[{"data":1,"prerenderedAt":4385},["ShallowReactive",2],{"sidebar-courses-with-stats":3,"wiki-imork":1626,"course-stats-imork":2034,"backlinks-imork":2038,"course-topics-imork":2070},{"courses":4,"counts":1622},[5,679,1148],{"id":6,"title":7,"body":8,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":663,"navigation":664,"path":665,"seo":666,"sources":667,"stem":669,"tags":670,"type":676,"updated":677,"__hash__":678},"courses\u002Fcourses\u002Fimork.md","Management oborových řešení (ImorK)",{"type":9,"value":10,"toc":640},"minimark",[11,15,114,119,147,151,193,197,202,251,255,338,342,371,375,395,399,455,459,533,537,548,552,604,608],[12,13,7],"h1",{"id":14},"management-oborových-řešení-imork",[16,17,18,29],"table",{},[19,20,21],"thead",{},[22,23,24,27],"tr",{},[25,26],"th",{},[25,28],{},[30,31,32,44,54,64,74,84,94,104],"tbody",{},[22,33,34,41],{},[35,36,37],"td",{},[38,39,40],"strong",{},"Zkratka",[35,42,43],{},"ImorK",[22,45,46,51],{},[35,47,48],{},[38,49,50],{},"Fakulta",[35,52,53],{},"Fakulta podnikatelská, VUT v Brně",[22,55,56,61],{},[35,57,58],{},[38,59,60],{},"Semestr",[35,62,63],{},"letní 2025\u002F2026",[22,65,66,71],{},[35,67,68],{},[38,69,70],{},"Ukončení",[35,72,73],{},"zkouška",[22,75,76,81],{},[35,77,78],{},[38,79,80],{},"Garant",[35,82,83],{},"Ing. Lukáš Novák, Ph.D.",[22,85,86,91],{},[35,87,88],{},[38,89,90],{},"Vyučující",[35,92,93],{},"Ing. Petr Sedlák",[22,95,96,101],{},[35,97,98],{},[38,99,100],{},"Ústav",[35,102,103],{},"Ústav informatiky",[22,105,106,111],{},[35,107,108],{},[38,109,110],{},"Prerekvizita",[35,112,113],{},"Management informační bezpečnosti (ImibePA)",[115,116,118],"h2",{"id":117},"cíle-předmětu","Cíle předmětu",[120,121,122,129,135,141],"ul",{},[123,124,125,126],"li",{},"Znalosti o specifických problémech a odlišnostech při ",[38,127,128],{},"oborovém řešení informační bezpečnosti",[123,130,131,132],{},"Porozumění jednotlivých řešení na úrovni ",[38,133,134],{},"případových studií",[123,136,137,138],{},"Přehled o rozdílných aspektech v závislosti na oborové řešení ",[38,139,140],{},"ISMS",[123,142,143,144],{},"Metodika pro budování bezpečných IS na bázi norem řady ",[38,145,146],{},"ISO\u002FIEC 27000",[115,148,150],{"id":149},"osnova","Osnova",[152,153,154,157,160,163,166,169,172,175,178,181,184,187,190],"ol",{},[123,155,156],{},"Bezpečnost v kyberprostoru",[123,158,159],{},"Budování bezpečnostního povědomí — SAE",[123,161,162],{},"Manažerská informační bezpečnost",[123,164,165],{},"Problematika GDPR",[123,167,168],{},"ISMS v ISVS",[123,170,171],{},"ISMS v univerzitním prostředí",[123,173,174],{},"ISMS ve zdravotnictví",[123,176,177],{},"ISMS v energetice",[123,179,180],{},"ISMS poskytovatelů konektivity (ISP)",[123,182,183],{},"Bezpečnost konvergovaných sítí",[123,185,186],{},"Řízení bezpečnosti www aplikací",[123,188,189],{},"Řízení bezpečnosti mailových aplikací",[123,191,192],{},"Řízení mobilní bezpečnosti",[115,194,196],{"id":195},"shrnutí-zdrojů","Shrnutí zdrojů",[198,199,201],"h3",{"id":200},"přednášky","Přednášky",[120,203,204,215,224,233,242],{},[123,205,206,214],{},[207,208,213],"a",{"className":209,"dataFsResolvedFilePath":211,"href":212},[210],"wikilink","summaries\u002Fimork-detail-predmetu.md","\u002Fwiki\u002Fimork-detail-predmetu","Detail předmětu"," — sylabus kurzu, hodnocení, literatura",[123,216,217,223],{},[207,218,222],{"className":219,"dataFsResolvedFilePath":220,"href":221},[210],"summaries\u002Fimork-manazerska-bezpecnost.md","\u002Fwiki\u002Fimork-manazerska-bezpecnost","Manažerská bezpečnost"," — governance, SIEM, log management, bezpečnostní role",[123,225,226,232],{},[207,227,231],{"className":228,"dataFsResolvedFilePath":229,"href":230},[210],"summaries\u002Fimork-bezpecnostni-strategie.md","\u002Fwiki\u002Fimork-bezpecnostni-strategie","Bezpečnostní strategie"," — tvorba a implementace bezpečnostní strategie",[123,234,235,241],{},[207,236,240],{"className":237,"dataFsResolvedFilePath":238,"href":239},[210],"summaries\u002Fimork-sae.md","\u002Fwiki\u002Fimork-sae","SAE"," — budování bezpečnostního povědomí (NIST SP 800-50\u002F16)",[123,243,244,250],{},[207,245,249],{"className":246,"dataFsResolvedFilePath":247,"href":248},[210],"summaries\u002Fimork-risk-management.md","\u002Fwiki\u002Fimork-risk-management","Risk Management"," — ISO 31000, ISO 27005, RTP, PoA\u002FSoA",[198,252,254],{"id":253},"oborová-isms","Oborová ISMS",[120,256,257,266,275,284,293,302,311,320,329],{},[123,258,259,265],{},[207,260,264],{"className":261,"dataFsResolvedFilePath":262,"href":263},[210],"summaries\u002Fimork-akademicke-prostredi.md","\u002Fwiki\u002Fimork-akademicke-prostredi","Akademické prostředí"," — kampus, WiFi, identita, VIS",[123,267,268,274],{},[207,269,273],{"className":270,"dataFsResolvedFilePath":271,"href":272},[210],"summaries\u002Fimork-financni-sektor.md","\u002Fwiki\u002Fimork-financni-sektor","Finanční sektor"," — DORA, MiCA, DLT\u002Fblockchain",[123,276,277,283],{},[207,278,282],{"className":279,"dataFsResolvedFilePath":280,"href":281},[210],"summaries\u002Fimork-zdravotnictvi.md","\u002Fwiki\u002Fimork-zdravotnictvi","Zdravotnictví"," — HIPAA, ISO 27799, PACS, DICOM, eHealth",[123,285,286,292],{},[207,287,291],{"className":288,"dataFsResolvedFilePath":289,"href":290},[210],"summaries\u002Fimork-energetika.md","\u002Fwiki\u002Fimork-energetika","Energetika"," — ISO 27019, IEC 61850, PLC\u002FSBC\u002FRTU",[123,294,295,301],{},[207,296,300],{"className":297,"dataFsResolvedFilePath":298,"href":299},[210],"summaries\u002Fimork-smart-grid.md","\u002Fwiki\u002Fimork-smart-grid","Smart Grid"," — NISTIR 7628, IEC 62351, prosumers",[123,303,304,310],{},[207,305,309],{"className":306,"dataFsResolvedFilePath":307,"href":308},[210],"summaries\u002Fimork-doprava.md","\u002Fwiki\u002Fimork-doprava","Doprava (železnice)"," — CLC\u002FTS 50701, kritická infrastruktura",[123,312,313,319],{},[207,314,318],{"className":315,"dataFsResolvedFilePath":316,"href":317},[210],"summaries\u002Fimork-automotive.md","\u002Fwiki\u002Fimork-automotive","Automotive"," — CAN bus, TISAX, UN Reg. 155",[123,321,322,328],{},[207,323,327],{"className":324,"dataFsResolvedFilePath":325,"href":326},[210],"summaries\u002Fimork-isp.md","\u002Fwiki\u002Fimork-isp","ISP\u002Ftelekomunikace"," — ISO 27011, NGN, 5G bezpečnost",[123,330,331,337],{},[207,332,336],{"className":333,"dataFsResolvedFilePath":334,"href":335},[210],"summaries\u002Fimork-mcn.md","\u002Fwiki\u002Fimork-mcn","Mission Critical Networks"," — NCPI, model hrozeb, dostupnost",[198,339,341],{"id":340},"bezpečnost-aplikací-a-dat","Bezpečnost aplikací a dat",[120,343,344,353,362],{},[123,345,346,352],{},[207,347,351],{"className":348,"dataFsResolvedFilePath":349,"href":350},[210],"summaries\u002Fimork-www.md","\u002Fwiki\u002Fimork-www","Bezpečnost webu"," — OWASP, SQL injection, XSS, Solid",[123,354,355,361],{},[207,356,360],{"className":357,"dataFsResolvedFilePath":358,"href":359},[210],"summaries\u002Fimork-email.md","\u002Fwiki\u002Fimork-email","Bezpečnost emailu"," — SPF, DKIM, DMARC, S\u002FMIME, šifrování",[123,363,364,370],{},[207,365,369],{"className":366,"dataFsResolvedFilePath":367,"href":368},[210],"summaries\u002Fimork-ochrana-dat.md","\u002Fwiki\u002Fimork-ochrana-dat","Ochrana dat"," — NAC, IDS\u002FIPS, SIEM, DLP, IPv6",[198,372,374],{"id":373},"kontinuita-a-obnova","Kontinuita a obnova",[120,376,377,386],{},[123,378,379,385],{},[207,380,384],{"className":381,"dataFsResolvedFilePath":382,"href":383},[210],"summaries\u002Fimork-bcm.md","\u002Fwiki\u002Fimork-bcm","BCM"," — ISO 22301, BIA, STEEPLE, PDCA",[123,387,388,394],{},[207,389,393],{"className":390,"dataFsResolvedFilePath":391,"href":392},[210],"summaries\u002Fimork-dr.md","\u002Fwiki\u002Fimork-dr","Disaster Recovery"," — RPO\u002FRTO, cloud DR, 7 tiers, DRaaS",[198,396,398],{"id":397},"kybernetické-útoky","Kybernetické útoky",[120,400,401,410,419,428,437,446],{},[123,402,403,409],{},[207,404,408],{"className":405,"dataFsResolvedFilePath":406,"href":407},[210],"summaries\u002Fimork-anatomie-utoku.md","\u002Fwiki\u002Fimork-anatomie-utoku","Anatomie útoku"," — APT, vektory, exploit\u002Fpayload",[123,411,412,418],{},[207,413,417],{"className":414,"dataFsResolvedFilePath":415,"href":416},[210],"summaries\u002Fimork-ai-utoky.md","\u002Fwiki\u002Fimork-ai-utoky","AI útoky"," — WormGPT, BEC, phishing",[123,420,421,427],{},[207,422,426],{"className":423,"dataFsResolvedFilePath":424,"href":425},[210],"summaries\u002Fimork-sitove-utoky.md","\u002Fwiki\u002Fimork-sitove-utoky","Síťové útoky"," — DDoS, spoofing, Emotet→Trickbot→Ryuk",[123,429,430,436],{},[207,431,435],{"className":432,"dataFsResolvedFilePath":433,"href":434},[210],"summaries\u002Fimork-ransomware.md","\u002Fwiki\u002Fimork-ransomware","Ransomware"," — historie 1989–2024, RaaS, NISTIR 8374, IR plán",[123,438,439,445],{},[207,440,444],{"className":441,"dataFsResolvedFilePath":442,"href":443},[210],"summaries\u002Fimork-rizeny-hacking.md","\u002Fwiki\u002Fimork-rizeny-hacking","Řízený hacking \u002F APT"," — APT skupiny, informační válka, OSINT",[123,447,448,454],{},[207,449,453],{"className":450,"dataFsResolvedFilePath":451,"href":452},[210],"summaries\u002Fimork-internetova-bezpecnost.md","\u002Fwiki\u002Fimork-internetova-bezpecnost","Internetová bezpečnost"," — kyberprostor, OSINT, behaviorální biometrika",[198,456,458],{"id":457},"případové-studie","Případové studie",[120,460,461,470,479,488,497,506,515,524],{},[123,462,463,469],{},[207,464,468],{"className":465,"dataFsResolvedFilePath":466,"href":467},[210],"summaries\u002Fimork-nemocnice.md","\u002Fwiki\u002Fimork-nemocnice","Útoky na nemocnice"," — Benešov (70M Kč), FN Brno (350M Kč), Nymburk",[123,471,472,478],{},[207,473,477],{"className":474,"dataFsResolvedFilePath":475,"href":476},[210],"summaries\u002Fimork-kradez-dat.md","\u002Fwiki\u002Fimork-kradez-dat","Krádež dat"," — PII, černý trh, IoT botnety, ISO 27701, GDPR",[123,480,481,487],{},[207,482,486],{"className":483,"dataFsResolvedFilePath":484,"href":485},[210],"summaries\u002Fimork-sprava-login.md","\u002Fwiki\u002Fimork-sprava-login","Správa login"," — privilegované účty, NIST SP 800-63, biometrika",[123,489,490,496],{},[207,491,495],{"className":492,"dataFsResolvedFilePath":493,"href":494},[210],"summaries\u002Fimork-ehealth.md","\u002Fwiki\u002Fimork-ehealth","eHealth"," — elektronizace zdravotnictví, telemedicína, NSeZ",[123,498,499,505],{},[207,500,504],{"className":501,"dataFsResolvedFilePath":502,"href":503},[210],"summaries\u002Fimork-tor.md","\u002Fwiki\u002Fimork-tor","TOR"," — anonymizace, onion routing, NSA X-Keyscore",[123,507,508,514],{},[207,509,513],{"className":510,"dataFsResolvedFilePath":511,"href":512},[210],"summaries\u002Fimork-payment.md","\u002Fwiki\u002Fimork-payment","Bezpečnost plateb"," — PCI DSS v4.0, NFC\u002Ftokenizace, EMV, darknet",[123,516,517,523],{},[207,518,522],{"className":519,"dataFsResolvedFilePath":520,"href":521},[210],"summaries\u002Fimork-mobilni-bezpecnost.md","\u002Fwiki\u002Fimork-mobilni-bezpecnost","Mobilní bezpečnost"," — SIMJaker, SIM swapping, 5G, Common Criteria",[123,525,526,532],{},[207,527,531],{"className":528,"dataFsResolvedFilePath":529,"href":530},[210],"summaries\u002Fimork-audio-hack.md","\u002Fwiki\u002Fimork-audio-hack","Audio Hack"," — fyzická zranitelnost HDD, CVE-2022-38392, rezonanční útok",[198,534,536],{"id":535},"další","Další",[120,538,539],{},[123,540,541,547],{},[207,542,546],{"className":543,"dataFsResolvedFilePath":544,"href":545},[210],"summaries\u002Fimork-digitalni-identita.md","\u002Fwiki\u002Fimork-digitalni-identita","Digitální identita a stopa"," — online identita, footprint",[115,549,551],{"id":550},"témata","Témata",[120,553,554,562,571,580,588,596],{},[123,555,556,561],{},[207,557,140],{"className":558,"dataFsResolvedFilePath":559,"href":560},[210],"topics\u002Fisms.md","\u002Fwiki\u002Fisms"," — systém řízení bezpečnosti informací",[123,563,564,570],{},[207,565,569],{"className":566,"dataFsResolvedFilePath":567,"href":568},[210],"topics\u002Frizeni-rizik.md","\u002Fwiki\u002Frizeni-rizik","Řízení rizik"," — proces identifikace a ošetření rizik",[123,572,573,579],{},[207,574,578],{"className":575,"dataFsResolvedFilePath":576,"href":577},[210],"topics\u002Fkyberneticka-bezpecnost.md","\u002Fwiki\u002Fkyberneticka-bezpecnost","Kybernetická bezpečnost"," — hrozby, útoky, obrana",[123,581,582,587],{},[207,583,240],{"className":584,"dataFsResolvedFilePath":585,"href":586},[210],"topics\u002Fsae.md","\u002Fwiki\u002Fsae"," — budování bezpečnostního povědomí",[123,589,590,595],{},[207,591,384],{"className":592,"dataFsResolvedFilePath":593,"href":594},[210],"topics\u002Fbcm.md","\u002Fwiki\u002Fbcm"," — řízení kontinuity činnosti",[123,597,598,603],{},[207,599,369],{"className":600,"dataFsResolvedFilePath":601,"href":602},[210],"topics\u002Fochrana-dat.md","\u002Fwiki\u002Fochrana-dat"," — technologická řešení ochrany",[115,605,607],{"id":606},"doporučená-literatura","Doporučená literatura",[120,609,610,618,625,631,634,637],{},[123,611,612,613,617],{},"JORDÁN, V. a ONDRÁK, V.: ",[614,615,616],"em",{},"Integrovaná podniková infrastruktura."," Brno: CERM, 2016. ISBN 978-80-214-5241-1",[123,619,620,621,624],{},"SEDLÁK, P. a KONEČNÝ, M.: ",[614,622,623],{},"Přeměna ISMS v manažerské informatice."," Brno: CERM, 2023. ISBN 978-80-7623-110-8",[123,626,620,627,630],{},[614,628,629],{},"Kybernetická (ne)bezpečnost."," Brno: CERM, 2021. ISBN 978-80-7623-068-2",[123,632,633],{},"ČSN EN ISO\u002FIEC 27011 — Bezpečnost pro telekomunikační organizace",[123,635,636],{},"ČSN EN ISO\u002FIEC 27019 — Bezpečnost pro energetický průmysl",[123,638,639],{},"ČSN EN ISO\u002FIEC 27799 — Bezpečnost ve zdravotnictví",{"title":641,"searchDepth":642,"depth":642,"links":643},"",2,[644,645,646,656,657],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":647},[648,650,651,652,653,654,655],{"id":200,"depth":649,"text":201},3,{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},"imork",null,"2026-04-12","md",false,{},true,"\u002Fcourses\u002Fimork",{"title":7,"description":641},[668],"raw\u002Fimork\u002FDetail předmětu.md","courses\u002Fimork",[658,671,672,673,674,675],"isms","informacni-bezpecnost","kyberneticka-bezpecnost","oborova-reseni","iso-27000","course","2026-04-25","6MdSdXZJ3FNW9uPHrGzZPucQlKskWh23itOKhDSZfGs",{"id":680,"title":681,"body":682,"course":1128,"courseName":659,"courses":659,"created":1129,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1130,"navigation":664,"path":1131,"seo":1132,"sources":1133,"stem":1139,"tags":1140,"type":676,"updated":677,"__hash__":1147},"courses\u002Fcourses\u002Fimek.md","Matematická ekonomie (ImeK)",{"type":9,"value":683,"toc":1112},[684,687,719,723,731,735,738,748,831,841,861,871,947,951,962,966,969,994,1000,1011,1017,1020,1024,1061,1065,1068,1072],[12,685,681],{"id":686},"matematická-ekonomie-imek",[120,688,689,695,701,707,713],{},[123,690,691,694],{},[38,692,693],{},"Fakulta:"," FP VUT",[123,696,697,700],{},[38,698,699],{},"Garant:"," doc. RNDr. Bedřich Půža, CSc.",[123,702,703,706],{},[38,704,705],{},"Vyučující (kombinované studium):"," Mgr. Martina Bobalová, Ph.D.",[123,708,709,712],{},[38,710,711],{},"Ukončení:"," zkouška (písemná 60 min + ústní ~10 min)",[123,714,715,718],{},[38,716,717],{},"Semestr:"," letní 2025\u002F2026",[115,720,722],{"id":721},"cíl-předmětu","Cíl předmětu",[724,725,726,727,730],"p",{},"Hlouběji proniknout do kauzální podstaty ekonomických vztahů, rozvoj schopnosti vyjadřovat ekonomické vztahy ",[38,728,729],{},"exaktními prostředky"," a provádět jejich analýzy. Matematické modelování mikroekonomie a makroekonomie pomocí prostředků inženýrské matematiky (derivace, integrály, Lagrangeova metoda).",[115,732,734],{"id":733},"obsah-kurzu","Obsah kurzu",[724,736,737],{},"Kurz je v kombinovaném studiu rozčleněn do tří přednáškových bloků:",[198,739,741,742],{"id":740},"blok-1-kalkul-poptávkanabídka-příjemnákladyzisk","Blok 1 — ",[207,743,747],{"className":744,"dataFsResolvedFilePath":745,"href":746},[210],"summaries\u002Fimek-blok-01.md","\u002Fwiki\u002Fimek-blok-01","Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",[120,749,750,759,768,777,786,795,804,813,822],{},[123,751,752,758],{},[207,753,757],{"className":754,"dataFsResolvedFilePath":755,"href":756},[210],"topics\u002Fzaklady-matematicke-ekonomie.md","\u002Fwiki\u002Fzaklady-matematicke-ekonomie","Základy matematické ekonomie"," — model, endogenní\u002Fexogenní proměnné, ceteris paribus, komparativní statika",[123,760,761,767],{},[207,762,766],{"className":763,"dataFsResolvedFilePath":764,"href":765},[210],"topics\u002Fderivace.md","\u002Fwiki\u002Fderivace","Derivace, diferenciál a extrémy 1D"," — geometrická a inženýrská interpretace, mezní veličiny",[123,769,770,776],{},[207,771,775],{"className":772,"dataFsResolvedFilePath":773,"href":774},[210],"topics\u002Fintegral.md","\u002Fwiki\u002Fintegral","Integrál"," — neurčitý a určitý, rekonstrukce TR z MR a TC z MC",[123,778,779,785],{},[207,780,784],{"className":781,"dataFsResolvedFilePath":782,"href":783},[210],"topics\u002Ffunkce-vice-promennych.md","\u002Fwiki\u002Ffunkce-vice-promennych","Funkce více proměnných"," — parciální derivace, diferenciál 2D, implicitní funkce, volné extrémy",[123,787,788,794],{},[207,789,793],{"className":790,"dataFsResolvedFilePath":791,"href":792},[210],"topics\u002Flagrangeova-metoda.md","\u002Fwiki\u002Flagrangeova-metoda","Lagrangeova metoda"," — vázané extrémy, multiplikátor jako náklady příležitosti",[123,796,797,803],{},[207,798,802],{"className":799,"dataFsResolvedFilePath":800,"href":801},[210],"topics\u002Fpoptavka-nabidka.md","\u002Fwiki\u002Fpoptavka-nabidka","Poptávka, nabídka a tržní rovnováha"," — modely D a S, rovnováha, multiplikátory",[123,805,806,812],{},[207,807,811],{"className":808,"dataFsResolvedFilePath":809,"href":810},[210],"topics\u002Fzdaneni-trhu.md","\u002Fwiki\u002Fzdaneni-trhu","Zdanění trhu"," — daň výrobci vs. spotřebiteli, rozklad daňového břemene, ekvivalence",[123,814,815,821],{},[207,816,820],{"className":817,"dataFsResolvedFilePath":818,"href":819},[210],"topics\u002Fprebytek-spotrebitele-vyrobce.md","\u002Fwiki\u002Fprebytek-spotrebitele-vyrobce","Přebytek spotřebitele a výrobce"," — CS, PS, plochy pod\u002Fnad křivkami",[123,823,824,830],{},[207,825,829],{"className":826,"dataFsResolvedFilePath":827,"href":828},[210],"topics\u002Fprijem-naklady-zisk.md","\u002Fwiki\u002Fprijem-naklady-zisk","Příjem, náklady a zisk"," — TR, AR, MR, TC, AC, MC, body zvratu, konstrukce nabídky firmy",[198,832,834,835],{"id":833},"blok-2-elasticita-a-produkce","Blok 2 — ",[207,836,840],{"className":837,"dataFsResolvedFilePath":838,"href":839},[210],"summaries\u002Fimek-blok-02.md","\u002Fwiki\u002Fimek-blok-02","Elasticita a produkce",[120,842,843,852],{},[123,844,845,851],{},[207,846,850],{"className":847,"dataFsResolvedFilePath":848,"href":849},[210],"topics\u002Felasticita.md","\u002Fwiki\u002Felasticita","Cenová, křížová a důchodová elasticita"," (jedno- i vícefaktorový model)",[123,853,854,860],{},[207,855,859],{"className":856,"dataFsResolvedFilePath":857,"href":858},[210],"topics\u002Fprodukce.md","\u002Fwiki\u002Fprodukce","Produkční funkce"," — Cobb-Douglasova, CES, lineární, Leontiefova, izokvanty, MRTS, Eulerova věta",[198,862,864,865],{"id":863},"blok-3-užitečnost-a-národní-důchod","Blok 3 — ",[207,866,870],{"className":867,"dataFsResolvedFilePath":868,"href":869},[210],"summaries\u002Fimek-blok-03.md","\u002Fwiki\u002Fimek-blok-03","Užitečnost a národní důchod",[120,872,873,906,929,938],{},[123,874,875,881,882,905],{},[207,876,880],{"className":877,"dataFsResolvedFilePath":878,"href":879},[210],"topics\u002Fuzitecnost.md","\u002Fwiki\u002Fuzitecnost","Užitečnost"," — pojem, mezní užitečnost, Cobb-Douglasova ",[883,884,887],"span",{"className":885},[886],"katex",[888,889,891],"math",{"xmlns":890},"http:\u002F\u002Fwww.w3.org\u002F1998\u002FMath\u002FMathML",[892,893,894,901],"semantics",{},[895,896,897],"mrow",{},[898,899,900],"mi",{},"U",[902,903,900],"annotation",{"encoding":904},"application\u002Fx-tex",", indiferenční křivky, MRCS",[123,907,908,914,915,928],{},[207,909,913],{"className":910,"dataFsResolvedFilePath":911,"href":912},[210],"topics\u002Foptimalizace-spotrebitele.md","\u002Fwiki\u002Foptimalizace-spotrebitele","Optimalizace spotřebitele"," — Lagrangeova maximalizace ",[883,916,918],{"className":917},[886],[888,919,920],{"xmlns":890},[892,921,922,926],{},[895,923,924],{},[898,925,900],{},[902,927,900],{"encoding":904},", duální minimalizace výdajů, Marshallova\u002FHicksova poptávka",[123,930,931,937],{},[207,932,936],{"className":933,"dataFsResolvedFilePath":934,"href":935},[210],"topics\u002Fnarodni-duchod.md","\u002Fwiki\u002Fnarodni-duchod","Národní důchod"," — GNP, spotřeba\u002Fúspory, MPC\u002FMPS, modely C-I, C-I-G, C-I-G-X",[123,939,940,946],{},[207,941,945],{"className":942,"dataFsResolvedFilePath":943,"href":944},[210],"topics\u002Fis-lm.md","\u002Fwiki\u002Fis-lm","IS-LM analýza"," — simultánní rovnováha trhu zboží a peněz, fiskální\u002Fmonetární politika",[115,948,950],{"id":949},"reference-a-přehledy","Reference a přehledy",[120,952,953],{},[123,954,955,961],{},[207,956,960],{"className":957,"dataFsResolvedFilePath":958,"href":959},[210],"outputs\u002Fimek-vzorce-prehled.md","\u002Fwiki\u002Fimek-vzorce-prehled","Kompletní přehled vzorců"," — všechny klíčové vzorce kurzu v definičním tvaru, se zdrojem a intuicí. Referenční list pro přípravu na zkoušku.",[115,963,965],{"id":964},"hodnocení-zkoušky","Hodnocení zkoušky",[724,967,968],{},"Písemná část (60 min) — 4 úlohy:",[152,970,971,977,983,989],{},[123,972,973,974],{},"Rozhodovací úloha o ekonomické funkci — ",[38,975,976],{},"10 bodů",[123,978,979,980],{},"Definice, formulace vlastnosti, interpretace ekonomické veličiny — ",[38,981,982],{},"20 bodů",[123,984,985,986],{},"Výpočetní úloha — ",[38,987,988],{},"30 bodů",[123,990,985,991],{},[38,992,993],{},"40 bodů",[724,995,996,999],{},[38,997,998],{},"Dílčí podmínky"," (nutné pro A–E):",[120,1001,1002,1005,1008],{},[123,1003,1004],{},"≥ 11 bodů ze součtu úloh 1 a 2",[123,1006,1007],{},"≥ 10 bodů z úlohy 3",[123,1009,1010],{},"≥ 10 bodů z úlohy 4",[724,1012,1013,1016],{},[38,1014,1015],{},"Stupnice:"," A (90–100), B (80–89), C (70–79), D (60–69), E (50–59), F (0–49 nebo nesplnění podmínek).",[724,1018,1019],{},"Doporučeno mít kalkulátor.",[115,1021,1023],{"id":1022},"literatura","Literatura",[120,1025,1026,1033,1040,1047,1054],{},[123,1027,1028,1029,1032],{},"I. Mezník, ",[614,1030,1031],{},"Úvod do matematické ekonomie pro ekonomy",", FP VUT \u002F CERM, Brno 2017 (CZ)",[123,1034,1035,1036,1039],{},"A.C. Chiang, ",[614,1037,1038],{},"Fundamental Methods of Mathematical Economics",", McGraw-Hill, 1984",[123,1041,1042,1043,1046],{},"J.U. Koch, L.A. Ostrosky, ",[614,1044,1045],{},"Introduction to Mathematical Economics",", McGraw-Hill, 1994",[123,1048,1049,1050,1053],{},"C.J. McKenna, R. Rees, ",[614,1051,1052],{},"Economics: A Mathematical Introduction",", Oxford UP, 1992",[123,1055,1056,1057,1060],{},"J. Jacques, ",[614,1058,1059],{},"Mathematics for Economics and Business",", Addison-Wesley, 1995",[115,1062,1064],{"id":1063},"prerekvizity","Prerekvizity",[724,1066,1067],{},"Standardní kurz inženýrské matematiky, mikroekonomie a makroekonomie na bakalářské úrovni.",[115,1069,1071],{"id":1070},"přehled-zdrojů","Přehled zdrojů",[120,1073,1074,1082,1089,1096,1103],{},[123,1075,1076,1081],{},[207,1077,213],{"className":1078,"dataFsResolvedFilePath":1079,"href":1080},[210],"summaries\u002Fimek-detail-predmetu.md","\u002Fwiki\u002Fimek-detail-predmetu"," — sylabus a administrativní informace",[123,1083,1084,1088],{},[207,1085,1087],{"className":1086,"dataFsResolvedFilePath":745,"href":746},[210],"KS 1. blok"," — 57 stran, matematický aparát + mikroekonomie",[123,1090,1091,1095],{},[207,1092,1094],{"className":1093,"dataFsResolvedFilePath":838,"href":839},[210],"KS 2. blok"," — 19 stran, elasticita a produkce",[123,1097,1098,1102],{},[207,1099,1101],{"className":1100,"dataFsResolvedFilePath":868,"href":869},[210],"KS 3. blok"," — 25 stran, užitečnost a národní důchod",[123,1104,1105,1111],{},[207,1106,1110],{"className":1107,"dataFsResolvedFilePath":1108,"href":1109},[210],"summaries\u002Fimek-kniha.md","\u002Fwiki\u002Fimek-kniha","Kniha Mezník — Úvod do matematické ekonomie"," — naskenované kap. 2–7 (107 stran), kompletní teorie + Příklady + Úlohy k samostatnému řešení",{"title":641,"searchDepth":642,"depth":642,"links":1113},[1114,1115,1123,1124,1125,1126,1127],{"id":721,"depth":642,"text":722},{"id":733,"depth":642,"text":734,"children":1116},[1117,1119,1121],{"id":740,"depth":649,"text":1118},"Blok 1 — Kalkul, poptávka\u002Fnabídka, příjem\u002Fnáklady\u002Fzisk",{"id":833,"depth":649,"text":1120},"Blok 2 — Elasticita a produkce",{"id":863,"depth":649,"text":1122},"Blok 3 — Užitečnost a národní důchod",{"id":949,"depth":642,"text":950},{"id":964,"depth":642,"text":965},{"id":1022,"depth":642,"text":1023},{"id":1063,"depth":642,"text":1064},{"id":1070,"depth":642,"text":1071},"imek","2026-04-20",{},"\u002Fcourses\u002Fimek",{"title":681,"description":641},[1134,1135,1136,1137,1138],"raw\u002Fimek\u002FDetail předmětu.md","raw\u002Fimek\u002FKS_prvni_blok.pdf","raw\u002Fimek\u002FKS_druhy_blok.pdf","raw\u002Fimek\u002FKS_treti_blok.pdf","raw\u002Fimek\u002Fkniha_scanned\u002F","courses\u002Fimek",[1128,1141,1142,1143,1144,1145,1146],"ekonomie","mikroekonomie","makroekonomie","lagrange","derivace","integraly","x73RNX_N_uAS3i63VHeCgVFPJa4tJKL2z8kq4DIN24M",{"id":1149,"title":1150,"body":1151,"course":1601,"courseName":659,"courses":659,"created":1602,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":1603,"navigation":664,"path":1604,"seo":1605,"sources":1606,"stem":1612,"tags":1613,"type":676,"updated":677,"__hash__":1621},"courses\u002Fcourses\u002Fipmrk.md","Pokročilé metody v rozhodování (IpmrK)",{"type":9,"value":1152,"toc":1593},[1153,1156,1230,1232,1235,1237,1321,1325,1354,1358,1423,1425,1474,1476],[12,1154,1150],{"id":1155},"pokročilé-metody-v-rozhodování-ipmrk",[16,1157,1158,1166],{},[19,1159,1160],{},[22,1161,1162,1164],{},[25,1163],{},[25,1165],{},[30,1167,1168,1177,1186,1195,1203,1211,1221],{},[22,1169,1170,1174],{},[35,1171,1172],{},[38,1173,40],{},[35,1175,1176],{},"IpmrK",[22,1178,1179,1183],{},[35,1180,1181],{},[38,1182,50],{},[35,1184,1185],{},"Fakulta podnikatelská VUT v Brně",[22,1187,1188,1192],{},[35,1189,1190],{},[38,1191,80],{},[35,1193,1194],{},"prof. Ing. Petr Dostál, CSc.",[22,1196,1197,1201],{},[35,1198,1199],{},[38,1200,100],{},[35,1202,103],{},[22,1204,1205,1209],{},[35,1206,1207],{},[38,1208,60],{},[35,1210,63],{},[22,1212,1213,1218],{},[35,1214,1215],{},[38,1216,1217],{},"Jazyk",[35,1219,1220],{},"čeština",[22,1222,1223,1227],{},[35,1224,1225],{},[38,1226,70],{},[35,1228,1229],{},"zkouška (písemný test 0–20 bodů, ECTS) + seminární práce (8–12 stran)",[115,1231,722],{"id":721},[724,1233,1234],{},"Seznámit se s pokročilými a nestandardními metodami analytických a simulačních technik v ekonomii a financích. Důraz na teorii i aplikaci do manažerské praxe.",[115,1236,150],{"id":149},[152,1238,1239,1242,1251,1257,1263,1271,1277,1285,1290,1298,1306,1315,1318],{},[123,1240,1241],{},"Úvod",[123,1243,1244,1250],{},[207,1245,1249],{"className":1246,"dataFsResolvedFilePath":1247,"href":1248},[210],"topics\u002Ffuzzy-logika.md","\u002Fwiki\u002Ffuzzy-logika","Fuzzy logika"," — teorie",[123,1252,1253,1256],{},[207,1254,1249],{"className":1255,"dataFsResolvedFilePath":1247,"href":1248},[210]," + aplikace — Excel",[123,1258,1259,1262],{},[207,1260,1249],{"className":1261,"dataFsResolvedFilePath":1247,"href":1248},[210]," — aplikace MATLAB",[123,1264,1265,1250],{},[207,1266,1270],{"className":1267,"dataFsResolvedFilePath":1268,"href":1269},[210],"topics\u002Fumele-neuronove-site.md","\u002Fwiki\u002Fumele-neuronove-site","Umělé neuronové sítě",[123,1272,1273,1276],{},[207,1274,1270],{"className":1275,"dataFsResolvedFilePath":1268,"href":1269},[210]," + aplikace MATLAB",[123,1278,1279,1250],{},[207,1280,1284],{"className":1281,"dataFsResolvedFilePath":1282,"href":1283},[210],"topics\u002Fgeneticke-algoritmy.md","\u002Fwiki\u002Fgeneticke-algoritmy","Genetické algoritmy",[123,1286,1287,1276],{},[207,1288,1284],{"className":1289,"dataFsResolvedFilePath":1282,"href":1283},[210],[123,1291,1292],{},[207,1293,1297],{"className":1294,"dataFsResolvedFilePath":1295,"href":1296},[210],"topics\u002Fteorie-chaosu.md","\u002Fwiki\u002Fteorie-chaosu","Teorie chaosu",[123,1299,1300],{},[207,1301,1305],{"className":1302,"dataFsResolvedFilePath":1303,"href":1304},[210],"topics\u002Fdatamining.md","\u002Fwiki\u002Fdatamining","Datamining",[123,1307,1308,1314],{},[207,1309,1313],{"className":1310,"dataFsResolvedFilePath":1311,"href":1312},[210],"topics\u002Fpredikce.md","\u002Fwiki\u002Fpredikce","Predikce",", kapitálový trh",[123,1316,1317],{},"Řízení výroby a řízení rizik",[123,1319,1320],{},"Rozhodování",[115,1322,1324],{"id":1323},"hodnocení","Hodnocení",[120,1326,1327,1333],{},[123,1328,1329,1332],{},[38,1330,1331],{},"Zkouška",": písemný test, 0–20 bodů. A: 20–18, B: 17–16, C: 15–14, D: 13–12, E: 11–10, F: 9–0.",[123,1334,1335,1338,1339,1343,1344,1348,1349,1353],{},[38,1336,1337],{},"Seminární práce",": 8–12 stran, individuální zaměření na problematiku z praxe, řešení pomocí ",[207,1340,1342],{"className":1341,"dataFsResolvedFilePath":1247,"href":1248},[210],"fuzzy logiky",", ",[207,1345,1347],{"className":1346,"dataFsResolvedFilePath":1268,"href":1269},[210],"umělých neuronových sítí"," nebo ",[207,1350,1352],{"className":1351,"dataFsResolvedFilePath":1282,"href":1283},[210],"genetických algoritmů",". Nutná úspěšná obhajoba.",[115,1355,1357],{"id":1356},"hlavní-témata","Hlavní témata",[120,1359,1360,1366,1372,1378,1387,1393,1402,1408,1417],{},[123,1361,1362,1365],{},[207,1363,1249],{"className":1364,"dataFsResolvedFilePath":1247,"href":1248},[210]," — modelování rozhodování s vágními pojmy",[123,1367,1368,1371],{},[207,1369,1270],{"className":1370,"dataFsResolvedFilePath":1268,"href":1269},[210]," — učení z dat, klasifikace, predikce",[123,1373,1374,1377],{},[207,1375,1284],{"className":1376,"dataFsResolvedFilePath":1282,"href":1283},[210]," — evoluční optimalizace",[123,1379,1380,1386],{},[207,1381,1385],{"className":1382,"dataFsResolvedFilePath":1383,"href":1384},[210],"topics\u002Fevolucni-algoritmy.md","\u002Fwiki\u002Fevolucni-algoritmy","Evoluční algoritmy"," — metaheuristiky, rojové algoritmy, prohledávací metody",[123,1388,1389,1392],{},[207,1390,1297],{"className":1391,"dataFsResolvedFilePath":1295,"href":1296},[210]," — nelineární dynamické systémy",[123,1394,1395,1401],{},[207,1396,1400],{"className":1397,"dataFsResolvedFilePath":1398,"href":1399},[210],"topics\u002Foptimalizace.md","\u002Fwiki\u002Foptimalizace","Optimalizace"," — hledání minima\u002Fmaxima, MATLAB Optimization Toolbox",[123,1403,1404,1407],{},[207,1405,1305],{"className":1406,"dataFsResolvedFilePath":1303,"href":1304},[210]," — dolování z dat, klastrování, rozhodovací stromy, Witness Miner",[123,1409,1410,1416],{},[207,1411,1415],{"className":1412,"dataFsResolvedFilePath":1413,"href":1414},[210],"topics\u002Fanfis.md","\u002Fwiki\u002Fanfis","ANFIS"," — hybridní propojení fuzzy logiky a neuronových sítí",[123,1418,1419,1422],{},[207,1420,1313],{"className":1421,"dataFsResolvedFilePath":1311,"href":1312},[210]," — prognózování časových řad v ekonomii a financích",[115,1424,607],{"id":606},[120,1426,1427,1434,1440,1447,1454,1460,1467],{},[123,1428,1429,1430,1433],{},"DOSTÁL, P. ",[614,1431,1432],{},"Pokročilé metody analýz a modelování v podnikatelství a veřejné správě",", CERM, 2008",[123,1435,1429,1436,1439],{},[614,1437,1438],{},"Advanced Decision making in Business and Public Services",", CERM, 2011",[123,1441,1442,1443,1446],{},"DOSTÁL, P., RAIS, K., SOJKA, Z. ",[614,1444,1445],{},"Pokročilé metody manažerského rozhodování",", Grada, 2005",[123,1448,1449,1450,1453],{},"ALTROCK, C. ",[614,1451,1452],{},"Fuzzy Logic & Neurofuzzy",", 1996",[123,1455,1456,1457,1453],{},"GATELY, E. ",[614,1458,1459],{},"Neural Network for Financial Forecasting",[123,1461,1462,1463,1466],{},"DAVIS, L. ",[614,1464,1465],{},"Handbook of Genetic Algorithms",", 1991",[123,1468,1469,1470,1473],{},"PETERS, E. ",[614,1471,1472],{},"Fractal Market Analysis",", 1994",[115,1475,196],{"id":195},[120,1477,1478,1486,1495,1504,1513,1522,1531,1540,1549,1557,1566,1575,1584],{},[123,1479,1480,1485],{},[207,1481,213],{"className":1482,"dataFsResolvedFilePath":1483,"href":1484},[210],"summaries\u002Fipmrk-detail-predmetu.md","\u002Fwiki\u002Fipmrk-detail-predmetu"," — základní informace o kurzu",[123,1487,1488,1494],{},[207,1489,1493],{"className":1490,"dataFsResolvedFilePath":1491,"href":1492},[210],"summaries\u002Fipmrk-fuzzy-excel.md","\u002Fwiki\u002Fipmrk-fuzzy-excel","Fuzzy logika — Excel"," — princip fuzzy logiky, funkce členství, pravidla, implementace",[123,1496,1497,1503],{},[207,1498,1502],{"className":1499,"dataFsResolvedFilePath":1500,"href":1501},[210],"summaries\u002Fipmrk-fuzzy-matlab.md","\u002Fwiki\u002Fipmrk-fuzzy-matlab","Fuzzy logika — MATLAB"," — architektura fuzzy systému, návrh modelu",[123,1505,1506,1512],{},[207,1507,1511],{"className":1508,"dataFsResolvedFilePath":1509,"href":1510},[210],"summaries\u002Fipmrk-nn-teorie.md","\u002Fwiki\u002Fipmrk-nn-teorie","Neuronové sítě — teorie"," — perceptron, aktivační funkce, backpropagation",[123,1514,1515,1521],{},[207,1516,1520],{"className":1517,"dataFsResolvedFilePath":1518,"href":1519},[210],"summaries\u002Fipmrk-nn-vypocet.md","\u002Fwiki\u002Fipmrk-nn-vypocet","Neuronové sítě — výpočet"," — ruční učení neuronu, vícevrstvé sítě, trénování",[123,1523,1524,1530],{},[207,1525,1529],{"className":1526,"dataFsResolvedFilePath":1527,"href":1528},[210],"summaries\u002Fipmrk-nn-aplikace.md","\u002Fwiki\u002Fipmrk-nn-aplikace","Neuronové sítě — aplikace"," — ANFIS, scoring, predikce, deep learning",[123,1532,1533,1539],{},[207,1534,1538],{"className":1535,"dataFsResolvedFilePath":1536,"href":1537},[210],"summaries\u002Fipmrk-ga-teorie.md","\u002Fwiki\u002Fipmrk-ga-teorie","Genetické algoritmy — teorie"," — chromozomy, selekce, křížení, mutace",[123,1541,1542,1548],{},[207,1543,1547],{"className":1544,"dataFsResolvedFilePath":1545,"href":1546},[210],"summaries\u002Fipmrk-ga-vyuziti.md","\u002Fwiki\u002Fipmrk-ga-vyuziti","Genetické algoritmy — využití"," — optimalizace, TSP, knapsack, klastrování",[123,1550,1551,1556],{},[207,1552,1297],{"className":1553,"dataFsResolvedFilePath":1554,"href":1555},[210],"summaries\u002Fipmrk-chaos.md","\u002Fwiki\u002Fipmrk-chaos"," — atraktory, fraktály, motýlí efekt, Hurstův exponent",[123,1558,1559,1565],{},[207,1560,1564],{"className":1561,"dataFsResolvedFilePath":1562,"href":1563},[210],"summaries\u002Fipmrk-kniha.md","\u002Fwiki\u002Fipmrk-kniha","Kniha — Pokročilé metody"," — celá učebnice, 7 kapitol, kontrolní otázky, nová témata (evoluční alg., optimalizace, datamining)",[123,1567,1568,1574],{},[207,1569,1573],{"className":1570,"dataFsResolvedFilePath":1571,"href":1572},[210],"summaries\u002Fipmrk-evolucni-algoritmy.md","\u002Fwiki\u002Fipmrk-evolucni-algoritmy","Evoluční algoritmy — principy a přehled"," — pseudokódy, vzorce SA\u002FTabu\u002FACO\u002FPSO\u002FDE\u002FSOMA\u002FAIS\u002FABC\u002FGSO",[123,1576,1577,1583],{},[207,1578,1582],{"className":1579,"dataFsResolvedFilePath":1580,"href":1581},[210],"summaries\u002Fipmrk-optimalizace.md","\u002Fwiki\u002Fipmrk-optimalizace","Optimalizace — MATLAB Optimization Toolbox"," — kompletní syntaxe fmincon\u002Ffminsearch\u002Flinprog\u002Fintlinprog\u002Fga",[123,1585,1586,1592],{},[207,1587,1591],{"className":1588,"dataFsResolvedFilePath":1589,"href":1590},[210],"summaries\u002Fipmrk-datamining.md","\u002Fwiki\u002Fipmrk-datamining","Datamining — techniky a nástroje"," — CRISP-DM, Link analýza, k-means, rozhodovací stromy, Apriori, Witness Miner, MATLAB kód",{"title":641,"searchDepth":642,"depth":642,"links":1594},[1595,1596,1597,1598,1599,1600],{"id":721,"depth":642,"text":722},{"id":149,"depth":642,"text":150},{"id":1323,"depth":642,"text":1324},{"id":1356,"depth":642,"text":1357},{"id":606,"depth":642,"text":607},{"id":195,"depth":642,"text":196},"ipmrk","2026-04-10",{},"\u002Fcourses\u002Fipmrk",{"title":1150,"description":641},[1607,1608,1609,1610,1611],"raw\u002Fipmrk\u002FDetail předmětu.md","raw\u002Fipmrk\u002Fkniha.md","raw\u002Fipmrk\u002Fevolucni-algoritmy-online.md","raw\u002Fipmrk\u002Foptimalizace-online.md","raw\u002Fipmrk\u002Fdatamining-online.md","courses\u002Fipmrk",[1601,1614,1615,1616,1617,1618,1619,1620],"fuzzy","neuronove-site","geneticke-algoritmy","evolucni-algoritmy","chaos","optimalizace","datamining","_iX_YpjZn-5NmPhFSn_DHNExx_u1xi12WJEbWAHjXpg",{"ipmrk":1623,"imork":1624,"imek":1625},25,41,21,{"page":1627,"collection":2033},{"id":6,"title":7,"body":1628,"course":658,"courseName":659,"courses":659,"created":660,"description":641,"examInfo":659,"extension":661,"featured":662,"garant":659,"meta":2029,"navigation":664,"path":665,"seo":2030,"sources":2031,"stem":669,"tags":2032,"type":676,"updated":677,"__hash__":678},{"type":9,"value":1629,"toc":2014},[1630,1632,1708,1710,1728,1730,1758,1760,1762,1789,1791,1838,1840,1857,1859,1871,1873,1905,1907,1949,1951,1958,1960,1992,1994],[12,1631,7],{"id":14},[16,1633,1634,1642],{},[19,1635,1636],{},[22,1637,1638,1640],{},[25,1639],{},[25,1641],{},[30,1643,1644,1652,1660,1668,1676,1684,1692,1700],{},[22,1645,1646,1650],{},[35,1647,1648],{},[38,1649,40],{},[35,1651,43],{},[22,1653,1654,1658],{},[35,1655,1656],{},[38,1657,50],{},[35,1659,53],{},[22,1661,1662,1666],{},[35,1663,1664],{},[38,1665,60],{},[35,1667,63],{},[22,1669,1670,1674],{},[35,1671,1672],{},[38,1673,70],{},[35,1675,73],{},[22,1677,1678,1682],{},[35,1679,1680],{},[38,1681,80],{},[35,1683,83],{},[22,1685,1686,1690],{},[35,1687,1688],{},[38,1689,90],{},[35,1691,93],{},[22,1693,1694,1698],{},[35,1695,1696],{},[38,1697,100],{},[35,1699,103],{},[22,1701,1702,1706],{},[35,1703,1704],{},[38,1705,110],{},[35,1707,113],{},[115,1709,118],{"id":117},[120,1711,1712,1716,1720,1724],{},[123,1713,125,1714],{},[38,1715,128],{},[123,1717,131,1718],{},[38,1719,134],{},[123,1721,137,1722],{},[38,1723,140],{},[123,1725,143,1726],{},[38,1727,146],{},[115,1729,150],{"id":149},[152,1731,1732,1734,1736,1738,1740,1742,1744,1746,1748,1750,1752,1754,1756],{},[123,1733,156],{},[123,1735,159],{},[123,1737,162],{},[123,1739,165],{},[123,1741,168],{},[123,1743,171],{},[123,1745,174],{},[123,1747,177],{},[123,1749,180],{},[123,1751,183],{},[123,1753,186],{},[123,1755,189],{},[123,1757,192],{},[115,1759,196],{"id":195},[198,1761,201],{"id":200},[120,1763,1764,1769,1774,1779,1784],{},[123,1765,1766,214],{},[207,1767,213],{"className":1768,"dataFsResolvedFilePath":211,"href":212},[210],[123,1770,1771,223],{},[207,1772,222],{"className":1773,"dataFsResolvedFilePath":220,"href":221},[210],[123,1775,1776,232],{},[207,1777,231],{"className":1778,"dataFsResolvedFilePath":229,"href":230},[210],[123,1780,1781,241],{},[207,1782,240],{"className":1783,"dataFsResolvedFilePath":238,"href":239},[210],[123,1785,1786,250],{},[207,1787,249],{"className":1788,"dataFsResolvedFilePath":247,"href":248},[210],[198,1790,254],{"id":253},[120,1792,1793,1798,1803,1808,1813,1818,1823,1828,1833],{},[123,1794,1795,265],{},[207,1796,264],{"className":1797,"dataFsResolvedFilePath":262,"href":263},[210],[123,1799,1800,274],{},[207,1801,273],{"className":1802,"dataFsResolvedFilePath":271,"href":272},[210],[123,1804,1805,283],{},[207,1806,282],{"className":1807,"dataFsResolvedFilePath":280,"href":281},[210],[123,1809,1810,292],{},[207,1811,291],{"className":1812,"dataFsResolvedFilePath":289,"href":290},[210],[123,1814,1815,301],{},[207,1816,300],{"className":1817,"dataFsResolvedFilePath":298,"href":299},[210],[123,1819,1820,310],{},[207,1821,309],{"className":1822,"dataFsResolvedFilePath":307,"href":308},[210],[123,1824,1825,319],{},[207,1826,318],{"className":1827,"dataFsResolvedFilePath":316,"href":317},[210],[123,1829,1830,328],{},[207,1831,327],{"className":1832,"dataFsResolvedFilePath":325,"href":326},[210],[123,1834,1835,337],{},[207,1836,336],{"className":1837,"dataFsResolvedFilePath":334,"href":335},[210],[198,1839,341],{"id":340},[120,1841,1842,1847,1852],{},[123,1843,1844,352],{},[207,1845,351],{"className":1846,"dataFsResolvedFilePath":349,"href":350},[210],[123,1848,1849,361],{},[207,1850,360],{"className":1851,"dataFsResolvedFilePath":358,"href":359},[210],[123,1853,1854,370],{},[207,1855,369],{"className":1856,"dataFsResolvedFilePath":367,"href":368},[210],[198,1858,374],{"id":373},[120,1860,1861,1866],{},[123,1862,1863,385],{},[207,1864,384],{"className":1865,"dataFsResolvedFilePath":382,"href":383},[210],[123,1867,1868,394],{},[207,1869,393],{"className":1870,"dataFsResolvedFilePath":391,"href":392},[210],[198,1872,398],{"id":397},[120,1874,1875,1880,1885,1890,1895,1900],{},[123,1876,1877,409],{},[207,1878,408],{"className":1879,"dataFsResolvedFilePath":406,"href":407},[210],[123,1881,1882,418],{},[207,1883,417],{"className":1884,"dataFsResolvedFilePath":415,"href":416},[210],[123,1886,1887,427],{},[207,1888,426],{"className":1889,"dataFsResolvedFilePath":424,"href":425},[210],[123,1891,1892,436],{},[207,1893,435],{"className":1894,"dataFsResolvedFilePath":433,"href":434},[210],[123,1896,1897,445],{},[207,1898,444],{"className":1899,"dataFsResolvedFilePath":442,"href":443},[210],[123,1901,1902,454],{},[207,1903,453],{"className":1904,"dataFsResolvedFilePath":451,"href":452},[210],[198,1906,458],{"id":457},[120,1908,1909,1914,1919,1924,1929,1934,1939,1944],{},[123,1910,1911,469],{},[207,1912,468],{"className":1913,"dataFsResolvedFilePath":466,"href":467},[210],[123,1915,1916,478],{},[207,1917,477],{"className":1918,"dataFsResolvedFilePath":475,"href":476},[210],[123,1920,1921,487],{},[207,1922,486],{"className":1923,"dataFsResolvedFilePath":484,"href":485},[210],[123,1925,1926,496],{},[207,1927,495],{"className":1928,"dataFsResolvedFilePath":493,"href":494},[210],[123,1930,1931,505],{},[207,1932,504],{"className":1933,"dataFsResolvedFilePath":502,"href":503},[210],[123,1935,1936,514],{},[207,1937,513],{"className":1938,"dataFsResolvedFilePath":511,"href":512},[210],[123,1940,1941,523],{},[207,1942,522],{"className":1943,"dataFsResolvedFilePath":520,"href":521},[210],[123,1945,1946,532],{},[207,1947,531],{"className":1948,"dataFsResolvedFilePath":529,"href":530},[210],[198,1950,536],{"id":535},[120,1952,1953],{},[123,1954,1955,547],{},[207,1956,546],{"className":1957,"dataFsResolvedFilePath":544,"href":545},[210],[115,1959,551],{"id":550},[120,1961,1962,1967,1972,1977,1982,1987],{},[123,1963,1964,561],{},[207,1965,140],{"className":1966,"dataFsResolvedFilePath":559,"href":560},[210],[123,1968,1969,570],{},[207,1970,569],{"className":1971,"dataFsResolvedFilePath":567,"href":568},[210],[123,1973,1974,579],{},[207,1975,578],{"className":1976,"dataFsResolvedFilePath":576,"href":577},[210],[123,1978,1979,587],{},[207,1980,240],{"className":1981,"dataFsResolvedFilePath":585,"href":586},[210],[123,1983,1984,595],{},[207,1985,384],{"className":1986,"dataFsResolvedFilePath":593,"href":594},[210],[123,1988,1989,603],{},[207,1990,369],{"className":1991,"dataFsResolvedFilePath":601,"href":602},[210],[115,1993,607],{"id":606},[120,1995,1996,2000,2004,2008,2010,2012],{},[123,1997,612,1998,617],{},[614,1999,616],{},[123,2001,620,2002,624],{},[614,2003,623],{},[123,2005,620,2006,630],{},[614,2007,629],{},[123,2009,633],{},[123,2011,636],{},[123,2013,639],{},{"title":641,"searchDepth":642,"depth":642,"links":2015},[2016,2017,2018,2027,2028],{"id":117,"depth":642,"text":118},{"id":149,"depth":642,"text":150},{"id":195,"depth":642,"text":196,"children":2019},[2020,2021,2022,2023,2024,2025,2026],{"id":200,"depth":649,"text":201},{"id":253,"depth":649,"text":254},{"id":340,"depth":649,"text":341},{"id":373,"depth":649,"text":374},{"id":397,"depth":649,"text":398},{"id":457,"depth":649,"text":458},{"id":535,"depth":649,"text":536},{"id":550,"depth":642,"text":551},{"id":606,"depth":642,"text":607},{},{"title":7,"description":641},[668],[658,671,672,673,674,675],"courses",{"zapisku":1624,"topics":2035,"summaries":2036,"outputs":2037},6,35,0,[2039,2043,2047,2050,2054,2058,2062,2066],{"slug":2040,"path":594,"title":2041,"snippet":2042},"bcm","BCM — Řízení kontinuity činnosti","… yberneticka-bezpecnost|Kybernetická bezpečnost]] — reakce na incidenty ## Zdroje v kurzu \u003C\u003Cimork>> - BCM — shrnutí přednášky - [[imork-dr|Disaster Recovery — shrnutí přednáš …",{"slug":2044,"path":530,"title":2045,"snippet":2046},"imork-audio-hack","Případovka: Audio Hack","… na médií - MCN — spolehlivost a dostupnost infrastruktury ## Zdroj v kurzu \u003C\u003Cimork>> - Případovka 2207 — Audio Hack (2022)",{"slug":2048,"path":230,"title":231,"snippet":2049},"imork-bezpecnostni-strategie","… imork-manazerska-bezpecnost|Manažerská bezpečnost]] — governance a role ## Zdroj v kurzu \u003C\u003Cimork>> - Přednáška 2101 — Bezpečnostní strategie (2022)",{"slug":2051,"path":212,"title":2052,"snippet":2053},"imork-detail-predmetu","ImorK — Detail předmětu","… žka | Hodnota | |---------|---------| | Název | Management oborových řešení | | Zkratka | \u003C\u003Cimork>> | | Garant | Ing. Petr Novák | | Vyučující | Ing. Petr Sedlák | | Prerekvizita | ImibePA …",{"slug":2055,"path":545,"title":2056,"snippet":2057},"imork-digitalni-identita","Digitální identita a digitální stopa","… y odesílatele - SAE — budování povědomí o digitální stopě ## Zdroj v kurzu \u003C\u003Cimork>> - Přednáška PRIS 2208 — Digitální identita a stopa",{"slug":2059,"path":494,"title":2060,"snippet":2061},"imork-ehealth","eHealth v ČR","… 2021) zaměřená na elektronizaci zdravotnictví v České republice a v Evropě. Součást kurzu \u003C\u003Cimork>>. ## Co je eHealth **eHealth** = elektronizace zdravotnictví — využití ICT pro podporu z …",{"slug":2063,"path":272,"title":2064,"snippet":2065},"imork-financni-sektor","ISMS ve finančním sektoru","… cka-bezpecnost|Kybernetická bezpečnost]] — hlášení incidentů, testování ## Zdroj v kurzu \u003C\u003Cimork>> - Přednáška 2005 — ISMS ve finančním sektoru (2023)",{"slug":2067,"path":452,"title":2068,"snippet":2069},"imork-internetova-bezpecnost","Internetová bezpečnost — cvičení","… ostoru přes hrozby a APT skupiny až po OSINT a pravidla bezpečného chování. Součást kurzu \u003C\u003Cimork>>. ## Kyberprostor - **Vznik pojmu**: 1983 (William Gibson), popularizace J.P. Barlow (De …",[2071,2559,3058,3508,3788,4138],{"id":2072,"title":2041,"body":2073,"course":659,"courses":2544,"created":660,"description":641,"extension":661,"meta":2545,"navigation":664,"path":2546,"seo":2547,"sources":2548,"stem":2551,"tags":2552,"type":2557,"updated":677,"__hash__":2558},"topics\u002Ftopics\u002Fbcm.md",{"type":9,"value":2074,"toc":2531},[2075,2078,2087,2090,2094,2188,2192,2246,2250,2273,2277,2366,2370,2373,2377,2454,2458,2484,2488,2508,2517],[12,2076,2041],{"id":2077},"bcm-řízení-kontinuity-činnosti",[724,2079,2080],{},[2081,2082],"img",{"alt":2083,"className":2084,"src":2086},"bcm-rpo-rto",[210,2085],"wikilink-broken","\u002Fwiki-assets\u002Fbcm-rpo-rto.jpeg",[724,2088,2089],{},"Identifikuje potenciální dopady incidentů a zajišťuje kontinuitu a obnovu klíčových procesů organizace na předem stanovenou minimální úroveň.",[115,2091,2093],{"id":2092},"klíčové-pojmy","Klíčové pojmy",[16,2095,2096,2109],{},[19,2097,2098],{},[22,2099,2100,2103,2106],{},[25,2101,2102],{},"Pojem",[25,2104,2105],{},"Anglicky",[25,2107,2108],{},"Popis",[30,2110,2111,2124,2136,2149,2162,2175],{},[22,2112,2113,2118,2121],{},[35,2114,2115],{},[38,2116,2117],{},"BCMS",[35,2119,2120],{},"Business Continuity Management System",[35,2122,2123],{},"Plánovaný, kontinuální a dokumentovaný systém",[22,2125,2126,2130,2133],{},[35,2127,2128],{},[38,2129,384],{},[35,2131,2132],{},"Business Continuity Management",[35,2134,2135],{},"Činnost identifikující dopady a zajišťující kontinuitu",[22,2137,2138,2143,2146],{},[35,2139,2140],{},[38,2141,2142],{},"BIA",[35,2144,2145],{},"Business Impact Analysis",[35,2147,2148],{},"Identifikace kritických činností (orientace na dopad, ne příčinu)",[22,2150,2151,2156,2159],{},[35,2152,2153],{},[38,2154,2155],{},"MBCO",[35,2157,2158],{},"Minimum Business Continuity Objective",[35,2160,2161],{},"Minimální přijatelná úroveň služeb",[22,2163,2164,2169,2172],{},[35,2165,2166],{},[38,2167,2168],{},"RPO",[35,2170,2171],{},"Recovery Point Objective",[35,2173,2174],{},"Do jakého bodu v minulosti lze obnovit data",[22,2176,2177,2182,2185],{},[35,2178,2179],{},[38,2180,2181],{},"RTO",[35,2183,2184],{},"Recovery Time Objective",[35,2186,2187],{},"Čas potřebný pro obnovu provozu",[115,2189,2191],{"id":2190},"pdca-cyklus-pro-bcms","PDCA cyklus pro BCMS",[16,2193,2194,2204],{},[19,2195,2196],{},[22,2197,2198,2201],{},[25,2199,2200],{},"Fáze",[25,2202,2203],{},"Obsah",[30,2205,2206,2216,2226,2236],{},[22,2207,2208,2213],{},[35,2209,2210],{},[38,2211,2212],{},"Plan",[35,2214,2215],{},"Kontext, požadavky, rozsah, politika, BIA, posouzení rizik",[22,2217,2218,2223],{},[35,2219,2220],{},[38,2221,2222],{},"Do",[35,2224,2225],{},"Strategie kontinuity, implementace plánů, cvičení",[22,2227,2228,2233],{},[35,2229,2230],{},[38,2231,2232],{},"Check",[35,2234,2235],{},"Monitoring, audit, přezkoumání managementem",[22,2237,2238,2243],{},[35,2239,2240],{},[38,2241,2242],{},"Act",[35,2244,2245],{},"Nápravná opatření, neustálé zlepšování",[115,2247,2249],{"id":2248},"iso-223012019-struktura","ISO 22301:2019 — struktura",[120,2251,2252,2255,2258,2261,2264,2267,2270],{},[123,2253,2254],{},"Kap. 4 — kontext organizace",[123,2256,2257],{},"Kap. 5 — vedení (leadership)",[123,2259,2260],{},"Kap. 6 — plánování (BIA, rizika)",[123,2262,2263],{},"Kap. 7 — podpora (kompetence, dokumentace, komunikace)",[123,2265,2266],{},"Kap. 8 — provoz (strategie, plány, cvičení)",[123,2268,2269],{},"Kap. 9 — hodnocení výkonnosti (monitoring, audit)",[123,2271,2272],{},"Kap. 10 — zlepšování (neshody, nápravná opatření)",[115,2274,2276],{"id":2275},"analýza-steeple","Analýza STEEPLE",[16,2278,2279,2289],{},[19,2280,2281],{},[22,2282,2283,2286],{},[25,2284,2285],{},"Faktor",[25,2287,2288],{},"Oblast",[30,2290,2291,2302,2313,2324,2334,2345,2356],{},[22,2292,2293,2299],{},[35,2294,2295,2298],{},[38,2296,2297],{},"S","ociální",[35,2300,2301],{},"Zaměstnanost, bezpečnost, komunity",[22,2303,2304,2310],{},[35,2305,2306,2309],{},[38,2307,2308],{},"T","echnologický",[35,2311,2312],{},"Závislost na technologiích",[22,2314,2315,2321],{},[35,2316,2317,2320],{},[38,2318,2319],{},"E","konomický",[35,2322,2323],{},"Ekonomická situace, finanční instituce",[22,2325,2326,2331],{},[35,2327,2328,2330],{},[38,2329,2319],{},"tický",[35,2332,2333],{},"Podnikatelská etika, média, veřejnost",[22,2335,2336,2342],{},[35,2337,2338,2341],{},[38,2339,2340],{},"P","olitický",[35,2343,2344],{},"Politický systém, hrozba nepokojů",[22,2346,2347,2353],{},[35,2348,2349,2352],{},[38,2350,2351],{},"L","egislativní",[35,2354,2355],{},"Předpisy, zákony",[22,2357,2358,2363],{},[35,2359,2360,2362],{},[38,2361,2319],{},"nvironmentální",[35,2364,2365],{},"Životní prostředí, přírodní hrozby",[115,2367,2369],{"id":2368},"disaster-recovery-dr","Disaster Recovery (DR)",[724,2371,2372],{},"Předem stanovený scénář obnovy provozu po havárii — součást BCM.",[198,2374,2376],{"id":2375},"_7-úrovní-dr-tiers","7 úrovní DR (Tiers)",[16,2378,2379,2388],{},[19,2380,2381],{},[22,2382,2383,2386],{},[25,2384,2385],{},"Tier",[25,2387,2108],{},[30,2389,2390,2398,2406,2414,2422,2430,2438,2446],{},[22,2391,2392,2395],{},[35,2393,2394],{},"0",[35,2396,2397],{},"Žádná off-site data",[22,2399,2400,2403],{},[35,2401,2402],{},"1",[35,2404,2405],{},"Fyzická záloha + cold site",[22,2407,2408,2411],{},[35,2409,2410],{},"2",[35,2412,2413],{},"Fyzická záloha + hot site",[22,2415,2416,2419],{},[35,2417,2418],{},"3",[35,2420,2421],{},"Elektronický trezor (electronic vaulting)",[22,2423,2424,2427],{},[35,2425,2426],{},"4",[35,2428,2429],{},"Point-in-time recovery",[22,2431,2432,2435],{},[35,2433,2434],{},"5",[35,2436,2437],{},"Two-site commit (kontinuální přenos)",[22,2439,2440,2443],{},[35,2441,2442],{},"6",[35,2444,2445],{},"Minimální až nulová ztráta dat (zrcadlení)",[22,2447,2448,2451],{},[35,2449,2450],{},"7",[35,2452,2453],{},"Automatizovaná obnova (AI monitoring)",[198,2455,2457],{"id":2456},"cloud-dr","Cloud DR",[120,2459,2460,2466,2472,2478],{},[123,2461,2462,2465],{},[38,2463,2464],{},"Cold DR"," — nejlevnější, nejdelší odstávka",[123,2467,2468,2471],{},[38,2469,2470],{},"Warm DR"," — aktualizované zálohy u poskytovatele",[123,2473,2474,2477],{},[38,2475,2476],{},"Hot DR"," — paralelní řešení v tandemu",[123,2479,2480,2483],{},[38,2481,2482],{},"DRaaS"," — Disaster Recovery as a Service (řízené\u002Fasistované\u002Fvlastní)",[115,2485,2487],{"id":2486},"propojení-s-dalšími-tématy","Propojení s dalšími tématy",[120,2489,2490,2496,2502],{},[123,2491,2492,2495],{},[207,2493,140],{"className":2494,"dataFsResolvedFilePath":559,"href":560},[210]," — BCM jako součást bezpečnostního systému",[123,2497,2498,2501],{},[207,2499,569],{"className":2500,"dataFsResolvedFilePath":567,"href":568},[210]," — krizové plány pro zbytková rizika",[123,2503,2504,2507],{},[207,2505,578],{"className":2506,"dataFsResolvedFilePath":576,"href":577},[210]," — reakce na incidenty",[115,2509,2511,2512],{"id":2510},"zdroje-v-kurzu-imork","Zdroje v kurzu ",[207,2513,43],{"className":2514,"dataFsResolvedFilePath":2515,"href":2516},[210],"courses\u002Fimork.md","\u002Fwiki\u002Fimork",[120,2518,2519,2525],{},[123,2520,2521],{},[207,2522,2524],{"className":2523,"dataFsResolvedFilePath":382,"href":383},[210],"BCM — shrnutí přednášky",[123,2526,2527],{},[207,2528,2530],{"className":2529,"dataFsResolvedFilePath":391,"href":392},[210],"Disaster Recovery — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":2532},[2533,2534,2535,2536,2537,2541,2542],{"id":2092,"depth":642,"text":2093},{"id":2190,"depth":642,"text":2191},{"id":2248,"depth":642,"text":2249},{"id":2275,"depth":642,"text":2276},{"id":2368,"depth":642,"text":2369,"children":2538},[2539,2540],{"id":2375,"depth":649,"text":2376},{"id":2456,"depth":649,"text":2457},{"id":2486,"depth":642,"text":2487},{"id":2510,"depth":642,"text":2543},"Zdroje v kurzu ImorK",[658],{},"\u002Ftopics\u002Fbcm",{"title":2041,"description":641},[2549,2550],"raw\u002Fimork\u002F2014 VUT_Bezp BCM-2021.pdf","raw\u002Fimork\u002F2013 VUT_Bezp DR-2021.pdf","topics\u002Fbcm",[658,2040,2553,2554,2555,2556],"kontinuita-cinnosti","iso-22301","bia","disaster-recovery","topic","ZJwDCcNpVg_0RD-SpeyBFhimC2w94ZwCp5TdUgQNLTI",{"id":2560,"title":2561,"body":2562,"course":659,"courses":3045,"created":660,"description":641,"extension":661,"meta":3046,"navigation":664,"path":3047,"seo":3048,"sources":3049,"stem":3052,"tags":3053,"type":2557,"updated":677,"__hash__":3057},"topics\u002Ftopics\u002Fisms.md","ISMS — Systém řízení bezpečnosti informací",{"type":9,"value":2563,"toc":3030},[2564,2567,2574,2581,2584,2588,2655,2659,2663,2722,2726,2746,2750,2754,2855,2859,2882,2886,2908,2912,2919,2975,2977,3008,3013],[12,2565,2561],{"id":2566},"isms-systém-řízení-bezpečnosti-informací",[724,2568,2569],{},[2081,2570],{"alt":2571,"className":2572,"src":2573},"isms-pdca-cyklus",[210,2085],"\u002Fwiki-assets\u002Fisms-pdca-cyklus.jpeg",[724,2575,2576],{},[2081,2577],{"alt":2578,"className":2579,"src":2580},"isms-oborova-mapa",[210,2085],"\u002Fwiki-assets\u002Fisms-oborova-mapa.jpeg",[724,2582,2583],{},"Information Security Management System (ISMS) je systematický přístup k řízení citlivých informací organizace tak, aby zůstaly bezpečné. Zahrnuje lidi, procesy a IT systémy.",[115,2585,2587],{"id":2586},"základní-pilíře","Základní pilíře",[16,2589,2590,2601],{},[19,2591,2592],{},[22,2593,2594,2597,2599],{},[25,2595,2596],{},"Pilíř",[25,2598,2105],{},[25,2600,2108],{},[30,2602,2603,2616,2629,2642],{},[22,2604,2605,2610,2613],{},[35,2606,2607],{},[38,2608,2609],{},"Důvěrnost",[35,2611,2612],{},"Confidentiality",[35,2614,2615],{},"Přístup pouze oprávněným osobám",[22,2617,2618,2623,2626],{},[35,2619,2620],{},[38,2621,2622],{},"Integrita",[35,2624,2625],{},"Integrity",[35,2627,2628],{},"Ochrana před neoprávněnou změnou",[22,2630,2631,2636,2639],{},[35,2632,2633],{},[38,2634,2635],{},"Dostupnost",[35,2637,2638],{},"Availability",[35,2640,2641],{},"Systémy a data dostupné v potřebný čas",[22,2643,2644,2649,2652],{},[35,2645,2646],{},[38,2647,2648],{},"Nepopiratelnost",[35,2650,2651],{},"Non-repudiation",[35,2653,2654],{},"Prokázání autorství akce",[115,2656,2658],{"id":2657},"normativní-rámec","Normativní rámec",[198,2660,2662],{"id":2661},"isoiec-27000-rodina","ISO\u002FIEC 27000 rodina",[120,2664,2665,2671,2677,2688,2694,2704,2713],{},[123,2666,2667,2670],{},[38,2668,2669],{},"ISO\u002FIEC 27001"," — požadavky na ISMS (certifikační norma)",[123,2672,2673,2676],{},[38,2674,2675],{},"ISO\u002FIEC 27002"," — soubor bezpečnostních opatření (best practices)",[123,2678,2679,2682,2683,2687],{},[38,2680,2681],{},"ISO\u002FIEC 27005"," — ",[207,2684,2686],{"className":2685,"dataFsResolvedFilePath":567,"href":568},[210],"řízení rizik"," bezpečnosti informací",[123,2689,2690,2693],{},[38,2691,2692],{},"ISO\u002FIEC 27014"," — governance bezpečnosti informací",[123,2695,2696,2699,2700],{},[38,2697,2698],{},"ISO\u002FIEC 27011"," — ISMS pro ",[207,2701,2703],{"className":2702,"dataFsResolvedFilePath":325,"href":326},[210],"telekomunikace",[123,2705,2706,2699,2709],{},[38,2707,2708],{},"ISO\u002FIEC 27019",[207,2710,2712],{"className":2711,"dataFsResolvedFilePath":289,"href":290},[210],"energetiku",[123,2714,2715,2699,2718],{},[38,2716,2717],{},"ISO\u002FIEC 27799",[207,2719,2721],{"className":2720,"dataFsResolvedFilePath":280,"href":281},[210],"zdravotnictví",[198,2723,2725],{"id":2724},"další-rámce","Další rámce",[120,2727,2728,2734,2740],{},[123,2729,2730,2733],{},[38,2731,2732],{},"NIST"," — americké standardy (SP 800 řada)",[123,2735,2736,2739],{},[38,2737,2738],{},"ISACA"," — profesní certifikace (CISM, CISA)",[123,2741,2742,2745],{},[38,2743,2744],{},"ENISA"," — evropská agentura pro kybernetickou bezpečnost",[115,2747,2749],{"id":2748},"governance-řízení","Governance (řízení)",[198,2751,2753],{"id":2752},"bezpečnostní-role","Bezpečnostní role",[16,2755,2756,2768],{},[19,2757,2758],{},[22,2759,2760,2763,2765],{},[25,2761,2762],{},"Role",[25,2764,40],{},[25,2766,2767],{},"Odpovědnost",[30,2769,2770,2781,2792,2803,2814,2825,2835,2845],{},[22,2771,2772,2775,2778],{},[35,2773,2774],{},"Chief Information Officer",[35,2776,2777],{},"CIO",[35,2779,2780],{},"Celkové řízení ICT",[22,2782,2783,2786,2789],{},[35,2784,2785],{},"Chief Information Security Officer",[35,2787,2788],{},"CISO",[35,2790,2791],{},"Řízení informační bezpečnosti",[22,2793,2794,2797,2800],{},[35,2795,2796],{},"Chief Technology Officer",[35,2798,2799],{},"CTO",[35,2801,2802],{},"Technologická strategie",[22,2804,2805,2808,2811],{},[35,2806,2807],{},"IS Security Officer",[35,2809,2810],{},"ISSO",[35,2812,2813],{},"Bezpečnost IS",[22,2815,2816,2819,2822],{},[35,2817,2818],{},"Manažer KB",[35,2820,2821],{},"—",[35,2823,2824],{},"Odpovědný za ISMS",[22,2826,2827,2830,2832],{},[35,2828,2829],{},"Architekt KB",[35,2831,2821],{},[35,2833,2834],{},"Návrh a implementace opatření",[22,2836,2837,2840,2842],{},[35,2838,2839],{},"Auditor KB",[35,2841,2821],{},[35,2843,2844],{},"Provádění auditů",[22,2846,2847,2850,2852],{},[35,2848,2849],{},"Garant aktiva",[35,2851,2821],{},[35,2853,2854],{},"Rozvoj, použití a bezpečnost aktiva",[198,2856,2858],{"id":2857},"tři-třídy-informační-bezpečnosti","Tři třídy informační bezpečnosti",[152,2860,2861,2867,2876],{},[123,2862,2863,2866],{},[38,2864,2865],{},"Management"," — hodnocení rizik, plánování, akvizice, certifikace",[123,2868,2869,2872,2873],{},[38,2870,2871],{},"Provoz"," — kontinuita, personální bezpečnost, fyzická ochrana, incidenty, ",[207,2874,240],{"className":2875,"dataFsResolvedFilePath":585,"href":586},[210],[123,2877,2878,2881],{},[38,2879,2880],{},"Technická"," — identifikace\u002Fautentizace, řízení přístupu, audit, ochrana komunikace",[115,2883,2885],{"id":2884},"isms-cyklus-pdca","ISMS cyklus (PDCA)",[152,2887,2888,2893,2898,2903],{},[123,2889,2890,2892],{},[38,2891,2212],{}," — stanovení kontextu, politiky, rozsahu ISMS",[123,2894,2895,2897],{},[38,2896,2222],{}," — implementace opatření, řízení rizik",[123,2899,2900,2902],{},[38,2901,2232],{}," — monitorování, audit, přezkoumání",[123,2904,2905,2907],{},[38,2906,2242],{}," — nápravná opatření, neustálé zlepšování",[115,2909,2911],{"id":2910},"oborová-řešení-isms","Oborová řešení ISMS",[724,2913,2914,2915,2918],{},"Kurz ",[207,2916,43],{"className":2917,"dataFsResolvedFilePath":2515,"href":2516},[210]," pokrývá ISMS specifika pro:",[120,2920,2921,2927,2933,2940,2946,2953,2959,2965,2970],{},[123,2922,2923],{},[207,2924,2926],{"className":2925,"dataFsResolvedFilePath":262,"href":263},[210],"Akademické\u002Funiverzitní prostředí",[123,2928,2929,2932],{},[207,2930,282],{"className":2931,"dataFsResolvedFilePath":280,"href":281},[210]," (HIPAA, ISO 27799)",[123,2934,2935,2939],{},[207,2936,2938],{"className":2937,"dataFsResolvedFilePath":289,"href":290},[210],"Energetiku"," (ISO 27019, IEC 61850)",[123,2941,2942,2945],{},[207,2943,300],{"className":2944,"dataFsResolvedFilePath":298,"href":299},[210]," (NISTIR 7628)",[123,2947,2948,2952],{},[207,2949,2951],{"className":2950,"dataFsResolvedFilePath":307,"href":308},[210],"Dopravu\u002Fželeznici"," (CLC\u002FTS 50701)",[123,2954,2955,2958],{},[207,2956,318],{"className":2957,"dataFsResolvedFilePath":316,"href":317},[210]," (TISAX)",[123,2960,2961,2964],{},[207,2962,327],{"className":2963,"dataFsResolvedFilePath":325,"href":326},[210]," (ISO 27011)",[123,2966,2967],{},[207,2968,336],{"className":2969,"dataFsResolvedFilePath":334,"href":335},[210],[123,2971,2972],{},[207,2973,273],{"className":2974,"dataFsResolvedFilePath":271,"href":272},[210],[115,2976,2487],{"id":2486},[120,2978,2979,2985,2990,2996,3002],{},[123,2980,2981,2984],{},[207,2982,569],{"className":2983,"dataFsResolvedFilePath":567,"href":568},[210]," — jádro ISMS procesu",[123,2986,2987,587],{},[207,2988,240],{"className":2989,"dataFsResolvedFilePath":585,"href":586},[210],[123,2991,2992,2995],{},[207,2993,384],{"className":2994,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti",[123,2997,2998,3001],{},[207,2999,578],{"className":3000,"dataFsResolvedFilePath":576,"href":577},[210]," — širší kontext",[123,3003,3004,3007],{},[207,3005,369],{"className":3006,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická opatření",[115,3009,2511,3010],{"id":2510},[207,3011,43],{"className":3012,"dataFsResolvedFilePath":2515,"href":2516},[210],[120,3014,3015,3020,3025],{},[123,3016,3017],{},[207,3018,222],{"className":3019,"dataFsResolvedFilePath":220,"href":221},[210],[123,3021,3022],{},[207,3023,249],{"className":3024,"dataFsResolvedFilePath":247,"href":248},[210],[123,3026,3027],{},[207,3028,231],{"className":3029,"dataFsResolvedFilePath":229,"href":230},[210],{"title":641,"searchDepth":642,"depth":642,"links":3031},[3032,3033,3037,3041,3042,3043,3044],{"id":2586,"depth":642,"text":2587},{"id":2657,"depth":642,"text":2658,"children":3034},[3035,3036],{"id":2661,"depth":649,"text":2662},{"id":2724,"depth":649,"text":2725},{"id":2748,"depth":642,"text":2749,"children":3038},[3039,3040],{"id":2752,"depth":649,"text":2753},{"id":2857,"depth":649,"text":2858},{"id":2884,"depth":642,"text":2885},{"id":2910,"depth":642,"text":2911},{"id":2486,"depth":642,"text":2487},{"id":2510,"depth":642,"text":2543},[658],{},"\u002Ftopics\u002Fisms",{"title":2561,"description":641},[3050,3051,668],"raw\u002Fimork\u002F2001 VUT_Bezp Managerská 2022.pdf","raw\u002Fimork\u002F2003 VUT_Bezp Risk Mngmt-2021.pdf","topics\u002Fisms",[658,671,3054,3055,672,3056],"iso-27001","iso-27002","governance","Itz64OPbMNGx3-X4N8-TmPXcCQeAMc2WpvRFQxHLSUs",{"id":3059,"title":578,"body":3060,"course":659,"courses":3493,"created":660,"description":641,"extension":661,"meta":3494,"navigation":664,"path":3495,"seo":3496,"sources":3497,"stem":3500,"tags":3501,"type":2557,"updated":677,"__hash__":3507},"topics\u002Ftopics\u002Fkyberneticka-bezpecnost.md",{"type":9,"value":3061,"toc":3479},[3062,3065,3072,3079,3083,3121,3125,3129,3171,3175,3182,3185,3211,3215,3232,3236,3267,3271,3339,3343,3346,3363,3367,3405,3407,3444,3449],[12,3063,578],{"id":3064},"kybernetická-bezpečnost",[724,3066,3067],{},[2081,3068],{"alt":3069,"className":3070,"src":3071},"kb-defense-in-depth",[210,2085],"\u002Fwiki-assets\u002Fkb-defense-in-depth.jpeg",[724,3073,3074,3075,3078],{},"Ochrana informačních systémů, sítí a dat před kybernetickými hrozbami. V kontextu ",[207,3076,140],{"className":3077,"dataFsResolvedFilePath":559,"href":560},[210]," zahrnuje jak manažerské, tak technické aspekty bezpečnosti.",[115,3080,3082],{"id":3081},"základní-pojmy","Základní pojmy",[120,3084,3085,3091,3097,3103,3109,3115],{},[123,3086,3087,3090],{},[38,3088,3089],{},"Útočná plocha"," (Attack Surface) — celkový počet vstupních bodů pro neoprávněný přístup (digitální + fyzická)",[123,3092,3093,3096],{},[38,3094,3095],{},"Vektor útoku"," (Attack Vector) — způsob zneužití zranitelnosti",[123,3098,3099,3102],{},[38,3100,3101],{},"Zranitelnost"," (Vulnerability) — slabé místo v aktivu nebo procesu",[123,3104,3105,3108],{},[38,3106,3107],{},"Exploit"," — kód zneužívající konkrétní zranitelnost",[123,3110,3111,3114],{},[38,3112,3113],{},"Payload"," — kód spuštěný po úspěšném exploitu",[123,3116,3117,3120],{},[38,3118,3119],{},"Shellcode"," — kód spouštěný v shellu napadeného systému",[115,3122,3124],{"id":3123},"typy-útoků","Typy útoků",[198,3126,3128],{"id":3127},"podle-cílení","Podle cílení",[16,3130,3131,3143],{},[19,3132,3133],{},[22,3134,3135,3138,3140],{},[25,3136,3137],{},"Typ",[25,3139,2108],{},[25,3141,3142],{},"Cíl",[30,3144,3145,3158],{},[22,3146,3147,3152,3155],{},[35,3148,3149],{},[38,3150,3151],{},"Plošný",[35,3153,3154],{},"Útočníkovi je jedno, kdo je obětí",[35,3156,3157],{},"Botnety, spam, ransomware",[22,3159,3160,3165,3168],{},[35,3161,3162],{},[38,3163,3164],{},"Cílený (APT)",[35,3166,3167],{},"Soustředěná pozornost na konkrétní cíl",[35,3169,3170],{},"Špionáž, sabotáž, krádež dat",[198,3172,3174],{"id":3173},"apt-advanced-persistent-threat","APT — Advanced Persistent Threat",[724,3176,3177],{},[2081,3178],{"alt":3179,"className":3180,"src":3181},"apt-faze-utoku",[210,2085],"\u002Fwiki-assets\u002Fapt-faze-utoku.jpeg",[724,3183,3184],{},"4 fáze:",[152,3186,3187,3193,3199,3205],{},[123,3188,3189,3192],{},[38,3190,3191],{},"Příprava"," — sběr informací, skenování zranitelností, sociální inženýrství",[123,3194,3195,3198],{},[38,3196,3197],{},"Průnik"," — spear phishing, watering hole, malvertising",[123,3200,3201,3204],{},[38,3202,3203],{},"Kompromitace"," — laterální pohyb, eskalace oprávnění, trvalý přístup",[123,3206,3207,3210],{},[38,3208,3209],{},"Dokončení"," — exfiltrace dat, vydírání, sabotáž",[198,3212,3214],{"id":3213},"základní-vektory-útoku","Základní vektory útoku",[120,3216,3217,3220,3223,3226,3229],{},[123,3218,3219],{},"Email s přílohou (spear phishing)",[123,3221,3222],{},"Trojanizované aplikace",[123,3224,3225],{},"Drive-by download (webové exploity)",[123,3227,3228],{},"Výměnná média (BadUSB)",[123,3230,3231],{},"Watering hole (kompromitace důvěryhodného webu)",[198,3233,3235],{"id":3234},"software-útoky","Software útoky",[120,3237,3238,3244,3250,3256,3261],{},[123,3239,3240,3243],{},[38,3241,3242],{},"Adware\u002FSpyware"," — sběr dat, odposlech",[123,3245,3246,3249],{},[38,3247,3248],{},"Viry"," — poškození HW\u002FSW",[123,3251,3252,3255],{},[38,3253,3254],{},"Trojské koně"," — skrytá funkčnost",[123,3257,3258,3260],{},[38,3259,435],{}," — šifrování dat za výkupné (single\u002Fdouble\u002Ftriple)",[123,3262,3263,3266],{},[38,3264,3265],{},"WormGPT"," — AI nástroj pro automatizaci kybernetické kriminality",[115,3268,3270],{"id":3269},"webové-útoky-owasp","Webové útoky (OWASP)",[16,3272,3273,3285],{},[19,3274,3275],{},[22,3276,3277,3280,3282],{},[25,3278,3279],{},"Útok",[25,3281,3142],{},[25,3283,3284],{},"Efekt",[30,3286,3287,3298,3308,3319,3329],{},[22,3288,3289,3292,3295],{},[35,3290,3291],{},"Content Spoofing",[35,3293,3294],{},"Klient",[35,3296,3297],{},"Ztráta přihlašovacích údajů",[22,3299,3300,3303,3305],{},[35,3301,3302],{},"XSS",[35,3304,3294],{},[35,3306,3307],{},"Přístup k cookies",[22,3309,3310,3313,3316],{},[35,3311,3312],{},"SQL Injection",[35,3314,3315],{},"Server",[35,3317,3318],{},"Neoprávněný přístup do DB",[22,3320,3321,3324,3326],{},[35,3322,3323],{},"DoS\u002FDDoS",[35,3325,3315],{},[35,3327,3328],{},"Nedostupnost služby",[22,3330,3331,3334,3336],{},[35,3332,3333],{},"Path Traversal",[35,3335,3315],{},[35,3337,3338],{},"Přístup k souborům",[115,3340,3342],{"id":3341},"bec-business-email-compromise","BEC — Business Email Compromise",[724,3344,3345],{},"Zneužití firemního emailu k podvodným platbám. 5 typů dle FBI:",[152,3347,3348,3351,3354,3357,3360],{},[123,3349,3350],{},"Vydávání se za právníka",[123,3352,3353],{},"Podvod na CEO",[123,3355,3356],{},"Krádež dat (personální oddělení)",[123,3358,3359],{},"Kompromitace účtu",[123,3361,3362],{},"Falešné faktury",[115,3364,3366],{"id":3365},"obranné-technologie","Obranné technologie",[120,3368,3369,3375,3381,3387,3393,3399],{},[123,3370,3371,3374],{},[38,3372,3373],{},"NAC"," — řízení přístupu k síti",[123,3376,3377,3380],{},[38,3378,3379],{},"IDS"," — detekce průniku (pasivní)",[123,3382,3383,3386],{},[38,3384,3385],{},"IPS"," — prevence průniku (aktivní, in-line)",[123,3388,3389,3392],{},[38,3390,3391],{},"SIEM"," — centralizovaná správa bezpečnostních událostí",[123,3394,3395,3398],{},[38,3396,3397],{},"DLP"," — prevence úniku dat",[123,3400,3401,3404],{},[38,3402,3403],{},"FW\u002FVPN"," — perimetrová ochrana",[115,3406,2487],{"id":2486},[120,3408,3409,3415,3421,3427,3438],{},[123,3410,3411,3414],{},[207,3412,140],{"className":3413,"dataFsResolvedFilePath":559,"href":560},[210]," — manažerský rámec bezpečnosti",[123,3416,3417,3420],{},[207,3418,569],{"className":3419,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení hrozeb a zranitelností",[123,3422,3423,3426],{},[207,3424,240],{"className":3425,"dataFsResolvedFilePath":585,"href":586},[210]," — budování povědomí jako obrana č. 1",[123,3428,3429,3432,3433,3437],{},[207,3430,384],{"className":3431,"dataFsResolvedFilePath":593,"href":594},[210]," \u002F ",[207,3434,3436],{"className":3435,"dataFsResolvedFilePath":391,"href":392},[210],"DR"," — reakce na incidenty a obnova",[123,3439,3440,3443],{},[207,3441,369],{"className":3442,"dataFsResolvedFilePath":601,"href":602},[210]," — technologická ochrana",[115,3445,2511,3446],{"id":2510},[207,3447,43],{"className":3448,"dataFsResolvedFilePath":2515,"href":2516},[210],[120,3450,3451,3457,3462,3467,3472],{},[123,3452,3453],{},[207,3454,3456],{"className":3455,"dataFsResolvedFilePath":406,"href":407},[210],"Anatomie kybernetického útoku",[123,3458,3459],{},[207,3460,417],{"className":3461,"dataFsResolvedFilePath":415,"href":416},[210],[123,3463,3464],{},[207,3465,351],{"className":3466,"dataFsResolvedFilePath":349,"href":350},[210],[123,3468,3469],{},[207,3470,426],{"className":3471,"dataFsResolvedFilePath":424,"href":425},[210],[123,3473,3474],{},[207,3475,458],{"className":3476,"dataFsResolvedFilePath":3477,"href":3478},[210],"summaries\u002Fimork-pripadovky.md","\u002Fwiki\u002Fimork-pripadovky",{"title":641,"searchDepth":642,"depth":642,"links":3480},[3481,3482,3488,3489,3490,3491,3492],{"id":3081,"depth":642,"text":3082},{"id":3123,"depth":642,"text":3124,"children":3483},[3484,3485,3486,3487],{"id":3127,"depth":649,"text":3128},{"id":3173,"depth":649,"text":3174},{"id":3213,"depth":649,"text":3214},{"id":3234,"depth":649,"text":3235},{"id":3269,"depth":642,"text":3270},{"id":3341,"depth":642,"text":3342},{"id":3365,"depth":642,"text":3366},{"id":2486,"depth":642,"text":2487},{"id":2510,"depth":642,"text":2543},[658],{},"\u002Ftopics\u002Fkyberneticka-bezpecnost",{"title":578,"description":641},[3498,3499,3050],"raw\u002Fimork\u002FCV 02 VUT_Anatomie útoku-2022.pdf","raw\u002Fimork\u002FCV 05 VUT_ AI útoky-2023 (1).pdf","topics\u002Fkyberneticka-bezpecnost",[658,673,3502,3503,3504,3505,3506],"utoky","apt","ransomware","phishing","owasp","YTY7yZ-dcytzBVML0ABbKkLBPI4HcQkkY-i_yZbQNy8",{"id":3509,"title":369,"body":3510,"course":659,"courses":3771,"created":660,"description":641,"extension":661,"meta":3772,"navigation":664,"path":3773,"seo":3774,"sources":3775,"stem":3779,"tags":3780,"type":2557,"updated":677,"__hash__":3787},"topics\u002Ftopics\u002Fochrana-dat.md",{"type":9,"value":3511,"toc":3757},[3512,3515,3522,3525,3529,3589,3593,3597,3608,3612,3623,3627,3635,3639,3650,3654,3659,3663,3674,3678,3698,3700,3732,3737],[12,3513,369],{"id":3514},"ochrana-dat",[724,3516,3517],{},[2081,3518],{"alt":3519,"className":3520,"src":3521},"ochrana-dat-technologie",[210,2085],"\u002Fwiki-assets\u002Fochrana-dat-technologie.jpeg",[724,3523,3524],{},"Technologická řešení pro zabezpečení dat v interní infrastruktuře i kyberprostoru. Zahrnuje síťové, aplikační i datové bezpečnostní mechanismy.",[115,3526,3528],{"id":3527},"formy-zneužití-dat","Formy zneužití dat",[16,3530,3531,3540],{},[19,3532,3533],{},[22,3534,3535,3538],{},[25,3536,3537],{},"Forma",[25,3539,2108],{},[30,3541,3542,3549,3557,3565,3573,3581],{},[22,3543,3544,3547],{},[35,3545,3546],{},"Zašifrování",[35,3548,435],{},[22,3550,3551,3554],{},[35,3552,3553],{},"Zveřejnění",[35,3555,3556],{},"Double ransomware",[22,3558,3559,3562],{},[35,3560,3561],{},"Odposlech",[35,3563,3564],{},"Pasivní sběr dat",[22,3566,3567,3570],{},[35,3568,3569],{},"Krádež",[35,3571,3572],{},"Cílená exfiltrace",[22,3574,3575,3578],{},[35,3576,3577],{},"Krádež dodavatelského řetězce",[35,3579,3580],{},"Triple ransomware",[22,3582,3583,3586],{},[35,3584,3585],{},"Prodej",[35,3587,3588],{},"Darknet marketplace",[115,3590,3592],{"id":3591},"bezpečnostní-technologie","Bezpečnostní technologie",[198,3594,3596],{"id":3595},"nac-network-access-control","NAC (Network Access Control)",[120,3598,3599,3602,3605],{},[123,3600,3601],{},"Proaktivní ochrana sítě před neautorizovaným přístupem",[123,3603,3604],{},"4 fáze: detekce → autentizace → vyhodnocení → autorizace",[123,3606,3607],{},"Ekvivalenty: MDM, BYOD",[198,3609,3611],{"id":3610},"ids-intrusion-detection-system","IDS (Intrusion Detection System)",[120,3613,3614,3617,3620],{},[123,3615,3616],{},"Monitoruje síťový provoz, generuje alerty",[123,3618,3619],{},"Pasivní systém — nezasahuje do provozu",[123,3621,3622],{},"Signaturová a anomální detekce",[198,3624,3626],{"id":3625},"ips-intrusion-prevention-system","IPS (Intrusion Prevention System)",[120,3628,3629,3632],{},[123,3630,3631],{},"Aktivní systém — blokuje škodlivý provoz",[123,3633,3634],{},"Zařazen přímo do síťové cesty (in-line)",[198,3636,3638],{"id":3637},"siem-security-information-and-event-management","SIEM (Security Information and Event Management)",[120,3640,3641,3644,3647],{},[123,3642,3643],{},"Centralizovaná správa bezpečnostních logů",[123,3645,3646],{},"Sběr s agentem i bez agenta",[123,3648,3649],{},"Prioritizace: třídy zpráv, zdroje, IP adresy, četnost",[198,3651,3653],{"id":3652},"dlp-data-loss-prevention","DLP (Data Loss Prevention)",[120,3655,3656],{},[123,3657,3658],{},"Klasifikace citlivých dat a vynucení ochrany",[198,3660,3662],{"id":3661},"šifrování","Šifrování",[120,3664,3665,3668,3671],{},[123,3666,3667],{},"AES (128\u002F192\u002F256 bit), 3DES",[123,3669,3670],{},"RSA (2048+ bit), DSS",[123,3672,3673],{},"SHA-256, SHA-1",[115,3675,3677],{"id":3676},"ipv6-bezpečnost","IPv6 bezpečnost",[120,3679,3680,3686,3692,3695],{},[123,3681,3682,3685],{},[38,3683,3684],{},"AH"," (Authentication Header) — ověření odesílatele a integrity",[123,3687,3688,3691],{},[38,3689,3690],{},"ESP"," (Encapsulating Security Payload) — šifrování dat",[123,3693,3694],{},"Transportní a tunelovací režim",[123,3696,3697],{},"SPD (Security Policy Database), bezpečnostní asociace",[115,3699,2487],{"id":2486},[120,3701,3702,3708,3714,3720,3726],{},[123,3703,3704,3707],{},[207,3705,140],{"className":3706,"dataFsResolvedFilePath":559,"href":560},[210]," — ochrana dat jako technická vrstva ISMS",[123,3709,3710,3713],{},[207,3711,578],{"className":3712,"dataFsResolvedFilePath":576,"href":577},[210]," — kontext hrozeb",[123,3715,3716,3719],{},[207,3717,569],{"className":3718,"dataFsResolvedFilePath":567,"href":568},[210]," — hodnocení aktiv a hrozeb",[123,3721,3722,3725],{},[207,3723,351],{"className":3724,"dataFsResolvedFilePath":349,"href":350},[210]," — webové útoky a obrana",[123,3727,3728,3731],{},[207,3729,360],{"className":3730,"dataFsResolvedFilePath":358,"href":359},[210]," — emailové protokoly",[115,3733,2511,3734],{"id":2510},[207,3735,43],{"className":3736,"dataFsResolvedFilePath":2515,"href":2516},[210],[120,3738,3739,3745,3751],{},[123,3740,3741],{},[207,3742,3744],{"className":3743,"dataFsResolvedFilePath":367,"href":368},[210],"Ochrana dat — shrnutí přednášky",[123,3746,3747],{},[207,3748,3750],{"className":3749,"dataFsResolvedFilePath":349,"href":350},[210],"Bezpečnost webových služeb",[123,3752,3753],{},[207,3754,3756],{"className":3755,"dataFsResolvedFilePath":358,"href":359},[210],"Bezpečnost emailových služeb",{"title":641,"searchDepth":642,"depth":642,"links":3758},[3759,3760,3768,3769,3770],{"id":3527,"depth":642,"text":3528},{"id":3591,"depth":642,"text":3592,"children":3761},[3762,3763,3764,3765,3766,3767],{"id":3595,"depth":649,"text":3596},{"id":3610,"depth":649,"text":3611},{"id":3625,"depth":649,"text":3626},{"id":3637,"depth":649,"text":3638},{"id":3652,"depth":649,"text":3653},{"id":3661,"depth":649,"text":3662},{"id":3676,"depth":642,"text":3677},{"id":2486,"depth":642,"text":2487},{"id":2510,"depth":642,"text":2543},[658],{},"\u002Ftopics\u002Fochrana-dat",{"title":369,"description":641},[3776,3777,3778],"raw\u002Fimork\u002F2017 VUT_Ochrana dat-2022.pdf","raw\u002Fimork\u002F2015 VUT_Bezp WWW-2019.pdf","raw\u002Fimork\u002F2016 VUT_Bezp Email-2022.pdf","topics\u002Fochrana-dat",[658,3514,3781,3782,3783,3784,3785,3786],"sifrovani","nac","ids","ips","dlp","gdpr","UMZ1-ocv30-Pg4Vr5J6J041nf2SKNlg1hXH3YgNhcA4",{"id":3789,"title":569,"body":3790,"course":659,"courses":4125,"created":660,"description":641,"extension":661,"meta":4126,"navigation":664,"path":4127,"seo":4128,"sources":4129,"stem":4130,"tags":4131,"type":2557,"updated":677,"__hash__":4137},"topics\u002Ftopics\u002Frizeni-rizik.md",{"type":9,"value":3791,"toc":4114},[3792,3795,3802,3809,3813,3877,3881,3931,3935,3940,3959,3963,3966,3970,3984,3988,4016,4020,4069,4071,4096,4101],[12,3793,569],{"id":3794},"řízení-rizik",[724,3796,3797],{},[2081,3798],{"alt":3799,"className":3800,"src":3801},"rizeni-rizik-proces",[210,2085],"\u002Fwiki-assets\u002Frizeni-rizik-proces.jpeg",[724,3803,3804,3805,3808],{},"Komplexní proces identifikace, analýzy a ošetření rizik ohrožujících bezpečnost informací v organizaci. Tvoří jádro ",[207,3806,140],{"className":3807,"dataFsResolvedFilePath":559,"href":560},[210],".",[115,3810,3812],{"id":3811},"normativní-základ","Normativní základ",[16,3814,3815,3825],{},[19,3816,3817],{},[22,3818,3819,3822],{},[25,3820,3821],{},"Norma",[25,3823,3824],{},"Zaměření",[30,3826,3827,3837,3847,3857,3867],{},[22,3828,3829,3834],{},[35,3830,3831],{},[38,3832,3833],{},"ISO 31000:2019",[35,3835,3836],{},"Obecné smrnice pro management rizik",[22,3838,3839,3844],{},[35,3840,3841],{},[38,3842,3843],{},"ISO 31010:2020",[35,3845,3846],{},"Techniky posuzování rizik",[22,3848,3849,3854],{},[35,3850,3851],{},[38,3852,3853],{},"ISO\u002FIEC 27005:2019",[35,3855,3856],{},"Řízení rizik bezpečnosti informací",[22,3858,3859,3864],{},[35,3860,3861],{},[38,3862,3863],{},"NIST SP 800-30",[35,3865,3866],{},"Průvodce hodnocením rizik",[22,3868,3869,3874],{},[35,3870,3871],{},[38,3872,3873],{},"NIST SP 800-39",[35,3875,3876],{},"Proces řízení bezpečnostních rizik",[115,3878,3880],{"id":3879},"proces-řízení-rizik-isoiec-27005","Proces řízení rizik (ISO\u002FIEC 27005)",[152,3882,3883,3889,3895,3901,3907,3913,3919,3925],{},[123,3884,3885,3888],{},[38,3886,3887],{},"Stanovení kontextu"," — rozsah, kritéria, metodika, role",[123,3890,3891,3894],{},[38,3892,3893],{},"Identifikace rizik"," — aktiva, hrozby, zranitelnosti",[123,3896,3897,3900],{},[38,3898,3899],{},"Analýza rizik"," — kvantifikace nebo kvalitativní popis",[123,3902,3903,3906],{},[38,3904,3905],{},"Vyhodnocení rizik"," — prioritizace dle kritérií",[123,3908,3909,3912],{},[38,3910,3911],{},"Zvládání rizik"," — výběr opatření (redukce, přenos, retence, vyhnutí)",[123,3914,3915,3918],{},[38,3916,3917],{},"Akceptace rizik"," — formální rozhodnutí",[123,3920,3921,3924],{},[38,3922,3923],{},"Komunikace"," — sdílení informací o rizicích",[123,3926,3927,3930],{},[38,3928,3929],{},"Monitorování"," — průběžné přezkoumávání",[115,3932,3934],{"id":3933},"výpočet-hodnoty-rizika","Výpočet hodnoty rizika",[724,3936,3937],{},[38,3938,3939],{},"Riziko = dopadová hodnota aktiva × hrozba × zranitelnost",[120,3941,3942,3948,3953],{},[123,3943,3944,3947],{},[38,3945,3946],{},"Hrozba"," — potenciální příčina incidentu (stupnice 1–5)",[123,3949,3950,3952],{},[38,3951,3101],{}," — slabé místo aktiva (stupnice 1–5)",[123,3954,3955,3958],{},[38,3956,3957],{},"Dopad"," — hodnota aktiva při ztrátě CIA",[115,3960,3962],{"id":3961},"obecný-model-hodnocení-rizik","Obecný model hodnocení rizik",[724,3964,3965],{},"Hrozba → Systém → Zranitelnost → Zneužitelnost? → Riziko → Přijatelné? → Opatření\u002FZbytkové riziko",[115,3967,3969],{"id":3968},"klíčové-dokumenty","Klíčové dokumenty",[120,3971,3972,3978],{},[123,3973,3974,3977],{},[38,3975,3976],{},"RTP"," (Risk Treatment Plan) — plán zvládání rizik s opatřeními, prioritami, termíny, zdroji",[123,3979,3980,3983],{},[38,3981,3982],{},"PoA\u002FSoA"," (Statement of Applicability) — přehled aplikovaných a neaplikovaných opatření",[115,3985,3987],{"id":3986},"bezpečnostní-role-dle-zkb","Bezpečnostní role dle ZKB",[120,3989,3990,3996,4001,4006,4011],{},[123,3991,3992,3995],{},[38,3993,3994],{},"Výbor pro řízení KB"," — organizovaná skupina pro celkové řízení",[123,3997,3998,4000],{},[38,3999,2818],{}," — odpovědný za ISMS",[123,4002,4003,4005],{},[38,4004,2829],{}," — návrh a implementace opatření",[123,4007,4008,4010],{},[38,4009,2839],{}," — provádění auditů",[123,4012,4013,4015],{},[38,4014,2849],{}," — zajištění rozvoje a bezpečnosti aktiva",[115,4017,4019],{"id":4018},"tří-úrovňový-model-nist-sp-800-39","Tří-úrovňový model (NIST SP 800-39)",[16,4021,4022,4034],{},[19,4023,4024],{},[22,4025,4026,4029,4031],{},[25,4027,4028],{},"Úroveň",[25,4030,3824],{},[25,4032,4033],{},"Typ rizika",[30,4035,4036,4047,4058],{},[22,4037,4038,4041,4044],{},[35,4039,4040],{},"Stupeň 1",[35,4042,4043],{},"Organizace",[35,4045,4046],{},"Strategické riziko",[22,4048,4049,4052,4055],{},[35,4050,4051],{},"Stupeň 2",[35,4053,4054],{},"Poslání\u002Fobchodní procesy",[35,4056,4057],{},"Taktické riziko",[22,4059,4060,4063,4066],{},[35,4061,4062],{},"Stupeň 3",[35,4064,4065],{},"Informační systémy",[35,4067,4068],{},"Operační riziko",[115,4070,2487],{"id":2486},[120,4072,4073,4079,4085,4091],{},[123,4074,4075,4078],{},[207,4076,140],{"className":4077,"dataFsResolvedFilePath":559,"href":560},[210]," — řízení rizik jako součást systému",[123,4080,4081,4084],{},[207,4082,384],{"className":4083,"dataFsResolvedFilePath":593,"href":594},[210]," — kontinuita činnosti při materializaci rizik",[123,4086,4087,4090],{},[207,4088,393],{"className":4089,"dataFsResolvedFilePath":391,"href":392},[210]," — obnova po havárii",[123,4092,4093,3713],{},[207,4094,578],{"className":4095,"dataFsResolvedFilePath":576,"href":577},[210],[115,4097,2511,4098],{"id":2510},[207,4099,43],{"className":4100,"dataFsResolvedFilePath":2515,"href":2516},[210],[120,4102,4103,4109],{},[123,4104,4105],{},[207,4106,4108],{"className":4107,"dataFsResolvedFilePath":247,"href":248},[210],"Risk Management — shrnutí přednášky",[123,4110,4111],{},[207,4112,222],{"className":4113,"dataFsResolvedFilePath":220,"href":221},[210],{"title":641,"searchDepth":642,"depth":642,"links":4115},[4116,4117,4118,4119,4120,4121,4122,4123,4124],{"id":3811,"depth":642,"text":3812},{"id":3879,"depth":642,"text":3880},{"id":3933,"depth":642,"text":3934},{"id":3961,"depth":642,"text":3962},{"id":3968,"depth":642,"text":3969},{"id":3986,"depth":642,"text":3987},{"id":4018,"depth":642,"text":4019},{"id":2486,"depth":642,"text":2487},{"id":2510,"depth":642,"text":2543},[658],{},"\u002Ftopics\u002Frizeni-rizik",{"title":569,"description":641},[3051,3050],"topics\u002Frizeni-rizik",[658,4132,4133,4134,4135,4136],"rizeni-rizik","iso-31000","iso-27005","nist","hodnoceni-rizik","QgxHGq7BTBoSo7sPrQH8Uv8y26R9huxzIJnkKME8Y9Q",{"id":4139,"title":4140,"body":4141,"course":659,"courses":4372,"created":660,"description":641,"extension":661,"meta":4373,"navigation":664,"path":4374,"seo":4375,"sources":4376,"stem":4378,"tags":4379,"type":2557,"updated":677,"__hash__":4384},"topics\u002Ftopics\u002Fsae.md","SAE — Budování bezpečnostního povědomí",{"type":9,"value":4142,"toc":4364},[4143,4146,4153,4156,4160,4259,4263,4298,4302,4322,4326,4329,4331,4351,4356],[12,4144,4140],{"id":4145},"sae-budování-bezpečnostního-povědomí",[724,4147,4148],{},[2081,4149],{"alt":4150,"className":4151,"src":4152},"sae-pyramida",[210,2085],"\u002Fwiki-assets\u002Fsae-pyramida.jpeg",[724,4154,4155],{},"Program definovaný doporučeními NIST řady SP 800, sloužící k budování a zvyšování bezpečnostního povědomí uživatelů ICT. Základní součást kybernetické hygieny.",[115,4157,4159],{"id":4158},"čtyři-úrovně-sae","Čtyři úrovně SAE",[16,4161,4162,4179],{},[19,4163,4164],{},[22,4165,4166,4168,4171,4173,4176],{},[25,4167,4028],{},[25,4169,4170],{},"Příznak",[25,4172,3142],{},[25,4174,4175],{},"Metody",[25,4177,4178],{},"Časový rámec",[30,4180,4181,4201,4221,4241],{},[22,4182,4183,4189,4192,4195,4198],{},[35,4184,4185,4188],{},[38,4186,4187],{},"Awareness"," (povědomí)",[35,4190,4191],{},"„Co\"",[35,4193,4194],{},"Rozpoznávání",[35,4196,4197],{},"Média, videa, plakáty",[35,4199,4200],{},"Krátkodobý",[22,4202,4203,4209,4212,4215,4218],{},[35,4204,4205,4208],{},[38,4206,4207],{},"Training"," (výcvik)",[35,4210,4211],{},"„Jak\"",[35,4213,4214],{},"Dovednosti",[35,4216,4217],{},"Přednášky, případovky, cvičení",[35,4219,4220],{},"Střednědobý",[22,4222,4223,4229,4232,4235,4238],{},[35,4224,4225,4228],{},[38,4226,4227],{},"Education"," (vzdělávání)",[35,4230,4231],{},"„Proč\"",[35,4233,4234],{},"Porozumění",[35,4236,4237],{},"Semináře, diskuze, výzkum",[35,4239,4240],{},"Dlouhodobý",[22,4242,4243,4248,4250,4253,4256],{},[35,4244,4245],{},[38,4246,4247],{},"Professional Development",[35,4249,2821],{},[35,4251,4252],{},"Profesní rozvoj",[35,4254,4255],{},"Certifikace, konference",[35,4257,4258],{},"Průběžný",[115,4260,4262],{"id":4261},"sae-plán-11-kroků","SAE plán (11 kroků)",[152,4264,4265,4268,4271,4274,4277,4280,4283,4286,4289,4292,4295],{},[123,4266,4267],{},"Role a odpovědnosti v programu",[123,4269,4270],{},"Stanovení cílů pro každou fázi",[123,4272,4273],{},"Rozdělení uživatelů (analýza)",[123,4275,4276],{},"Vytvoření školících materiálů dle skupin",[123,4278,4279],{},"Určení cíle pro každou skupinu",[123,4281,4282],{},"Témata pro každou relaci\u002Fkurz",[123,4284,4285],{},"Metody nasazení (metodiky)",[123,4287,4288],{},"Dokumentace a zpětná vazba",[123,4290,4291],{},"Vyhodnocení a aktualizace materiálů",[123,4293,4294],{},"Četnost opakování",[123,4296,4297],{},"Kalkulace",[115,4299,4301],{"id":4300},"modely-řízení","Modely řízení",[120,4303,4304,4310,4316],{},[123,4305,4306,4309],{},[38,4307,4308],{},"Centralizovaný"," — veškerá odpovědnost na CIO\u002FCISO",[123,4311,4312,4315],{},[38,4313,4314],{},"Částečně decentralizovaný"," — politiky centrálně, implementace distribuovaně",[123,4317,4318,4321],{},[38,4319,4320],{},"Plně decentralizovaný"," — pouze politika centrálně, vše ostatní delegováno",[115,4323,4325],{"id":4324},"doporučená-témata-dle-nzkb-vyhl-4092025-sb","Doporučená témata dle nZKB (vyhl. 409\u002F2025 Sb.)",[724,4327,4328],{},"25 témat včetně: bezpečné použití přenosných médií, cloud, hlášení incidentů, BYOD, aktuální hrozby, firewall, malware, hesla, MFA, sociální inženýrství, VPN, šifrování, zálohování aj.",[115,4330,2487],{"id":2486},[120,4332,4333,4339,4345],{},[123,4334,4335,4338],{},[207,4336,140],{"className":4337,"dataFsResolvedFilePath":559,"href":560},[210]," — SAE jako součást provozní bezpečnosti",[123,4340,4341,4344],{},[207,4342,578],{"className":4343,"dataFsResolvedFilePath":576,"href":577},[210]," — povědomí jako obrana č. 1",[123,4346,4347,4350],{},[207,4348,569],{"className":4349,"dataFsResolvedFilePath":567,"href":568},[210]," — snižování rizika lidského faktoru",[115,4352,2511,4353],{"id":2510},[207,4354,43],{"className":4355,"dataFsResolvedFilePath":2515,"href":2516},[210],[120,4357,4358],{},[123,4359,4360],{},[207,4361,4363],{"className":4362,"dataFsResolvedFilePath":238,"href":239},[210],"SAE — shrnutí přednášky",{"title":641,"searchDepth":642,"depth":642,"links":4365},[4366,4367,4368,4369,4370,4371],{"id":4158,"depth":642,"text":4159},{"id":4261,"depth":642,"text":4262},{"id":4300,"depth":642,"text":4301},{"id":4324,"depth":642,"text":4325},{"id":2486,"depth":642,"text":2487},{"id":2510,"depth":642,"text":2543},[658],{},"\u002Ftopics\u002Fsae",{"title":4140,"description":641},[4377],"raw\u002Fimork\u002F2002 VUT_Bezp SAE-2025.pdf","topics\u002Fsae",[658,4380,4381,4382,4135,4383],"sae","bezpecnostni-povedomi","skoleni","kyberneticka-hygiena","-1Y2p-b_s_2TkIYA9ZxuD7k_ZQ-t9uyKk4l8A4eMzr8",1777154859722]