• Title/Summary/Keyword: 취약지

Search Result 2,898, Processing Time 0.03 seconds

Development of Detailed Risk Information based on Risk Zoning for Preventing Urban Flooding (도시침수 예방대책 마련을 위한 상세 위험도 주제도 개발)

  • Kim, Mi-Eun;Kim, Seul-Ye;Lee, Sang-Eun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.123-123
    • /
    • 2017
  • 기후변화의 영향으로 개발밀도가 높은 도시지역은 호우로 인한 피해가 지속적으로 증가하고 있다. 최근, 극한 호우에 의해 발생되는 도시침수의 피해를 저감하기 위해 시설물 대책에만 의존하기 보다는 지자체가 수립하는 공간계획을 통해 토지이용, 건축물 등을 아우르는 종합적인 예방전략 마련이 강조되고 있다. 하지만 지자체 도시계획 담당자가 기후변화를 고려해 방재대책을 마련하는데는 국가 차원의 표준화된 방법론의 부재, 침수해석을 위한 전문적 지식이 요구되는 등의 한계가 있다. 본 연구에서는 지자체가 도시계획에 실효성 있는 방재대책을 마련하는데 직접적으로 활용할 수 있는 도시침수에 대한 상세 위험도 주제도를 개발하고자 한다. 이를 위해, 우선적으로 중장기적인 측면에서 기후변화의 영향과 도시지역의 유출 특성을 고려해 방재계획을 수립할 수 있는 강우 시나리오 기준으로 지속시간 1시간에 대한 재현빈도 30년과 100년을 제시하였다. 기후변화의 영향을 고려한 강우 시나리오 기준에 따라 도시지역 내 내수 외수의 침수발생 원인을 고려해 침수심 지도를 생성하고자 한다. 이를 위해 범용적으로 적용할 수 있는 침수해석 모형인 HEC-RAS와 SWMM을 선정하고, 공간적 제약이 없이 폭 넓게 적용할 수 있도록 모형의 구축 절차를 간소화한 방법을 제안하였다. 간소화된 침수해석 모형 결과를 토대로 강우 시나리오별 침수심 지도를 제작하고, 강우 시나리오와 침수심을 기준으로 위험정도에 따라 Red zone, Orange zone, Yellow zone, Green zone으로 영향권을 설정하였다. 실질적으로 각 영향권에 적합한 도시계획 차원에서의 방재대책 수립이 가능하도록 노출특성과 취약성 분석을 실시하였다. 노출특성은 영향권에 노출된 토지이용면적(m2)과 거주인구수(명)로 평가하고 취약성은 영향권 내 취약한 건축물 수(지하 또는 노후 건축물), 보호대상시설물 수로 평가하였다. 침수 발생이 예상되는 영향권별 노출특성과 취약성 분석 결과를 토대로 위험이 높은 지역(Red zone)은 공간규모를 축소해 상세 위험도 공간정보 주제도를 개발하였다. 또한 위험도가 높은 지역은 작은 공간 단위로 노출특성과 취약성을 분석해 상세 위험도 주제도를 개발하였다. 본 연구에서 개발한 상세 위험도 공간정보는 지자체가 도시계획 수립단계에서 실질적인 방재대책을 강구하는데 활용할 수 있을 것으로 기대한다.

  • PDF

An Assessment of Groundwater Contamination Vulnerability and Priority Areas for Groundwater Management Using GIS and Analytic Hierarchy Process (GIS 및 계층분석법을 이용한 지하수 오염 취약성 평가 및 관리 우선 대상 지역 평가)

  • LEE, Moung-Jin;HYUN, Yun-Jung;HWANG, Sang-Il
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.35-51
    • /
    • 2015
  • The purpose of this study is to improve the previous groundwater contamination vulnerability assessment method, apply it to the study area, and select priority areas for groundwater management based on the quantitative analysis of groundwater contamination vulnerability. For this purpose, first, the previous 'potential contamination' based on groundwater contamination vulnerability assessment method was upgraded to the methodology considering 'adaptation capacity' which reduced contamination. Second, the weight of groundwater contamination vulnerability assessment factors was calculated based on the analytical hierarchy process(AHP) and the result of survey targeting groundwater experts. Third, Gyeonggi-do was selected as the study area and the improved methodology and weight were implemented with GIS and actual groundwater contamination vulnerability assessment was carried out. Fourth, the priority area for groundwater contamination management was selected based on the quantitative groundwater contamination vulnerability assessment diagram. The improved detailed groundwater contamination vulnerability assessment factors in this study were a total of 15 factors, and 15 factors were analyzed as new and improved weight with higher 'adaptation capacity' than the assessment factor corresponding to the previous 'potential contamination' in the weight calculation result using AHP. Also, the result of groundwater contamination vulnerability assessment in Gyeonggi Province using GIS showed that Goyang and Gwangmyeong which were adjacent to Seoul had a high groundwater contamination vulnerability and Pocheon and Yangpyeong County had a relatively low groundwater contamination vulnerability. In this study, the previous groundwater contamination vulnerability assessment was improved and applied to study areas actually. The result of this study can be utilized both directly and indirectly for the groundwater management master plan at national and local government level in the future.

Vulnerability Assessment of Landslide by Heavy Rain to Establish Climate Change Adaptation Plan for Local Governments (지자체 기후변화 적응계획 수립지원을 위한 집중호우에 의한 산사태 취약성 평가)

  • Lee, Dong-kun;Kim, Ho Gul;Baek, Gyoung Hye;Seo, Changwan;Kim, Jaeuk;Song, Changkeun;Yu, Jeong Ah
    • Journal of Climate Change Research
    • /
    • v.3 no.1
    • /
    • pp.39-50
    • /
    • 2012
  • KMA(Korea Meteorological Administration) projected that annual mean temperatures of South Korea will rise $3.8^{\circ}C$ and the annual total precipitation will increase by 17 percent by 2100. Rainfall is concentrated during the summer in South Korea. Thus the risk of landslide by heavy rain is expected to increase. After the landslide of Mt. Umyeon occurred in July 2011, disaster of forest sector is highlighted. Therefore vulnerability assessment of landslide is urgent. However, vulnerability assessment based on local governments was not done yet. In this study, we assess vulnerability of landslide by heavy rain for local governments. We used several scenarios to consider uncertainty of climate change. Through this study, local governments can use the results to establish adaptation plans. Also, the results could be used to decrease vulnerability of landslide.

Vulnerability Analysis using the Web Vulnerability Scanner (Web Vulnerability Scanner를 이용한 취약성 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.71-76
    • /
    • 2012
  • As the use of Mashups, web3.0, JavaScript and AJAX(Asynchronous JavaScript XML) widely increases, the new security threats for web vulnerability also increases when the web application services are provided. In order to previously diagnose the vulnerability and prepare the threats, in this paper, the classification of security threats and requirements are presented, and the web vulnerability is analyzed for the domestic web sites using WVS(Web Vulnerability Scanner) automatic evaluation tool. From the results of vulnerability such as XSS(Cross Site Scripting) and SQL Injection, the total alerts are distributed from 0 to 31,177, mean of 411, and standard deviation of 2,563. The results also show that the web sites of 22.5% for total web sites has web vulnerability, and the previous defenses for the security threats are required.

Study of a Flood Vulnerability Assessment for Climate Change and Utilizing the Vulnerability-based Disaster Response in Jeju-do (기후변화에 따른 제주도의 홍수 취약성 평가 및 취약성 기반 소방 대응 활용 연구)

  • Lim, Chae-Hyun;Park, Yong-Yi
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.64-70
    • /
    • 2016
  • This study assessed the flood vulnerability of Jeju-do depending on climate change using VESTAP. The results showed that the flood vulnerability of Jeju-do in the future (2020s, 2030s and 2040s) will increase continuously compared to the present time (2010s). In particular, the flood vulnerability of Jeju-si is expected to be higher than Seogwipo-si prior to 2030s. Conversely, the flood vulnerability of Seogwipo-si is expected to be higher than Jeju-si after 2030. These analysis results confirmed the characteristics of flood vulnerability between Seogwipo-si and Jeju-si and the growth of flood vulnerability entirely within Jeju-do.

Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity (Khan 인증기법의 취약점 분석과 개선된 사용자 익명성 제공 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2013
  • In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper, we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.

Flood Vulnerability Analysis considering Gender Factors (젠더 특성을 고려한 홍수 취약성 분석)

  • Hwang, Nanhee;Chung, Gunhui
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.384-384
    • /
    • 2018
  • 최근 기상이변의 가속화로 인해 홍수피해는 더욱 증가되고 있으며, 도시화로 인해 불투수면적이 급격히 늘어남에 따라 기존 관개수로의 통수능력 부족으로 도시침수피해가 증가되고 있다. 재난 연감과 재해연보를 바탕으로 비교한 결과, 홍수를 비롯한 각종 재난 발생 시 일반적으로 남성들에 비해 여성들의 피해자 수가 많으며 피해의 정도는 상대적으로 심각하였다. 그러나 국내외적으로 홍수에 대한 피해를 줄이고자 홍수 취약성에 대한 많은 연구들이 수행되었지만 아직 젠더를 고려한 취약성 분석은 부족한 실정이다. 본 연구에서는 대상지역을 우리나라의 인구밀집도가 가장 높은 서울시 25개구로 선정하였고, 엔트로피 이론을 활용해 25개 구의 홍수 취약성 지수를 계산하였다. 홍수 취약성 지수 계산 시 고려요인으로는 여성인구비율, 고령화비율 및 인구밀도 등과 같은 사회적 요인과 연 홍수 피해액, 복구금액 등 경제적 요인 그리고 일일 최대 강수량 및 80mm 이상의 강수량, 홍수 피해 횟수 등과 같은 환경적 요인을 고려하였다. 그 결과 각각의 요인에 따라서 서울시 25개구의 홍수취약성 지수가 상이하게 나타나는 것을 확인할 수 있었다. 이를 통해 취약성지수가 높은 자치구들의 경우 지역특성을 고려한 별도의 홍수대책 가이드라인이 필요 할 것으로 판단된다. 본 연구의 결과물을 바탕으로 향후 홍수 대책이나, 홍수대비 관련 정책을 수립할 정부 및 지자체에서 사회, 경제, 환경적 요인을 고려한 합리적인 정책 수립 결정에 도움이 될 것으로 판단된다.

  • PDF

Implementing a Fuzzing Agent to Dectect Buffer Overflow Vulnerability (버퍼 오버플로우 취약점 탐지를 위한 퍼징 에이전트 구현)

  • Kim, Bong-Han
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.11-17
    • /
    • 2021
  • If a vulnerability in the software connected to the network to obtain the user's privilege, a remote attacker could gain the privilege to use the computer. In addition, in a user environment in which an operating system for a specific series is used a lot, if a problem occurs in the operating system, considerable damage can occur. In particular, If an error is a security vulnerability, it can be a very big problem. Various studies have been conducted to find and respond to vulnerabilities in such a situation. Among various security technologies, the fuzzing technology is one of the most effective technologies to find errors in software. In this paper, I designed and implemented a fuzzing agent that can detect buffer overflow vulnerabilities that can occur in various applications. Through this fuzzing agent, application developers will be able to realize a more secure computing environment in which they can discover and fix vulnerabilities in their own applications.

A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System (상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구)

  • Euom, Ieck-Chae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.35-44
    • /
    • 2019
  • The purpose of this study is to find out quantitative vulnerability assessment about COTS(Commercial Off The Shelf) O/S based I&C System. This paper analyzed vulnerability's lifecycle and it's impact. this paper is to develop a quantitative assessment of overall cyber security risks and vulnerabilities I&C System by studying the vulnerability analysis and prediction method. The probabilistic vulnerability assessment method proposed in this study suggests a modeling method that enables setting priority of patches, threshold setting of vulnerable size, and attack path in a commercial OS-based measurement control system that is difficult to patch an immediate vulnerability.

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.