• Title/Summary/Keyword: 인지된 취약성

Search Result 156, Processing Time 0.026 seconds

Analysis of Non-monotonic Phenomena of Resilience and Vulnerability in Water Resources Systems (수자원시스템의 회복도 및 취약도 증감현상 해석)

  • Lee, Gwang-Man;Cha, Kee-Uk;Yi, Jaeeung
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.2
    • /
    • pp.183-193
    • /
    • 2013
  • Selecting the evaluation index to determine water resources system design yield is an important problem for water resources engineers. Reliability, resilience and vulnerability are three widely used indices for yield analysis. However, there is an overlap region between indices as well as resilience and vulnerability can show improvement in non-monotonic phenomena although yield condition becomes worse. These problems are usually not recognized and the decisions are made according to calculated estimates in real situation. The reason for this is caused by a diverse characteristics of water resources system such as seasonal variability of hydrologic characteristics and water demands. In this study, the applicability of resilience and vulnerability for multi indices application in addition to reliability which is applied generally is examined. Based on highly seasonal irrigation water demand ratio, the correlation and non-monotonic phenomena of each index are analyzed for seven selected reservoirs. Yongdam reservoir which supplies constant water supply showed the general tendency, but Chungju, Andong, Namgang and other reservoirs which supplies irrigation water showed clear non-monotonic phenomena in resilience and vulnerability.

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

The Effectiveness of Apps Recommending Best Restaurant through Location-based Knowledge Information: Privacy Calculus Perspective (위치기반 지식정보를 활용한 맛집 추천 앱의 효과: 프라이버시 계산을 중심으로)

  • Jiang, Taypun;Lim, Hyun A;Choi, Jaewon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.89-106
    • /
    • 2017
  • In advanced mobile devices environment, the market share of mobile application has been increased. Among various mobile services, Location-based Service (LBS) is an important feature to increase user motivation related to purchase intention on mobile. However, individual privacy has also increased as an important problem for invasion of privacy and information leakage while too many LBS based applications (App) rapidly launched in the App market. In this study, we focused on perceived values of LBS App users who use Apps related to recommending best restaurants in China and South Korea. The purpose of this study is to identify important factors for perceived value when users provide personal information for LBS service provider. The result of this study is follows: perceived value can increase while LBS customers can more control self-information and information useability. Also information ability of users affected perceived values for LBS Apps. Also users' app user ability and perceived value were effects on privacy revenue. In addtion, perceived weakness of users and perceived value increased privacy threat.

Weakness of Andriod Smartphone Applications against Electromagnetic Analsysis (안드로이드 기반 스마트폰 어플리케이션의 전자기파분석 공격 취약성)

  • Park, JeaHoon;Kim, Soo Hyeon;Han, Daewan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1017-1023
    • /
    • 2013
  • With the growing use of smartphones, many secure applications are performed on smartphones such as banking, payment, authentication. To provide security services, cryptographic algorithms are performed on smartphones' CPU. However, smartphone's CPU has no considerations against side-channel attacks including Electromagnetic Analysis (EMA). In DesignCon 2012, G. Kenworthy introduced the risk of cryptographic algorithms operated on smartphone against EMA. In this paper, using improved experimental setups, we performed EMA experiments on androin smartphones' commercial secure applications. As a result, we show that the weakness of real application. According to the experimental setups, we picked up the operation of w-NAF scalar multiplication from the operation of Google's Play Store application using radiated EM signal. Also, we distinguished scalar values (0 or not) of w-NAF scalar multiplication.

A Study on Analysis of Open Source Analysis Tools in Web Service (오픈소스기반의 웹서비스 취약점 진단도구에 관한 분석)

  • Yoo, Jeong-Seok;Hong, Ji-Hoon;Jung, Jun-Kwon;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.475-478
    • /
    • 2014
  • 최근 인터넷이 발전함에 따라 월드와이드웹(World Wide Web) 기반의 웹 서비스가 급격한 발전을 이루었다. 또한 이 웹 서비스를 바탕으로 다양한 컨텐츠들과 이를 이용하는 사용자의 수도 함께 증가하였다. 그러나 이와 같은 웹 서비스의 보편화가 증대될수록 이를 악용하려는 사이버 범죄 또한 비례하여 증가하고 있다. 최근에는 공격자들이 스마트폰을 대상으로 악성코드를 전파하기 위한 방법으로 웹 서비스를 활용하기 시작하면서 웹 서비스의 보안에 대한 중요성이 더욱 강조되고 있다. 이러한 웹 서비스 보안의 필요성을 인지하고, 많은 사람들이 무료로 쉽게 웹 서비스 보안취약점을 진단 할 수 있도록 여러 오픈소스 기반의 보안 취약점 진단도구가 연구, 개발되고 있다. 하지만 웹 서비스의 보안약점을 진단하는 도구의 적합성 평가 및 기능 분류가 명확하지 않아서 진단도구를 선택하고 활용함에 있어 어려움이 따른다. 본 논문에서는 OWASP에서 위험도에 따라 선정한 웹 서비스의 보안 취약점 Top 10 항목과 소프트웨어 보안약점 진단가이드 등을 통해 웹 서비스 보안 취약점을 진단하는 도구에 대한 분석 기준을 제시한다. 이후 오픈소스로 공개된 테스트 기반 취약점 탐지도구와 소스 기반 취약점 진단도구들에 대해 제시한 기준을 이용하여 분석한다. 본 논문의 분석결과로 웹 서비스의 안전성을 평가하기 위해 활용할 수 있는 진단 도구에 대한 분석정보를 제공함으로써 보다 안전한 웹 서비스의 개발과 운영에 기여할 것으로 기대한다.

A Study on the Pilot Application of Disaster Information Delivery and Evacuation Support System for the Vulnerable Groups (안전취약계층 대상 재난정보 전달 및 대피지원 체계 시범적용 연구)

  • Jung Tae-Ho;Lee, Han-Jun
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.139-140
    • /
    • 2022
  • 본 연구는 재난발생 시 현장 상황 판단 및 대응 능력이 현저히 떨어지는 안전취약계층 중 장애인과 노인이 재난정보를 받고 안전하게 대피·대응할 수 있도록 지원하는 시스템의 시범적용에 대한 것이다. 재난정보 전달 및 대피지원 시스템은 재난에 취약한 장애인과 노인이 재난상황에서 각각의 취약 특성을 고려하여 재난 위기상황에 대응하도록 설계 하였으며, 실내 위치측정에 관한 공간정보 표준 및 데이터 구축과 개발한 시스템을 설치하고 구현할 수 있는 실내 공간을 선정하여 시범적으로 적용하였다. 재난정보 및 대피지원 시스템의 시범적용을 위해 선정된 시설의 실내 공간정보 구축 및 현행화를 통해 실내 대피경로를 구축하고, 실제 시범적용을 통해 보완하는 과정을 수행하였다. 장애인·노인 대상 재난정보 전달 및 대피지원 서비스 구축을 위해 실내에서 재난발생 시 재난정보 데이터를 실시간으로 수집하고 스마트폰과 연계할 수 있는 연계 모듈을 개발하였다. 또한 재난정보를 스마트폰에 알릴 수 있는 알람 푸시 모듈, 재난정보 및 대피 안내 모듈과 시각 장애인의 실내 공간 인지를 위한 음성안내 모듈을 개발하였다. 본 연구의 목적은 IoT 기반의 통합관제 기술을 활용하는 서비스 제공을 통해서 정보전달의 사각지대를 해소하고 장애인·노인의 효율적 재난 대응을 위해 맞춤형 재난정보 전달 및 대피지원 서비스를 구축하고 시범적용의 과정을 통해 문제점을 보완하여 최종적으로 재난으로부터 안전취약계층의 안전성을 향상시키는데 목적이 있다.

  • PDF

Discussion on Formulation Process and Configuration of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 구성과 정립프로세스 논의)

  • Kim, Seong Gon;Chang, Eun Mi;Choi, Gap Yong;Kim, Hi Tae
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.71-77
    • /
    • 2014
  • There are numbers of unpredictable risk factors in the disaster scenes such as fire, explosion and fail to early life-saving or holding the flames which can lead to massive damage. In particular, fire-fighters who arrive on the scene within 5 minutes after dispatching, have a limitation to get aware to the situation of scene fully, because of immediate deploy to disaster scene with limited information. This situation may lead to disturbance that fire-fighters perform effective fire-fighting activities, to put fire-fighter's life at risk by misjudge the situation. Previous domestic and International studies focused vulnerability for spatial area or features which can damage to life and property in the event of anticipated. In this study, we have been developed fire-fighting vulnerable zone model that can analyze comprehensively hindrance factors for fire-fighting activities targeting whole life cycle of fire-fighting activities from dispatch to fire suppression or life-saving. In addition, we have been given shape to finality and applicability for our model by defining the new concept of fire-fighting vulnerable zone which can be distinguished from the concept of fire vulnerable area in previous studies. The results of this study can be used to analysis fire-fighting vulnerable zone type analysis, establish fire-fighting policies and improve the performance of decision-making process.

A Study on the Optimization Methods of Security Risk Analysis and Management (경비위험 분석 및 관리의 최적화 방안에 관한 연구)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.189-213
    • /
    • 2005
  • Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

  • PDF

A preliminary study on factors affecting cognitive function and cognitive training effects (인지기능 및 인지훈련효과의 관련변인에 관한 예비연구)

  • Kim, Youngkyoung
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.343-351
    • /
    • 2020
  • The present study investigated the related variables of cognitive function, subjective cognitive decline and cognitive training effects. The cognitive training was composed of mete-cognitive education and cognitive task performing. Twenty older adults attended for 14 weeks and were tested before and after the training. Results show that their cognitive level was related with age, self-esteem and personality traits. And subjective cognitive decline was related depression, anxiety, personality traits, self-efficacy, self-esteem and subjective age, but it does not reflect objective cognitive impairments. Their cognitive test scores were enhanced after training in MMSE, memory and executive function, and enhanced scores were related with age, subjective cognitive decline, anxiety, self-efficacy, self-esteem, subjective age and personality traits. Findings suggest one's personality and psychological state need to be considered for the effects of cognitive training.

The Vulnerability of a Masking based Countermeasures against 1st-order Differential Power Analysis (마스킹 기반 대응방안에 대한 1차 DPA 취약성 분석)

  • Kim Chang-Kyun;Yoo Hyung-So;Park Il-Hwan;Moon Sang-Jae
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.153-158
    • /
    • 2006
  • P. Kocher에 의해 DPA 공격이 소개된 이후 이를 방어하기 위한 연구가 활발하게 진행되고있다. 그에 대한 일환으로 블록암호알고리즘 구현 시 소프트웨어적인 대응방안으로 마스킹 기반의 대응기법이 많이 사용되고 있으며 이는 1차 DPA 공격에 안전한 것으로 인지되어 왔다. 본 논문에서는 부주의하게 구현된 마스킹 기반의 대응기법이 2차 DPA 공격이 아닌 1차 DPA 공격에도 취약한 사실을 증명하였으며 이를 실험을 통해서 검증하였다.

  • PDF