• Title/Summary/Keyword: 취약성 요소

Search Result 649, Processing Time 0.031 seconds

The Risk Evaluation on Water Supply Networks using PROMETHEE (PROMETHEE를 이용한 상수도관망시스템의 위험도 평가)

  • Hong Sungjun;Kim Sheung-Kown;Kim Jooghun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.1307-1311
    • /
    • 2005
  • 최근들어 Water Security에 대한 관심이 고조되고 있지만 국내의 경우 이에 대한 체계적인 연구가 아직 진행되지 않았고 상수도관망시스템의 오염예방 및 위험관리에 대한 연구는 매우 미비한 실정이며 특히 상수도관망시스템의 위험성 및 취약성에 대한 연구는 전무한 상태이다. 이러한 상수도관망시스템의 위험도와 관련된 여러 위험요소들은 인명의 피해, 재산상의 피해, 환경적 피해, 시스템의 피해 그리고 사회적 불안등 여러 기준을 고려하여 평가되어야 한다. 이 문제는 다기준의사결정(multi-criteria decision making)문제로서 평가기준들(criteria) 간의 상충관계(trade-off)로 인하여 판단이 모호한 대안들을 PROMETHEE(Preference Ranking Organization METHod Enrichment Evaluations) 기법을 이용하여 평가하였다. PROMETHEE는 선호의 유출량(leaving flow)과 유입량(entering flow)의 개념을 이용하여 여러 대안들의 순위선호(outranking)를 산정하는 기법으로, 의사결정자(decision matter)가 비교적 쉽게 이해할 수 있으며 기존의 AHP$\cdot$ANP와는 달리 명확한 판단이 어려운 대안들에 대해서는 비교불가능한(incomparable) 대안으로 분류한다. 이와 같은 위험도 평가결과는 위기상황에 대한 대처방안을 제시할 의사결정시스템 구축의 기초 자료가 될 수 있을 것이다.

  • PDF

Vulnerability Analysis on the Strong-Password Mutual Authentication Protocols (강력한 패스워드 상호인증 프로토콜 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.722-728
    • /
    • 2011
  • Most services need to have authentication protocols to verify users' eligibility in the network environment. For this, a lot of user authentication protocols have been researched and developed. Two of them, SPMA and I-SPMA protocols, introduced the lack of mutual authentication and vulnerability to the reply attack of the prior protocols and suggested revised protocols. Nevertheless, these protocols did not mention about the critical problem caused when the server and the client lose synchronization on the secret information between them. Therefore, in this paper, we analyze the security characteristics of the existing protocols and prove the vulnerability to the synchronization of the protocols.

Development of comprehensive drought risk index for drought risk assessment (가뭄 위험도 평가를 위한 종합적 지수 개발에 관한 연구)

  • Jee, Hee Won;Kim, Young-Oh;Kim, Daeho;Kang, Tae-Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.124-124
    • /
    • 2019
  • 가뭄은 다른 자연재해들과 달리 복잡한 자연의 순환 시스템에 의해 발생하므로 시기가 명확하지 않으며, 사회 전반에 걸친 큰 규모의 피해가 발생한다. 이러한 피해를 저감하기 위해 가뭄에 대한 다양한 연구들이 진행되고 있다. 가뭄에 대한 기존 연구들을 살펴보면, 강수량과 같은 가뭄의 원인을 중점적으로 다룬 가뭄지수 연구가 대다수이다. 한편, 실제 가뭄 피해에 대한 연구들은 위험 혹은 취약성 분석으로 지수를 산정하는 방법으로 연구되고 있으며 농업 가뭄에 집중한 결과를 제시하고 있다. 본 연구에서는 가뭄 현상의 원인을 제공하는 기상학적 요인뿐 아니라 피해 대상과 대상의 내부시스템 능력에 따른 영향을 고려한 가뭄위험지수(Drought Risk Index, DRI)을 연구하였다. 또한, 생활용수, 농업용수, 공업용수를 고려하여 농업가뭄과 더불어 사회 경제학적 가뭄의 피해 평가가 가능한 통합 DRI를 산정하였다. 크론바흐 알파 계수를 통하여 지수 구성 요소들 간의 신뢰성과 DRI와 실제 가뭄 피해간의 스피어만 상관 계수를 사용하여 국내 유역에 대한 DRI의 타당성을 확인하였고 이를 통해 지수의 적합성을 분석하였다. 결과적으로 기후변화 시나리오를 사용하여 한반도의 2030, 2050, 2080년대 통합 DRI를 제시하였다.

  • PDF

A Study on the Human Vulnerability Classification System for People-Centric Security (인간중심보안을 위한 인적취약점 분류체계에 관한 연구)

  • Jungjun Park;Seongjin Ahn
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.561-575
    • /
    • 2023
  • The information security industry has seen a wide variety of growth over the past few decades. In particular, various solutions have been proposed in terms of technology, management, and institutional aspects. Nevertheless, it should be notedthat security accidents continue to occur every year. This proves that there are limitations to various business changes in the digital era as existing security is being promoted with technology-oriented and prevention-oriented policies. Thus, people-centric security (PCS) has recently become a hot topic in order to escape the limitations of traditional securityapproaches. Through the concept of information security violations, PCS strategic principles, and expert interviews, this studyaims to present a fundamental security incident response plan by classifying human-caused vulnerabilities into 5 categories and classifying them into 21 detailed components.

Enhancement of Password-based Mutual Authentication Protocol against De-synchronization Attacks (비동기 공격에 안전한 패스워드기반 상호 인증 프로토콜)

  • Yuk, Hyeong-Jun;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.24-32
    • /
    • 2013
  • Authentication is one of the necessary elements in the network environment. Many researches have detected security vulnerabilities to the existing authentication mechanisms and suggested secure mutual authentication protocols by resolving these vulnerabilities. The representative ones of them are SPMA(Strong Pass Mutual Authentication) and I-SPMA(Improved Strong Password Mutual Authentication). However, these protocols cause a critical problem when the shared secret information is de-synchronized between the server and the client. This paper proposes a revised protocol to resolve the de-synchronization problem. Based on a security assessment on the proposed protocol, we consider the proposed protocol is safer than the previous ones and possible to effectively make a user authentication system mre secure.

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

Slope Stability and Development of Debris Flow Deposit in the Ulleung Basin, East Sea (동해 울릉분지의 사면안정성 및 쇄설류 퇴적체의 발달)

  • Lee, Sun-Jong;Lee, Jeong-Min;Yoo, Dong-Geun;Lee, Go-Eun;Park, Soo-Chul
    • Economic and Environmental Geology
    • /
    • v.50 no.2
    • /
    • pp.129-143
    • /
    • 2017
  • The shallow sediments in the southwestern Ulleung Basin consist of mass flow deposits such as slide/slump and debris flow deposits (DFD), caused by slope failure. These sediments are proven to be important in studying geological disaster and stability of the seafloor. In this paper, we analysised the flow accumulation and slope failure susceptibility of the Ulleung Basin on the basis of multi-beam data, collected in this area. We also studied the distribution pattern and the seismic characteristics of the DFD in the uppermost layer of the Ulleung Basin on the basis of seismic data. The slope susceptibility was calculated as the frequency ratio of each factors including slope, aspect, curvature and stream power index (SPI), which causes the slope failure. These results indicate that the slope failure is frequently to occur in the southern and western continental slope of the Ulleung Basin. The sediment flow (mass flow) caused by the slope failure converges to the north and northwest of the Ulleung Basin. According to the seismic characteristics, the uppermost layer in study area can be divided into four sedimentary unit. These sedimentary units develop from the south and southwest to the north and northwest in association with slope susceptibility and flow accumulation.

Hydrological drought risk assessment for climate change adaptation in South Korea (기후변화 적응을 위한 우리나라 수문학적 가뭄 위험도 평가)

  • Seo, Jungho;Chi, Haewon;Kim, Heey Jin;Kim, Yeonjoo
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.6
    • /
    • pp.421-435
    • /
    • 2022
  • As natural disasters have been increasing due to climate change, sustainable solutions are in need to alleviate the degree of drought hazard, assess and project the drought influence based on future climate change scenarios. In assessing drought risk, socio-economic factors of the region must be considered along with meteorological factors. This study categorized drought hazard, exposure, and vulnerability as three major components of drought risk according to the Intergovernmental panel on Climate Change (IPCC) risk assessment framework, and selected indices for each component to quantify the drought risk in South Korea according to the mid-size basins. Combinations of climate scenarios (Representative Concentration Pathway; RCP 2.6 and RCP 8.5) and socio-economic scenarios (Shared Socio-economic Pathways; SSP 1, SSP2 and SSP3) for the near future (2030-2050) ant the far future (2080-2099) were utilized in drought risk analysis, and results were compared with the historical data (1986-2005). In general, the drought risks for all scenarios shows large increases as time proceeds to the far furture. In addition, we analyzed the rank of drought hazard, exposure, vulnerability for drought risk, and each of their contribution. The results showed that the drought hazard is the most contributing component to the increase of drought risk in future and each basin shows varying contributing components. Finally, we suggested countermeasures for each basin according to future climate change scenarios, and thus this study provides made the basis for establishing drought management measures.

An Analysis of Security Requirement Based on Vulnerabilities in Cloud Computing System (클라우드 컴퓨팅 환경에서 취약점에 따른 보안 요구사항 분석)

  • Park, Min-Woo;Kim, Nam-Uk;Cho, Sinyoung;Eom, Jung-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1312-1315
    • /
    • 2010
  • 본 논문은 클라우드 컴퓨팅 시스템의 필수적인 보안 요구사항에 대해 분석한다. 클라우드 컴퓨팅은 수 많은 자료와 방대한 자원을 다루는 시스템이다. 클라우드 컴퓨팅은 이와 같은 특징으로 인해 쉽게 해커의 공격 대상이 된다. 따라서 클라우드 컴퓨팅 산업에서는 무엇보다도 보안이 매우 중요한 요소이다. 본 논문에서는 잠재적인 위협으로부터 클라우드 컴퓨팅이 보유한 자료와 자원을 보호하기 위한 필수적인 보안 요구사항에 대해 분석한다.