• Title/Summary/Keyword: 취약성 지도

Search Result 1,855, Processing Time 0.03 seconds

Study of a Flood Vulnerability Assessment for Climate Change and Utilizing the Vulnerability-based Disaster Response in Jeju-do (기후변화에 따른 제주도의 홍수 취약성 평가 및 취약성 기반 소방 대응 활용 연구)

  • Lim, Chae-Hyun;Park, Yong-Yi
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.64-70
    • /
    • 2016
  • This study assessed the flood vulnerability of Jeju-do depending on climate change using VESTAP. The results showed that the flood vulnerability of Jeju-do in the future (2020s, 2030s and 2040s) will increase continuously compared to the present time (2010s). In particular, the flood vulnerability of Jeju-si is expected to be higher than Seogwipo-si prior to 2030s. Conversely, the flood vulnerability of Seogwipo-si is expected to be higher than Jeju-si after 2030. These analysis results confirmed the characteristics of flood vulnerability between Seogwipo-si and Jeju-si and the growth of flood vulnerability entirely within Jeju-do.

Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045 (ISO/IEC 15408, 18045 기반 소프트웨어 취약성 분석 방법론)

  • Im, Jae-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.969-974
    • /
    • 2014
  • CC (Common Criteria) requires collecting vulnerability information and analyzing them by using penetration testing for evaluating IT security products. Under the time limited circumstance, developers cannot help but apply vulnerability analysis at random to the products. Without the systematic vulnerability analysis, it is inevitable to get the diverse vulnerability analysis results depending on competence in vulnerability analysis of developers. It causes that the security quality of the products are different despite of the same level of security assurance. It is even worse for the other IT products that are not obliged to get the CC evaluation to be applied the vulnerability analysis. This study describes not only how to apply vulnerability taxonomy to IT security vulnerability but also how to manage security quality of IT security products practically.

Assessment of agricultural water resources healthiness and the water use vulnerability in Yeongsan river basin (영산강 유역의 농업수자원 건전성 및 농업용수 취약성 평가)

  • Kim, Sehoon;Lee, Jiwan;Shin, Hyungjin;Kim, Won-Jin;Kim, Seongjoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.32-32
    • /
    • 2022
  • 본 연구는 농경지가 주로 분포되어있는 영산강 유역(3,371.4 km2)을 대상으로 농업용수 건전성 및 취약성 평가를 수행하였다. 먼저, 농업용수 건전성은 관개 기간에 농업용수 확보를 위한 유역 환경 요소(하천, 토지이용, 수문, 수질, 수생태, 서식지)로 정의하였으며, 취약성은 용수공급에 영향을 주는 인위적인 변화 요소(기후변화, 불투수층 변화, 농업용수 수요량 변화, 토지피복 변화)로 구분하였다. 각 요소의 sub-index는 1개의 지수로 정규화하여 평가하였으며 Percentile rank 방법으로 계산하였다. 분석결과 영산강 하류의 나주시(5004) 유역의 건전성 및 취약성 지수가 각각 0.33, 0.92로 농업용수 공급에 취약한 것으로 분석되었다. 이에 따른 회복력 및 유지·조치 우선순위 분석결과 또한 농업용 수리시설(저수지, 양수장, 취입보, 집수암거, 관정)을 이용한 농업용수 확보가 시급한 것으로 분석되었다. 최종적으로 본 연구에서 제시한 농업용수 건전성 및 취약성 지수는 장기간에 걸친 유역 변화분석이 가능하고, 농업용수 공급 상황을 예측함으로써 향후 농업용수 확보를 위한 시설물 설치계획 수립에 근거자료로 활용할 수 있을 것으로 판단된다.

  • PDF

Development of integrated disaster mapping method (II) : disaster mapping with risk analysis (통합 재해지도 작성 기법 개발(II) : 리스크 분석을 적용한 재해지도 작성)

  • Park, Jun Hyung;Kim, Byunghyun
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.1
    • /
    • pp.85-97
    • /
    • 2022
  • In this study, a method for an integrated flood risk mapping was proposed that simultaneously considers the flood inundation map indicating the degree of risk and the disaster vulnerability index. This method creates a new disaster map that can be used in actual situations by providing various and specific information on a single map. In order to consider the human, social and economic factors in the disaster map, the study area was divided into exposure, vulnerability, responsiveness, and recovery factors. Then, 7 indicators for each factor were extracted using the GIS tool. The data extracted by each indicator was classified into grades 1 to 5, and the data was selected as a disaster vulnerability index and used for integrated risk mapping by factor. The risk map for each factor, which overlaps the flood inundatoin map and the disaster vulnerability index factor, was used to establish an evacuation plan by considering regional conditions including population, assets, and buildings. In addition, an integrated risk analysis method that considers risks while converting to a single vulnerability through standardization of the disaster vulnerability index was proposed. This is expected to contribute to the establishment of preparedness, response and recovery plans for providing detailed and diverse information that simultaneously considers the flood risk including social, humanistic, and economic factors.

Quantification of Climate Change Vulnerability Index for Extreme Weather - Focused on Typhoon case - (기후변화에 따른 극한기상의 취약성 지수 정량화 연구 - 태풍을 중심으로 -)

  • Kim, Cheol-Hee;Nam, Ki-Pyo;Lee, Jong-Jae
    • Journal of Environmental Impact Assessment
    • /
    • v.24 no.2
    • /
    • pp.190-203
    • /
    • 2015
  • VRI(Vulnerability-Resilience Index), which is defined as a function of 3 variables: climate exposure, sensitivity, and adaptive capacity, has been quantified for the case of Typhoon which is one of the extreme weathers that will become more serious as climate change proceeds. Because VRI is only indicating the relative importance of vulnerability between regions, the VRI quantification is prerequisite for the effective adaptation policy for climate in Korea. For this purpose, damage statistics such as amount of damage, occurrence frequency, and major damaged districts caused by Typhoon over the past 20 years, has been employed. According to the VRI definition, we first calculated VRI over every district in the case of both with and without weighting factors of climate exposure proxy variables. For the quantitative estimation of weighting factors, we calculated correlation coefficients (R) for each of the proxy variables against damage statistics of Typhoon, and then used R as weighting factors of proxy variables. The results without applying weighting factors indicates some biases between VRI and damage statistics in some regions, but most of biases has been improved by applying weighting factors. Finally, due to the relations between VRI and damage statistics, we are able to quantify VRI expressed as a unit of KRW, showing that VRI=1 is approximately corresponding to 500 hundred million KRW. This methodology of VRI quantification employed in this study, can be also practically applied to the number of future climate scenario studies over Korea.

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

The Vulnerability Assessment Forest Fire in Jeju to Climate Change using the VESTAP (VESTAP을 활용한 기후변화에 따른 제주도 산불 취약성 평가 연구)

  • Lim, Chae-Hyun
    • Fire Science and Engineering
    • /
    • v.30 no.1
    • /
    • pp.57-62
    • /
    • 2016
  • This study evaluated the risk of forest fires due to climate change in Jeju using the VESTAP. The study primarily aimed at assessing the risks posed to Jeju city and Seogwipo city, and uses actual and projected date from the period of 2000's to 2040's based on RCP 8.5 scenario. Forest fire vulnerability throughout Jeju-do was determined through the standardization of vulnerability index. The highest vulnerability was determined for the towns of Chuja-myeon, Udo-myeon, two downtown areas in Jeju city, Daejeong-eup, and five downtown areas in Seogwipo city, respectively.

A GIS-Based Seismic Vulnerability Mapping and Assessment Using AHP: A Case Study of Gyeongju, Korea (GIS 기반 AHP를 이용한 지진 취약성 지도제작 및 평가: 경주시를 중심으로)

  • Han, Jihye;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.217-228
    • /
    • 2019
  • In this study, a seismic vulnerability map of Gyeongju city, where the 9.12 Gyeongju earthquake occurred, was produced and evaluated using analytic hierarchy process(AHP) and geographic information system (GIS). Geotechnical, physical, social, structural, and capacity factors were selected as the main indicators and 18 sub-indicators to construct a spatial database. Weights derived using the AHP were applied to the 18 sub-indicators, which generated a vulnerability map of the five main indicators. After weighting the five generated maps, we created seismic vulnerability maps by overlaying each of the five maps. The seismic vulnerability map was classified into five zones, i.e., very high, high, moderate, low, and safe. For seismic vulnerability, the results indicated that 3% of Gyeongju area is characterized as having very high vulnerability, while 19% was characterized as safe. Based on district standards, Jungbu-dong, Hwangoh-dong, Hwangseong-dong, Seonggeon-dong, and Dongcheon-dong were high-risk areas, and Bodeok-dong, Gangdong-myeon, Yangbuk-myeon, Yangnam-myeon, and Oedong-eup were characterized as safe areas. The seismic vulnerability map produced in this study could possibly be used to minimize damage caused by earthquakes and could be used as a reference when establishing policies.

Flood Vulnerability Analysis considering Gender Factors (젠더 특성을 고려한 홍수 취약성 분석)

  • Hwang, Nanhee;Chung, Gunhui
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.384-384
    • /
    • 2018
  • 최근 기상이변의 가속화로 인해 홍수피해는 더욱 증가되고 있으며, 도시화로 인해 불투수면적이 급격히 늘어남에 따라 기존 관개수로의 통수능력 부족으로 도시침수피해가 증가되고 있다. 재난 연감과 재해연보를 바탕으로 비교한 결과, 홍수를 비롯한 각종 재난 발생 시 일반적으로 남성들에 비해 여성들의 피해자 수가 많으며 피해의 정도는 상대적으로 심각하였다. 그러나 국내외적으로 홍수에 대한 피해를 줄이고자 홍수 취약성에 대한 많은 연구들이 수행되었지만 아직 젠더를 고려한 취약성 분석은 부족한 실정이다. 본 연구에서는 대상지역을 우리나라의 인구밀집도가 가장 높은 서울시 25개구로 선정하였고, 엔트로피 이론을 활용해 25개 구의 홍수 취약성 지수를 계산하였다. 홍수 취약성 지수 계산 시 고려요인으로는 여성인구비율, 고령화비율 및 인구밀도 등과 같은 사회적 요인과 연 홍수 피해액, 복구금액 등 경제적 요인 그리고 일일 최대 강수량 및 80mm 이상의 강수량, 홍수 피해 횟수 등과 같은 환경적 요인을 고려하였다. 그 결과 각각의 요인에 따라서 서울시 25개구의 홍수취약성 지수가 상이하게 나타나는 것을 확인할 수 있었다. 이를 통해 취약성지수가 높은 자치구들의 경우 지역특성을 고려한 별도의 홍수대책 가이드라인이 필요 할 것으로 판단된다. 본 연구의 결과물을 바탕으로 향후 홍수 대책이나, 홍수대비 관련 정책을 수립할 정부 및 지자체에서 사회, 경제, 환경적 요인을 고려한 합리적인 정책 수립 결정에 도움이 될 것으로 판단된다.

  • PDF

Analysis of Groundwater Resources Management Vulnerability in Yeongsan River Basin (영산강 유역 지하수자원 관리 취약성 분석)

  • Lim, Jae-Deok;Yang, Jeong-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.129-129
    • /
    • 2018
  • 최근 가뭄, 강우사상의 변화 등의 자연적 요인과 함께 불투수면적의 증가, 지하수 이용의 증가, 지하구조물 공사 등과 같은 인위적 요인에 의한 지하수위 하강이 문제가 되고 있다. 지하수위의 하강은 지하수자원 부족과 같은 1차적 피해뿐만 아니라 지반침하, 생태계 교란, 농작물 피해, 지하수 오염과 같은 2차 피해를 야기할 수 있다. 지하수자원에 문제가 생긴 경우 단기간에 회복되기가 힘들고 투자할 수 있는 자원이 한정된 현 상황에서 지하수자원 관리 방안을 유역에 대해서 일괄적으로 적용하기에 어려움이 있다. 이를 위해 영산강 본류가 흐르는 행정구역을 대상으로 정량적인 분석을 통하여 지하수자원 관리에 취약한 지역을 선정하고 지하수자원 관리 방안을 적용하는 것이 효율적인 방법이 될 수 있다. 본 연구에서는 영산강 본류가 흐르는 7개 시 군을 대상으로 자료를 수집하였고 취약성 지수를 산정하여 지하수자원 관리 취약성 분석을 실시하였다. 7개 시 군의 자료를 수집하고 Re-scale 기법을 적용하여 표준화 하였고, 취약성 지수를 산정하기 위하여 엔트로피 방법을 통해 산정된 가중치를 적용하였다. 최종 취약성 지수를 지도에 나타내 가시화 하고 지하수자원 관리에 취약한 지역에 대하여 지하수자원 관리 방안 및 시설물 개선 등의 계획을 세운다면 지하수자원 관리 부족에 따른 피해에 효과적인 대응이 가능할 것으로 예상된다.

  • PDF