• Title/Summary/Keyword: 취약성 요소

Search Result 650, Processing Time 0.032 seconds

Flood fragility analysis of bridge piers in consideration of debris impacts (부유물 충돌을 고려한 교각의 홍수 취약도 해석 기법)

  • Kim, Hyunjun;Sim, Sung-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.325-331
    • /
    • 2016
  • This research developed a flood fragility curve of bridges considering the debris impacts. Damage and failures of civil infrastructure due to natural disasters can cause casualties as well as social and economic losses. Fragility analysis is an effective tool to help better understand the vulnerability of a structure to possible extreme events, such as earthquakes and floods. In particular, flood-induced failures of bridges are relatively common in Korea, because of the mountainous regions and summer concentrated rainfall. The main failure reasons during floods are reported to be debris impact and scour; however, research regarding debris impacts is considered challenging due to various uncertainties that affect the failure probability. This study introduces a fragility analysis methodology for evaluating the structural vulnerability due to debris impacts during floods. The proposed method describes how the essential components in fragility analysis are considered, including limit-state function, intensity measure of the debris impact, and finite element model. A numerical example of the proposed fragility analysis is presented using a bridge pier system under a debris impact.

Sensitivity Analysis of Drought Impact Factors Using a Structural Equation Model and Bayesian Networks (구조방정식모형과 베이지안 네트워크를 활용한 가뭄 영향인자의 민감도 분석)

  • Kim, Ji Eun;Kim, Minji;Yoo, Jiyoung;Jung, Sungwon;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.1
    • /
    • pp.11-21
    • /
    • 2022
  • Drought occurs extensively over a long period and causes great socio-economic damage. Since drought risk consists of social, environmental, physical, and economic factors along with meteorological and hydrological factors, it is important to quantitatively identify their impacts on drought risk. This study investigated the relationship among drought hazard, vulnerability, response capacity, and risk in Chungcheongbuk-do using a structural equation model and evaluated their impacts on drought risk using Bayesian networks. We also performed sensitivity analysis to investigate how the factors change drought risk. Overall results showed that Chungju-si had the highest risk of drought. The risk was calculated as the largest even when the hazard and response capacity were changed. However, when the vulnerability was changed, Eumseong-gun had the greatest risk. The sensitivity analysis showed that Jeungpyeong-gun had the highest sensitivity, and Jecheon-si, Eumseong-gun, and Okcheon-gun had highest individual sensitivities with hazard, vulnerability, and response capacity, respectively. This study concluded that it is possible to identify impact factors on drought risk using regional characteristics, and to prepare appropriate drought countermeasures considering regional drought risk.

Study for Assembly System Automation of MTO(Make-To-Order) (다품종 주문생산 방식의 조립시스템 자동화에 관한 연구)

  • 목학수;신현창;표승태
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.542-545
    • /
    • 2000
  • 본 연구에서는 다품종 주문 생산 방식이 가지고 있는 여러 문제점들 중의 하나인 조립시스템에서의 소량 생산의 문제점을 해결하기 위해 효율적인 조립자동화 시스템을 통해 난점들을 해결하고자 한다. 본 연구의 내용은 첫째, 제품 및 구조의 분석으로 제거 및 통합 가능한 부품 파악을 하며 불필요하거나 생산 및 조립 용이성이 떨어지는 요소를 제거한다. 둘째, 취약 공정의 분석으로써 취약공정의 개선효과를 파악하고 근접 작업장과의 원활한 공정 흐름을 고려하여 취약공정 유무 파악 및 우선 개선 공정을 결정한다. 셋째는 조립시스템에 적합한 대안의 제시로써 자동화를 위한 적절한 메커니즘을 제시한다. 마지막으로 넷째, 제시된 대안의 평가를 통해 적합성 여부 판정한다. 즉, 미리 설정된 평가 기준에 의한 대안의 평가를 내리게 된다.

  • PDF

Design and Implementation of a Secure Software Architecture for Security Patch Distribution (안전한 보안패치 분배 구조의 설계 및 구현)

  • 손태식;서정우;문종섭;서정택;임을규;이철원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.47-62
    • /
    • 2003
  • Patch distribution is one of important processes to fix vulnerabilities of software and to ensure security of systems. Since an institute or a company has various operating systems or applications, it is not easy to update patches promptly. In this paper, we propose a secure patch distribution architecture with an authentication mechanism, a security assurance mechanism, a patch integrity assurance mechanism, and an automatic patch installation mechanism. We argue that the proposed architecture improve security of patch distribution processes within a domain.

GIS-based Subsidence Hazard Map in Urban Area (GIS 기반의 도심지 지반침하지도 작성 사례)

  • Choi, Eun-Kyeong;Kim, Sung-Wook;Cho, Jin-Woo;Lee, Ju-Hyung
    • Journal of the Korean Geotechnical Society
    • /
    • v.33 no.10
    • /
    • pp.5-14
    • /
    • 2017
  • The hazard maps for predicting collapse on natural slopes consist of a combination of topographic, hydrological, and geological factors. Topographic factors are extracted from DEM, including aspect, slope, curvature, and topographic index. Hydrological factors, such as soil drainage, stream-power index, and wetness index are most important factors for slope instability. However, most of the urban areas are located on the plains and it is difficult to apply the hazard map using the topography and hydrological factors. In order to evaluate the risk of subsidence of flat and low slope areas, soil depth and groundwater level data were collected and used as a factor for interpretation. In addition, the reliability of the hazard map was compared with the disaster history of the study area (Gangnam-gu and Yeouido district). In the disaster map of the disaster prevention agency, the urban area was mostly classified as the stable area and did not reflect the collapse history. Soil depth, drainage conditions and groundwater level obtained from boreholes were added as input data of hazard map, and disaster vulnerability increased at the location where the actual subsidence points. In the study area where damage occurred, the moderate and low grades of the vulnerability of previous hazard map were 12% and 88%, respectively. While, the improved map showed 2% high grade, moderate grade 29%, low grade 66% and very low grade 2%. These results were similar to actual damage.

기업보안 강화를 위한 취약점 진단 통합관리 체계 구축

  • Mun, Ho-Geon;Park, Seong-Cheol
    • Information and Communications Magazine
    • /
    • v.31 no.5
    • /
    • pp.39-45
    • /
    • 2014
  • 기업활동에서 IT에 대한 의존도가 증가함에 따라 기업들은 다양한 소프트웨어 및 하드웨어 플랫폼에서 제공되는 서비스들을 운영하고 있다. 서비스들이 보급, 확대되는 과정에서 새로운 보안 취약점들이 나타나고, 이들 취약점을 악용한 기업정보의 유출 및 해킹 등 보안사고의 발생도 비례하여 증가하고 있다[1]. 특히 다양한 유형의 사업을 운영하는 지주회사 또는 대기업 그룹사의 경우, 사업영역별로 운영 중인 IT 인프라의 보안 취약점이 네트워크로 연결된 타 사업용 IT 인프라에 대한 사이버 침해의 통로로 악용될 가능성이 있다. 이 같은 문제의 해결을 위해 기업들은 사업영역 별로 보유한 IT 인프라의 보안 취약점 진단과 대응을 위한 솔루션들을 도입, 운영해 오고 있다. 하지만 기업의 보안 거버넌스 관점에서 보안 취약점 관리도 전사적인 보안 정책과의 연계 강화, 투자 중복의 방지, 효과적인 관리와 통제에 대한 필요성이 대두되기 시작했다. 보안 거버넌스 체계 강화에 대한 기업의 요구변화에 맞춰 보안 취약점의 통합관리를 지원하는 상용 솔루션들이 일부 출시되고 있으나 기업들이 기 운영하고 있는 개별 취약점 진단 솔루션과의 연동, 로그관리 및 기업이 요구하는 특화된 기능 구현 등의 어려움이 도입에 장애가 되고 있다. 따라서, 대기업을 중심으로 개별 보안 취약점 진단 솔루션들을 연동하여 기업보안 거버넌스를 효과적으로 지원할 수 있도록 취약점 관리업무 프로세스의 재설계와 함께 취약점 진단 통합관리 체계를 구축하고 있다[2][3][4]. 본고는 보안 취약점 관리업무의 문제점을 소개하고, 최근 대 기업을 중심으로 활발히 구축이 추진되고 있는 웹 기반의 취약 점 진단 통합관리 체계의 개념, 기능 및 운영 프로세스를 소개한다. 아울러, 기업 IT 인프라에 대한 보안 취약점 진단 데이터를 축적하여 기업 내부의 보안위험 요소를 사전예측하고, 정보보호의 투자 대비 효과(ROSI: Security Return on Investment)를 효과적으로 산정하는 인프라로서 활용 가치를 소개한다.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

A Survivability Model of an Intrusion Tolerance System (침입감내시스템의 생존성 모델)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.395-404
    • /
    • 2005
  • There have been large concerns about survivability defined as the capability of a system to perform a mission-critical role, in a timely manner, in the presence of attacks, failures. In particular, One of the most important core technologies required for the design of the ITS(Intrusion Tolerance System) that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions is the survivability one of In included the dependability analysis of a reliability and availability etc. quantitative dependability analysis of the In. In this Paper, we applied self-healing mechanism utilizing two factors of self-healing mechanism (fault model and system response), the core technology of autonomic computing to secure the protection power of the ITS and consisted of a state transition diagram of the ITS composed of a primary server and a backup server. We also defined the survivability, availability, and downtime cost of the ITS, and then performed studies on simulation experiments and two cases of vulnerability attack. Simulation results show that intrusion tolerance capability at the initial state is more important than coping capability at the attack state in terms of the dependability enhancement.

Analysis of regional type according to spatial correspondence between heat wave vulnerable areas and health damage occurrence (폭염 취약지역과 건강 피해 발생의 공간적 일치성에 따른 지역 유형 분석)

  • Hee-Soo HWANG;Ji Yoon CHOI;Jung Eun KANG
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.1
    • /
    • pp.89-113
    • /
    • 2023
  • This study aimed to identify heat wave vulnerable areas and discuss spatial typology and policy directions through spatial coincidence analysis of heat wave damage. By utilizing the climate change vulnerability assessment of the Intergovernmental Panel on Climate Change (IPCC) and Spatial Statistics Comparison Analysis, this study examined cities, counties, and districts in South Korea for five years (2015-2019), including 2018, when the heat wave was most extreme. It was determined that the number of heat wave days (exposure) was the most impactful among various factors for heat wave vulnerability. Sensitivity and adaptive capacity to heat waves were found to vary according to regional characteristics. The relationship between heat wave vulnerability and damage was categorized into four types through spatial coherence. Hot to Hot and Cold to Cold types have a positive relationship between vulnerability and damage, while Hot to Cold and Cold to Hot types have a negative relationship. The findings suggest that since different types of regions have distinct characteristics and conditions, policies and research for improvement should be directed to address each region separately. This study may be used as basic data for establishing heat-related policies in the future, as it categorizes regions by considering both heat vulnerability and damage and examines the direction of response by type.

Assessment of Hydrological Drought Risk Considering Regional Water Supply Capacity (지역적 용수공급능력을 고려한 수문학적 가뭄 위험도 평가)

  • Kim, Ji Eun;Yu, Jisoo;Lee, Joo-Heon;Kim, Tae-Woong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.152-152
    • /
    • 2020
  • 가뭄은 장기간에 걸쳐 광범위하게 발생하는 특징으로 인해 자연재해뿐만 아니라 사회·경제적으로도 큰 피해를 야기한다. 즉, 가뭄으로 인한 댐의 용수 공급 부족은 공업·농업뿐만 아니라 국민들의 생활에도 상당한 피해를 미친다. 하지만, 가뭄으로 인한 지역의 피해정도는 해당 지역의 특성 또는 가뭄에 대한 지역의 대처 능력에 따라 매우 상이하게 나타난다. 따라서, 가뭄에 의한 피해를 저감시키고 안전한 용수공급이 이루어질 수 있도록 지역의 특성 및 용수 공급 체계를 고려한 위험 정도를 분석하는 것이 필요하며, 사람들과 직접적인 연관성이 높은 물수급 관련 인자들을 고려하여 가뭄의 잠재적 영향 및 피해정도를 파악할 수 있는 가뭄 위험도 평가가 수행되어야 한다. 그러나 용수공급 및 수요 현황을 반영한 가뭄 노출성 및 취약성 평가는 아직 부족한 실정이며, 각 인자에 대한 가중치를 산정하는데 설문조사 또는 단순평균방법이 많이 이용되고 있다. 본 연구에서는 용수공급 체계 및 지역적 특성을 고려하고 객관적인 가중치 산정방안이 적용된 확률·통계적 가뭄 위험도를 평가방법을 제시하였다. 먼저, 용수공급 실패 사상의 발생 확률이 적용된 결합가뭄관리지수(Joint Drought Management Index, JDMI)를 통해 가뭄노출성지수(Drought Hazard Index, DHI)를 산정하고, 각 인자에 대한 영향정도를 객관적으로 판단할 수 있는 가우스 혼합 모델을 활용하여 가뭄취약성지수(Drought Vulnerability Index, DVI)를 산정하였다. 이 두 지수를 결합하여 가뭄위험도지수(Drought Risk Index, DRI)를 계산하고 위험도 평가를 수행하였다. 충청지역에 적용한 결과, DHI는 용수공급 실패 사상의 발생확률이 큰 보령시가 가장 높게 나타났으며, DVI는 농업적 요소의 가중치가 크게 산정됨에 따라 청주시가 가장 높게 산정되었다. DHI와 DVI가 결합된 DRI의 경우는 청주시가 가장 위험한 것으로 나타났다. 따라서, DRI가 가장 높은 청주시는 충정 지역의 가뭄 위험 경감을 위한 대응 수립시 우선적으로 고려되어야 한다.

  • PDF