• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.023 seconds

A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System (상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구)

  • Euom, Ieck-Chae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.35-44
    • /
    • 2019
  • The purpose of this study is to find out quantitative vulnerability assessment about COTS(Commercial Off The Shelf) O/S based I&C System. This paper analyzed vulnerability's lifecycle and it's impact. this paper is to develop a quantitative assessment of overall cyber security risks and vulnerabilities I&C System by studying the vulnerability analysis and prediction method. The probabilistic vulnerability assessment method proposed in this study suggests a modeling method that enables setting priority of patches, threshold setting of vulnerable size, and attack path in a commercial OS-based measurement control system that is difficult to patch an immediate vulnerability.

Social Impact Assessment of Introduction of Best Available Technology in Marine Industrial Facilities (해양산업시설 적용 가능한 최적기술 도입의 사회영향평가)

  • Wonsoo Kang;Moonjin Lee;Hoon Choi;Kyewon Kim;Youngkyu Park
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.2
    • /
    • pp.106-117
    • /
    • 2023
  • The social impact of hazardous and noxious substances from marine industrial facilities was evaluated, and implications for the application of social impact assessment items and methods required in the process of setting technology-based effluent limitations were derived. The scope of the study was based on marine industrial facilities in Incheon Metropolitan City. The analysis results are as follows. First, the impact on companies and industries was evaluated as "great," but large companies had little impact on operating profit losses, bankruptcy possibilities, and employment losses, while small and medium-sized companies had a large impact. Second, the impact on the community and economy was evaluated as "less," but it is judged that careful policy intervention is needed because the impact of fishing producers, local tourism workers, and the region can be concentrated and large. Third, it is judged that items and methods for calculating social loss costs and social benefits can be usefully applied in the method of setting technology-based effluent limitations.

The Study of Area-division Strategy for Medical Waste Disposal (의료폐기물 처리의 권역화 방안 연구)

  • Ahn, Sae-Hee;Ahn, Sang-Yoon
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.255-263
    • /
    • 2014
  • It is different from other countries, they limit the possibility of long-distance travel of infectious waste by principles around treatment and recommend to use various techniques. Medical waste generated from the health medical institutions requires more thorough management because it causes potential danger to anybody exposed and also greatly harmful to natural ecosystems. The amendment bill of Wastes Control Act points out growing risk while consigning to remote waste treatment facilities because of the low processing cost and propose area-division as a solution. This study based on literature reviews, comparison of foreign countries and Korean acts. It requires area-division strategies as a suitable alternative considering the domestic situation.

Implementation of a Point-to-Multipoint Wireless Communication System Based on The Bluetooth (블루투스 기반 점 대 다중점 무선 통신시스템의 구현)

  • Bae, Jin-Seop;Kang, Seog-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1921-1927
    • /
    • 2009
  • In this paper, a point-to-multipoint wireless communication system based on Bluetooth specifications, which is possibly applied to very large vessels, is implemented and analyzed. Here, a communication network is composed of a slave Bluetooth module connected to the task computer and multiple master Bluetooth modules equipped with a sensor. And exploiting the point-to-multipoint data communication among the Bluetooth modules, a surveillance system that recognizes and controls a variety of emergency situations happened on a large vessel is implemented. It is, therefore, considered that the wireless communication system implemented in this paper is possibly exploited a basic technology for the digital shipbuilding of the next generation.

Global company with a focus on case analysis of the longevity factor (글로벌 기업사례를 통해 본 장수요인 분석)

  • Choi, Seung-Il;Kim, Dong-Il
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.237-243
    • /
    • 2013
  • Companies engaged in the enterprise, while still at the start will have social responsibility. But recently, more and more companies will shorten the life expectancy of a corporate environment and is also rapidly changing. In this study, the longevity of global enterprises through the company's longevity factor analysis, that has continued to gain corporate answer. DuPont's global corporate giant Siemens and the longevity of the two factors in analyzing the factors that change the business portfolio, risk management, and continuous research and development, trust management, environmental management and other factors have been described. This ongoing internal and external environment analysis and core competencies by strengthening the implementation of responsible management as the core of the upcoming general management are appearing.

An Improved Detection Performance for the Intrusion Detection System based on Windows Kernel (윈도우즈 커널 기반 침입탐지시스템의 탐지 성능 개선)

  • Kim, Eui-Tak;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.711-717
    • /
    • 2018
  • The breakthrough in computer and network has facilitated a variety of information exchange. However, at the same time, malicious users and groups are attacking vulnerable systems. Intrusion Detection System(IDS) detects malicious behaviors through network packet analysis. However, it has a burden of processing a large amount of packets in a short time. Therefore, in order to solve these problem, we propose a network intrusion detection system that operates at kernel level to improve detection performance at user level. In fact, we confirmed that the network intrusion detection system implemented at kernel level improves packet analysis and detection performance.

Impersonation Attacks on Anonymous User Authentication and Key Agreement Scheme in Wireless Sensor Networks (무선센서네트워크에서 익명의 사용자 인증과 키동의 기법에 대한 가장 공격)

  • Choi, Hae-Won;Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.287-293
    • /
    • 2016
  • Wireless sensor networks (WSNs) have many applications and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Recently, an anonymous user authentication and key agreement scheme (AUAKAS) was proposed based on symmetric cryptosystem in WSNs. It is claimed in AUAKAS that it assures security against different types of attacks including impersonation attacks. However, this paper shows that AUAKAS does not cope from user impersonation attack and gateway impersonation attack from the legally registered user on the gateway. The security analysis could guide the required features of the security scheme to be satisfied.

A Study on the Development of Korean Inventory for the Multi-Hazard Risk Assessment -Based on Earthquake Damage Analysis (복합재난 손실 평가를 위한 한국형 인벤토리 구축 방안 연구 -지진재해 손실 평가를 중심으로)

  • Chai, Su-Seong;Shin, Su-mi;Suh, Dongjun
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1127-1134
    • /
    • 2017
  • The main goal of this study is to develop the system of multi-hazard risk assessment tools based on major inventories and functions. As a first step, designing and building a Korean inventory of the loss assessment was performed due to earthquake disasters. We focused on the special features, taking account of the possibly conflicting features of the various conditions such as different type of formats, environmental differences, and collected data relevant to the use of proposed risk assessment system in terms of constructing the Korean inventory including buildings and population.

A Study on the Introduction of Derivatives for Hedge of Housing Rent Price -Targeting Apartment Rent Price in Gangnam and Gangbuk Regions of Seoul- (주택전세가격 헤지를 위한 파생상품 도입 연구 - 서울시 강남, 강북지역 아파트 전세가격을 대상으로 -)

  • Choi, In-Sik;Yoo, Seung-Kyu;Kim, Jae-Jun
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.12 no.1
    • /
    • pp.35-43
    • /
    • 2012
  • This study aimed to seek a method capable of hedging a rising risk of housing rent price by introducing derivatives with the target of Korean housing rent markets. The research model used in this thesis progressed a research by applying a futures contract method with the target of the rent price of major apartments in Gangnam and Gangbuk Regions of Seoul. As an analysis result, the rent price of all complexes has risen during its analysis period, so it could be confirmed that the CRB future index was also risen according to this. Finally, it was confirmed that the rising risk of the rent price can be hedged through a purchase position of futures. But, as the difference between rent price variation and CRB future index variation occurs, it appeared that 100% of hedge is difficult. However, it is judged that if considering that a method capable of hedging the rising risk of the existing rent price was nonexistent, the hedge trading effect utilizing the CRB future index on the rent price will be meaningful.

A Study of User Environment for Fair Use of Open Source Software (공정한 오픈소스소프트웨어 활용을 위한 사용자환경 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.357-364
    • /
    • 2012
  • For the resistance of the closed intellectual property license from the Free Software Movement. It's free and also can adapt have been widely used. Software for the resistance of the closed intellectual property rights have been promoted by the free software movement. Implementation of the proposed changes in the license that anyone can freely use the software and adapt open source software is widely used. The product of open source software can reduce development time and cost. Many people who use it will improve, verification and developed. However, indiscriminate use of these advantages, as well as the risk of dispute is high. This study is analyzed open source software dispute cases for piracy protection and will show duly open source software available to users by user environment.