[{"data":1,"prerenderedAt":4589},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork-www":1626,"course-stats-imork":2266,"course-topics-imork":2270,"backlinks-imork-www":4569,"related-imork-www":4587},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2265},{"id":1628,"title":1629,"body":1630,"course":658,"courses":659,"created":660,"description":641,"extension":661,"meta":2251,"navigation":664,"path":2252,"seo":2253,"sources":2254,"stem":2256,"tags":2257,"type":2263,"updated":677,"__hash__":2264},"summaries\u002Fsummaries\u002Fimork-www.md","Bezpečnost webových služeb",{"type":9,"value":1631,"toc":2229},[1632,1635,1639,1656,1660,1674,1678,1681,1696,1700,1703,1707,1710,1714,1724,1727,1731,1863,1867,1905,1909,1912,1916,1923,1959,1963,1977,1981,1984,2004,2017,2021,2035,2039,2042,2129,2133,2136,2168,2172,2178,2182,2189,2193,2196,2222,2226],[12,1633,1629],{"id":1634},"bezpečnost-webových-služeb",[115,1636,1638],{"id":1637},"základy-webu","Základy webu",[120,1640,1641,1647,1653],{},[123,1642,1643,1646],{},[38,1644,1645],{},"HTTP"," — protokol pro přenos hypertextu",[123,1648,1649,1652],{},[38,1650,1651],{},"HTML"," — značkovací jazyk webových stránek",[123,1654,1655],{},"Architektura klient–server",[115,1657,1659],{"id":1658},"historie-a-standardizace","Historie a standardizace",[120,1661,1662,1668],{},[123,1663,1664,1667],{},[38,1665,1666],{},"Tim Berners-Lee"," — tvůrce World Wide Web (1989)",[123,1669,1670,1673],{},[38,1671,1672],{},"W3C"," (World Wide Web Consortium) — standardizační organizace",[115,1675,1677],{"id":1676},"projekt-solid","Projekt Solid",[724,1679,1680],{},"Decentralizovaná platforma pro správu osobních dat:",[120,1682,1683,1690,1693],{},[123,1684,1685,1686,1689],{},"Uživatel vlastní svá data v ",[38,1687,1688],{},"POD"," (Personal Online Data store)",[123,1691,1692],{},"Aplikace žádají o přístup k datům",[123,1694,1695],{},"Oddělení dat od aplikací",[115,1697,1699],{"id":1698},"owasp-top-10","OWASP Top 10",[724,1701,1702],{},"Žebříček 10 nejkritičtějších bezpečnostních rizik webových aplikací (pravidelně aktualizovaný).",[115,1704,1706],{"id":1705},"důvěryhodnost-webu-web-credibility","Důvěryhodnost webu (Web Credibility)",[724,1708,1709],{},"Faktory ovlivňující vnímání důvěryhodnosti webových stránek uživateli.",[115,1711,1713],{"id":1712},"architektura-webových-aplikací","Architektura webových aplikací",[1715,1716,1721],"pre",{"className":1717,"code":1719,"language":1720},[1718],"language-text","Prohlížeč → Webový server → Databáze\n","text",[1722,1723,1719],"code",{"__ignoreMap":641},[724,1725,1726],{},"Každá vrstva představuje potenciální vektor útoku.",[115,1728,1730],{"id":1729},"typy-útoků-na-webové-aplikace","Typy útoků na webové aplikace",[16,1732,1733,1749],{},[19,1734,1735],{},[22,1736,1737,1740,1743,1746],{},[25,1738,1739],{},"Útok",[25,1741,1742],{},"Cíl",[25,1744,1745],{},"Efekt",[25,1747,1748],{},"Prevence",[30,1750,1751,1767,1784,1800,1816,1832,1848],{},[22,1752,1753,1758,1761,1764],{},[35,1754,1755],{},[38,1756,1757],{},"Content Spoofing",[35,1759,1760],{},"Obsah stránky",[35,1762,1763],{},"Falešný obsah",[35,1765,1766],{},"Validace vstupu",[22,1768,1769,1775,1778,1781],{},[35,1770,1771,1774],{},[38,1772,1773],{},"XSS"," (Cross-Site Scripting)",[35,1776,1777],{},"Prohlížeč uživatele",[35,1779,1780],{},"Krádež session, přesměrování",[35,1782,1783],{},"Escapování výstupu",[22,1785,1786,1791,1794,1797],{},[35,1787,1788],{},[38,1789,1790],{},"Session Fixation",[35,1792,1793],{},"Session ID",[35,1795,1796],{},"Převzetí relace",[35,1798,1799],{},"Regenerace session",[22,1801,1802,1807,1810,1813],{},[35,1803,1804],{},[38,1805,1806],{},"Path Traversal",[35,1808,1809],{},"Souborový systém",[35,1811,1812],{},"Přístup k souborům",[35,1814,1815],{},"Sanitizace cest",[22,1817,1818,1823,1826,1829],{},[35,1819,1820],{},[38,1821,1822],{},"DoS",[35,1824,1825],{},"Dostupnost služby",[35,1827,1828],{},"Výpadek",[35,1830,1831],{},"Rate limiting, WAF",[22,1833,1834,1839,1842,1845],{},[35,1835,1836],{},[38,1837,1838],{},"SQL Injection",[35,1840,1841],{},"Databáze",[35,1843,1844],{},"Únik\u002Fmodifikace dat",[35,1846,1847],{},"Parametrizované dotazy",[22,1849,1850,1855,1858,1861],{},[35,1851,1852],{},[38,1853,1854],{},"XPath Injection",[35,1856,1857],{},"XML data",[35,1859,1860],{},"Neautorizovaný přístup",[35,1862,1766],{},[115,1864,1866],{"id":1865},"w3c-6-bodů-bezpečnosti-webových-služeb","W3C — 6 bodů bezpečnosti webových služeb",[152,1868,1869,1875,1881,1887,1893,1899],{},[123,1870,1871,1874],{},[38,1872,1873],{},"Autentizace"," — ověření identity",[123,1876,1877,1880],{},[38,1878,1879],{},"Autorizace"," — kontrola oprávnění",[123,1882,1883,1886],{},[38,1884,1885],{},"Důvěrnost"," — ochrana dat před odposlechem",[123,1888,1889,1892],{},[38,1890,1891],{},"Integrita"," — ochrana před modifikací",[123,1894,1895,1898],{},[38,1896,1897],{},"Nepopiratelnost"," — důkaz o provedení akce",[123,1900,1901,1904],{},[38,1902,1903],{},"Dostupnost"," — zajištění přístupu ke službě",[115,1906,1908],{"id":1907},"nist-sp-800-95","NIST SP 800-95",[724,1910,1911],{},"Průvodce zabezpečením webových služeb — doporučení pro návrh, implementaci a provoz.",[115,1913,1915],{"id":1914},"ipsec-bezpečnost-na-l3","IPsec — bezpečnost na L3",[724,1917,1918,1919,1922],{},"Bezpečnostní protokol na síťové vrstvě (L3) dle ",[38,1920,1921],{},"RFC 4301",":",[16,1924,1925,1935],{},[19,1926,1927],{},[22,1928,1929,1932],{},[25,1930,1931],{},"Protokol",[25,1933,1934],{},"Funkce",[30,1936,1937,1948],{},[22,1938,1939,1945],{},[35,1940,1941,1944],{},[38,1942,1943],{},"AH"," (Authentication Header)",[35,1946,1947],{},"Autentizace a integrita paketů",[22,1949,1950,1956],{},[35,1951,1952,1955],{},[38,1953,1954],{},"ESP"," (Encapsulating Security Payload)",[35,1957,1958],{},"Šifrování + autentizace",[198,1960,1962],{"id":1961},"režimy-ipsec","Režimy IPsec",[120,1964,1965,1971],{},[123,1966,1967,1970],{},[38,1968,1969],{},"Transportní režim"," — šifruje pouze payload, hlavička zůstává; komunikace host-to-host",[123,1972,1973,1976],{},[38,1974,1975],{},"Tunelovací režim"," — šifruje celý paket včetně hlavičky; VPN gateway-to-gateway",[115,1978,1980],{"id":1979},"tls-bezpečnost-na-l4","TLS — bezpečnost na L4",[724,1982,1983],{},"Zabezpečení transportní vrstvy (L4) — 3 fáze handshaku:",[152,1985,1986,1992,1998],{},[123,1987,1988,1991],{},[38,1989,1990],{},"Dohoda"," — výběr šifrovací sady (cipher suite)",[123,1993,1994,1997],{},[38,1995,1996],{},"Výměna klíčů"," — autentizace serveru (volitelně klienta), výměna session klíčů",[123,1999,2000,2003],{},[38,2001,2002],{},"Šifrování"," — symetrické šifrování datového přenosu",[724,2005,2006,2007,1343,2010,1343,2013,2016],{},"Použití: ",[38,2008,2009],{},"HTTPS",[38,2011,2012],{},"SIP",[38,2014,2015],{},"VPN"," a další protokoly.",[115,2018,2020],{"id":2019},"ssl-architektura","SSL architektura",[120,2022,2023,2029],{},[123,2024,2025,2028],{},[38,2026,2027],{},"Bodové zabezpečení"," (point-to-point) — šifrování mezi dvěma koncovými body",[123,2030,2031,2034],{},[38,2032,2033],{},"Nevýhody",": zajišťuje pouze point-to-point, nikoli end-to-end zabezpečení; každý mezilehlý uzel musí dešifrovat a znovu zašifrovat",[115,2036,2038],{"id":2037},"xml-security","XML Security",[724,2040,2041],{},"Sada standardů pro zabezpečení XML-based webových služeb:",[16,2043,2044,2053],{},[19,2045,2046],{},[22,2047,2048,2051],{},[25,2049,2050],{},"Standard",[25,2052,1934],{},[30,2054,2055,2065,2075,2086,2097,2108,2119],{},[22,2056,2057,2062],{},[35,2058,2059],{},[38,2060,2061],{},"XML Digital Signature",[35,2063,2064],{},"Digitální podpis XML dokumentů",[22,2066,2067,2072],{},[35,2068,2069],{},[38,2070,2071],{},"XML Encryption",[35,2073,2074],{},"Šifrování XML dat",[22,2076,2077,2083],{},[35,2078,2079,2082],{},[38,2080,2081],{},"XKMS"," (XML Key Management Specification)",[35,2084,2085],{},"Správa klíčů pro XML",[22,2087,2088,2094],{},[35,2089,2090,2093],{},[38,2091,2092],{},"SAML"," (Security Assertion Markup Language)",[35,2095,2096],{},"Výměna autentizačních a autorizačních informací",[22,2098,2099,2105],{},[35,2100,2101,2104],{},[38,2102,2103],{},"XACML"," (eXtensible Access Control Markup Language)",[35,2106,2107],{},"Řízení přístupu na základě politik",[22,2109,2110,2116],{},[35,2111,2112,2115],{},[38,2113,2114],{},"WSS\u002FSOAP"," (Web Services Security)",[35,2117,2118],{},"Zabezpečení SOAP zpráv",[22,2120,2121,2126],{},[35,2122,2123],{},[38,2124,2125],{},"WS-Trust",[35,2127,2128],{},"Vydávání a validace bezpečnostních tokenů",[115,2130,2132],{"id":2131},"referenční-model-bezpečnosti-webu","Referenční model bezpečnosti webu",[724,2134,2135],{},"Pět klíčových oblastí:",[152,2137,2138,2144,2150,2156,2162],{},[123,2139,2140,2143],{},[38,2141,2142],{},"Security Management"," — řízení bezpečnostních politik a procesů",[123,2145,2146,2149],{},[38,2147,2148],{},"Identity Management"," — správa identit a autentizace",[123,2151,2152,2155],{},[38,2153,2154],{},"Message Security"," — zabezpečení zpráv (šifrování, podpisy)",[123,2157,2158,2161],{},[38,2159,2160],{},"Policy"," — definice a vynucování bezpečnostních pravidel",[123,2163,2164,2167],{},[38,2165,2166],{},"Access Control"," — řízení přístupu ke zdrojům",[115,2169,2171],{"id":2170},"data-diodes","Data diodes",[724,2173,2174,2177],{},[38,2175,2176],{},"Jednosměrné připojení"," (unidirectional gateway) — hardware zajišťující tok dat pouze jedním směrem. Použití pro ochranu důvěrnosti v kritických infrastrukturách — data mohou odcházet, ale nelze se dostat dovnitř (nebo naopak).",[115,2179,2181],{"id":2180},"berserk-vulnerability","BERserk vulnerability",[724,2183,2184,2185,2188],{},"Zranitelnost v implementaci ",[38,2186,2187],{},"RSA verifikace"," v knihovně Mozilla NSS (použité v Mozilla Firefox). Umožňovala útočníkovi obejít ověření RSA podpisu — opraveno v aktualizaci prohlížeče.",[115,2190,2192],{"id":2191},"důvěryhodné-webové-stránky-9-tipů","Důvěryhodné webové stránky — 9 tipů",[724,2194,2195],{},"Praktická doporučení pro ověření důvěryhodnosti webu:",[152,2197,2198,2204,2210,2216,2219],{},[123,2199,2200,2201,2203],{},"Kontrola ",[38,2202,2009],{}," a platnosti certifikátu",[123,2205,2206,2209],{},[38,2207,2208],{},"WHOIS"," lookup — ověření vlastníka domény",[123,2211,2212,2215],{},[38,2213,2214],{},"VirusTotal"," — skenování URL na malware",[123,2217,2218],{},"Antiphishing certifikát a další bezpečnostní indikátory",[123,2220,2221],{},"Kontrola kontaktních údajů, obchodních podmínek, grafické kvality a dalších signálů důvěryhodnosti",[115,2223,2225],{"id":2224},"ssl-certifikáty","SSL certifikáty",[724,2227,2228],{},"Zabezpečení komunikace pomocí SSL\u002FTLS certifikátů — šifrování přenosu mezi klientem a serverem.",{"title":641,"searchDepth":642,"depth":642,"links":2230},[2231,2232,2233,2234,2235,2236,2237,2238,2239,2240,2243,2244,2245,2246,2247,2248,2249,2250],{"id":1637,"depth":642,"text":1638},{"id":1658,"depth":642,"text":1659},{"id":1676,"depth":642,"text":1677},{"id":1698,"depth":642,"text":1699},{"id":1705,"depth":642,"text":1706},{"id":1712,"depth":642,"text":1713},{"id":1729,"depth":642,"text":1730},{"id":1865,"depth":642,"text":1866},{"id":1907,"depth":642,"text":1908},{"id":1914,"depth":642,"text":1915,"children":2241},[2242],{"id":1961,"depth":649,"text":1962},{"id":1979,"depth":642,"text":1980},{"id":2019,"depth":642,"text":2020},{"id":2037,"depth":642,"text":2038},{"id":2131,"depth":642,"text":2132},{"id":2170,"depth":642,"text":2171},{"id":2180,"depth":642,"text":2181},{"id":2191,"depth":642,"text":2192},{"id":2224,"depth":642,"text":2225},{},"\u002Fsummaries\u002Fimork-www",{"title":1629,"description":641},[2255],"raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","summaries\u002Fimork-www",[658,2258,2259,2260,2261,2262,2037,2170],"web","owasp","ssl","tls","ipsec","summary","NtqD5cx58Oypgzw-KYPhyTg-ua79Twvq7U-2qrXc2wg","summaries",{"zapisku":1624,"topics":2267,"summaries":2268,"outputs":2269},6,35,0,[2271,2761,3256,3697,3972,4322],{"id":2272,"title":2273,"body":2274,"course":659,"courses":2745,"created":660,"description":641,"extension":661,"meta":2746,"navigation":664,"path":2747,"seo":2748,"sources":2749,"stem":2752,"tags":2753,"type":2759,"updated":677,"__hash__":2760},"topics\u002Ftopics\u002Fbcm.md","BCM — Řízení kontinuity činnosti",{"type":9,"value":2275,"toc":2732},[2276,2279,2288,2291,2295,2389,2393,2447,2451,2474,2478,2567,2571,2574,2578,2655,2659,2685,2689,2709,2718],[12,2277,2273],{"id":2278},"bcm-řízení-kontinuity-činnosti",[724,2280,2281],{},[2282,2283],"img",{"alt":2284,"className":2285,"src":2287},"bcm-rpo-rto",[210,2286],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2289,2290],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2292,2294],{"id":2293},"klíčové-pojmy","Klíčové pojmy",[16,2296,2297,2310],{},[19,2298,2299],{},[22,2300,2301,2304,2307],{},[25,2302,2303],{},"Pojem",[25,2305,2306],{},"Anglicky",[25,2308,2309],{},"Popis",[30,2311,2312,2325,2337,2350,2363,2376],{},[22,2313,2314,2319,2322],{},[35,2315,2316],{},[38,2317,2318],{},"BCMS",[35,2320,2321],{},"Business Continuity Management System",[35,2323,2324],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2326,2327,2331,2334],{},[35,2328,2329],{},[38,2330,384],{},[35,2332,2333],{},"Business Continuity Management",[35,2335,2336],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2338,2339,2344,2347],{},[35,2340,2341],{},[38,2342,2343],{},"BIA",[35,2345,2346],{},"Business Impact Analysis",[35,2348,2349],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2351,2352,2357,2360],{},[35,2353,2354],{},[38,2355,2356],{},"MBCO",[35,2358,2359],{},"Minimum Business Continuity Objective",[35,2361,2362],{},"Minimální přijatelná úroveň služeb",[22,2364,2365,2370,2373],{},[35,2366,2367],{},[38,2368,2369],{},"RPO",[35,2371,2372],{},"Recovery Point Objective",[35,2374,2375],{},"Do jakého bodu v minulosti lze obnovit data",[22,2377,2378,2383,2386],{},[35,2379,2380],{},[38,2381,2382],{},"RTO",[35,2384,2385],{},"Recovery Time Objective",[35,2387,2388],{},"Čas potřebný pro obnovu provozu",[115,2390,2392],{"id":2391},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2394,2395,2405],{},[19,2396,2397],{},[22,2398,2399,2402],{},[25,2400,2401],{},"Fáze",[25,2403,2404],{},"Obsah",[30,2406,2407,2417,2427,2437],{},[22,2408,2409,2414],{},[35,2410,2411],{},[38,2412,2413],{},"Plan",[35,2415,2416],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2418,2419,2424],{},[35,2420,2421],{},[38,2422,2423],{},"Do",[35,2425,2426],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2428,2429,2434],{},[35,2430,2431],{},[38,2432,2433],{},"Check",[35,2435,2436],{},"Monitoring, audit, přezkoumání managementem",[22,2438,2439,2444],{},[35,2440,2441],{},[38,2442,2443],{},"Act",[35,2445,2446],{},"Nápravná opatření, neustálé zlepšování",[115,2448,2450],{"id":2449},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2452,2453,2456,2459,2462,2465,2468,2471],{},[123,2454,2455],{},"Kap. 4 — kontext organizace",[123,2457,2458],{},"Kap. 5 — vedení (leadership)",[123,2460,2461],{},"Kap. 6 — plánování (BIA, rizika)",[123,2463,2464],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2466,2467],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2469,2470],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2472,2473],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2475,2477],{"id":2476},"analýza-steeple","Analýza STEEPLE",[16,2479,2480,2490],{},[19,2481,2482],{},[22,2483,2484,2487],{},[25,2485,2486],{},"Faktor",[25,2488,2489],{},"Oblast",[30,2491,2492,2503,2514,2525,2535,2546,2557],{},[22,2493,2494,2500],{},[35,2495,2496,2499],{},[38,2497,2498],{},"S","ociální",[35,2501,2502],{},"Zaměstnanost, bezpečnost, komunity",[22,2504,2505,2511],{},[35,2506,2507,2510],{},[38,2508,2509],{},"T","echnologický",[35,2512,2513],{},"Závislost na technologiích",[22,2515,2516,2522],{},[35,2517,2518,2521],{},[38,2519,2520],{},"E","konomický",[35,2523,2524],{},"Ekonomická situace, finanční instituce",[22,2526,2527,2532],{},[35,2528,2529,2531],{},[38,2530,2520],{},"tický",[35,2533,2534],{},"Podnikatelská etika, média, veřejnost",[22,2536,2537,2543],{},[35,2538,2539,2542],{},[38,2540,2541],{},"P","olitický",[35,2544,2545],{},"Politický systém, hrozba nepokojů",[22,2547,2548,2554],{},[35,2549,2550,2553],{},[38,2551,2552],{},"L","egislativní",[35,2555,2556],{},"Předpisy, zákony",[22,2558,2559,2564],{},[35,2560,2561,2563],{},[38,2562,2520],{},"nvironmentální",[35,2565,2566],{},"Životní prostředí, přírodní hrozby",[115,2568,2570],{"id":2569},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2572,2573],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2575,2577],{"id":2576},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2579,2580,2589],{},[19,2581,2582],{},[22,2583,2584,2587],{},[25,2585,2586],{},"Tier",[25,2588,2309],{},[30,2590,2591,2599,2607,2615,2623,2631,2639,2647],{},[22,2592,2593,2596],{},[35,2594,2595],{},"0",[35,2597,2598],{},"Žádná off-site data",[22,2600,2601,2604],{},[35,2602,2603],{},"1",[35,2605,2606],{},"Fyzická záloha + cold site",[22,2608,2609,2612],{},[35,2610,2611],{},"2",[35,2613,2614],{},"Fyzická záloha + hot site",[22,2616,2617,2620],{},[35,2618,2619],{},"3",[35,2621,2622],{},"Elektronický trezor (electronic vaulting)",[22,2624,2625,2628],{},[35,2626,2627],{},"4",[35,2629,2630],{},"Point-in-time recovery",[22,2632,2633,2636],{},[35,2634,2635],{},"5",[35,2637,2638],{},"Two-site commit (kontinuální přenos)",[22,2640,2641,2644],{},[35,2642,2643],{},"6",[35,2645,2646],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2648,2649,2652],{},[35,2650,2651],{},"7",[35,2653,2654],{},"Automatizovaná obnova (AI monitoring)",[198,2656,2658],{"id":2657},"cloud-dr","Cloud DR",[120,2660,2661,2667,2673,2679],{},[123,2662,2663,2666],{},[38,2664,2665],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2668,2669,2672],{},[38,2670,2671],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2674,2675,2678],{},[38,2676,2677],{},"Hot DR"," — paralelní řešení v tandemu",[123,2680,2681,2684],{},[38,2682,2683],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2686,2688],{"id":2687},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2690,2691,2697,2703],{},[123,2692,2693,2696],{},[207,2694,140],{"className":2695,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2698,2699,2702],{},[207,2700,569],{"className":2701,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2704,2705,2708],{},[207,2706,578],{"className":2707,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2710,2712,2713],{"id":2711},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2714,43],{"className":2715,"dataFsResolvedFilePath":2716,"href":2717},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2719,2720,2726],{},[123,2721,2722],{},[207,2723,2725],{"className":2724,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2727,2728],{},[207,2729,2731],{"className":2730,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2733},[2734,2735,2736,2737,2738,2742,2743],{"id":2293,"depth":642,"text":2294},{"id":2391,"depth":642,"text":2392},{"id":2449,"depth":642,"text":2450},{"id":2476,"depth":642,"text":2477},{"id":2569,"depth":642,"text":2570,"children":2739},[2740,2741],{"id":2576,"depth":649,"text":2577},{"id":2657,"depth":649,"text":2658},{"id":2687,"depth":642,"text":2688},{"id":2711,"depth":642,"text":2744},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2273,"description":641},[2750,2751],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2754,2755,2756,2757,2758],"bcm","kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2762,"title":2763,"body":2764,"course":659,"courses":3243,"created":660,"description":641,"extension":661,"meta":3244,"navigation":664,"path":3245,"seo":3246,"sources":3247,"stem":3250,"tags":3251,"type":2759,"updated":677,"__hash__":3255},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2765,"toc":3228},[2766,2769,2776,2783,2786,2790,2853,2857,2861,2920,2924,2944,2948,2952,3053,3057,3080,3084,3106,3110,3117,3173,3175,3206,3211],[12,2767,2763],{"id":2768},"isms-systém-řízení-bezpečnosti-informací",[724,2770,2771],{},[2282,2772],{"alt":2773,"className":2774,"src":2775},"isms-pdca-cyklus",[210,2286],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2777,2778],{},[2282,2779],{"alt":2780,"className":2781,"src":2782},"isms-oborova-mapa",[210,2286],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2784,2785],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2787,2789],{"id":2788},"základní-pilíře","Základní pilíře",[16,2791,2792,2803],{},[19,2793,2794],{},[22,2795,2796,2799,2801],{},[25,2797,2798],{},"Pilíř",[25,2800,2306],{},[25,2802,2309],{},[30,2804,2805,2817,2829,2841],{},[22,2806,2807,2811,2814],{},[35,2808,2809],{},[38,2810,1885],{},[35,2812,2813],{},"Confidentiality",[35,2815,2816],{},"Přístup pouze oprávněným osobám",[22,2818,2819,2823,2826],{},[35,2820,2821],{},[38,2822,1891],{},[35,2824,2825],{},"Integrity",[35,2827,2828],{},"Ochrana před neoprávněnou změnou",[22,2830,2831,2835,2838],{},[35,2832,2833],{},[38,2834,1903],{},[35,2836,2837],{},"Availability",[35,2839,2840],{},"Systémy a data dostupné v potřebný čas",[22,2842,2843,2847,2850],{},[35,2844,2845],{},[38,2846,1897],{},[35,2848,2849],{},"Non-repudiation",[35,2851,2852],{},"Prokázání autorství akce",[115,2854,2856],{"id":2855},"normativní-rámec","Normativní rámec",[198,2858,2860],{"id":2859},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2862,2863,2869,2875,2886,2892,2902,2911],{},[123,2864,2865,2868],{},[38,2866,2867],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2870,2871,2874],{},[38,2872,2873],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2876,2877,2880,2881,2885],{},[38,2878,2879],{},"ISO\u002FIEC 27005"," — ",[207,2882,2884],{"className":2883,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2887,2888,2891],{},[38,2889,2890],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2893,2894,2897,2898],{},[38,2895,2896],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2899,2901],{"className":2900,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2903,2904,2897,2907],{},[38,2905,2906],{},"ISO\u002FIEC 27019",[207,2908,2910],{"className":2909,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2912,2913,2897,2916],{},[38,2914,2915],{},"ISO\u002FIEC 27799",[207,2917,2919],{"className":2918,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2921,2923],{"id":2922},"další-rámce","Další rámce",[120,2925,2926,2932,2938],{},[123,2927,2928,2931],{},[38,2929,2930],{},"NIST"," — americké standardy (SP 800 řada)",[123,2933,2934,2937],{},[38,2935,2936],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2939,2940,2943],{},[38,2941,2942],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2945,2947],{"id":2946},"governance-řízení","Governance (řízení)",[198,2949,2951],{"id":2950},"bezpečnostní-role","Bezpečnostní role",[16,2953,2954,2966],{},[19,2955,2956],{},[22,2957,2958,2961,2963],{},[25,2959,2960],{},"Role",[25,2962,40],{},[25,2964,2965],{},"Odpovědnost",[30,2967,2968,2979,2990,3001,3012,3023,3033,3043],{},[22,2969,2970,2973,2976],{},[35,2971,2972],{},"Chief Information Officer",[35,2974,2975],{},"CIO",[35,2977,2978],{},"Celkové řízení ICT",[22,2980,2981,2984,2987],{},[35,2982,2983],{},"Chief Information Security Officer",[35,2985,2986],{},"CISO",[35,2988,2989],{},"Řízení informační bezpečnosti",[22,2991,2992,2995,2998],{},[35,2993,2994],{},"Chief Technology Officer",[35,2996,2997],{},"CTO",[35,2999,3000],{},"Technologická strategie",[22,3002,3003,3006,3009],{},[35,3004,3005],{},"IS Security Officer",[35,3007,3008],{},"ISSO",[35,3010,3011],{},"Bezpečnost IS",[22,3013,3014,3017,3020],{},[35,3015,3016],{},"Manažer KB",[35,3018,3019],{},"—",[35,3021,3022],{},"Odpovědný za ISMS",[22,3024,3025,3028,3030],{},[35,3026,3027],{},"Architekt KB",[35,3029,3019],{},[35,3031,3032],{},"Návrh a implementace opatření",[22,3034,3035,3038,3040],{},[35,3036,3037],{},"Auditor KB",[35,3039,3019],{},[35,3041,3042],{},"Provádění auditů",[22,3044,3045,3048,3050],{},[35,3046,3047],{},"Garant aktiva",[35,3049,3019],{},[35,3051,3052],{},"Rozvoj, použití a bezpečnost aktiva",[198,3054,3056],{"id":3055},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,3058,3059,3065,3074],{},[123,3060,3061,3064],{},[38,3062,3063],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,3066,3067,3070,3071],{},[38,3068,3069],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,3072,240],{"className":3073,"dataFsResolvedFilePath":585,"href":586},[210],[123,3075,3076,3079],{},[38,3077,3078],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,3081,3083],{"id":3082},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,3085,3086,3091,3096,3101],{},[123,3087,3088,3090],{},[38,3089,2413],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,3092,3093,3095],{},[38,3094,2423],{}," — implementace opatření, řízení rizik",[123,3097,3098,3100],{},[38,3099,2433],{}," — monitorování, audit, přezkoumání",[123,3102,3103,3105],{},[38,3104,2443],{}," — nápravná opatření, neustálé zlepšování",[115,3107,3109],{"id":3108},"oborová-řešení-isms","Oborová řešení ISMS",[724,3111,3112,3113,3116],{},"Kurz ",[207,3114,43],{"className":3115,"dataFsResolvedFilePath":2716,"href":2717},[210]," pokrývá ISMS specifika pro:",[120,3118,3119,3125,3131,3138,3144,3151,3157,3163,3168],{},[123,3120,3121],{},[207,3122,3124],{"className":3123,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,3126,3127,3130],{},[207,3128,282],{"className":3129,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,3132,3133,3137],{},[207,3134,3136],{"className":3135,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,3139,3140,3143],{},[207,3141,300],{"className":3142,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,3145,3146,3150],{},[207,3147,3149],{"className":3148,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,3152,3153,3156],{},[207,3154,318],{"className":3155,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,3158,3159,3162],{},[207,3160,327],{"className":3161,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,3164,3165],{},[207,3166,336],{"className":3167,"dataFsResolvedFilePath":334,"href":335},[210],[123,3169,3170],{},[207,3171,273],{"className":3172,"dataFsResolvedFilePath":271,"href":272},[210],[115,3174,2688],{"id":2687},[120,3176,3177,3183,3188,3194,3200],{},[123,3178,3179,3182],{},[207,3180,569],{"className":3181,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,3184,3185,587],{},[207,3186,240],{"className":3187,"dataFsResolvedFilePath":585,"href":586},[210],[123,3189,3190,3193],{},[207,3191,384],{"className":3192,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,3195,3196,3199],{},[207,3197,578],{"className":3198,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3201,3202,3205],{},[207,3203,369],{"className":3204,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3207,2712,3208],{"id":2711},[207,3209,43],{"className":3210,"dataFsResolvedFilePath":2716,"href":2717},[210],[120,3212,3213,3218,3223],{},[123,3214,3215],{},[207,3216,222],{"className":3217,"dataFsResolvedFilePath":220,"href":221},[210],[123,3219,3220],{},[207,3221,249],{"className":3222,"dataFsResolvedFilePath":247,"href":248},[210],[123,3224,3225],{},[207,3226,231],{"className":3227,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3229},[3230,3231,3235,3239,3240,3241,3242],{"id":2788,"depth":642,"text":2789},{"id":2855,"depth":642,"text":2856,"children":3232},[3233,3234],{"id":2859,"depth":649,"text":2860},{"id":2922,"depth":649,"text":2923},{"id":2946,"depth":642,"text":2947,"children":3236},[3237,3238],{"id":2950,"depth":649,"text":2951},{"id":3055,"depth":649,"text":3056},{"id":3082,"depth":642,"text":3083},{"id":3108,"depth":642,"text":3109},{"id":2687,"depth":642,"text":2688},{"id":2711,"depth":642,"text":2744},[658],{},"\u002Ftopics\u002Fisms",{"title":2763,"description":641},[3248,3249,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3252,3253,672,3254],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3257,"title":578,"body":3258,"course":659,"courses":3683,"created":660,"description":641,"extension":661,"meta":3684,"navigation":664,"path":3685,"seo":3686,"sources":3687,"stem":3690,"tags":3691,"type":2759,"updated":677,"__hash__":3696},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3259,"toc":3669},[3260,3263,3270,3277,3281,3319,3323,3327,3368,3372,3379,3382,3408,3412,3429,3433,3464,3468,3529,3533,3536,3553,3557,3595,3597,3634,3639],[12,3261,578],{"id":3262},"kybernetická-bezpečnost",[724,3264,3265],{},[2282,3266],{"alt":3267,"className":3268,"src":3269},"kb-defense-in-depth",[210,2286],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3271,3272,3273,3276],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3274,140],{"className":3275,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3278,3280],{"id":3279},"základní-pojmy","Základní pojmy",[120,3282,3283,3289,3295,3301,3307,3313],{},[123,3284,3285,3288],{},[38,3286,3287],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3290,3291,3294],{},[38,3292,3293],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3296,3297,3300],{},[38,3298,3299],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3302,3303,3306],{},[38,3304,3305],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3308,3309,3312],{},[38,3310,3311],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3314,3315,3318],{},[38,3316,3317],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3320,3322],{"id":3321},"typy-útoků","Typy útoků",[198,3324,3326],{"id":3325},"podle-cílení","Podle cílení",[16,3328,3329,3340],{},[19,3330,3331],{},[22,3332,3333,3336,3338],{},[25,3334,3335],{},"Typ",[25,3337,2309],{},[25,3339,1742],{},[30,3341,3342,3355],{},[22,3343,3344,3349,3352],{},[35,3345,3346],{},[38,3347,3348],{},"Plošný",[35,3350,3351],{},"Útočníkovi je jedno, kdo je obětí",[35,3353,3354],{},"Botnety, spam, ransomware",[22,3356,3357,3362,3365],{},[35,3358,3359],{},[38,3360,3361],{},"Cílený (APT)",[35,3363,3364],{},"Soustředěná pozornost na konkrétní cíl",[35,3366,3367],{},"Špionáž, sabotáž, krádež dat",[198,3369,3371],{"id":3370},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3373,3374],{},[2282,3375],{"alt":3376,"className":3377,"src":3378},"apt-faze-utoku",[210,2286],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3380,3381],{},"4 fáze:",[152,3383,3384,3390,3396,3402],{},[123,3385,3386,3389],{},[38,3387,3388],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3391,3392,3395],{},[38,3393,3394],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3397,3398,3401],{},[38,3399,3400],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3403,3404,3407],{},[38,3405,3406],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3409,3411],{"id":3410},"základní-vektory-útoku","Základní vektory útoku",[120,3413,3414,3417,3420,3423,3426],{},[123,3415,3416],{},"Email s přílohou (spear phishing)",[123,3418,3419],{},"Trojanizované aplikace",[123,3421,3422],{},"Drive-by download (webové exploity)",[123,3424,3425],{},"Výměnná média (BadUSB)",[123,3427,3428],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3430,3432],{"id":3431},"software-útoky","Software útoky",[120,3434,3435,3441,3447,3453,3458],{},[123,3436,3437,3440],{},[38,3438,3439],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3442,3443,3446],{},[38,3444,3445],{},"Viry"," — poškození HW\u002FSW",[123,3448,3449,3452],{},[38,3450,3451],{},"Trojské koně"," — skrytá funkčnost",[123,3454,3455,3457],{},[38,3456,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3459,3460,3463],{},[38,3461,3462],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3465,3467],{"id":3466},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3469,3470,3480],{},[19,3471,3472],{},[22,3473,3474,3476,3478],{},[25,3475,1739],{},[25,3477,1742],{},[25,3479,1745],{},[30,3481,3482,3492,3501,3511,3521],{},[22,3483,3484,3486,3489],{},[35,3485,1757],{},[35,3487,3488],{},"Klient",[35,3490,3491],{},"Ztráta přihlašovacích údajů",[22,3493,3494,3496,3498],{},[35,3495,1773],{},[35,3497,3488],{},[35,3499,3500],{},"Přístup k cookies",[22,3502,3503,3505,3508],{},[35,3504,1838],{},[35,3506,3507],{},"Server",[35,3509,3510],{},"Neoprávněný přístup do DB",[22,3512,3513,3516,3518],{},[35,3514,3515],{},"DoS\u002FDDoS",[35,3517,3507],{},[35,3519,3520],{},"Nedostupnost služby",[22,3522,3523,3525,3527],{},[35,3524,1806],{},[35,3526,3507],{},[35,3528,1812],{},[115,3530,3532],{"id":3531},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3534,3535],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3537,3538,3541,3544,3547,3550],{},[123,3539,3540],{},"Vydávání se za právníka",[123,3542,3543],{},"Podvod na CEO",[123,3545,3546],{},"Krádež dat (personální oddělení)",[123,3548,3549],{},"Kompromitace účtu",[123,3551,3552],{},"Falešné faktury",[115,3554,3556],{"id":3555},"obranné-technologie","Obranné technologie",[120,3558,3559,3565,3571,3577,3583,3589],{},[123,3560,3561,3564],{},[38,3562,3563],{},"NAC"," — řízení přístupu k síti",[123,3566,3567,3570],{},[38,3568,3569],{},"IDS"," — detekce průniku (pasivní)",[123,3572,3573,3576],{},[38,3574,3575],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3578,3579,3582],{},[38,3580,3581],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3584,3585,3588],{},[38,3586,3587],{},"DLP"," — prevence úniku dat",[123,3590,3591,3594],{},[38,3592,3593],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3596,2688],{"id":2687},[120,3598,3599,3605,3611,3617,3628],{},[123,3600,3601,3604],{},[207,3602,140],{"className":3603,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3606,3607,3610],{},[207,3608,569],{"className":3609,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3612,3613,3616],{},[207,3614,240],{"className":3615,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3618,3619,3622,3623,3627],{},[207,3620,384],{"className":3621,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3624,3626],{"className":3625,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3629,3630,3633],{},[207,3631,369],{"className":3632,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3635,2712,3636],{"id":2711},[207,3637,43],{"className":3638,"dataFsResolvedFilePath":2716,"href":2717},[210],[120,3640,3641,3647,3652,3657,3662],{},[123,3642,3643],{},[207,3644,3646],{"className":3645,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3648,3649],{},[207,3650,417],{"className":3651,"dataFsResolvedFilePath":415,"href":416},[210],[123,3653,3654],{},[207,3655,351],{"className":3656,"dataFsResolvedFilePath":349,"href":350},[210],[123,3658,3659],{},[207,3660,426],{"className":3661,"dataFsResolvedFilePath":424,"href":425},[210],[123,3663,3664],{},[207,3665,458],{"className":3666,"dataFsResolvedFilePath":3667,"href":3668},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3670},[3671,3672,3678,3679,3680,3681,3682],{"id":3279,"depth":642,"text":3280},{"id":3321,"depth":642,"text":3322,"children":3673},[3674,3675,3676,3677],{"id":3325,"depth":649,"text":3326},{"id":3370,"depth":649,"text":3371},{"id":3410,"depth":649,"text":3411},{"id":3431,"depth":649,"text":3432},{"id":3466,"depth":642,"text":3467},{"id":3531,"depth":642,"text":3532},{"id":3555,"depth":642,"text":3556},{"id":2687,"depth":642,"text":2688},{"id":2711,"depth":642,"text":2744},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3688,3689,3248],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3692,3693,3694,3695,2259],"utoky","apt","ransomware","phishing","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3698,"title":369,"body":3699,"course":659,"courses":3956,"created":660,"description":641,"extension":661,"meta":3957,"navigation":664,"path":3958,"seo":3959,"sources":3960,"stem":3963,"tags":3964,"type":2759,"updated":677,"__hash__":3971},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3700,"toc":3942},[3701,3704,3711,3714,3718,3778,3782,3786,3797,3801,3812,3816,3824,3828,3839,3843,3848,3851,3862,3866,3884,3886,3918,3923],[12,3702,369],{"id":3703},"ochrana-dat",[724,3705,3706],{},[2282,3707],{"alt":3708,"className":3709,"src":3710},"ochrana-dat-technologie",[210,2286],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3712,3713],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3715,3717],{"id":3716},"formy-zneužití-dat","Formy zneužití dat",[16,3719,3720,3729],{},[19,3721,3722],{},[22,3723,3724,3727],{},[25,3725,3726],{},"Forma",[25,3728,2309],{},[30,3730,3731,3738,3746,3754,3762,3770],{},[22,3732,3733,3736],{},[35,3734,3735],{},"Zašifrování",[35,3737,435],{},[22,3739,3740,3743],{},[35,3741,3742],{},"Zveřejnění",[35,3744,3745],{},"Double ransomware",[22,3747,3748,3751],{},[35,3749,3750],{},"Odposlech",[35,3752,3753],{},"Pasivní sběr dat",[22,3755,3756,3759],{},[35,3757,3758],{},"Krádež",[35,3760,3761],{},"Cílená exfiltrace",[22,3763,3764,3767],{},[35,3765,3766],{},"Krádež dodavatelského řetězce",[35,3768,3769],{},"Triple ransomware",[22,3771,3772,3775],{},[35,3773,3774],{},"Prodej",[35,3776,3777],{},"Darknet marketplace",[115,3779,3781],{"id":3780},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3783,3785],{"id":3784},"nac-network-access-control","NAC (Network Access Control)",[120,3787,3788,3791,3794],{},[123,3789,3790],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3792,3793],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3795,3796],{},"Ekvivalenty: MDM, BYOD",[198,3798,3800],{"id":3799},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3802,3803,3806,3809],{},[123,3804,3805],{},"Monitoruje síťový provoz, generuje alerty",[123,3807,3808],{},"Pasivní systém — nezasahuje do provozu",[123,3810,3811],{},"Signaturová a anomální detekce",[198,3813,3815],{"id":3814},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3817,3818,3821],{},[123,3819,3820],{},"Aktivní systém — blokuje škodlivý provoz",[123,3822,3823],{},"Zařazen přímo do síťové cesty (in-line)",[198,3825,3827],{"id":3826},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3829,3830,3833,3836],{},[123,3831,3832],{},"Centralizovaná správa bezpečnostních logů",[123,3834,3835],{},"Sběr s agentem i bez agenta",[123,3837,3838],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3840,3842],{"id":3841},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3844,3845],{},[123,3846,3847],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3849,2002],{"id":3850},"šifrování",[120,3852,3853,3856,3859],{},[123,3854,3855],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3857,3858],{},"RSA (2048+ bit), DSS",[123,3860,3861],{},"SHA-256, SHA-1",[115,3863,3865],{"id":3864},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3867,3868,3873,3878,3881],{},[123,3869,3870,3872],{},[38,3871,1943],{}," (Authentication Header) — ověření odesílatele a integrity",[123,3874,3875,3877],{},[38,3876,1954],{}," (Encapsulating Security Payload) — šifrování dat",[123,3879,3880],{},"Transportní a tunelovací režim",[123,3882,3883],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3885,2688],{"id":2687},[120,3887,3888,3894,3900,3906,3912],{},[123,3889,3890,3893],{},[207,3891,140],{"className":3892,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3895,3896,3899],{},[207,3897,578],{"className":3898,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3901,3902,3905],{},[207,3903,569],{"className":3904,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3907,3908,3911],{},[207,3909,351],{"className":3910,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3913,3914,3917],{},[207,3915,360],{"className":3916,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3919,2712,3920],{"id":2711},[207,3921,43],{"className":3922,"dataFsResolvedFilePath":2716,"href":2717},[210],[120,3924,3925,3931,3936],{},[123,3926,3927],{},[207,3928,3930],{"className":3929,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3932,3933],{},[207,3934,1629],{"className":3935,"dataFsResolvedFilePath":349,"href":350},[210],[123,3937,3938],{},[207,3939,3941],{"className":3940,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3943},[3944,3945,3953,3954,3955],{"id":3716,"depth":642,"text":3717},{"id":3780,"depth":642,"text":3781,"children":3946},[3947,3948,3949,3950,3951,3952],{"id":3784,"depth":649,"text":3785},{"id":3799,"depth":649,"text":3800},{"id":3814,"depth":649,"text":3815},{"id":3826,"depth":649,"text":3827},{"id":3841,"depth":649,"text":3842},{"id":3850,"depth":649,"text":2002},{"id":3864,"depth":642,"text":3865},{"id":2687,"depth":642,"text":2688},{"id":2711,"depth":642,"text":2744},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3961,2255,3962],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3703,3965,3966,3967,3968,3969,3970],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3973,"title":569,"body":3974,"course":659,"courses":4309,"created":660,"description":641,"extension":661,"meta":4310,"navigation":664,"path":4311,"seo":4312,"sources":4313,"stem":4314,"tags":4315,"type":2759,"updated":677,"__hash__":4321},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3975,"toc":4298},[3976,3979,3986,3993,3997,4061,4065,4115,4119,4124,4143,4147,4150,4154,4168,4172,4200,4204,4253,4255,4280,4285],[12,3977,569],{"id":3978},"řízení-rizik",[724,3980,3981],{},[2282,3982],{"alt":3983,"className":3984,"src":3985},"rizeni-rizik-proces",[210,2286],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3987,3988,3989,3992],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3990,140],{"className":3991,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3994,3996],{"id":3995},"normativní-základ","Normativní základ",[16,3998,3999,4009],{},[19,4000,4001],{},[22,4002,4003,4006],{},[25,4004,4005],{},"Norma",[25,4007,4008],{},"Zaměření",[30,4010,4011,4021,4031,4041,4051],{},[22,4012,4013,4018],{},[35,4014,4015],{},[38,4016,4017],{},"ISO 31000:2019",[35,4019,4020],{},"Obecné smrnice pro management rizik",[22,4022,4023,4028],{},[35,4024,4025],{},[38,4026,4027],{},"ISO 31010:2020",[35,4029,4030],{},"Techniky posuzování rizik",[22,4032,4033,4038],{},[35,4034,4035],{},[38,4036,4037],{},"ISO\u002FIEC 27005:2019",[35,4039,4040],{},"Řízení rizik bezpečnosti informací",[22,4042,4043,4048],{},[35,4044,4045],{},[38,4046,4047],{},"NIST SP 800-30",[35,4049,4050],{},"Průvodce hodnocením rizik",[22,4052,4053,4058],{},[35,4054,4055],{},[38,4056,4057],{},"NIST SP 800-39",[35,4059,4060],{},"Proces řízení bezpečnostních rizik",[115,4062,4064],{"id":4063},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,4066,4067,4073,4079,4085,4091,4097,4103,4109],{},[123,4068,4069,4072],{},[38,4070,4071],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,4074,4075,4078],{},[38,4076,4077],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,4080,4081,4084],{},[38,4082,4083],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,4086,4087,4090],{},[38,4088,4089],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,4092,4093,4096],{},[38,4094,4095],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,4098,4099,4102],{},[38,4100,4101],{},"Akceptace rizik"," — formální rozhodnutí",[123,4104,4105,4108],{},[38,4106,4107],{},"Komunikace"," — sdílení informací o rizicích",[123,4110,4111,4114],{},[38,4112,4113],{},"Monitorování"," — průběžné přezkoumávání",[115,4116,4118],{"id":4117},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,4120,4121],{},[38,4122,4123],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,4125,4126,4132,4137],{},[123,4127,4128,4131],{},[38,4129,4130],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,4133,4134,4136],{},[38,4135,3299],{}," — slabé místo aktiva (stupnice 1–5)",[123,4138,4139,4142],{},[38,4140,4141],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,4144,4146],{"id":4145},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,4148,4149],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,4151,4153],{"id":4152},"klíčové-dokumenty","Klíčové dokumenty",[120,4155,4156,4162],{},[123,4157,4158,4161],{},[38,4159,4160],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,4163,4164,4167],{},[38,4165,4166],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,4169,4171],{"id":4170},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,4173,4174,4180,4185,4190,4195],{},[123,4175,4176,4179],{},[38,4177,4178],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,4181,4182,4184],{},[38,4183,3016],{}," — odpovědný za ISMS",[123,4186,4187,4189],{},[38,4188,3027],{}," — návrh a implementace opatření",[123,4191,4192,4194],{},[38,4193,3037],{}," — provádění auditů",[123,4196,4197,4199],{},[38,4198,3047],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4201,4203],{"id":4202},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4205,4206,4218],{},[19,4207,4208],{},[22,4209,4210,4213,4215],{},[25,4211,4212],{},"Úroveň",[25,4214,4008],{},[25,4216,4217],{},"Typ rizika",[30,4219,4220,4231,4242],{},[22,4221,4222,4225,4228],{},[35,4223,4224],{},"Stupeň 1",[35,4226,4227],{},"Organizace",[35,4229,4230],{},"Strategické riziko",[22,4232,4233,4236,4239],{},[35,4234,4235],{},"Stupeň 2",[35,4237,4238],{},"Poslání\u002Fobchodní procesy",[35,4240,4241],{},"Taktické riziko",[22,4243,4244,4247,4250],{},[35,4245,4246],{},"Stupeň 3",[35,4248,4249],{},"Informační systémy",[35,4251,4252],{},"Operační riziko",[115,4254,2688],{"id":2687},[120,4256,4257,4263,4269,4275],{},[123,4258,4259,4262],{},[207,4260,140],{"className":4261,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4264,4265,4268],{},[207,4266,384],{"className":4267,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4270,4271,4274],{},[207,4272,393],{"className":4273,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4276,4277,3899],{},[207,4278,578],{"className":4279,"dataFsResolvedFilePath":576,"href":577},[210],[115,4281,2712,4282],{"id":2711},[207,4283,43],{"className":4284,"dataFsResolvedFilePath":2716,"href":2717},[210],[120,4286,4287,4293],{},[123,4288,4289],{},[207,4290,4292],{"className":4291,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4294,4295],{},[207,4296,222],{"className":4297,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4299},[4300,4301,4302,4303,4304,4305,4306,4307,4308],{"id":3995,"depth":642,"text":3996},{"id":4063,"depth":642,"text":4064},{"id":4117,"depth":642,"text":4118},{"id":4145,"depth":642,"text":4146},{"id":4152,"depth":642,"text":4153},{"id":4170,"depth":642,"text":4171},{"id":4202,"depth":642,"text":4203},{"id":2687,"depth":642,"text":2688},{"id":2711,"depth":642,"text":2744},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3249,3248],"topics\u002Frizeni-rizik",[658,4316,4317,4318,4319,4320],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4323,"title":4324,"body":4325,"course":659,"courses":4556,"created":660,"description":641,"extension":661,"meta":4557,"navigation":664,"path":4558,"seo":4559,"sources":4560,"stem":4562,"tags":4563,"type":2759,"updated":677,"__hash__":4568},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4326,"toc":4548},[4327,4330,4337,4340,4344,4443,4447,4482,4486,4506,4510,4513,4515,4535,4540],[12,4328,4324],{"id":4329},"sae-budování-bezpečnostního-povědomí",[724,4331,4332],{},[2282,4333],{"alt":4334,"className":4335,"src":4336},"sae-pyramida",[210,2286],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4338,4339],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4341,4343],{"id":4342},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4345,4346,4363],{},[19,4347,4348],{},[22,4349,4350,4352,4355,4357,4360],{},[25,4351,4212],{},[25,4353,4354],{},"Příznak",[25,4356,1742],{},[25,4358,4359],{},"Metody",[25,4361,4362],{},"Časový rámec",[30,4364,4365,4385,4405,4425],{},[22,4366,4367,4373,4376,4379,4382],{},[35,4368,4369,4372],{},[38,4370,4371],{},"Awareness"," (povědomí)",[35,4374,4375],{},"„Co\"",[35,4377,4378],{},"Rozpoznávání",[35,4380,4381],{},"Média, videa, plakáty",[35,4383,4384],{},"Krátkodobý",[22,4386,4387,4393,4396,4399,4402],{},[35,4388,4389,4392],{},[38,4390,4391],{},"Training"," (výcvik)",[35,4394,4395],{},"„Jak\"",[35,4397,4398],{},"Dovednosti",[35,4400,4401],{},"Přednášky, případovky, cvičení",[35,4403,4404],{},"Střednědobý",[22,4406,4407,4413,4416,4419,4422],{},[35,4408,4409,4412],{},[38,4410,4411],{},"Education"," (vzdělávání)",[35,4414,4415],{},"„Proč\"",[35,4417,4418],{},"Porozumění",[35,4420,4421],{},"Semináře, diskuze, výzkum",[35,4423,4424],{},"Dlouhodobý",[22,4426,4427,4432,4434,4437,4440],{},[35,4428,4429],{},[38,4430,4431],{},"Professional Development",[35,4433,3019],{},[35,4435,4436],{},"Profesní rozvoj",[35,4438,4439],{},"Certifikace, konference",[35,4441,4442],{},"Průběžný",[115,4444,4446],{"id":4445},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4448,4449,4452,4455,4458,4461,4464,4467,4470,4473,4476,4479],{},[123,4450,4451],{},"Role a odpovědnosti v programu",[123,4453,4454],{},"Stanovení cílů pro každou fázi",[123,4456,4457],{},"Rozdělení uživatelů (analýza)",[123,4459,4460],{},"Vytvoření školících materiálů dle skupin",[123,4462,4463],{},"Určení cíle pro každou skupinu",[123,4465,4466],{},"Témata pro každou relaci\u002Fkurz",[123,4468,4469],{},"Metody nasazení (metodiky)",[123,4471,4472],{},"Dokumentace a zpětná vazba",[123,4474,4475],{},"Vyhodnocení a aktualizace materiálů",[123,4477,4478],{},"Četnost opakování",[123,4480,4481],{},"Kalkulace",[115,4483,4485],{"id":4484},"modely-řízení","Modely řízení",[120,4487,4488,4494,4500],{},[123,4489,4490,4493],{},[38,4491,4492],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4495,4496,4499],{},[38,4497,4498],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4501,4502,4505],{},[38,4503,4504],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4507,4509],{"id":4508},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4511,4512],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4514,2688],{"id":2687},[120,4516,4517,4523,4529],{},[123,4518,4519,4522],{},[207,4520,140],{"className":4521,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4524,4525,4528],{},[207,4526,578],{"className":4527,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4530,4531,4534],{},[207,4532,569],{"className":4533,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4536,2712,4537],{"id":2711},[207,4538,43],{"className":4539,"dataFsResolvedFilePath":2716,"href":2717},[210],[120,4541,4542],{},[123,4543,4544],{},[207,4545,4547],{"className":4546,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4549},[4550,4551,4552,4553,4554,4555],{"id":4342,"depth":642,"text":4343},{"id":4445,"depth":642,"text":4446},{"id":4484,"depth":642,"text":4485},{"id":4508,"depth":642,"text":4509},{"id":2687,"depth":642,"text":2688},{"id":2711,"depth":642,"text":2744},[658],{},"\u002Ftopics\u002Fsae",{"title":4324,"description":641},[4561],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4564,4565,4566,4319,4567],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",[4570,4572,4575,4579,4583,4585],{"slug":658,"path":2717,"title":7,"snippet":4571},"… ion Critical Networks]] — NCPI, model hrozeb, dostupnost ### Bezpečnost aplikací a dat - \u003C\u003Cimork-www>> — OWASP, SQL injection, XSS, Solid - Bezpečnost emailu — SPF, DKIM, DMARC …",{"slug":4573,"path":407,"title":3646,"snippet":4574},"imork-anatomie-utoku","… LS | SSL stripping, POODLE | Aktualizace, HSTS | | **L7 (aplikační)** | HTTP, DNS, SMTP | \u003C\u003Cimork-www>>, SQL Injection, DNS poisoning | WAF, validace vstupu | ## Amplifikační úto …",{"slug":4576,"path":545,"title":4577,"snippet":4578},"imork-digitalni-identita","Digitální identita a digitální stopa","… alšími tématy - Ochrana dat — technologie ochrany osobních údajů - \u003C\u003Cimork-www>> — online identita a webové služby - Bezpečnost emailu — ověřování identit …",{"slug":4580,"path":452,"title":4581,"snippet":4582},"imork-internetova-bezpecnost","Internetová bezpečnost — cvičení","… šifrované WiFi komunikace - Útočník vynucuje reinstalaci šifrovacího klíče - Propojení s \u003C\u003Cimork-www>> ## NÚKIB **Národní úřad pro kybernetickou a informační bezpečnost** — ústřední orgán st …",{"slug":673,"path":577,"title":578,"snippet":4584},"… - Anatomie kybernetického útoku - AI útoky - \u003C\u003Cimork-www>> - Síťové útoky - Případové studie",{"slug":3703,"path":602,"title":369,"snippet":4586},"… ezpečnost]] — kontext hrozeb - Řízení rizik — hodnocení aktiv a hrozeb - \u003C\u003Cimork-www>> — webové útoky a obrana - Bezpečnost emailu — emailové protokoly ## Zdro …",[4588],{"slug":673,"title":578,"path":577,"sharedTags":642},1777154964554]