• Title/Summary/Keyword: Area of Vulnerability

Search Result 394, Processing Time 0.032 seconds

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Vulnerability Evaluation for Monitoring Wide Area Outage in Transmission Systems (송전 계통 감시 시스템을 위한 취약도 평가 방법 개발)

  • Kim, Jin-Hwan;Lim, Il-Hyung;Lee, Seung-Jae;Choi, Myeon-Song;Lim, Seong-Il;Kim, Sang-Tae;Jin, Bo-Gun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.3
    • /
    • pp.506-514
    • /
    • 2010
  • Defense systems are needed to prevent catastrophic failures of a power grid due to cascaded events. Cascaded events can be occurred by power flow overload. Especially, it is the most dangerous problem that overload line is outage, because it can make the power system face danger of cascaded. In this paper, vulnerability evaluation for monitoring wide are outage is proposed using by configuration information of transmission systems. This method of vulnerability evaluation is considered direct effect and indirect effect of power flow, especially overload. What is more, it can be used when the configuration of power system changes, as simple fault occurs or maintenance of facility. In the case studies, the estimation and simulation network have been testified and analysed in PSSE and C programming.

Developing a Nature Hazard Vulnerability Map of Yangyang and its Vicinity (양양의 자연재해 취약지 추정)

  • Myeong, Soo-Jeong;Hong, Hyun-Jung;Choi, Hyun-Il
    • Proceedings of the KSRS Conference
    • /
    • 2009.03a
    • /
    • pp.237-241
    • /
    • 2009
  • Yangyang Gangwon-do has begun the clearing of upland forested areas for development. This process has caused great damage from natural hazards such as landslides and flooding for many years. Moreover, proper hazard prevention strategies have not Yet been prepared. To provide useful information for developing hazard prevention strategies this study attempted to detect areas vulnerable to flooding in Yangyang using data such as topology, meteorology, history, land use, soil, hydrology, and society. It was found that roughly 30% of the study area was vulnerable to flooding. Also it was discovered that where the vulnerability index was high, there was increased amounts of flooding. The most vulnerable areas were where forests were cut and near livers. In addition, areas where frequent hazard events were reported had a high index of vulnerability. The results of this study will provide useful information in developing hazard prevention strategies.

  • PDF

An Analysis of the Damage Factor Vulnerability Using a Natural Disaster DB (자연재해 DB를 이용한 피해항목별 취약성 분석)

  • Park, Jong-Kil;Jung, Woo-Sik;Choi, Hyo-Jin
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.505-508
    • /
    • 2008
  • When it grasps a total property losses and relationship of damage factors, there is possibility of reducing the natural disaster damage which is a yearly repeated. Also, checking and supply to vulnerability should be presupposed. This study aims to find out a damage factor vulnerability using a natural disaster database by Park et al(2007). And added 2005 year data to database. Total 10 damage factors are deaths(person, including missing person) injury(person), victims(person), building(thousand), vessel(thousand), cultivated land(thousand), public facilities(thousand), others(thousand), total property losses(thousand). We analyzed of correlation analysis, ratio, population, area, regional character etc for damage factors.

  • PDF

A Study on Vulnerability Assessment and Prioritizing Sectors to Support Adaptation Strategy to Climate Change - Case Study of Gangwon Province - (기후변화 적응대책 수립 지원을 위한 취약성 평가 및 부문별 우선순위 선정 방안 연구 - 강원도 사례를 중심으로 -)

  • Oh, Suhyun;Lee, Woo-Kyun;Yoo, Seongjin;Byun, Jungyeon;Park, Sunmin;Kwak, Hanbin;Cui, Guishan;Kim, Moonil;Jung, Raesun;Nam, Kijun;Shin, Donghee
    • Journal of Climate Change Research
    • /
    • v.3 no.4
    • /
    • pp.245-257
    • /
    • 2012
  • Vulnerability assessment has been required for establish climate adaptation plan to prevent damage from climate change. In this study we assessed vulnerability with 1 km resolution and determined which sectors have the highest priority in each municipality of Gangwon province based on the result of vulnerability assessment. All sectors of vulnerability assessment are composed of three criteria; sensitivity, exposure and adaptation capacity. And suitable indicators of each sector were selected and spatial data set was prepared using GIS. Priority of vulnerability was classified with the degree of vulnerability in present and variation in vulnerability between present and future. The results of vulnerability assessment were different among municipalities due to the contribution of indicators. Present and future trends in vulnerability showed similar results but high vulnerable area was predicted to expand in the future. In addition increase in temperature led whole area to be more vulnerable generally. The result of prioritizing sectors of vulnerability indicated the most considerable sectors within a municipality. Also, the municipalities which have similar geographic, climatic and social conditions tended to be classified as the same priority class. The method of vulnerability assessment and determining priorities suggested in this study could be used to support decision makers to establish adaptation plan of local area.

Application of Flood Vulnerability Index for analyzing safety change of levee according to climate change (기후변화에 따른 제방의 안전성 영향 분석을 위한 제방홍수취약성지수의 적용)

  • Lee, Hoo Sang;Lee, Jae Joon
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.4
    • /
    • pp.293-299
    • /
    • 2018
  • In this study, a new technique for evaluating the flood vulnerability of river banks is proposed. For this purpose, flood quantities of the basin were estimated based on the future climate change scenarios and the infiltration stability was evaluated by analyzing the infiltration behavior using SEEP/W which is a 2D groundwater infiltration model of the levee. The size of the river levee was investigated. The size of river levee was investigated by selecting the target area. The safety factor of the levee was analyzed considering the current flood level of the levee and the flood level considering the climate change. The factor needed to analyze the levee vulnerability was derived. We analyzed the vulnerability of the levee considering the change of the levee level according to the climate change scenarios. Levee Flood Vulnerability Index (LFVI) were used to evaluate the vulnerability of the levee.

The Vulnerability Assessment of Hydro-pneumatic Suspension of Ground Combat Vehicles Using Vulnerable Area Method and DMEA (취약면적법과 DMEA를 활용한 지상전투차량 유공압 현가장치의 취약성 평가)

  • Nam, Myung Hoon;Park, Kang;Park, Woo Sung;Yoo, Chul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.2
    • /
    • pp.141-149
    • /
    • 2017
  • Vulnerability assesses the loss of major performance functions of GCV (Ground Combat Vehicles) when it is hit by enemy's shell. To decide the loss of major functions, it is determined what effects are on the performance of GCV when some components of GCV are failed. M&S (Modeling and Simulation) technology is used to vulnerability assessment. The hydro-pneumatic suspension is used as a sample part. The procedures of vulnerability assessment of the hydro-pneumatic suspension are shown as follows: 1) The components of the suspension are defined, and shot lines are generated evenly around the part. 2) The penetrated components are checked by using the penetration equation. 3) The function model of the suspension is designed by using IDEF0. 4) When the failure of the critical components of the suspension happens, its effect on the function of the suspension can be estimated using DMEA (Damage Mode and Effects Analysis). 5) The diagram of FTA (Fault Tree Analysis) is designed by exploiting DMEA. 6) The damage probability of the suspension is calculated by using FTA and vulnerable area method. In this paper, SLAP (Shot Line Analysis Program) which was developed based on COVART methodology. SLAP calculates the damage probability and visualizes the vulnerable areas of the suspension.

Assessing the Vulnerability of Network Topologies under Large-Scale Regional Failures

  • Peng, Wei;Li, Zimu;Liu, Yujing;Su, Jinshu
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.451-460
    • /
    • 2012
  • Natural disasters often lead to regional failures that can cause network nodes and links co-located in a large geographical area to fail. Novel approaches are required to assess the network vulnerability under such regional failures. In this paper, we investigate the vulnerability of networks by considering the geometric properties of regional failures and network nodes. To evaluate the criticality of node locations and determine the critical areas in a network, we propose the concept of ${\alpha}$-critical-distance with a given failure impact ratio ${\alpha}$, and we formulate two optimization problems based on the concept. By analyzing the geometric properties of the problems, we show that although finding critical nodes or links in a pure graph is a NP-complete problem, the problem of finding critical areas has polynomial time complexity. We propose two algorithms to deal with these problems and analyze their time complexities. Using real city-level Internet topology data, we conducted experiments to compute the ${\alpha}$-critical-distances for different networks. The computational results demonstrate the differences in vulnerability of different networks. The results also indicate that the critical area of a network can be estimated by limiting failure centers on the locations of network nodes. Additionally, we find that with the same impact ratio ${\alpha}$, the topologies examined have larger ${\alpha}$-critical-distances when the network performance is measured using the giant component size instead of the other two metrics. Similar results are obtained when the network performance is measured using the average two terminal reliability and the network efficiency, although computation of the former entails less time complexity than that of the latter.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

Quantitative Assessment of Coastal Groundwater Vulnerability to Seawater Intrusion using Density-dependent Groundwater Flow Model (분산형 해수침투 모델을 이용한 양적 지표 기반의 해안지하수 취약성 평가연구)

  • Chang, Sun Woo
    • Journal of Soil and Groundwater Environment
    • /
    • v.26 no.6
    • /
    • pp.95-105
    • /
    • 2021
  • Extensive groundwater abstraction has been recognized as one of the major challenges in management of coastal groundwater. The purpose of this study was to assess potential changes of groundwater distribution of northeastern Jeju Island over 10-year duration, where brackish water have been actively developed. To quantitatively estimate the coastal groundwater resources, numerical simulations using three-dimensional finite-difference density-dependent flow models were performed to describe spatial distribution of the groundwater in the aquifer under various pumping and recharge scenarios. The simulation results showed different spatial distribution of freshwater, brackish, and saline groundwater at varying seawater concentration from 10 to 90%. Volumetric analysis was also performed using three-dimensional concentration distribution of groundwater to calculate the volume of fresh, brackish, and saline groundwater below sea level. Based on the volumetric analysis, a quantitative analysis of future seawater intrusion vulnerability was performed using the volume-based vulnerability index adopted from the existing analytical approaches. The result showed that decrease in recharge can exacerbate vulnerability of coastal groundwater resources by inducing broader saline area as well as increasing brackish water volume of unconfined aquifers.