• Title/Summary/Keyword: CWSS

Search Result 9, Processing Time 0.022 seconds

The changes of nociception and the signal molecules expression in the dorsal root ganglia and the spinal cord after cold water swimming stress in mice

  • Feng, Jing-Hui;Sim, Su-Min;Park, Jung-Seok;Hong, Jae-Seung;Suh, Hong-Won
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.25 no.3
    • /
    • pp.207-216
    • /
    • 2021
  • Several studies have previously reported that exposure to stress provokes behavioral changes, including antinociception, in rodents. In the present study, we studied the effect of acute cold-water (4℃) swimming stress (CWSS) on nociception and the possible changes in several signal molecules in male ICR mice. Here, we show that 3 min of CWSS was sufficient to produce antinociception in tail-flick, hot-plate, von-Frey, writhing, and formalin-induced pain models. Significantly, CWSS strongly reduced nociceptive behavior in the first phase, but not in the second phase, of the formalin-induced pain model. We further examined some signal molecules' expressions in the dorsal root ganglia (DRG) and spinal cord to delineate the possible molecular mechanism involved in the antinociceptive effect under CWSS. CWSS reduced p-ERK, p-AMPKα1, p-AMPKα2, p-Tyk2, and p-STAT3 expression both in the spinal cord and DRG. However, the phosphorylation of mTOR was activated after CWSS in the spinal cord and DRG. Moreover, p-JNK and p-CREB activation were significantly increased by CWSS in the spinal cord, whereas CWSS alleviated JNK and CREB phosphorylation levels in DRG. Our results suggest that the antinociception induced by CWSS may be mediated by several molecules, such as ERK, JNK, CREB, AMPKα1, AMPKα2, mTOR, Tyk2, and STAT3 located in the spinal cord and DRG.

Quantitative Scoring System on the Importance of Software Vulnerabilities (보안취약점 중요도 정량 평가 체계 연구)

  • Ahn, Joonseon;Chang, Byeong-Mo;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.921-932
    • /
    • 2015
  • We proposed a new scoring system on software vulnerabilities, which calculates quantitatively the severity of software vulnerabilities. The proposed scoring system consists of metrics for vulnerability severity and scoring equations; the metrics are designed to measure the severity of a software vulnerability considering the prevalence of the vulnerability, the risk level of the vulnerability, the domestic market share of the software and the frequency of the software. We applied the proposed scoring system to domestically reported software vulnerabilities, and discussed the effectiveness of the scoring system, comparing it with CVSS and CWSS. We also suggested the prospective utilization areas of the proposed scoring system.

Characteristics of Groundwater Environment in Highly Enriched Areas of Natural Radionuclides (고함량 자연방사성물질 우려지역에 대한 지하수 환경 특성 연구)

  • Jeong, Do-Hwan;Eom, Ig-Chun;Yoon, Jeong-Ki;Kim, Moon-Su;Kim, Yeong-Kyoo;Kim, Tae-Seung
    • Journal of Soil and Groundwater Environment
    • /
    • v.15 no.6
    • /
    • pp.9-16
    • /
    • 2010
  • Groundwater sampling was performed at 38 wells where they are located in the areas with high uranium and radon (marked as A and B, respectively) concentrations, which were based on the previous research results. In-situ parameters (temperature, pH, EC, Eh, DO) and natural radionuclides (uranium and radon) were analyzed to figure out the characteristics of groundwater environments. In-situ data did not show any relations to natural radionuclide data, which could be caused by groundwater mixing, depths of wells, and geological settings, etc. But the highest radon well presented relatively low temperature value and the highest uranium well presented relatively low pH values The highest uranium concentration ranging $1.14{\sim}188.19{\mu}g/L$ showed in the area of A region consisted of Jurassic two-mica granite. The areas of Jurassic biotite granite and Cretaceous granite in the A region have the uranium concentrations ranging $0.10{\sim}49.78{\mu}g/L$ and $0.36{\sim}3.01{\mu}g/L$, respectively. The uranium values from between wells of community water systems (CWSs) penetrating fractured bed-rock aquifers and personal boreholes settled in shallow aquifers near the wells of CWSs show big differences. It implies that the groundwaters of the two areas have evolved from different water-rock interaction paths that may caused by various types of wells having different aquifers. High radon activities in the area of B region composed of Precambrian gneiss showed ranging from 6,770 to 64,688 pCi/L. Even though the wells are located in the same geological settings, their rodon concentration presented different according to depth and distance.

A Risk Assessment Scheme of Social Engineering Attacks for Enterprise Organizations (사회공학 공격에 대한 기업조직의 위험 수준 평가 방안)

  • Park, Younghoo;Shin, Dongcheon
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.103-110
    • /
    • 2019
  • Recently security related attacks occur in very diverse ways, aiming at people who operate the system rather than the system itself by exploiting vulnerabilities of the system. However, to the our best knowledge, there has been very few works to analyze and strategically to deal with the risks of social engineering attacks targeting people. In this paper, in order to access risks of social engineering attacks we analyze those attacks in terms of attack routes, attack means, attack steps, attack tools, attack goals. Then, with the purpose of accessing the organizational risks we consider the characteristics and environments of the organizations because the impacts of attacks on the organizations obviously depend on the characteristics and environments of the organizations. In addition, we analyze general attack risk assessment methods such as CVSS, CWSS, and OWASP Risk Rating Methodolog. Finally, we propose the risk access scheme of social engineering attacks for the organizations. The proposed scheme allows each organization to take its own proper actions to address social engineering attacks according to the changes of its environments.

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.

Deformation behavior, evolution of strain states and textures during roll cladding of five ply composite sheets (5겹 복합판재 시료의 압연시 각 판재 층의 변형상태 및 집합조직의 형성)

  • Kim, J.K.;Huh, M.Y.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2006.05a
    • /
    • pp.413-416
    • /
    • 2006
  • Two clad composites of five ply sheets comprising STS430/AA3003/AA3003/AA3003/STS430 and STS430/AA3003/STS430/AA3003/STS430 were produced by roll cladding at $350^{\circ}C$. In order to clarify the deformation behavior and strain states in the composites during roll cladding, the variation of individual sheet thickness and the evolution of through thickness textures and microstructures of the composites were investigated. The thickness reduction of each sheet depended on the location of the sheet and on the strength of each sheet in the composites. In order to elucidate the evolution of textures and microstructures in AA3003 sheets, the strain states in AA3003 sheets during roll cladding were calculated by FEM. The formation of shear textures and fine grains in AA3003 sheet was discussed in terms of the strain states in each sheet layer. Finally, the strain states extracted from the FEM were verified by texture simulations

  • PDF

A Study on effective risk analysis and evaluation method of cloud computing system environment (클라우드컴퓨팅 시스템 환경의 효과적 위험분석평가 방법에 관한 연구)

  • Lee, Junglimg;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.10-25
    • /
    • 2021
  • Although many studies have been conducted on risk analysis and evaluation in the on-premises environment in information security, studies on effective methodologies of risk analysis and evaluation for cloud computing systems are lacking. In 2015, the Cloud Computing Development Act was enacted, which served as an opportunity to promote the introduction of cloud computing. However, due to the increase in security incidents in the cloud computing system, activation is insufficient. In addition, the cloud computing system is not being actively introduced because of the difficulty in understanding the cloud computing system technology of the person in charge who intends to introduce the cloud computing system. In this regard, this study presented an effective risk analysis and evaluation method by examining the characteristics, concepts, and models of cloud computing systems and analyzing how these characteristics affect risk analysis and evaluation.

Risk Scoring System for Software Vulnerability Using Public Vulnerability Information (공개 취약점 정보를 활용한 소프트웨어 취약점 위험도 스코어링 시스템)

  • Kim, Min Cheol;Oh, Sejoon;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1449-1461
    • /
    • 2018
  • As the number of software vulnerabilities grows year by year, attacks on software are also taking place a lot. As a result, the security administrator must identify and patch vulnerabilities in the software. However, it is important to prioritize the patches because patches for all vulnerabilities are realistically hard. In this paper, we propose a scoring system that expands the scale of risk assessment metric by taking into consideration attack patterns or weaknesses cause vulnerabilities with the vulnerability information provided by the NIST(National Institute of Standards and Technology). The proposed scoring system is expanded based on the CWSS and uses only public vulnerability information to utilize easily for any company. In this paper, we applied the automated scoring system to software vulnerabilities, and showed the expanded metrics with consideration for influence of attack pattern and weakness are meaningful.

Characterization of Convective Weather Systems in the Middle Himalaya during 1999 and 2000 Summer Monsoons (1999년과 2000년 여름몬순기간 동안 히말라야 지역에 발생한 대류계의 특성에 관한 연구)

  • Kim, Gwang-Seob;Noh, Joon-Woo
    • Journal of Korea Water Resources Association
    • /
    • v.36 no.3 s.134
    • /
    • pp.495-505
    • /
    • 2003
  • Convective weather systems such as organized mesoscale convective systems (Mesoscale Convective Complex, MCC and Convective Cloud Clusters, CCC) and much weaker Disorganized Short-lived Convection (DSC) in the region of India and Nepal were analyzed using the Meteosat-5 IR imagery. The diurnal march and propagation of patterns of convective activity in the Himalayas and Northern Indian subcontinent were examined. Results indicate that infrared satellite images of Northern India and along the southern flank of the Himalayas reveal a strong presence of convective weather systems during the 1999 and 2000 monsoons, especially in the afternoon and during the night. The typical MCCs have life-times of about 11 hours, and areal extent about $300,000km^2$. Although the core of MCC activity remains generally away from the Middle Himalayan range, the occurrence of heavy precipitation events in this region can be directly linked to MCCs that venture into the Lesser Himalayan region and remain within the region bounded by $25^{\circ}-30^{\circ}N$. One principal feature in the spatial organization of convection is the dichotomy between the Tibetan Plateau and the Northern Indian Plains: CCCs and DSCs begin in the Tibetan Plateau in the mid-afternoon into the evening; while they are most active in the mid-night and early morning in the Gangetic Plains and along the southern facing flanks of the Himalayas. Furthermore, these data are consistent with the daily cycle of rainfall documented for a network of 20 hydrometeorological stations in Central Nepal, which show strong nocturnal peaks of intense rainfall consistent with the close presence of Convective Weather Systems (CWSs) in the Gangetic Plains (Barros et al. 2000).