• Title/Summary/Keyword: Attack risk assessment

Search Result 33, Processing Time 0.026 seconds

Risk-based Security Impact Evaluation of Bridges for Terrorism (Security and Risk를 기반으로 한 교량구조물의 재난 안전성 평가)

  • Kang, Sang-Hyeok;Choi, Hyun-Ho;Seo, Jong-Won
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.629-632
    • /
    • 2008
  • Risk-based security impact evaluation may be affected by various factors according to numerous combinations of explosive devices, cutting devices, impact vehicles, and specific attack location to consider. Presently, in planning and design phases, designers are still often uncertain of their responsibility, lack of information and training of security. Therefore, designers are still failing to exploit the potential to reduce threats on site. In this study, the concept of security impact assessment is introduced in order to derive the performing design for safety in design phase. For this purpose, a framework for security impact assessment model using risk-based approach for bridge structures is suggested. The suggested model includes of information survey, classification of terror threats, and quantitative estimation of severity and occurrence.

  • PDF

Cyber Threat and Vulnerability Analysis-based Risk Assessment for Smart Ship

  • Jeoungkyu Lim;Yunja Yoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.3
    • /
    • pp.263-274
    • /
    • 2024
  • The digitization of ship environments has increased the risk of cyberattacks on ships. The smartization and automation of ships are also likely to result in cyber threats. The International Maritime Organization (IMO) has discussed the establishment of regulations at the autonomous level and has revised existing agreements by dividing autonomous ships into four stages, where stages 1 and 2 are for sailors who are boarding ships while stages 3 and 4 are for those not boarding ships. In this study, the level of a smart ship was classified into LEVELs (LVs) 1 to 3 based on the autonomous levels specified by the IMO. Furthermore, a risk assessment for smart ships at various LVs in different risk scenarios was conducted The cyber threats and vulnerabilities of smart ships were analyzed by dividing them into administrative, physical, and technical security; and mitigation measures for each security area were derived. A total of 22 cyber threats were identified for the cyber asset (target system). We inferred that the higher the level of a smart ship, the greater the hyper connectivity and the remote access to operational technology systems; consequently, the greater the attack surface. Therefore, it is necessary to apply mitigation measures using technical security controls in environments with high-level smart ships.

Attack Rate of Active Pulmonary Tuberculosis among Dusty Workers who Were Diagnosed with Pneumoconiosis in Korea (진폐환자에서 활동성 폐결핵 발병률)

  • Hwang, Joo Hwan
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.29 no.4
    • /
    • pp.582-589
    • /
    • 2019
  • Objectives: Although active pulmonary tuberculosis(active PTB) is manifested as one of the complications of pneumoconiosis, attacks of active PTB among patients with pneumoconiosis is still unexplored. The objective of the present study was to identify the attack rate of active PTB among workers in dusty environments who were diagnosed with pneumoconiosis. Methods: The study was performed using the results of the Pneumoconiosis Examination Council's assessment from the Korea Workers' Compensation and Welfare Service(KCOMWEL) database between January 1, 1984 and December 31, 2017. Pneumoconiosis was defined as Category 1 or more in the radiological findings of pneumoconiosis. Active PTB was defined as a positive result for active PTB in the results of the Pneumoconiosis Examination Council's assessment. Results: A total of 37,946 workers in dusty environments who received a health examination for diagnosing pneumoconiosis between January 1, 1984 and December 31, 2017 were selected as study subjects. The attack rate of active TB among subjects who were diagnosed with pneumoconiosis and those who were diagnosed without pneumoconiosis were 8.5% and 1.4%, respectively. In the multivariate logistic analysis including age, sex, radiological findings, complications, male[odds ratio(OR), 2.0; 95% confidence interval(CI), 1.4-3.1] and pneumoconiosis(OR, 6.5; 95% CI, 5.7-7.4) were associated with an increased risk of developing active PTB. Conclusions: The present study determined that dusty workers who were diagnosed with pneumoconiosis had a high rate of active PTB compared to TB patients and patients who were diagnosed with silicosis. Therefore, in addition to silicosis, it is necessary to include pneumoconiosis among the high-risk groups for TB.

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.

An investigation of the relationship between cutaneous allodynia and kinesiophobia, gastrointestinal system symptom severity, physical activity and disability in individuals with migraine

  • Hafize Altay;Seyda Toprak Celenay
    • The Korean Journal of Pain
    • /
    • v.36 no.1
    • /
    • pp.137-246
    • /
    • 2023
  • Background: To investigate the relationship between cutaneous allodynia (CA) and kinesiophobia, gastrointestinal system (GIS) symptom severity, physical activity, and disability, and to determine whether CA, pain, and disability were influencing factors for kinesiophobia, GIS symptoms, and physical activity in individuals with migraine. Methods: The study included 144 individuals with migraine. CA, kinesiophobia, GIS symptoms, physical activity level, and migraine-related disability were evaluated with the Allodynia Symptom Checklist, the Tampa Kinesiophobia Scale (TKS), the Gastrointestinal Symptom Rating Scale (GSRS), the International Physical Activity Questionnaire-7, and the Migraine Disability Assessment Scale (MIDAS), respectively. Results: The CA severity was only associated with TKS (r = 0.515; P < 0.001), GSRS-total (r = 0.336; P < 0.001), GSRS-abdominal pain (r = 0.323; P < 0.001), GSRS-indigestion (r = 0.257; P = 0.002), GSRS-constipation (r = 0.371; P < 0.001), and MIDAS scores (r = 0.178; P = 0.033). Attack frequency (P = 0.015), attack duration (P = 0.035) and presence of CA (P < 0.001) were risk factors for kinesiophobia. Attack frequency (P = 0.027) and presence of CA (P = 0.004) were risk factors for GIS symptoms. Conclusions: There was a relationship between the CA and kinesiophobia, GIS symptoms, and disability. CA and attack frequency were found to be risk factors for kinesiophobia and GIS symptoms. Migraine patients with CA should be assessed in terms of kinesiophobia, GIS, and disability. Lifestyle changes such as exercise and dietary changes and/or pharmacological treatment options for CA may increase success in migraine management.

High-Resolusion Magnetic Resonance Imaging of Carotid Atherosclerotic Plaque (경동맥 죽상경화반의 고해상도 자기공명영상)

  • Byun, Woo-Mok;Cho, Jae-Ho
    • Journal of Yeungnam Medical Science
    • /
    • v.21 no.2
    • /
    • pp.143-150
    • /
    • 2004
  • A thromboembolic stroke is believed to be precipitated by a rupture of vulnerable atheromatous plaques. Until recently the assessment of a further risk of stroke in high-risk patients in whom atherosclerosis has presented with a transient ischaemic attack (TIA), has been confined to a quantitative assessment of the luminal patency of the internal carotid artery. These traditional stratification parameters are no longer believed to be the most accurate predictors of a thrombo-embolism. This is because the process of vessel wall remodeling can maintain a luminal patency, and consequently, quite large friable plaques may remain unidentified. Accordingly, there is a need for an improved risk assessment. The fibrous cap of a vulnerable plaque is thinner, and an intraplaque hemorrhage and inflammation can occur during the development of atherosclerotic plaque. Several imaging methods for identifying vulnerable plaques have been developed. Recently, high resolution magnetic resonance (MR) imaging has emerged as an accurate non-invasive tool that can characterize the carotid plaque components in vivo. A High resolution carotid magnetic resonance is capable of distinguishing an intact, thick fibrous cap from a thin and ruptured cap in carotid plaque. In addition, a plaque MR can identify the active inflammation and detect a hemorrhage. High resolution carotid MR imaging is a valuable noninvasive method for quantifying the plaque components and identifying vulnerable plaque.

  • PDF

A Study on the Assessment of Critical Assets Considering the Dependence of Defense Mission (국방 임무 종속성을 고려한 핵심 자산 도출 방안 연구)

  • Kim Joon Seok;Euom Ieck Chae
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.189-200
    • /
    • 2024
  • In recent years, the development of defense technology has become digital with the introduction of advanced assets such as drones equipped with artificial intelligence. These assets are integrated with modern information technologies such as industrial IoT, artificial intelligence, and cloud computing to promote innovation in the defense domain. However, the convergence of the technology is increasing the possibility of transfer of cyber threats, which is emerging as a problem of increasing the vulnerability of defense assets. While the current cybersecurity methodologies focus on the vulnerability of a single asset, interworking of various military assets is necessary to perform the mission. Therefore, this paper recognizes these problems and presents a mission-based asset management and evaluation methodology. It aims to strengthen cyber security in the defense sector by identifying assets that are important for mission execution and analyzing vulnerabilities in terms of cyber security. In this paper, we propose a method of classifying mission dependencies through linkage analysis between functions and assets to perform a mission, and identifying and classifying assets that affect the mission. In addition, a case study of identifying key assets was conducted through an attack scenario.

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Lee, Cheol-Kwon;Kwon, Kee-Choon;Lee, Dong-Young
    • Nuclear Engineering and Technology
    • /
    • v.44 no.8
    • /
    • pp.919-928
    • /
    • 2012
  • The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the lifecycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

Assessing Vulnerability and Risk of Sensor Networks under Node Compromise (Node Compromise에 대한 무선 센서 네트워크의 취약성 및 위험 평가)

  • Park, Jong-Sou;Suh, Yoon-Kyung;Lee, Seul-Ki;Lee, Jang-Se;Kim, Dong-Seong
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.51-60
    • /
    • 2007
  • It is important to assess vulnerability of network and information system to countermeasure against a variety of attack in effective and efficient way. But vulnerability and risk assessment methodology for network and information systems could not be directly applied to sensor networks because sensor networks have different properties compared to traditional network and information system. This paper proposes a vulnerability assessment framework for cluster based sensor networks. The vulnerability assessment for sensor networks is presented. Finally, the case study in cluster based sensor networks is described to show possibility of the framework.

  • PDF