1821],{},[38,1818,1819],{},"IP spoofing"," — podvržení zdrojové IP adresy\n",[120,1822,1823,1830,1836],{},[123,1824,1825,1826,1829],{},"Využití pro ",[38,1827,1828],{},"DDoS amplifikaci"," — útočník pošle požadavek s podvrženou IP oběti na NTP\u002FDNS server → odpověď (mnohonásobně větší) směřuje na oběť",[123,1831,1832,1835],{},[38,1833,1834],{},"NTP amplifikace"," — poměr požadavek:odpověď až 1:556",[123,1837,1838,1841],{},[38,1839,1840],{},"DNS amplifikace"," — poměr požadavek:odpověď až 1:70",[123,1843,1844,1847],{},[38,1845,1846],{},"Obrana"," — filtrování na hranici sítě (BCP38\u002FBCP84), uRPF (unicast Reverse Path Forwarding)",[115,1849,1851],{"id":1850},"sniffing-podrobně","Sniffing — podrobně",[120,1853,1854,1860,1863],{},[123,1855,1856,1859],{},[38,1857,1858],{},"Packet capture"," — zachytávání provozu na síťovém segmentu (Wireshark, tcpdump)",[123,1861,1862],{},"Efektivní zejména v nešifrovaných sítích a na sdílených segmentech",[123,1864,1865,1868],{},[38,1866,1867],{},"Obrana:",[120,1869,1870,1873,1879,1885],{},[123,1871,1872],{},"Šifrování — SSL\u002FTLS pro webový provoz",[123,1874,1875,1878],{},[38,1876,1877],{},"VPN"," — šifrovaný tunel pro veškerý provoz",[123,1880,1881,1884],{},[38,1882,1883],{},"SSH"," — šifrovaný vzdálený přístup",[123,1886,1887],{},"Segmentace sítě (switche místo hubů)",[115,1889,1891],{"id":1890},"sociální-inženýrství-a-malware","Sociální inženýrství a malware",[120,1893,1894,1900,1906,1912],{},[123,1895,1896,1899],{},[38,1897,1898],{},"Sociální inženýrství"," — manipulace uživatelů k provedení nebezpečných akcí",[123,1901,1902,1905],{},[38,1903,1904],{},"Viry"," — sebereplikující kód vyžadující hostitele",[123,1907,1908,1911],{},[38,1909,1910],{},"Červi (worms)"," — samostatně se šířící malware",[123,1913,1914,1917],{},[38,1915,1916],{},"Rootkity"," — skrytí přítomnosti útočníka v systému",[115,1919,1921],{"id":1920},"kombinovaný-útočný-řetězec-emotet-trickbot-ryuk","Kombinovaný útočný řetězec: Emotet → Trickbot → Ryuk",[724,1923,1924,1925,1928],{},"Reálný případ — ",[38,1926,1927],{},"nemocnice Benešov (2019)",":",[152,1930,1931,1937,1943],{},[123,1932,1933,1936],{},[38,1934,1935],{},"Emotet"," — počáteční infekce přes phishingový e-mail s makrem",[123,1938,1939,1942],{},[38,1940,1941],{},"Trickbot"," — banking trojan stažený Emotetem, provádí průzkum sítě a krade přihlašovací údaje",[123,1944,1945,1948,1949,1953],{},[38,1946,1947],{},"Ryuk"," — ",[207,1950,1952],{"className":1951,"dataFsResolvedFilePath":433,"href":434},[210],"ransomware"," nasazený po kompromitaci sítě, šifruje data a žádá výkupné",[724,1955,1956,1957,1961],{},"Tento řetězec demonstruje, jak se moderní útoky skládají z více fází a nástrojů — viz také ",[207,1958,1960],{"className":1959,"dataFsResolvedFilePath":442,"href":443},[210],"APT model útoku",".",[115,1963,1965],{"id":1964},"obrana-ngfw-next-generation-firewall","Obrana — NGFW (Next-Generation Firewall)",[120,1967,1968,1971,1974,1977,1980],{},[123,1969,1970],{},"Hloubková inspekce paketů (DPI)",[123,1972,1973],{},"Aplikační filtrování (L7)",[123,1975,1976],{},"IPS\u002FIDS integrace",[123,1978,1979],{},"Sandboxing podezřelých souborů",[123,1981,1982,1983,1986,1987],{},"Propojení s ",[207,1984,140],{"className":1985,"dataFsResolvedFilePath":559,"href":560},[210]," a ",[207,1988,1990],{"className":1989,"dataFsResolvedFilePath":567,"href":568},[210],"řízením rizik",[115,1992,1994],{"id":1993},"vazby-na-další-témata","Vazby na další témata",[120,1996,1997,2004,2010,2017,2023,2029],{},[123,1998,1999,2003],{},[207,2000,2002],{"className":2001,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku"," — obecný model útočného řetězce",[123,2005,2006,2009],{},[207,2007,444],{"className":2008,"dataFsResolvedFilePath":442,"href":443},[210]," — APT skupiny využívající tyto techniky",[123,2011,2012,2016],{},[207,2013,2015],{"className":2014,"dataFsResolvedFilePath":502,"href":503},[210],"TOR síť"," — anonymizace útočníků",[123,2018,2019,2022],{},[207,2020,435],{"className":2021,"dataFsResolvedFilePath":433,"href":434},[210]," — Ryuk jako koncová fáze řetězce",[123,2024,2025,2028],{},[207,2026,384],{"className":2027,"dataFsResolvedFilePath":593,"href":594},[210]," — obnova po úspěšném útoku (případ Benešov)",[123,2030,2031,2034],{},[207,2032,369],{"className":2033,"dataFsResolvedFilePath":601,"href":602},[210]," — prevence úniku dat",{"title":641,"searchDepth":642,"depth":642,"links":2036},[2037,2038,2039,2040,2041,2042,2043,2044,2045],{"id":1640,"depth":642,"text":1641},{"id":1678,"depth":642,"text":1679},{"id":1723,"depth":642,"text":1724},{"id":1811,"depth":642,"text":1812},{"id":1850,"depth":642,"text":1851},{"id":1890,"depth":642,"text":1891},{"id":1920,"depth":642,"text":1921},{"id":1964,"depth":642,"text":1965},{"id":1993,"depth":642,"text":1994},{},"\u002Fsummaries\u002Fimork-sitove-utoky",{"title":1629,"description":1637},[2050],"raw\u002Fimork\u002FCV 03 VUT_Síťové útoky-2023.pdf","summaries\u002Fimork-sitove-utoky",[658,2053,2054,2055,2056,2057,2058,2059],"sitove-utoky","ddos","spoofing","sniffing","mitm","emotet","ryuk","summary","pdBau-y38YK8oU-6vPRbTOdQXBnZLAwFHhs2s4XotMY","summaries",{"zapisku":1624,"topics":2064,"summaries":2065,"outputs":2066},6,35,0,[2068,2555,3053,3498,3778,4127],{"id":2069,"title":2070,"body":2071,"course":659,"courses":2539,"created":660,"description":641,"extension":661,"meta":2540,"navigation":664,"path":2541,"seo":2542,"sources":2543,"stem":2546,"tags":2547,"type":2553,"updated":677,"__hash__":2554},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2072,"toc":2526},[2073,2076,2083,2086,2090,2183,2187,2241,2245,2268,2272,2361,2365,2368,2372,2449,2453,2479,2483,2503,2512],[12,2074,2070],{"id":2075},"bcm-řízení-kontinuity-činnosti",[724,2077,2078],{},[1715,2079],{"alt":2080,"className":2081,"src":2082},"bcm-rpo-rto",[210,1719],"\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2084,2085],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2087,2089],{"id":2088},"klíčové-pojmy","Klíčové pojmy",[16,2091,2092,2104],{},[19,2093,2094],{},[22,2095,2096,2099,2102],{},[25,2097,2098],{},"Pojem",[25,2100,2101],{},"Anglicky",[25,2103,1653],{},[30,2105,2106,2119,2131,2144,2157,2170],{},[22,2107,2108,2113,2116],{},[35,2109,2110],{},[38,2111,2112],{},"BCMS",[35,2114,2115],{},"Business Continuity Management System",[35,2117,2118],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2120,2121,2125,2128],{},[35,2122,2123],{},[38,2124,384],{},[35,2126,2127],{},"Business Continuity Management",[35,2129,2130],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2132,2133,2138,2141],{},[35,2134,2135],{},[38,2136,2137],{},"BIA",[35,2139,2140],{},"Business Impact Analysis",[35,2142,2143],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2145,2146,2151,2154],{},[35,2147,2148],{},[38,2149,2150],{},"MBCO",[35,2152,2153],{},"Minimum Business Continuity Objective",[35,2155,2156],{},"Minimální přijatelná úroveň služeb",[22,2158,2159,2164,2167],{},[35,2160,2161],{},[38,2162,2163],{},"RPO",[35,2165,2166],{},"Recovery Point Objective",[35,2168,2169],{},"Do jakého bodu v minulosti lze obnovit data",[22,2171,2172,2177,2180],{},[35,2173,2174],{},[38,2175,2176],{},"RTO",[35,2178,2179],{},"Recovery Time Objective",[35,2181,2182],{},"Čas potřebný pro obnovu provozu",[115,2184,2186],{"id":2185},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2188,2189,2199],{},[19,2190,2191],{},[22,2192,2193,2196],{},[25,2194,2195],{},"Fáze",[25,2197,2198],{},"Obsah",[30,2200,2201,2211,2221,2231],{},[22,2202,2203,2208],{},[35,2204,2205],{},[38,2206,2207],{},"Plan",[35,2209,2210],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2212,2213,2218],{},[35,2214,2215],{},[38,2216,2217],{},"Do",[35,2219,2220],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2222,2223,2228],{},[35,2224,2225],{},[38,2226,2227],{},"Check",[35,2229,2230],{},"Monitoring, audit, přezkoumání managementem",[22,2232,2233,2238],{},[35,2234,2235],{},[38,2236,2237],{},"Act",[35,2239,2240],{},"Nápravná opatření, neustálé zlepšování",[115,2242,2244],{"id":2243},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2246,2247,2250,2253,2256,2259,2262,2265],{},[123,2248,2249],{},"Kap. 4 — kontext organizace",[123,2251,2252],{},"Kap. 5 — vedení (leadership)",[123,2254,2255],{},"Kap. 6 — plánování (BIA, rizika)",[123,2257,2258],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2260,2261],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2263,2264],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2266,2267],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2269,2271],{"id":2270},"analýza-steeple","Analýza STEEPLE",[16,2273,2274,2284],{},[19,2275,2276],{},[22,2277,2278,2281],{},[25,2279,2280],{},"Faktor",[25,2282,2283],{},"Oblast",[30,2285,2286,2297,2308,2319,2329,2340,2351],{},[22,2287,2288,2294],{},[35,2289,2290,2293],{},[38,2291,2292],{},"S","ociální",[35,2295,2296],{},"Zaměstnanost, bezpečnost, komunity",[22,2298,2299,2305],{},[35,2300,2301,2304],{},[38,2302,2303],{},"T","echnologický",[35,2306,2307],{},"Závislost na technologiích",[22,2309,2310,2316],{},[35,2311,2312,2315],{},[38,2313,2314],{},"E","konomický",[35,2317,2318],{},"Ekonomická situace, finanční instituce",[22,2320,2321,2326],{},[35,2322,2323,2325],{},[38,2324,2314],{},"tický",[35,2327,2328],{},"Podnikatelská etika, média, veřejnost",[22,2330,2331,2337],{},[35,2332,2333,2336],{},[38,2334,2335],{},"P","olitický",[35,2338,2339],{},"Politický systém, hrozba nepokojů",[22,2341,2342,2348],{},[35,2343,2344,2347],{},[38,2345,2346],{},"L","egislativní",[35,2349,2350],{},"Předpisy, zákony",[22,2352,2353,2358],{},[35,2354,2355,2357],{},[38,2356,2314],{},"nvironmentální",[35,2359,2360],{},"Životní prostředí, přírodní hrozby",[115,2362,2364],{"id":2363},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2366,2367],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2369,2371],{"id":2370},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2373,2374,2383],{},[19,2375,2376],{},[22,2377,2378,2381],{},[25,2379,2380],{},"Tier",[25,2382,1653],{},[30,2384,2385,2393,2401,2409,2417,2425,2433,2441],{},[22,2386,2387,2390],{},[35,2388,2389],{},"0",[35,2391,2392],{},"Žádná off-site data",[22,2394,2395,2398],{},[35,2396,2397],{},"1",[35,2399,2400],{},"Fyzická záloha + cold site",[22,2402,2403,2406],{},[35,2404,2405],{},"2",[35,2407,2408],{},"Fyzická záloha + hot site",[22,2410,2411,2414],{},[35,2412,2413],{},"3",[35,2415,2416],{},"Elektronický trezor (electronic vaulting)",[22,2418,2419,2422],{},[35,2420,2421],{},"4",[35,2423,2424],{},"Point-in-time recovery",[22,2426,2427,2430],{},[35,2428,2429],{},"5",[35,2431,2432],{},"Two-site commit (kontinuální přenos)",[22,2434,2435,2438],{},[35,2436,2437],{},"6",[35,2439,2440],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2442,2443,2446],{},[35,2444,2445],{},"7",[35,2447,2448],{},"Automatizovaná obnova (AI monitoring)",[198,2450,2452],{"id":2451},"cloud-dr","Cloud DR",[120,2454,2455,2461,2467,2473],{},[123,2456,2457,2460],{},[38,2458,2459],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2462,2463,2466],{},[38,2464,2465],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2468,2469,2472],{},[38,2470,2471],{},"Hot DR"," — paralelní řešení v tandemu",[123,2474,2475,2478],{},[38,2476,2477],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2480,2482],{"id":2481},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2484,2485,2491,2497],{},[123,2486,2487,2490],{},[207,2488,140],{"className":2489,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2492,2493,2496],{},[207,2494,569],{"className":2495,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2498,2499,2502],{},[207,2500,578],{"className":2501,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2504,2506,2507],{"id":2505},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2508,43],{"className":2509,"dataFsResolvedFilePath":2510,"href":2511},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2513,2514,2520],{},[123,2515,2516],{},[207,2517,2519],{"className":2518,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2521,2522],{},[207,2523,2525],{"className":2524,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2527},[2528,2529,2530,2531,2532,2536,2537],{"id":2088,"depth":642,"text":2089},{"id":2185,"depth":642,"text":2186},{"id":2243,"depth":642,"text":2244},{"id":2270,"depth":642,"text":2271},{"id":2363,"depth":642,"text":2364,"children":2533},[2534,2535],{"id":2370,"depth":649,"text":2371},{"id":2451,"depth":649,"text":2452},{"id":2481,"depth":642,"text":2482},{"id":2505,"depth":642,"text":2538},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2070,"description":641},[2544,2545],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2548,2549,2550,2551,2552],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2556,"title":2557,"body":2558,"course":659,"courses":3040,"created":660,"description":641,"extension":661,"meta":3041,"navigation":664,"path":3042,"seo":3043,"sources":3044,"stem":3047,"tags":3048,"type":2553,"updated":677,"__hash__":3052},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2559,"toc":3025},[2560,2563,2570,2577,2580,2584,2651,2655,2659,2717,2721,2741,2745,2749,2850,2854,2877,2881,2903,2907,2914,2970,2972,3003,3008],[12,2561,2557],{"id":2562},"isms-systém-řízení-bezpečnosti-informací",[724,2564,2565],{},[1715,2566],{"alt":2567,"className":2568,"src":2569},"isms-pdca-cyklus",[210,1719],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2571,2572],{},[1715,2573],{"alt":2574,"className":2575,"src":2576},"isms-oborova-mapa",[210,1719],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2578,2579],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2581,2583],{"id":2582},"základní-pilíře","Základní pilíře",[16,2585,2586,2597],{},[19,2587,2588],{},[22,2589,2590,2593,2595],{},[25,2591,2592],{},"Pilíř",[25,2594,2101],{},[25,2596,1653],{},[30,2598,2599,2612,2625,2638],{},[22,2600,2601,2606,2609],{},[35,2602,2603],{},[38,2604,2605],{},"Důvěrnost",[35,2607,2608],{},"Confidentiality",[35,2610,2611],{},"Přístup pouze oprávněným osobám",[22,2613,2614,2619,2622],{},[35,2615,2616],{},[38,2617,2618],{},"Integrita",[35,2620,2621],{},"Integrity",[35,2623,2624],{},"Ochrana před neoprávněnou změnou",[22,2626,2627,2632,2635],{},[35,2628,2629],{},[38,2630,2631],{},"Dostupnost",[35,2633,2634],{},"Availability",[35,2636,2637],{},"Systémy a data dostupné v potřebný čas",[22,2639,2640,2645,2648],{},[35,2641,2642],{},[38,2643,2644],{},"Nepopiratelnost",[35,2646,2647],{},"Non-repudiation",[35,2649,2650],{},"Prokázání autorství akce",[115,2652,2654],{"id":2653},"normativní-rámec","Normativní rámec",[198,2656,2658],{"id":2657},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2660,2661,2667,2673,2683,2689,2699,2708],{},[123,2662,2663,2666],{},[38,2664,2665],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2668,2669,2672],{},[38,2670,2671],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2674,2675,1948,2678,2682],{},[38,2676,2677],{},"ISO\u002FIEC 27005",[207,2679,2681],{"className":2680,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2684,2685,2688],{},[38,2686,2687],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2690,2691,2694,2695],{},[38,2692,2693],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2696,2698],{"className":2697,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2700,2701,2694,2704],{},[38,2702,2703],{},"ISO\u002FIEC 27019",[207,2705,2707],{"className":2706,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2709,2710,2694,2713],{},[38,2711,2712],{},"ISO\u002FIEC 27799",[207,2714,2716],{"className":2715,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2718,2720],{"id":2719},"další-rámce","Další rámce",[120,2722,2723,2729,2735],{},[123,2724,2725,2728],{},[38,2726,2727],{},"NIST"," — americké standardy (SP 800 řada)",[123,2730,2731,2734],{},[38,2732,2733],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2736,2737,2740],{},[38,2738,2739],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2742,2744],{"id":2743},"governance-řízení","Governance (řízení)",[198,2746,2748],{"id":2747},"bezpečnostní-role","Bezpečnostní role",[16,2750,2751,2763],{},[19,2752,2753],{},[22,2754,2755,2758,2760],{},[25,2756,2757],{},"Role",[25,2759,40],{},[25,2761,2762],{},"Odpovědnost",[30,2764,2765,2776,2787,2798,2809,2820,2830,2840],{},[22,2766,2767,2770,2773],{},[35,2768,2769],{},"Chief Information Officer",[35,2771,2772],{},"CIO",[35,2774,2775],{},"Celkové řízení ICT",[22,2777,2778,2781,2784],{},[35,2779,2780],{},"Chief Information Security Officer",[35,2782,2783],{},"CISO",[35,2785,2786],{},"Řízení informační bezpečnosti",[22,2788,2789,2792,2795],{},[35,2790,2791],{},"Chief Technology Officer",[35,2793,2794],{},"CTO",[35,2796,2797],{},"Technologická strategie",[22,2799,2800,2803,2806],{},[35,2801,2802],{},"IS Security Officer",[35,2804,2805],{},"ISSO",[35,2807,2808],{},"Bezpečnost IS",[22,2810,2811,2814,2817],{},[35,2812,2813],{},"Manažer KB",[35,2815,2816],{},"—",[35,2818,2819],{},"Odpovědný za ISMS",[22,2821,2822,2825,2827],{},[35,2823,2824],{},"Architekt KB",[35,2826,2816],{},[35,2828,2829],{},"Návrh a implementace opatření",[22,2831,2832,2835,2837],{},[35,2833,2834],{},"Auditor KB",[35,2836,2816],{},[35,2838,2839],{},"Provádění auditů",[22,2841,2842,2845,2847],{},[35,2843,2844],{},"Garant aktiva",[35,2846,2816],{},[35,2848,2849],{},"Rozvoj, použití a bezpečnost aktiva",[198,2851,2853],{"id":2852},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,2855,2856,2862,2871],{},[123,2857,2858,2861],{},[38,2859,2860],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,2863,2864,2867,2868],{},[38,2865,2866],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,2869,240],{"className":2870,"dataFsResolvedFilePath":585,"href":586},[210],[123,2872,2873,2876],{},[38,2874,2875],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,2878,2880],{"id":2879},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,2882,2883,2888,2893,2898],{},[123,2884,2885,2887],{},[38,2886,2207],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,2889,2890,2892],{},[38,2891,2217],{}," — implementace opatření, řízení rizik",[123,2894,2895,2897],{},[38,2896,2227],{}," — monitorování, audit, přezkoumání",[123,2899,2900,2902],{},[38,2901,2237],{}," — nápravná opatření, neustálé zlepšování",[115,2904,2906],{"id":2905},"oborová-řešení-isms","Oborová řešení ISMS",[724,2908,2909,2910,2913],{},"Kurz ",[207,2911,43],{"className":2912,"dataFsResolvedFilePath":2510,"href":2511},[210]," pokrývá ISMS specifika pro:",[120,2915,2916,2922,2928,2935,2941,2948,2954,2960,2965],{},[123,2917,2918],{},[207,2919,2921],{"className":2920,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,2923,2924,2927],{},[207,2925,282],{"className":2926,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,2929,2930,2934],{},[207,2931,2933],{"className":2932,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,2936,2937,2940],{},[207,2938,300],{"className":2939,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,2942,2943,2947],{},[207,2944,2946],{"className":2945,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,2949,2950,2953],{},[207,2951,318],{"className":2952,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,2955,2956,2959],{},[207,2957,327],{"className":2958,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,2961,2962],{},[207,2963,336],{"className":2964,"dataFsResolvedFilePath":334,"href":335},[210],[123,2966,2967],{},[207,2968,273],{"className":2969,"dataFsResolvedFilePath":271,"href":272},[210],[115,2971,2482],{"id":2481},[120,2973,2974,2980,2985,2991,2997],{},[123,2975,2976,2979],{},[207,2977,569],{"className":2978,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,2981,2982,587],{},[207,2983,240],{"className":2984,"dataFsResolvedFilePath":585,"href":586},[210],[123,2986,2987,2990],{},[207,2988,384],{"className":2989,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,2992,2993,2996],{},[207,2994,578],{"className":2995,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,2998,2999,3002],{},[207,3000,369],{"className":3001,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3004,2506,3005],{"id":2505},[207,3006,43],{"className":3007,"dataFsResolvedFilePath":2510,"href":2511},[210],[120,3009,3010,3015,3020],{},[123,3011,3012],{},[207,3013,222],{"className":3014,"dataFsResolvedFilePath":220,"href":221},[210],[123,3016,3017],{},[207,3018,249],{"className":3019,"dataFsResolvedFilePath":247,"href":248},[210],[123,3021,3022],{},[207,3023,231],{"className":3024,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3026},[3027,3028,3032,3036,3037,3038,3039],{"id":2582,"depth":642,"text":2583},{"id":2653,"depth":642,"text":2654,"children":3029},[3030,3031],{"id":2657,"depth":649,"text":2658},{"id":2719,"depth":649,"text":2720},{"id":2743,"depth":642,"text":2744,"children":3033},[3034,3035],{"id":2747,"depth":649,"text":2748},{"id":2852,"depth":649,"text":2853},{"id":2879,"depth":642,"text":2880},{"id":2905,"depth":642,"text":2906},{"id":2481,"depth":642,"text":2482},{"id":2505,"depth":642,"text":2538},[658],{},"\u002Ftopics\u002Fisms",{"title":2557,"description":641},[3045,3046,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3049,3050,672,3051],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3054,"title":578,"body":3055,"course":659,"courses":3484,"created":660,"description":641,"extension":661,"meta":3485,"navigation":664,"path":3486,"seo":3487,"sources":3488,"stem":3491,"tags":3492,"type":2553,"updated":677,"__hash__":3497},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3056,"toc":3470},[3057,3060,3067,3074,3078,3116,3120,3124,3165,3169,3176,3179,3205,3209,3226,3230,3260,3264,3332,3336,3339,3356,3360,3397,3399,3436,3441],[12,3058,578],{"id":3059},"kybernetická-bezpečnost",[724,3061,3062],{},[1715,3063],{"alt":3064,"className":3065,"src":3066},"kb-defense-in-depth",[210,1719],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3068,3069,3070,3073],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3071,140],{"className":3072,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3075,3077],{"id":3076},"základní-pojmy","Základní pojmy",[120,3079,3080,3086,3092,3098,3104,3110],{},[123,3081,3082,3085],{},[38,3083,3084],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3087,3088,3091],{},[38,3089,3090],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3093,3094,3097],{},[38,3095,3096],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3099,3100,3103],{},[38,3101,3102],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3105,3106,3109],{},[38,3107,3108],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3111,3112,3115],{},[38,3113,3114],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3117,3119],{"id":3118},"typy-útoků","Typy útoků",[198,3121,3123],{"id":3122},"podle-cílení","Podle cílení",[16,3125,3126,3137],{},[19,3127,3128],{},[22,3129,3130,3132,3134],{},[25,3131,1650],{},[25,3133,1653],{},[25,3135,3136],{},"Cíl",[30,3138,3139,3152],{},[22,3140,3141,3146,3149],{},[35,3142,3143],{},[38,3144,3145],{},"Plošný",[35,3147,3148],{},"Útočníkovi je jedno, kdo je obětí",[35,3150,3151],{},"Botnety, spam, ransomware",[22,3153,3154,3159,3162],{},[35,3155,3156],{},[38,3157,3158],{},"Cílený (APT)",[35,3160,3161],{},"Soustředěná pozornost na konkrétní cíl",[35,3163,3164],{},"Špionáž, sabotáž, krádež dat",[198,3166,3168],{"id":3167},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3170,3171],{},[1715,3172],{"alt":3173,"className":3174,"src":3175},"apt-faze-utoku",[210,1719],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3177,3178],{},"4 fáze:",[152,3180,3181,3187,3193,3199],{},[123,3182,3183,3186],{},[38,3184,3185],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3188,3189,3192],{},[38,3190,3191],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3194,3195,3198],{},[38,3196,3197],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3200,3201,3204],{},[38,3202,3203],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3206,3208],{"id":3207},"základní-vektory-útoku","Základní vektory útoku",[120,3210,3211,3214,3217,3220,3223],{},[123,3212,3213],{},"Email s přílohou (spear phishing)",[123,3215,3216],{},"Trojanizované aplikace",[123,3218,3219],{},"Drive-by download (webové exploity)",[123,3221,3222],{},"Výměnná média (BadUSB)",[123,3224,3225],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3227,3229],{"id":3228},"software-útoky","Software útoky",[120,3231,3232,3238,3243,3249,3254],{},[123,3233,3234,3237],{},[38,3235,3236],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3239,3240,3242],{},[38,3241,1904],{}," — poškození HW\u002FSW",[123,3244,3245,3248],{},[38,3246,3247],{},"Trojské koně"," — skrytá funkčnost",[123,3250,3251,3253],{},[38,3252,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3255,3256,3259],{},[38,3257,3258],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3261,3263],{"id":3262},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3265,3266,3278],{},[19,3267,3268],{},[22,3269,3270,3273,3275],{},[25,3271,3272],{},"Útok",[25,3274,3136],{},[25,3276,3277],{},"Efekt",[30,3279,3280,3291,3301,3312,3322],{},[22,3281,3282,3285,3288],{},[35,3283,3284],{},"Content Spoofing",[35,3286,3287],{},"Klient",[35,3289,3290],{},"Ztráta přihlašovacích údajů",[22,3292,3293,3296,3298],{},[35,3294,3295],{},"XSS",[35,3297,3287],{},[35,3299,3300],{},"Přístup k cookies",[22,3302,3303,3306,3309],{},[35,3304,3305],{},"SQL Injection",[35,3307,3308],{},"Server",[35,3310,3311],{},"Neoprávněný přístup do DB",[22,3313,3314,3317,3319],{},[35,3315,3316],{},"DoS\u002FDDoS",[35,3318,3308],{},[35,3320,3321],{},"Nedostupnost služby",[22,3323,3324,3327,3329],{},[35,3325,3326],{},"Path Traversal",[35,3328,3308],{},[35,3330,3331],{},"Přístup k souborům",[115,3333,3335],{"id":3334},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3337,3338],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3340,3341,3344,3347,3350,3353],{},[123,3342,3343],{},"Vydávání se za právníka",[123,3345,3346],{},"Podvod na CEO",[123,3348,3349],{},"Krádež dat (personální oddělení)",[123,3351,3352],{},"Kompromitace účtu",[123,3354,3355],{},"Falešné faktury",[115,3357,3359],{"id":3358},"obranné-technologie","Obranné technologie",[120,3361,3362,3368,3374,3380,3386,3391],{},[123,3363,3364,3367],{},[38,3365,3366],{},"NAC"," — řízení přístupu k síti",[123,3369,3370,3373],{},[38,3371,3372],{},"IDS"," — detekce průniku (pasivní)",[123,3375,3376,3379],{},[38,3377,3378],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3381,3382,3385],{},[38,3383,3384],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3387,3388,2034],{},[38,3389,3390],{},"DLP",[123,3392,3393,3396],{},[38,3394,3395],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3398,2482],{"id":2481},[120,3400,3401,3407,3413,3419,3430],{},[123,3402,3403,3406],{},[207,3404,140],{"className":3405,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3408,3409,3412],{},[207,3410,569],{"className":3411,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3414,3415,3418],{},[207,3416,240],{"className":3417,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3420,3421,3424,3425,3429],{},[207,3422,384],{"className":3423,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3426,3428],{"className":3427,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3431,3432,3435],{},[207,3433,369],{"className":3434,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3437,2506,3438],{"id":2505},[207,3439,43],{"className":3440,"dataFsResolvedFilePath":2510,"href":2511},[210],[120,3442,3443,3448,3453,3458,3463],{},[123,3444,3445],{},[207,3446,2002],{"className":3447,"dataFsResolvedFilePath":406,"href":407},[210],[123,3449,3450],{},[207,3451,417],{"className":3452,"dataFsResolvedFilePath":415,"href":416},[210],[123,3454,3455],{},[207,3456,351],{"className":3457,"dataFsResolvedFilePath":349,"href":350},[210],[123,3459,3460],{},[207,3461,426],{"className":3462,"dataFsResolvedFilePath":424,"href":425},[210],[123,3464,3465],{},[207,3466,458],{"className":3467,"dataFsResolvedFilePath":3468,"href":3469},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3471},[3472,3473,3479,3480,3481,3482,3483],{"id":3076,"depth":642,"text":3077},{"id":3118,"depth":642,"text":3119,"children":3474},[3475,3476,3477,3478],{"id":3122,"depth":649,"text":3123},{"id":3167,"depth":649,"text":3168},{"id":3207,"depth":649,"text":3208},{"id":3228,"depth":649,"text":3229},{"id":3262,"depth":642,"text":3263},{"id":3334,"depth":642,"text":3335},{"id":3358,"depth":642,"text":3359},{"id":2481,"depth":642,"text":2482},{"id":2505,"depth":642,"text":2538},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3489,3490,3045],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3493,3494,1952,3495,3496],"utoky","apt","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3499,"title":369,"body":3500,"course":659,"courses":3761,"created":660,"description":641,"extension":661,"meta":3762,"navigation":664,"path":3763,"seo":3764,"sources":3765,"stem":3769,"tags":3770,"type":2553,"updated":677,"__hash__":3777},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3501,"toc":3747},[3502,3505,3512,3515,3519,3579,3583,3587,3598,3602,3613,3617,3625,3629,3640,3644,3649,3653,3664,3668,3688,3690,3722,3727],[12,3503,369],{"id":3504},"ochrana-dat",[724,3506,3507],{},[1715,3508],{"alt":3509,"className":3510,"src":3511},"ochrana-dat-technologie",[210,1719],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3513,3514],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3516,3518],{"id":3517},"formy-zneužití-dat","Formy zneužití dat",[16,3520,3521,3530],{},[19,3522,3523],{},[22,3524,3525,3528],{},[25,3526,3527],{},"Forma",[25,3529,1653],{},[30,3531,3532,3539,3547,3555,3563,3571],{},[22,3533,3534,3537],{},[35,3535,3536],{},"Zašifrování",[35,3538,435],{},[22,3540,3541,3544],{},[35,3542,3543],{},"Zveřejnění",[35,3545,3546],{},"Double ransomware",[22,3548,3549,3552],{},[35,3550,3551],{},"Odposlech",[35,3553,3554],{},"Pasivní sběr dat",[22,3556,3557,3560],{},[35,3558,3559],{},"Krádež",[35,3561,3562],{},"Cílená exfiltrace",[22,3564,3565,3568],{},[35,3566,3567],{},"Krádež dodavatelského řetězce",[35,3569,3570],{},"Triple ransomware",[22,3572,3573,3576],{},[35,3574,3575],{},"Prodej",[35,3577,3578],{},"Darknet marketplace",[115,3580,3582],{"id":3581},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3584,3586],{"id":3585},"nac-network-access-control","NAC (Network Access Control)",[120,3588,3589,3592,3595],{},[123,3590,3591],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3593,3594],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3596,3597],{},"Ekvivalenty: MDM, BYOD",[198,3599,3601],{"id":3600},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3603,3604,3607,3610],{},[123,3605,3606],{},"Monitoruje síťový provoz, generuje alerty",[123,3608,3609],{},"Pasivní systém — nezasahuje do provozu",[123,3611,3612],{},"Signaturová a anomální detekce",[198,3614,3616],{"id":3615},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3618,3619,3622],{},[123,3620,3621],{},"Aktivní systém — blokuje škodlivý provoz",[123,3623,3624],{},"Zařazen přímo do síťové cesty (in-line)",[198,3626,3628],{"id":3627},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3630,3631,3634,3637],{},[123,3632,3633],{},"Centralizovaná správa bezpečnostních logů",[123,3635,3636],{},"Sběr s agentem i bez agenta",[123,3638,3639],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3641,3643],{"id":3642},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3645,3646],{},[123,3647,3648],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3650,3652],{"id":3651},"šifrování","Šifrování",[120,3654,3655,3658,3661],{},[123,3656,3657],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3659,3660],{},"RSA (2048+ bit), DSS",[123,3662,3663],{},"SHA-256, SHA-1",[115,3665,3667],{"id":3666},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3669,3670,3676,3682,3685],{},[123,3671,3672,3675],{},[38,3673,3674],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3677,3678,3681],{},[38,3679,3680],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3683,3684],{},"Transportní a tunelovací režim",[123,3686,3687],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3689,2482],{"id":2481},[120,3691,3692,3698,3704,3710,3716],{},[123,3693,3694,3697],{},[207,3695,140],{"className":3696,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3699,3700,3703],{},[207,3701,578],{"className":3702,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3705,3706,3709],{},[207,3707,569],{"className":3708,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3711,3712,3715],{},[207,3713,351],{"className":3714,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3717,3718,3721],{},[207,3719,360],{"className":3720,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3723,2506,3724],{"id":2505},[207,3725,43],{"className":3726,"dataFsResolvedFilePath":2510,"href":2511},[210],[120,3728,3729,3735,3741],{},[123,3730,3731],{},[207,3732,3734],{"className":3733,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3736,3737],{},[207,3738,3740],{"className":3739,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3742,3743],{},[207,3744,3746],{"className":3745,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3748},[3749,3750,3758,3759,3760],{"id":3517,"depth":642,"text":3518},{"id":3581,"depth":642,"text":3582,"children":3751},[3752,3753,3754,3755,3756,3757],{"id":3585,"depth":649,"text":3586},{"id":3600,"depth":649,"text":3601},{"id":3615,"depth":649,"text":3616},{"id":3627,"depth":649,"text":3628},{"id":3642,"depth":649,"text":3643},{"id":3651,"depth":649,"text":3652},{"id":3666,"depth":642,"text":3667},{"id":2481,"depth":642,"text":2482},{"id":2505,"depth":642,"text":2538},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3766,3767,3768],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3504,3771,3772,3773,3774,3775,3776],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3779,"title":569,"body":3780,"course":659,"courses":4114,"created":660,"description":641,"extension":661,"meta":4115,"navigation":664,"path":4116,"seo":4117,"sources":4118,"stem":4119,"tags":4120,"type":2553,"updated":677,"__hash__":4126},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3781,"toc":4103},[3782,3785,3792,3798,3802,3866,3870,3920,3924,3929,3948,3952,3955,3959,3973,3977,4005,4009,4058,4060,4085,4090],[12,3783,569],{"id":3784},"řízení-rizik",[724,3786,3787],{},[1715,3788],{"alt":3789,"className":3790,"src":3791},"rizeni-rizik-proces",[210,1719],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3793,3794,3795,1961],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3796,140],{"className":3797,"dataFsResolvedFilePath":559,"href":560},[210],[115,3799,3801],{"id":3800},"normativní-základ","Normativní základ",[16,3803,3804,3814],{},[19,3805,3806],{},[22,3807,3808,3811],{},[25,3809,3810],{},"Norma",[25,3812,3813],{},"Zaměření",[30,3815,3816,3826,3836,3846,3856],{},[22,3817,3818,3823],{},[35,3819,3820],{},[38,3821,3822],{},"ISO 31000:2019",[35,3824,3825],{},"Obecné smrnice pro management rizik",[22,3827,3828,3833],{},[35,3829,3830],{},[38,3831,3832],{},"ISO 31010:2020",[35,3834,3835],{},"Techniky posuzování rizik",[22,3837,3838,3843],{},[35,3839,3840],{},[38,3841,3842],{},"ISO\u002FIEC 27005:2019",[35,3844,3845],{},"Řízení rizik bezpečnosti informací",[22,3847,3848,3853],{},[35,3849,3850],{},[38,3851,3852],{},"NIST SP 800-30",[35,3854,3855],{},"Průvodce hodnocením rizik",[22,3857,3858,3863],{},[35,3859,3860],{},[38,3861,3862],{},"NIST SP 800-39",[35,3864,3865],{},"Proces řízení bezpečnostních rizik",[115,3867,3869],{"id":3868},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,3871,3872,3878,3884,3890,3896,3902,3908,3914],{},[123,3873,3874,3877],{},[38,3875,3876],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,3879,3880,3883],{},[38,3881,3882],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,3885,3886,3889],{},[38,3887,3888],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,3891,3892,3895],{},[38,3893,3894],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,3897,3898,3901],{},[38,3899,3900],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,3903,3904,3907],{},[38,3905,3906],{},"Akceptace rizik"," — formální rozhodnutí",[123,3909,3910,3913],{},[38,3911,3912],{},"Komunikace"," — sdílení informací o rizicích",[123,3915,3916,3919],{},[38,3917,3918],{},"Monitorování"," — průběžné přezkoumávání",[115,3921,3923],{"id":3922},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,3925,3926],{},[38,3927,3928],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,3930,3931,3937,3942],{},[123,3932,3933,3936],{},[38,3934,3935],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,3938,3939,3941],{},[38,3940,3096],{}," — slabé místo aktiva (stupnice 1–5)",[123,3943,3944,3947],{},[38,3945,3946],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,3949,3951],{"id":3950},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,3953,3954],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,3956,3958],{"id":3957},"klíčové-dokumenty","Klíčové dokumenty",[120,3960,3961,3967],{},[123,3962,3963,3966],{},[38,3964,3965],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,3968,3969,3972],{},[38,3970,3971],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,3974,3976],{"id":3975},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,3978,3979,3985,3990,3995,4000],{},[123,3980,3981,3984],{},[38,3982,3983],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,3986,3987,3989],{},[38,3988,2813],{}," — odpovědný za ISMS",[123,3991,3992,3994],{},[38,3993,2824],{}," — návrh a implementace opatření",[123,3996,3997,3999],{},[38,3998,2834],{}," — provádění auditů",[123,4001,4002,4004],{},[38,4003,2844],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4006,4008],{"id":4007},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4010,4011,4023],{},[19,4012,4013],{},[22,4014,4015,4018,4020],{},[25,4016,4017],{},"Úroveň",[25,4019,3813],{},[25,4021,4022],{},"Typ rizika",[30,4024,4025,4036,4047],{},[22,4026,4027,4030,4033],{},[35,4028,4029],{},"Stupeň 1",[35,4031,4032],{},"Organizace",[35,4034,4035],{},"Strategické riziko",[22,4037,4038,4041,4044],{},[35,4039,4040],{},"Stupeň 2",[35,4042,4043],{},"Poslání\u002Fobchodní procesy",[35,4045,4046],{},"Taktické riziko",[22,4048,4049,4052,4055],{},[35,4050,4051],{},"Stupeň 3",[35,4053,4054],{},"Informační systémy",[35,4056,4057],{},"Operační riziko",[115,4059,2482],{"id":2481},[120,4061,4062,4068,4074,4080],{},[123,4063,4064,4067],{},[207,4065,140],{"className":4066,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4069,4070,4073],{},[207,4071,384],{"className":4072,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4075,4076,4079],{},[207,4077,393],{"className":4078,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4081,4082,3703],{},[207,4083,578],{"className":4084,"dataFsResolvedFilePath":576,"href":577},[210],[115,4086,2506,4087],{"id":2505},[207,4088,43],{"className":4089,"dataFsResolvedFilePath":2510,"href":2511},[210],[120,4091,4092,4098],{},[123,4093,4094],{},[207,4095,4097],{"className":4096,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4099,4100],{},[207,4101,222],{"className":4102,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4104},[4105,4106,4107,4108,4109,4110,4111,4112,4113],{"id":3800,"depth":642,"text":3801},{"id":3868,"depth":642,"text":3869},{"id":3922,"depth":642,"text":3923},{"id":3950,"depth":642,"text":3951},{"id":3957,"depth":642,"text":3958},{"id":3975,"depth":642,"text":3976},{"id":4007,"depth":642,"text":4008},{"id":2481,"depth":642,"text":2482},{"id":2505,"depth":642,"text":2538},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3046,3045],"topics\u002Frizeni-rizik",[658,4121,4122,4123,4124,4125],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4128,"title":4129,"body":4130,"course":659,"courses":4361,"created":660,"description":641,"extension":661,"meta":4362,"navigation":664,"path":4363,"seo":4364,"sources":4365,"stem":4367,"tags":4368,"type":2553,"updated":677,"__hash__":4373},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4131,"toc":4353},[4132,4135,4142,4145,4149,4248,4252,4287,4291,4311,4315,4318,4320,4340,4345],[12,4133,4129],{"id":4134},"sae-budování-bezpečnostního-povědomí",[724,4136,4137],{},[1715,4138],{"alt":4139,"className":4140,"src":4141},"sae-pyramida",[210,1719],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4143,4144],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4146,4148],{"id":4147},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4150,4151,4168],{},[19,4152,4153],{},[22,4154,4155,4157,4160,4162,4165],{},[25,4156,4017],{},[25,4158,4159],{},"Příznak",[25,4161,3136],{},[25,4163,4164],{},"Metody",[25,4166,4167],{},"Časový rámec",[30,4169,4170,4190,4210,4230],{},[22,4171,4172,4178,4181,4184,4187],{},[35,4173,4174,4177],{},[38,4175,4176],{},"Awareness"," (povědomí)",[35,4179,4180],{},"„Co\"",[35,4182,4183],{},"Rozpoznávání",[35,4185,4186],{},"Média, videa, plakáty",[35,4188,4189],{},"Krátkodobý",[22,4191,4192,4198,4201,4204,4207],{},[35,4193,4194,4197],{},[38,4195,4196],{},"Training"," (výcvik)",[35,4199,4200],{},"„Jak\"",[35,4202,4203],{},"Dovednosti",[35,4205,4206],{},"Přednášky, případovky, cvičení",[35,4208,4209],{},"Střednědobý",[22,4211,4212,4218,4221,4224,4227],{},[35,4213,4214,4217],{},[38,4215,4216],{},"Education"," (vzdělávání)",[35,4219,4220],{},"„Proč\"",[35,4222,4223],{},"Porozumění",[35,4225,4226],{},"Semináře, diskuze, výzkum",[35,4228,4229],{},"Dlouhodobý",[22,4231,4232,4237,4239,4242,4245],{},[35,4233,4234],{},[38,4235,4236],{},"Professional Development",[35,4238,2816],{},[35,4240,4241],{},"Profesní rozvoj",[35,4243,4244],{},"Certifikace, konference",[35,4246,4247],{},"Průběžný",[115,4249,4251],{"id":4250},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4253,4254,4257,4260,4263,4266,4269,4272,4275,4278,4281,4284],{},[123,4255,4256],{},"Role a odpovědnosti v programu",[123,4258,4259],{},"Stanovení cílů pro každou fázi",[123,4261,4262],{},"Rozdělení uživatelů (analýza)",[123,4264,4265],{},"Vytvoření školících materiálů dle skupin",[123,4267,4268],{},"Určení cíle pro každou skupinu",[123,4270,4271],{},"Témata pro každou relaci\u002Fkurz",[123,4273,4274],{},"Metody nasazení (metodiky)",[123,4276,4277],{},"Dokumentace a zpětná vazba",[123,4279,4280],{},"Vyhodnocení a aktualizace materiálů",[123,4282,4283],{},"Četnost opakování",[123,4285,4286],{},"Kalkulace",[115,4288,4290],{"id":4289},"modely-řízení","Modely řízení",[120,4292,4293,4299,4305],{},[123,4294,4295,4298],{},[38,4296,4297],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4300,4301,4304],{},[38,4302,4303],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4306,4307,4310],{},[38,4308,4309],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4312,4314],{"id":4313},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4316,4317],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4319,2482],{"id":2481},[120,4321,4322,4328,4334],{},[123,4323,4324,4327],{},[207,4325,140],{"className":4326,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4329,4330,4333],{},[207,4331,578],{"className":4332,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4335,4336,4339],{},[207,4337,569],{"className":4338,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4341,2506,4342],{"id":2505},[207,4343,43],{"className":4344,"dataFsResolvedFilePath":2510,"href":2511},[210],[120,4346,4347],{},[123,4348,4349],{},[207,4350,4352],{"className":4351,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4354},[4355,4356,4357,4358,4359,4360],{"id":4147,"depth":642,"text":4148},{"id":4250,"depth":642,"text":4251},{"id":4289,"depth":642,"text":4290},{"id":4313,"depth":642,"text":4314},{"id":2481,"depth":642,"text":2482},{"id":2505,"depth":642,"text":2538},[658],{},"\u002Ftopics\u002Fsae",{"title":4129,"description":641},[4366],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4369,4370,4371,4124,4372],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4375,4377,4381,4385,4389,4393],{"slug":658,"path":2511,"title":7,"snippet":4376},"… — APT, vektory, exploit\u002Fpayload - AI útoky — WormGPT, BEC, phishing - \u003C\u003Cimork-sitove-utoky>> — DDoS, spoofing, Emotet→Trickbot→Ryuk - Ransomware — historie 1989– …",{"slug":4378,"path":452,"title":4379,"snippet":4380},"imork-internetova-bezpecnost","Internetová bezpečnost — cvičení","… upce dat, degradace - **Zneužití** — neoprávněný přístup, eskalace práv - **Odposlech** — \u003C\u003Cimork-sitove-utoky>>, man-in-the-middle - **Právní** — nesoulad s legislativou, sankce ### ESET Top 10 hrozeb …",{"slug":4382,"path":434,"title":4383,"snippet":4384},"imork-ransomware","Ransomware — komplexní případová studie","… |Bezpečnostní analýzy]] — pravidelné hodnocení zranitelností ## Vazby na další témata - \u003C\u003Cimork-sitove-utoky>> — řetězec Emotet → Trickbot → Ryuk - Řízený hacking \u002F APT — APT …",{"slug":4386,"path":443,"title":4387,"snippet":4388},"imork-rizeny-hacking","Řízený hacking — Advanced Persistent Threat (APT)","… ata - Anatomie kybernetického útoku — obecný kill chain model - \u003C\u003Cimork-sitove-utoky>> — technické vektory průniku - TOR síť — anonymizace útočníků - [[ochrana-da …",{"slug":4390,"path":503,"title":4391,"snippet":4392},"imork-tor","TOR — The Onion Router","… - Řízený hacking \u002F APT — TOR jako nástroj anonymizace útočníků - \u003C\u003Cimork-sitove-utoky>> — sniffing na exit relay - Ransomware — TOR jako distribuční kanál - …",{"slug":673,"path":577,"title":578,"snippet":4394},"… ie kybernetického útoku]] - AI útoky - Bezpečnost webu - \u003C\u003Cimork-sitove-utoky>> - Případové studie",[4396],{"slug":4397,"title":4398,"path":467,"sharedTags":642},"imork-nemocnice","Případovka: Kybernetické útoky na české nemocnice",1777154962073]