• Title/Summary/Keyword: 취약성 요소

Search Result 649, Processing Time 0.024 seconds

POLICY & ISSUES 환경정책 - 환경복지 구현을 위한 환경보건정책 방향

  • Lee, Ji-Yun
    • Bulletin of Korea Environmental Preservation Association
    • /
    • s.402
    • /
    • pp.6-9
    • /
    • 2012
  • 전국적으로 도시화가 진전됨에 따라 아파트, 사무실 등 실내공간에서 생활하는 시간이 하루의 90%를 넘어서고 있어 실내 공간의 환경관리가 건강관리의 중요 요소로 등장하고 있으며, 저출산 고령화가 심화되면서 취약한 노년층 인구의 증가와 힘께 과보호를 받는 어린이 인구는 증가하고 있어 면역력 약화에 따른 질환 및 만성질환의 이환 기능성이 환경보건 분야의 새로운 과제로 등장하고 있다.

  • PDF

부산지역 해수면 상승의 확률론적 전망

  • Lee, Jeonghoon;Lee, Okjeong;Cha, Wooyoung;Kim, Sadan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.212-212
    • /
    • 2016
  • 해수면 상승의 예측에 대한 근본적인 불확실성은 전 지구적 해수면 상승에 대한 가속도와 상대적으로 해수면에 영향을 미치는 지역적인 요소와 연관되어 있다. 최근, 기후 모형을 포함하는 다양한 모형의 결과와 빙하 관측자료, 그리고 이들의 해수면에 대한 기여도는 해수면 상승이 가속화될 것이라는 사실을 나타내지만, 아직 조수 관측과 위성 자료들은 이와 관련된 근거를 발견하지 못하고 있다. 본 논문에서는 연안도시 계획 설계자들이 이러한 해수면 상승의 불확실성을 고려할 수 있도록 미래 해수면 상승의 확률론적 산정을 제공하기 위해 최근 해수면 상승 가속과 그 상승률에 대해 선택된 분포와 관측 해수면 자료의 합성을 제시한다. 결과는 프로젝트 취약성을 평가하기 위한 위험도 기반 관리체계의 기준으로서 사용 될 수 있다. 또한, 기후 영향에 의한 해수면의 동역학적 지질물리학의 이해도를 증진시킴으로써, 분포의 선택과 정확성, 그리고 해수면 상승 예측이 개선될 것이라고 기대 된다. 본 연구에서 제시된 방법론은 사례연구로 부산에 적용되어 설명되어 진다.

  • PDF

Proposed RASS Security Assessment Model to Improve Enterprise Security (기업 보안 향상을 위한 RASS 보안 평가 모델 제안)

  • Kim, Ju-won;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.635-637
    • /
    • 2021
  • Cybersecurity assessment is the process of assessing the risk level of a system through threat and vulnerability analysis to take appropriate security measures. Accurate security evaluation models are needed to prepare for the recent increase in cyberattacks and the ever-developing intelligent security threats. Therefore, we present a risk assessment model through a matrix-based security assessment model analysis that scores by assigning weights across security equipment, intervals, and vulnerabilities. The factors necessary for cybersecurity evaluation can be simplified and evaluated according to the corporate environment. It is expected that the evaluation will be more appropriate for the enterprise environment through evaluation by security equipment, which will help the cyber security evaluation research in the future.

  • PDF

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Research of the base smoke control planes for high-rise apartment (고층 공동주택의 제연계획에 관한 기초연구)

  • Son, Bong-Sae
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.4 no.3 s.14
    • /
    • pp.89-94
    • /
    • 2004
  • Recently, the cityward tendency of the population has caused the construction of a high rise apartment increased, because it is possible for many people to dwell on a small ground area in an apartment. In the future the number of the constructed high-rise apartment units will also increase, because many people require a better environment and more improved space of their life. However, apartment buildings with many dwellers in spite of small area are exposed to great dangers, particularly fire. So the adaptable control methods of smoke which is the most dangerous to people in a fire were proposed by an analysis on some standards for the fire in this study.

A Study on the Components of Library Services for Applying Universal Design (유니버설디자인 적용을 위한 도서관 서비스 구성요소에 관한 연구)

  • Kim, Bo-Il
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.3
    • /
    • pp.5-16
    • /
    • 2010
  • Libraries should offer their services to all users including those who find difficult to access knowledge information without any obstacles or discrimination. Therefore, this study, aiming at providing library services to all users by applying 'Universal Design' to libraries, extracted and presented five components in library services: universal convenience, which allows all users to use libraries; safety of services, which offers safety in library use; user-orientedness, which offers user-oriented library services; user request, which allows library services reflecting the needs of users; and economic feasibility of the services, which provide efficient and economic library services. The proposed five components will play the foundational role in implementing universal design on libraries so that all users can use library services.

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

Development of Spatial Landslide Information System and Application of Spatial Landslide Information (산사태 공간 정보시스템 개발 및 산사태 공간 정보의 활용)

  • 이사로;김윤종;민경덕
    • Spatial Information Research
    • /
    • v.8 no.1
    • /
    • pp.141-153
    • /
    • 2000
  • The purpose of this study is to develop and apply spatial landslide information system using Geographic information system (GIS) in concerned with spatial data. Landslide locations detected from interpretation of aerial photo and field survey, and topographic , soil , forest , and geological maps of the study area, Yongin were collected and constructed into spatial database using GIS. As landslide occurrence factors, slope, aspect and curvature of topography were calculated from the topographic database. Texture, material, drainage and effective thickness of soil were extracted from the soil database, and type, age, diameter and density of wood were extracted from the forest database. Lithology was extracted from the geological database, and land use was classified from the Landsat TM satellite image. In addition, landslide damageable objects such as building, road, rail and other facility were extracted from the topographic database. Landslide susceptibility was analyzed using the landslide occurrence factors by probability, logistic regression and neural network methods. The spatial landslide information system was developed to retrieve the constructed GIS database and landslide susceptibility . The system was developed using Arc View script language(Avenue), and consisted of pull-down and icon menus for easy use. Also, the constructed database can be retrieved through Internet World Wide Web (WWW) using Internet GIS technology.

  • PDF

An Estimation to Landslide Vulnerable Area of Rainfall Condition using GIS (GIS를 이용한 강우조건에 따른 산사태 취약지 평가)

  • Yang, In-Tae;Chun, Ki-Sun;Park, Jae-Kook;Lee, Sang-Yeun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.15 no.1 s.39
    • /
    • pp.39-46
    • /
    • 2007
  • Most areas in Kangwon Province are mountainous and vulnerable to landslide due to the rainy season in summer and the localized torrential downpour triggered by abnormal climate. In particular, the rainfall is one of direct reasons for landslide. In accordance with the analysis of the relevance between the landslide areas and the accumulated rainfall for four months, there are severe damages of landslide to the areas having more than 1,100 mm of rainfall during three(3) months. Further, it indicates that the more the accumulated rainfall is the greater the size of landslide. These analyses show that the rainfall causes the possible and potential landslide in the vulnerable areas. And also, it means that there exist strong possibilities of landslide even in the areas of lower vulnerability if the amount of rainfall is above certain standard level. Accordingly, in this study we stored the GIS database on the causes and factors of landslide in the southern parts of Kangwon province and conducted simulations on the change of distribution of vulnerable areas by varying the rainfall conditions and by using the evaluation data of landslide vulnerability. As such a result, we found that the landslide could potentially occur if the amount of rainfall is 200 mm and more.

  • PDF