• Title/Summary/Keyword: 취약화

Search Result 1,448, Processing Time 0.031 seconds

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Seismic Vulnerability Analysis of River Levee by Earthquake Return Period (지진 재현주기에 따른 하천 제방의 지진취약성 분석)

  • Kim, Kyung-Oh;Han, Heui-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.679-686
    • /
    • 2020
  • In this study, the seismic vulnerability of public river levees was analyzed quantitatively. Input seismic waves were generated in Pohang seismic waves in return periods of 200, 500, 1000, and 2400 years. The behavior of the levee was analyzed by seismic vulnerability analysis according to the return period. The displacement that occurs during an earthquake showed the same tendency as the input seismic wave and was largest in the return period of 2400 years. An analysis of the sliding stability revealed a 31.5% and 26.7% decrease in the sliding safety factor for the return period of 2400 for the landside and waterside, respectively. An examination of liquefaction by the q/p' ratio showed that the seepage line inside the embankment rises due to earthquakes. As a result, in the case of a return period of 2400 years, most embankments generate liquefaction, making them vulnerable to earthquakes. Through this research, it will be necessary to re-establish domestic seismic-design standards and establish clear standards for the results through a dynamics method.

Assessment of Local Social Vulnerability in Facing Merapi Volcanic Hazard (메라피 화산재해에 대한 지역단위의 사회적 취약성 평가)

  • Lee, Sungsu;Maharani, Yohana Noradika;Yi, Waon-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.485-492
    • /
    • 2014
  • In regards to natural disasters, vulnerability analysis is a component of the disaster risk analysis with one of its objectives as a basis for planning priority setting activities. The volcano eruption raises many casualties and property in the surrounding area, especially when the volcano located in densely populated areas. Volcanic eruptions cannot be prevented, but the risk and vulnerability can be reduced which involve careful planning and preparations that anticipate a future crisis. The social vulnerability as social inequalities with those social factors can influence the susceptibility of various groups to harm and govern their ability to respond. This study carried out the methods of Social Vulnerability Index (SoVI) to measure the socially created vulnerability of the people living in Merapi proximal hamlets in Central Java, Indonesia that refers to the socioeconomic and demographic factors that affect the resilience of communities in order to describe and understand the social burdens of risk. Social vulnerability captured here, using a qualitative survey based-data such as interviews to local people with random ages and background to capture the answer vary, also interviews to stakeholders to help define social vulnerability variables. The paper concludes that by constructing the vulnerability index for the hamlets, the study reveals information about the distribution and causes of social vulnerability. The analysis using SoVI confirms that this method works well in ensuring that positive values indicating high social vulnerability and vice versa.

전력품질에 이해 및 전력장애에 따른 보호 기술①

  • 김병상
    • Electric Engineers Magazine
    • /
    • v.255 no.11
    • /
    • pp.43-47
    • /
    • 2003
  • 기존의 전력 품질에 대한 개념은 대부분의 전력기기들이 진공관식이나 Coil Type의 장비들로써 절연이 비교적 높아 별 악영향없이 사용되었으므로 그다지 어려운문제가 발생하지 않았다. 그러나 반도체 기기는 더욱 빨라지고 소형화되어 그 졀연 또한 매우 미세해져서 전력품질 문제에 더욱 취약해졌다.

  • PDF

An Experimental Study on Blasting Collapse Behavior of Asymmetry Structure with High Aspect Ratio (고종횡비 비대칭 구조물의 발파붕괴 거동에 관한 연구)

  • Song, Young-Suk;Jung, Min-Su;Jung, Dong-Wol;Hur, Won-Ho
    • Explosives and Blasting
    • /
    • v.31 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • In blasting demolition, a method would be chosen among many depends on shape and system of a structure and its surround. To demolish using explosives a structure, which is asymmetric and with high aspect ratio, pre-weakening, explosive locations, detonating delay, and surround conditions are needed to be considered in front to design blasting demolition plan. In this study, to over turn asymmetric and high aspect ratio structure in safe, a simulation using a software named Extreme Loadings for Structures, ELS, had performed. In results, it is achieved optimized pre-weakening shapes and locations, which prevent kick back motion of the structure when it collapse, by analyzing moment distribution caused by pre-weakening. And of structural collapse and by minimizing asymmetric structure's torsional moment. Also, after the demolition, simulation results are also compared with actual collapse behavior. In results, it is confirmed the accuracy of collapse behaviour simulation results, and in blasting demolition, kick back motion can be controled by adjusting pre-weakening shape and location, and the torsional moment of an asymmetric structure also can be solved by optimizing detonation locations and its time intervals.

Android-based mobile messenger application vulnerability analysis and secure coding method (안드로이드 기반 모바일 메신저 취약점 분석 및 시큐어 코딩 적용방안)

  • Paik, Chan Ho;Sun, Jong Min;Ryu, Ki Dong;Moon, Byeong Jong;Kim, Tae wan;Kim, Woo Je
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.83-87
    • /
    • 2014
  • 본 논문에서는 안드로이드 스마트폰 환경에서 높은 점유율을 가진 카카오톡 모바일 메신저 앱에 대하여 행정안전부가 고시한 Android-JAVA 시큐어 코딩가이드의 입력 데이터 검증 및 표현, API악용, 보안특성, 시간 및 상태, 에러처리, 코드 품질, 캡슐화 등 18가지 보안 취약점을 분석하고, 해당 취약점에 대한 시큐어 코딩 기법을 적용한다. 먼저 현재 상용화되고 있는 카카오톡 모바일 메신저 코드를 역공학(리버스엔지니어링)방법을 이용하여 코드단에서 소스를 분석한다. 실제 코드에서 시큐어 코딩이 안드로이드 스마트폰 환경에서 행정안전부가 고시한 Android-JAVA 시큐어 코딩가이드를 기준으로 취약한 부분을 찾고, 적용이 안 되어 있는 부분에 안드로이드 환경에 맞는 시큐어 코딩 기법을 적용한다.

  • PDF

Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment (의료 ICT융합 환경에서 안전한 사용자 관리를 위한 인증시스템 설계 및 구현: 중소형 의료기관을 중심으로)

  • Kim, Yanghoon;Choi, Yean Jung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • The convergence of traditional industry and ICT is a combination of security threats and vulnerabilities in ICT and specific industry-specific problems of existing industries, and new security threats and vulnerabilities are emerging. In particular, in the medical ICT convergence industry, various problems regarding user authentication are derived from the medical information system, which is being used for abuse and security weaknesses. According, this study designed and implemented a user authentication system for secure user management in medical ICT convergence environment. Specifically, we design and implement measures to solve the abuse and security weaknesses of ID sharing and to solve the inconvenience of individual ID / PW authentication by performing user authentication using personalized devices based on medical information systems.

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.

A Study on the Water Quality Variation Characteristics of Nakdong River Considering the Meteorological Effects (기상학적 영향을 고려한 낙동강 유역 수질변동특성 연구)

  • Jung, Woo Suk;Kim, Young Do
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.422-422
    • /
    • 2019
  • 최근 낙동강유역에서는 여름철 폭염 및 가뭄의 영향으로 조류대경보가 발령되고 있으며, 급격한 수질환경적 변화가 이루어지고 있다. 녹조중의 하나인 남조류가 만들어내는 마이크로시스틴은 직접 섭취하면 간 괴사까지 일으키는 독성물질로 알려져 있으며, 최근 4대강 녹조 발생 지역에 살고있는 어패류의 체내에 마이크로시스틴이 축적돼 이를 섭취하기만 해도 이차 독성이 나타나는 것으로 확인되었다. 특히 낙동강은 가뭄과 같은 기상학적 영향에 따른 수질환경적 변동특성이 뚜렷하여 수생태에 미치는 피해우려가 크며, 녹조발생에 취약한 유역이라 할 수 있다. 이는 기후변화에 따른 강우의 강도 및 편중으로 영양물질 유출의 증가와 표층 온도 상승과 함께 밀도류에 의해 성층이 심화되면서 표층에서의 극심한 녹조 발생이 이루어지는 것으로 설명할 수 있다. 따라서 본 연구에서는 연구대상지점으로 낙동강유역을 선정하여 물환경 빅데이터 구축을 통해 상세 유역현황을 파악하고 데이터마이닝 기법을 이용하여 녹조발생에 따른 수질환경적 변동특성 및 영향인자를 분석하고자 한다. 또한 가뭄에 따른 수질환경적 취약지역에 대한 선제적 관리방안을 도출하기 위해 지점별 취약성 평가방안을 제시하고자 한다.

  • PDF