"Syst\u00E9mov\u00E1 anal\u00FDza kybernetick\u00FDch s\u00EDt\u00ED."@cs . . . . "2"^^ . "RIV/68407700:21260/12:00202812" . . . "Syst\u00E9mov\u00E1 anal\u00FDza kybernetick\u00FDch s\u00EDt\u00ED." . . "P(7E11072)" . "Critical infrastructures; cyber networks; computer networks; system analysis; threats"@en . . . "8"^^ . "2"^^ . "SYSTEM ANALISYS OF CYBER NETWORKS"@en . . . "Syst\u00E9mov\u00E1 anal\u00FDza kybernetick\u00FDch s\u00EDt\u00ED."@cs . . "[5853326506A7]" . "2012-05-16+02:00"^^ . "Proch\u00E1zkov\u00E1, Danu\u0161e" . . . . "Syst\u00E9mov\u00E1 anal\u00FDza kybernetick\u00FDch s\u00EDt\u00ED." . . "RIV/68407700:21260/12:00202812!RIV13-MSM-21260___" . . "C\u00EDlem \u010Dl\u00E1nku je uk\u00E1zat, \u017Ee v\u0161echny kybernetick\u00E9 s\u00EDt\u011B (jako telekomunika\u010Dn\u00ED, IT nebo ICT s\u00EDt\u011B) jsou systematicky identick\u00E9 nebo velmi podobn\u00E9., a\u010Dkoliv se aplikuj\u00ED v r\u016Fzn\u00FDch oblastech pr\u016Fmyslu a ekonomiky nebo zahrnuj\u00ED r\u016Fzn\u00E9 funk\u010Dn\u00ED elementy. \u00DAsil\u00ED je zam\u011B\u0159eno na pr\u016Fkaz, \u017Ee syst\u00E9mov\u00E1 identita (podobnost) zm\u00EDn\u011Bn\u00FDch s\u00EDt\u00ED identifikuje stejn\u00FD soubor hrozeb pro bezpe\u010D\u00ED s\u00EDt\u011B, je\u017E mohou b\u00FDt \u0159e\u0161eny pou\u017Eit\u00EDm stejn\u00FDch p\u0159\u00EDstup\u016F a technik. Celostn\u00ED p\u0159\u00EDstup zalo\u017Een\u00FD na syst\u00E9mov\u00E9m p\u0159\u00EDstupu dovoluje efektivn\u00ED pou\u017Eit\u00ED a v\u0161echny prost\u0159edky zam\u011B\u0159en\u00E9 na \u0159e\u0161en\u00ED skute\u010Dn\u00FDch probl\u00E9m\u016F. Zm\u00EDn\u011Bn\u00E1 klasifikace s\u00EDt\u00ED v kybernetick\u00E9 infrastruktu\u0159e je tak\u00E9 zalo\u017Eena na tomto konceptu."@cs . "SYSTEM ANALISYS OF CYBER NETWORKS"@en . . . "Srp, Jaroslav" . . "The aim of the paper is to show that all cyber networks (such as telecommunication, IT or ICT networks) are systemically identical or very similar, although each of them is applied in another industry or economy field or includes other added functional elements. The effort is to show that systemic identity (similarity) of the mentioned networks identifies the same set of network security threats that can be solved using the same approaches and techniques. The integrative approach based on the systematic approach enables to effectively use the efforts of professionals and all means target to the actual problem solving. The mentioned networks classification to the cyber critical infrastructures is also made based on this concept."@en . "21260" . "978-80-7231-871-1" . "C\u00EDlem \u010Dl\u00E1nku je uk\u00E1zat, \u017Ee v\u0161echny kybernetick\u00E9 s\u00EDt\u011B (jako telekomunika\u010Dn\u00ED, IT nebo ICT s\u00EDt\u011B) jsou systematicky identick\u00E9 nebo velmi podobn\u00E9., a\u010Dkoliv se aplikuj\u00ED v r\u016Fzn\u00FDch oblastech pr\u016Fmyslu a ekonomiky nebo zahrnuj\u00ED r\u016Fzn\u00E9 funk\u010Dn\u00ED elementy. \u00DAsil\u00ED je zam\u011B\u0159eno na pr\u016Fkaz, \u017Ee syst\u00E9mov\u00E1 identita (podobnost) zm\u00EDn\u011Bn\u00FDch s\u00EDt\u00ED identifikuje stejn\u00FD soubor hrozeb pro bezpe\u010D\u00ED s\u00EDt\u011B, je\u017E mohou b\u00FDt \u0159e\u0161eny pou\u017Eit\u00EDm stejn\u00FDch p\u0159\u00EDstup\u016F a technik. Celostn\u00ED p\u0159\u00EDstup zalo\u017Een\u00FD na syst\u00E9mov\u00E9m p\u0159\u00EDstupu dovoluje efektivn\u00ED pou\u017Eit\u00ED a v\u0161echny prost\u0159edky zam\u011B\u0159en\u00E9 na \u0159e\u0161en\u00ED skute\u010Dn\u00FDch probl\u00E9m\u016F. Zm\u00EDn\u011Bn\u00E1 klasifikace s\u00EDt\u00ED v kybernetick\u00E9 infrastruktu\u0159e je tak\u00E9 zalo\u017Eena na tomto konceptu." . "Bezpe\u010Dnostn\u00ED management a spole\u010Dnost 2012" . "173154" . . "Univerzita obrany" . "Brno" . "Brno" .