• Title/Summary/Keyword: 취약지 분석

Search Result 1,623, Processing Time 0.027 seconds

A Study on the Development of Fire Safety Index (소방안전지수 개발에 관한 연구)

  • Kim, Seong-Gon;Kim, Jung-Gon;Kim, Tae-Hwan
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.379-380
    • /
    • 2022
  • 사회발전으로 도시화가 진행됨에 따라 화재발생 및 피해 특성은 물론 소방 환경도 같은 지자체 내에서 지역적 차이가 발생하고 있다. 따라서 한정된 소방자원을 활용하여 화재에 효율적으로 대응하기 위해서는 소방 환경에 대한 면밀한 분석을 통해 정책적으로 접근할 필요가 있다. 본 연구에서는 서울을 대상으로 다양한 소방 환경을 종합적으로 비교분석할 수 있는 소방안전지수를 개발한다. 개발된 소방안전지수는 소방환경의 취약지역을 효율적로 파악하고 대책마련을 위한 정책결정에 활용될 수 있다.

  • PDF

Mediating Effects of Psychological Weakness between the Soldiers Internet Addiction and Their Military Adjustment (군 병사들의 입대 전 인터넷 중독과 군 생활 적응의 관계에서 심리적 취약성의 매개효과)

  • Han, In-Young;Koo, Seung-Shin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.314-322
    • /
    • 2012
  • The purpose of the study is to examine the mediating effects of psychological weakness between the soldiers internet addiction and their adjustments in the military. 486 soldiers in Kangwon-province and Kyonggi-province participated in the survey thru convenient sampling. For the study, the correlation analysis and the multiple regression were conducted. The results are as follows: First, correlations among the soldiers internet addiction, psychological weakness, solitude, lack of control, lack of efficacy, and military adjustments were found significant. Secondly, psychological weakness was verified as mediating effects in the relationship between the soldiers internet addiction and military adjustments. The study indicates mental health services for soldiers with internet addiction.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

Analysis of 'Digital Divide' Research Trends in Library and Information Science (문헌정보학 분야 정보격차 연구동향 분석)

  • Kang, In-Seo;Kim, Hea-Jin
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.333-352
    • /
    • 2020
  • This study aimed to analyze research trends of 'digital divide' in Library and Information Science. To this end, we coded research subjects with 11 subcategories, and research objectives with 4 subcategories, and research methods with 4 subcategories, and constructed keyword networks to which a pathfinder algorithm was applied. As a result of the analysis, 79.5% of studies are on the disabled, multicultural families, and the elderly among information vulnerable groups, and it was found to be concentrated in specific groups. In addition, digital divide related studies have been actively conducted for the purpose of resolving information vulnerabilities such as people with disabilities. We also found that these studies focused on verifying the effectiveness by designing and applying treatments such as informatization education, information utilization, and reading programs. Lastly, the most frequently used research method in the digital divide was found to use case studies or questionnaires simultaneously with literature research.

An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment (가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크)

  • Yang, Jin-Seok;Chung, Tai-Myoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2014
  • In this paper, we propose an efficient agent framework for host-based vulnerability assessment system by analyzing the operational concept of traditional vulnerability assessment framework and proposed vulnerability assessment agent framework in virtualization environment. A proposed agent framework have concept by using the features of virtualization technology, it copy and execute checking agent in targeted virtual machines. In order to embody a propose agent framework, we design function block of checking agent and describe a vulnerability checking scenario of proposed agent framework. Also we develop pilot system for vulnerability checking scenario. We improve the shortcomings of the traditional vulnerability assessment system, such as unnecessary system load of the agent, inefficiency due to duplication agent installation. Moreover, the proposed agent framework is maximizing the scalability of the system because there is no agent installation when adding a targeted system.

Web Application Attack Prevention by Traffic Analysis (트래픽 분석에 의한 웹 어플리케이션 공격 방지)

  • Chang, Moon-Soo;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.139-146
    • /
    • 2008
  • Despite of information security installation, leakage of personal information in web services has not decreased. This is because traffics to web applications are still vulnerable by permitting external sources to access services in port HTTF 80 and HTTPS 443, even with firewall systems in place. This thesis analyzes various attack patterns resulted from web service environment and vulnerable traffic and categorizes the traffics into normal and abnormal traffics. Also this proposes ways to analyze web application attack patterns from those abnormal traffics based on weak points warned in OWASF(Open Web Application Security Project), design a system capable of detect and isolate attacks in real time, and increase efficiency of preventing attacks.

  • PDF

A Study on Artifact Grouping by Analyzing Artifact Case by Vulnerability : Using Adobe Flash Player Vulnerabilities (취약점 별 아티팩트 사례 분석을 통한 아티팩트 그룹핑 연구 : 어도비 플래시 플레이어 취약점을 이용하여)

  • Song, ByungKwan;Kim, SeonKwang;Kwon, EunJin;Jin, SeungTaek;Kim, JongHyuk;Kim, HyeongCheol;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.87-95
    • /
    • 2019
  • The damage is increasing due to many encroachment accidents caused by increasingly sophisticated cyber attacks. Many institutions and businesses lack early response to invest a lot of resources in the infrastructure for incident detection. The initial response of an intrusion is to identify the route of attack, and many cyber attacks are targeted at software vulnerabilities. Therefore, analyzing the artifacts of a Windows system against software vulnerabilities and classifying the analyzed data can be utilized for rapid initial response. Therefore, the remaining artifacts upon entry of attacks by software are classified, and artifact grouping is presented for use in analysis of encroachment accidents.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석연구

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Myung-Joo
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.72-77
    • /
    • 2009
  • 가상화 기술은 클라우드 컴퓨팅의 핵심 기술로서 서버 및 스토리지, 하드웨어 등을 분리된 시스템이 아닌 하나의 자원 영역으로 간주하여 자원을 필요에 따라 할당할 수 있다. 클라우드 컴퓨팅 환경에서는 가상화 기술을 통해 자원을 통합하여 활용을 극대화하고, 운영비용 절감 및 공간절약의 효과를 얻을 수 있다. 그러나 가상화 가술을 제공하는 가상화 소프트웨어의 경우, 소프트웨어 자체에서 발생할 수 있는 보안 취약점이 존재하게 되고, 이를 이용한 보안 위협 요소는 가상화 환경 기반의 클라우드 컴퓨팅 서비스의 신뢰도를 저하시킬 수 있다. 본 논문에서는 가상머신(VM : Virtual Machine)이 갖는 취약점 분석을 통하여 가상화 환경에서 발생 가능한 보안 위협을 정의하고, 분석 결과를 기반으로 클라우드 컴퓨팅의 가상화 환경에서 고려해야할 보안 문제 및 대응 방안을 기술한다.

Analysis for Weak Keys of the Block Cipher SEED-192 (블록암호 SEED-192에 대한 취약키 분석)

  • Kim, Jong-Sung;Cho, Ki-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.69-75
    • /
    • 2011
  • In this paper, we analyze the key schedule of the block cipher SEED-192. According to the result of this paper, there exist weak keys in 16 out of 20 rounds of SEED-192 against the related-key rectangle/boomerang attack. This is the first cryptanalytic result for the key schedule of SEED-192.