• Title/Summary/Keyword: 취약성 평가 방법

Search Result 508, Processing Time 0.039 seconds

Parameteric Assessment of Water Use Vulnerability of South Korea using SWAT model and TOPSIS (SWAT 모형과 TOPSIS 기법을 이용한 우리나라 물이용 취약성 평가)

  • Won, Kwyang Jai;Sung, Jang Hyun;Chung, Eun-Sung
    • Journal of Korea Water Resources Association
    • /
    • v.48 no.8
    • /
    • pp.647-657
    • /
    • 2015
  • This study assessed the water use vulnerability for 12 basins of South Korea. The annual runoff of 12 basins are derived using a Soil and Water Assessment Tool (SWAT) and the calculated runoff per unit area and population are compared with each basin. The 18 indicators are selected in order to assess the vulnerability. Those are classified by aspects of demand, loss and supply of water use. Their weighting values used Entropy method to determine objective weights. To quantitatively assess the water use vulnerability, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) based on multi-criteria decision making are applied. The results show that the water availability vulnerability of Hyeongsan River has the highest value followed by Sapgyo River; Dongjin River; Seomjin River; Anseong River; Mangyung River; Nakdong River; Tamjin River; Youngsan River, Geum River; Taehwa River; and Han River. The result of this study has a capability to provide references for the index deveopment of climate change vulnerability assessment.

Risk analysis and assessment Methodology Research for network based Real-time Risk Management (네트워크 기반의 실시간 위험관리를 위한 위험분석 및 평가 방법연구)

  • Kim, Sung-Won;Kim, Hui-Young;Kwon, Young-Chan;Yun, Ho-Sang;Kim, Chul-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.29-34
    • /
    • 2007
  • 본 논문은 다양한 시스템이 존재하는 컴퓨터 네트워크 상의 위험을 분석 평가하기 위한 방법을 소개한다. 실시간으로 위험을 구성하는 요소들의 상태가 변화하는 상황에서 자산의 강도 평가, 위협 가능성 분석, 취약성에 대한 기존 통제 분석이 필요하다. 기존 통제 구성은 네트워크 토폴로지를 이용한 네트워크 베이스, 응용 어플리케이션에 기반한 호스트 베이스 통제가 있으며, 이들은 컴퓨터 네트워크상의 실질적인 취약성을 효과적으로 식별하는데 도움을 준다. 또한 가능성 분석은 위험평가 과정에서 불필요한 위협 정보를 효과적으로 제거하여 줄 수 있을 것이다.

  • PDF

Vulnerability Assessment of Forest Distribution by the Climate Change Scenarios (기후변화 시나리오에 따른 산림분포 취약성 평가)

  • Lee, Sangchul;Choi, Sungho;Lee, Woo-Kyun;Park, Taejin;Oh, Suhyun;Kim, Su-Na
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.2
    • /
    • pp.256-265
    • /
    • 2011
  • This study was aiming at assessing the vulnerability of forest distribution by the A2 and B1 climate change scenarios of Intergovernmental Panel on Climate Change (IPCC). The vulnerability of forest distribution was assessed using its sensitivity and adaptation to climate change with the help of the simulations of Korean-specific forest distribution model, so-called the Thermal Analogy Group (TAG), and the Plant Functional Type (PFT) defined in the HyTAG (Hydrological and Thermal Analogy Groups) model. As a result, the vulnerable area occupied 30.78% and 2.81% of Korea in A2 and B1 scenario, respectively. When it comes to the administrative districts, Pusan in A2 and Daegu in B1 appeared the most vulnerable area. This study would be employed into preparation of adaptative measures for forest in future in terms of using climate change scenarios reflecting different future development conditions.

A Study on Vulnerability Analysis Methodology for Composite Security Product Evaluation (합성형 정보보호제품 평가를 위한 취약성 분석 방법 개발에 관한 연구)

  • Kim, Seok-Soo;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.19-24
    • /
    • 2008
  • Common Criteria is a standard to estimate safety of information protection product such as network-level firewall system and intrusion detection system. Recently, CC version is changed from CC v.2.3 to CC v.3.1. CC v.3.1 estimation methodology requires a secured dictionary accomodation preparation for information protection product. In this research, progressed CC v3 base composition product test and research about vulnerability analysis method. Further, this paper presents specific plan sorting composition style information protection product examination methodology to existing principle and detailed methodology.

  • PDF

Comparison of Water Resources Vulnerability Index of South and North Korea Using TOPSIS (TOPSIS를 이용한 남·북한 지역별 기후변화에 대한 수자원 취약성 지수 비교)

  • Song, Jae Yeol;Chung, Eun-Sung;Jeong, Sunghun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.643-643
    • /
    • 2015
  • 최근 북한의 수자원에 대한 관심과 연구가 활발히 이루어지고 있다. 또한, 수자원 취약성과 지속가능한 개발과 관련된 지수에 대한 연구도 꾸준히 이루어지고 있으며, 이 지수를 이용하여 현재 또는 미래의 수자원 취약성을 판단하고 대비하고 있다. 본 연구는 기상청, 통계청, 환경부에서 제공하는 자료 중에서 북한의 지역별 자료의 확보 가능한 자료를 대상으로 기후변화에 대한 기후노출, 민감도, 적응능력을 나타내는 지표들을 선정하여 남한과 북한의 26개 광역자치단체에 대하여 수자원 취약성 순위를 도출하였다. 기후변화를 고려한 지표들은 각각 홍수피해와 물부족을 반영하는 지표인 일최대강수량, 일강수량이 80mm 이상인 날의 수, 연최대 연속강우일수, 3일주기 최대 강수량, 6-9월 강수량, 12-2월 증발산량, 3-5월 증발산량, 12-2월 강수량, 3-5월 강수량, 연속적인 무강우일 수의 최대값, 총인구, 인구밀도를 선택하였으며, 변수들의 가중치 결정은 객관적 가중치 산정 방법인 Shannon의 entropy 기법과 주관적 가중치인 환경부(2012)에서 전문가를 대상으로 유도한 가중치를 적용하여 치수와 이수분야에 대한 취약성을 각각 평가하였다. 수자원 취약성의 정량적 평가를 위하여 TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) 기법을 적용하여 남 북한 지역별 수자원 취약성을 지수화하고 취약성 순위를 도출하였다. 산정된 수자원 취약성 지수가 낮을수록 취약함의 정도가 심각한 것으로 정의할 수 있으며, 연구결과 남 북한을 통틀어서 서울이 가장 취약한 지역으로 나타났으며, 치수 분야에서는 북한의 양강도가 취약성이 낮은 것으로 나타났고, 이수분야에서는 북한의 양강도와 남한의 제주도가 취약성이 낮은 것으로 나타났다. 따라서 본 연구는 남 북한의 지역별 취약성 순위를 통해 우리나라와 북한 수자원의 현황을 제시하며, 미래의 국가 수자원 계획 수립 및 대책을 제시할 수 있는 자료로 활용할 수 있을 것이다.

  • PDF

Seismic Fragility Analysis of PSC Containment Building by Nonlinear Analysis (비선형 지진해석에 의한 PSC 격납건물의 지진취약도 분석)

  • Choi, In-Kil;Ahn, Seong-Moon;Choun, Young-Sun
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.10 no.1 s.47
    • /
    • pp.63-74
    • /
    • 2006
  • The seismic fragility analysis method has been used as a quantitative seismic safety evaluation method for the NPP(Nuclear Power Plant) structures and equipments. The seismic fragility analysis gives a realistic seismic capacity excluding the convertism included in the design stage. The conservatism is considered as the probabilistic parameters related to the response and capacity in the seismic fragility analysis. In this study, the displacement based seismic fragility analysis method was proposed based on the nonlinear dynamic analysis results. In this study, the seismic safety of the prestressed concrete containment building of KSNP(Korean Standard Nuclear Power Plant) was evaluated for the scenario earthquakes, neat-fault, far-fault, design earthquake and probability based scenario earthquake, which can be occurred in the NPP sites.

사이버보안 위협 변화에 따른 취약점 분석 방안

  • Min, Byung-Gil;Ahn, Woogeun;Seo, Jungtaek
    • Review of KIISC
    • /
    • v.24 no.1
    • /
    • pp.7-12
    • /
    • 2014
  • 각종 악성코드와 취약점이 하루가 다르게 출현하고 있다. 주기적인 취약점 분석 평가는 새로운 사이버보안 위협에 신속하게 대응하고 지속적으로 사이버보안을 강화하는 중요한 활동이다. 그러나 최근 스마트폰 이용 확산에 따른 모바일 보안위협 증가와 기반시설 제어시스템에 대한 보안위협 증가는 기존 취약점 분석 평가 방법의 구조적인 변화를 요구하고 있다. 본 논문에서는 스마트폰 테더링과 같은 모바일 보안위협에 따른 취약점 분석 평가 시의 고려사항과 시스템 영향을 최소화 할 수 있는 분석 절차와 방안을 제시하고 있다. BYOD를 사용한 모바일 인터넷 사용은 내 외부 네트워크 구분을 무의미하게 만들고 있기 때문에 다양한 침입경로에 대한 분석이 필요하다. 또한 제어시스템과 같이 높은 가용성이 요구되는 시스템에 대해서는 유휴시간 점검, 백업 시스템 점검, 테스트 베드 등을 사용한 취약점 점검 방법의 도입이 필요하다.

Development and Application of a Methodologyfor Climate Change Vulnerability Assessment-Sea Level Rise Impact ona Coastal City (기후변화 취약성 평가 방법론의 개발 및 적용 해수면 상승을 중심으로)

  • Yoo, Ga-Young;Park, Sung-Woo;Chung, Dong-Ki;Kang, Ho-Jeong;Hwang, Jin-Hwan
    • Journal of Environmental Policy
    • /
    • v.9 no.2
    • /
    • pp.185-205
    • /
    • 2010
  • Climate change vulnerability assessment based on local conditions is a prerequisite for establishment of climate change adaptation policies. While some studies have developed a methodology for vulnerability assessment at the national level using statistical data, few attempts, whether domestic or overseas, have been made to develop methods for local vulnerability assessments that are easily applicable to a single city. Accordingly, the objective of this study was to develop a conceptual framework for climate change vulnerability, and then develop a general methodology for assessment at the regional level applied to a single coastal city, Mokpo, in Jeolla province, Korea. We followed the conceptual framework of climate change vulnerability proposed by the IPCC (1996) which consists of "climate exposure," "systemic sensitivity," and "systemic adaptive capacity." "Climate exposure" was designated as sea level rises of 1, 2, 3, 4, and 5 meter(s), allowing for a simple scenario for sea level rises. Should more complex forecasts of sea level rises be required later, the methodology developed herein can be easily scaled and transferred to other projects. Mokpo was chosen as a seaside city on the southwest coast of Korea, where all cities have experienced rising sea levels. Mokpo has experienced the largest sea level increases of all, and is a region where abnormal high tide events have become a significant threat; especially subsequent to the construction of an estuary dam and breakwaters. Sensitivity to sea level rises was measured by the percentage of flooded area for each administrative region within Mokpo evaluated via simulations using GIS techniques. Population density, particularly that of senior citizens, was also factored in. Adaptive capacity was considered from both the "hardware" and "software" aspects. "Hardware" adaptive capacity was incorporated by considering the presence (or lack thereof) of breakwaters and seawalls, as well as their height. "Software" adaptive capacity was measured using a survey method. The survey questionnaire included economic status, awareness of climate change impact and adaptation, governance, and policy, and was distributed to 75 governmental officials working for Mokpo. Vulnerability to sea level rises was assessed by subtracting adaptive capacity from the sensitivity index. Application of the methodology to Mokpo indicated vulnerability was high for seven out of 20 administrative districts. The results of our methodology provides significant policy implications for the development of climate change adaptation policy as follows: 1) regions with high priority for climate change adaptation measures can be selected through a correlation diagram between vulnerabilities and records of previous flood damage, and 2) after review of existing short, mid, and long-term plans or projects in high priority areas, appropriate adaptation measures can be taken as per this study. Future studies should focus on expanding analysis of climate change exposure from sea level rises to other adverse climate related events, including heat waves, torrential rain, and drought etc.

  • PDF

Fragility Curve Evaluation of Reinforced Concrete Shear Wall Structures according to Various Nonlinear Seismic Analysis Methods (다양한 비선형지진해석방법에 따른 철근콘크리트 전단벽 구조물의 취약도곡선 평가)

  • Jang, Dong-Hui;Song, Jong-Keol;Kang, Sung-Lib;Park, Chang-Ho
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.15 no.4
    • /
    • pp.1-12
    • /
    • 2011
  • Seismic fragility analysis has been developed to evaluate the seismic performance of existing nuclear power plants, but now its applicability has been extended to buildings and bridges. In general, the seismic fragility curves are evaluated from the nonlinear time-history analysis (THA) using many earthquake ground motions. Seismic fragility analysis using the nonlinear THA requires a time consuming process of structural modeling and analysis. To overcome this shortcoming of the nonlinear THA, simplified methods such as the displacement coefficient method (DCM) and the capacity spectrum method (CSM) are used for the seismic fragility analysis. In order to evaluate the accuracy of the seismic fragility curve calculated by the DCM and the CSM, the seismic fragility curves of a reinforced concrete shear wall structure calculated by the DCM and CSM are compared with those calculated by the nonlinear THA. In order to construct a numerical fragility curve, 190 artificially generated ground motions corresponding to the design spectrum and the methodology proposed by Shinozuka et al. are used.

An Approach to Drought Vulnerability Assessment using TOPSIS Method (TOPSIS을 적용한 가뭄취약성 평가 방법에 관한 연구)

  • LEE, Chang-Woo;SHIN, Hyung-Jin;KWON, Min-Sung;LEE, Gyu-Min;NAM, Sang-Hyeok;KANG, Mun-Sung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.102-115
    • /
    • 2019
  • This study aims to establish and apply a drought vulnerability assessment plan including various factors related to drought. The evaluation technique consisted of three stages: evaluation factor and weight selection, evaluation data database construction, evaluation data and weight combination, and Delphi investigation method was applied to evaluation factor and weight selection. As the evaluation method, the TOPSIS method, which is a widely used MCDM method, was used. The results of the drought vulnerability assessment were applied to the administrative districts of Sigun-gu, Korea from March 2016 to September 2019. As a result of the evaluation, drought vulnerable areas were identified in Chungcheongbuk-do, Gyeongsangnam-do, and Jeollanam-do, and it was analyzed that it is necessary to establish drought response plans for these areas.