• Title/Summary/Keyword: 취약지 분석

Search Result 1,623, Processing Time 0.027 seconds

Vulnerability Analysis on Fire Service Zone using Map Overlay Method in GIS (GIS 기반 중첩기법을 이용한 소방서비스 취약지역 분석)

  • Lee, Seul-Ji;Lee, Ji-Yeong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.1
    • /
    • pp.91-100
    • /
    • 2011
  • Fire stations should be located in optimal location to act quickly in case of emergency and minimize damages as a public facility that protects life and property of local residents. Siting fire stations without regard for the accessibility and occurrence factors of an accident may provide fire service unequally. Therefore service analysis is necessary to reduce the blind spot of disaster and safety and to offer equal fire-service at this time. Especially fire stations can service more efficiently than before by reducing a more likely vulnerable area. This study suggests methods of mapping index of value that represents vulnerability of the occurrence of an accident and extracting service zone map of fire stations, as an initial research for offering efficient fire service. Geographical distribution mismatch between service zone map and vulnerability map is figured out and vulnerable area for fire service is defined by using map overlay method.

Evaluation of Flood Vulnerability in Taehwa River Basin Using Flood Factors (홍수 인자를 활용한 태화강 유역 홍수 취약성 평가)

  • Kim, Min Kuk;Seol, Myung Sue;Park, Jun Sue;Lee, Jae Yung;Lee, Chung Dae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.390-390
    • /
    • 2020
  • 자연재해 중 홍수의 경우 단기간에 발생하며, 큰 인명 및 금전적 피해를 가져오는 재해이다. 1970년~2017년 국내 홍수 피해 분석결과 사상자(총 8,152명)는 점차 줄어드는 추세를 보이지만, 반대로 피해액(총 17조5,000억원)은 증가하는 것으로 나타났다(wamis, 국가수자원관리종합정보시스템). 이러한 국내 홍수 피해를 최소화하기 위해서는 각 유역 또는 지역별 특성을 고려한 홍수 취약성 평가가 필요하다. 홍수 취약성은 대상 지역의 기상, 지형, 인문학적 상황에 따라 상이하게 나타나며, 홍수 취약성을 평가하는 인자의 선정 또한 매우 중요하다. 따라서 본 연구에서는 홍수 피해 자료와 홍수 인자간의 인과관계를 분석하여 홍수 취약성 지표 선정 및 취약성 평가를 실시하였다. 홍수 취약성 평가를 위해 홍수 피해 자료와 대상 인자간의 상관성 분석을 통해 상관계수 값이 상대적으로 높게 나온 인자를 선정하였다. 대상 인자는 크게 기상학적 인자, 지형학적 인자, 사회·인문학적 인자로 구분하였다 선정된 인자 간 서로 높은 상관성을 보일 시 공선성이 존재함을 의미하며, 이러한 공선성을 방지하기 위해 VIF (Variance Inflation Factor, 분산팽창계수)를 통한 공선성 검토를 적용하였다. 또한 각 인자 간 에는 서로 다른 단위 및 범위를 가진다. 이러한 경우 특정 인자들의 증감을 취약성 평가에 반영하기에 어려움이 있으며, 유역별 평가 시 신뢰성이 낮아진다. 따라서 Re-scaling 방법을 통해 각 인자의 단위 및 범위를 표준화 후 동일가중치 법을 적용하였다. 본 연구에서는 전체 유역 중 홍수피해가 가장 크게 발생하는 낙동강 태화강 유역을 연구 대상 지역으로 선정하였다. 태화강은 도심지의 중심부를 흐르는 하천이며, 산지의 고도가 높은 지형적 특성을 가지고 있어 홍수에 대한 취약성이 높은 것으로 나타났다(wamis, 국가수자원관리종합정보시스템). 태화강 유역 홍수 취약성 평가결과 유역별 기상, 지형, 인문학적 특성에 따라 홍수 취약성이 높게 나타나는 결과를 보였다. 이와 같은 결과는 유역 내 도심지 비율, 인구밀도, 토지피복 특성에 의한 것으로 주로 지형학적 인자로 인해 취약성이 높게 나타났다. 본 연구에서 활용한 홍수 취약성 평가 방법은 향후 홍수피해 대책 수립에 사용될 수 있을 것으로 판단된다.

  • PDF

Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity (Khan 인증기법의 취약점 분석과 개선된 사용자 익명성 제공 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2013
  • In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper, we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.

Flood Vulnerability Analysis considering Gender Factors (젠더 특성을 고려한 홍수 취약성 분석)

  • Hwang, Nanhee;Chung, Gunhui
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.384-384
    • /
    • 2018
  • 최근 기상이변의 가속화로 인해 홍수피해는 더욱 증가되고 있으며, 도시화로 인해 불투수면적이 급격히 늘어남에 따라 기존 관개수로의 통수능력 부족으로 도시침수피해가 증가되고 있다. 재난 연감과 재해연보를 바탕으로 비교한 결과, 홍수를 비롯한 각종 재난 발생 시 일반적으로 남성들에 비해 여성들의 피해자 수가 많으며 피해의 정도는 상대적으로 심각하였다. 그러나 국내외적으로 홍수에 대한 피해를 줄이고자 홍수 취약성에 대한 많은 연구들이 수행되었지만 아직 젠더를 고려한 취약성 분석은 부족한 실정이다. 본 연구에서는 대상지역을 우리나라의 인구밀집도가 가장 높은 서울시 25개구로 선정하였고, 엔트로피 이론을 활용해 25개 구의 홍수 취약성 지수를 계산하였다. 홍수 취약성 지수 계산 시 고려요인으로는 여성인구비율, 고령화비율 및 인구밀도 등과 같은 사회적 요인과 연 홍수 피해액, 복구금액 등 경제적 요인 그리고 일일 최대 강수량 및 80mm 이상의 강수량, 홍수 피해 횟수 등과 같은 환경적 요인을 고려하였다. 그 결과 각각의 요인에 따라서 서울시 25개구의 홍수취약성 지수가 상이하게 나타나는 것을 확인할 수 있었다. 이를 통해 취약성지수가 높은 자치구들의 경우 지역특성을 고려한 별도의 홍수대책 가이드라인이 필요 할 것으로 판단된다. 본 연구의 결과물을 바탕으로 향후 홍수 대책이나, 홍수대비 관련 정책을 수립할 정부 및 지자체에서 사회, 경제, 환경적 요인을 고려한 합리적인 정책 수립 결정에 도움이 될 것으로 판단된다.

  • PDF

A Vulnerability Analysis for Armored Fighting Vehicle based on SES/MB Framework using Importance of Component (구성 부품의 중요도를 활용한 SES/MB 프레임워크 기반 전차 취약성 분석)

  • Kim, Hun-Ki;Hwang, Hun-Gyu;Lee, Jang-Se
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.59-68
    • /
    • 2015
  • In this paper, we proposed a methodology of vulnerability analysis for armored fighting vehicle based on modeling and simulation. The SES/MB framework serves hierarchical representation of the structure for a complex systems and is easy to conduct modeling for the armored fighting vehicle which consists of various components. When the armored fighting vehicle is hit by the shots from threat, the vulnerability of the armored fighting vehicle is decreased by damaged or penetrated level of armors and components. The penetration is determined by the result of comparing a penetration energy through penetration analysis equation and defence ability of armor and components. And the defence ability is determined in accordance with type and defined property of normal component and armor component, all components have a weighted values for the degree of importance. We developed a simulation program for verification proposed methodology. Thus, the program analyzes vulnerability for armored fighting vehicle SES/MB framework using importance.

An Effective Technique for Detecting Vulnerabilities in Android Device Drivers (안드로이드 장치 드라이버에 대한 효과적 취약점 탐지 기법)

  • Chung, Youngki;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1179-1187
    • /
    • 2016
  • Android- and Linux-based embedded systems require device drivers, which are structured and built in kernel functions. However, device driver software (firmware) provided by various 3rd parties is not usually checked in terms of their security requirements but is simply included in the final products, that is, Android-based smart phones. In addition, static analysis, which is generally used to detect vulnerabilities, may result in extra cost to detect critical security issues such as privilege escalation due to its large proportion of false positive results. In this paper, we propose and evaluate an effective technique to detect vulnerabilities in Android device drivers using both static and dynamic analyses.

Flood vulnerability analysis in Seoul, Korea (한국 도심지에서의 홍수취약성 분석)

  • Hwang, Nanhee;Park, Heeseong;Chung, Gunhui
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.10
    • /
    • pp.729-742
    • /
    • 2019
  • Natural disasters such as floods has been increased in many parts of the world, also Korea is no exception. The biggest part of natural damage in South Korea was caused by the flooding during the rainy season in every summer. The existing flood vulnerability analysis cannot explain the reality because of the repeated changes in topography. Therefore, it is necessary to calculate a new flood vulnerability index in accordance with the changed terrain and socio-economic environment. The priority of the investment for the flood prevention and mitigation has to be determined using the new flood vulnerability index. Total 25 urban districts in Seoul were selected as the study area. Flood vulnerability factors were developed using Pressure-State-Response (PSR) structures. The Pressure Index (PI) includes nine factors such as population density and number of vehicles, and so on. Four factors such as damage of public facilities, etc. for the Status Index (SI) were selected. Finally, seven factors for Response Index (RI) were selected such as the number of evacuation facilities and financial independence, etc. The weights of factors were calculated using AHP method and Fuzzy AHP to implement the uncertainties in the decision making process. As a result, PI and RI were changed, but the ranks in PI and RI were not be changed significantly. However, SI were changed significanlty in terms of the weight method. Flood vulnerability index using Fuzzy AHP shows less vulnerability index in Southern part of Han river. This would be the reason that cost of flood mitigation, number of government workers and Financial self-reliance are high.

Cost Based Vulnerability Control Method Using Static Analysis Tool (정적 분석 툴을 이용한 비용 기반의 취약점 처리 방안)

  • Lee, Ki Hyun;Kim, Seok Mo;Park, Young B.;Park, Je Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • When, Software is developed, Applying development methods considering security, it is generated the problem of additional cost. These additional costs are caused not consider security in many developing organization. Even though, proceeding the developments, considering security, lack of ways to get the cost of handling the vulnerability throughput within the given cost. In this paper, propose a method for calculating the vulnerability throughput for using a security vulnerability processed cost-effectively. In the proposed method focuses on the implementation phase of the software development phase, leveraging static analysis tools to find security vulnerabilities in CWE TOP25. The found vulnerabilities are define risk, transaction costs, risk costs and defines the processing priority. utilizing the information in the CWE, Calculating a consumed cost in a detected vulnerability processed through a defined priority, and controls the vulnerability throughput in the input cost. When applying the method, it is expected to handle the maximum risk of vulnerability in the input cost.

Landslide Susceptibility Mapping Using Ensemble FR and LR models at the Inje Area, Korea (FR과 LR 앙상블 모형을 이용한 산사태 취약성 지도 제작 및 검증)

  • Kim, Jin Soo;Park, So Young
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.25 no.1
    • /
    • pp.19-27
    • /
    • 2017
  • This research was aimed to analyze landslide susceptibility and compare the prediction accuracy using ensemble frequency ratio (FR) and logistic regression at the Inje area, Korea. The landslide locations were identified with the before and after aerial photographs of landslide occurrence that were randomly selected for training (70%) and validation (30%). The total twelve landslide-related factors were elevation, slope, aspect, distance to drainage, topographic wetness index, stream power index, soil texture, soil sickness, timber age, timber diameter, timber density, and timber type. The spatial relationship between landslide occurrence and landslide-related factors was analyzed using FR and ensemble model. The produced LSI maps were validated and compared using relative operating characteristics (ROC) curve. The prediction accuracy of produced ensemble LSI map was about 2% higher than FR LSI map. The LSI map produced in this research could be used to establish land use planning and mitigate the damages caused by disaster.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.