• Title/Summary/Keyword: Infrastructure Vulnerability

Search Result 133, Processing Time 0.023 seconds

Effect of Maximum Aggregate, Porosity, and Temperature on Crack Resistance and Moisture Susceptibility of Porous Asphalt Mixtures (최대입경, 공극률, 온도가 다공성 아스팔트 혼합물의 균열저항성 및 수분민감성에 미치는 영향)

  • Yoo, In-Kyoon;Lee, Su-Hyung;Park, Ki-Soo;Yoon, Kang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.611-619
    • /
    • 2021
  • Porous asphalt pavement (PAP) has many functions, such as reducing accidents and decreasing noise. On the other hand, vulnerability is inevitable because PAP contains approximately 20% porosity. This study evaluated the effects of the maximum aggregate size (MAS), temperature, and porosity on the PAP durability. The indirect tensile strength measures durability. This study tested the samples that stayed dry and were moisturized by freezing and thawing for mixtures having the same porosity of 20% and MAS of 13mm, 10mm, and 8mm. The same test was performed on a mixture of 20% and 22% voids made of the same material with a MAS of 10mm. As a result, for 20% porosity, significant differences in the changes in MAS and temperature were found. A clear difference was observed between 8mm and 13mm under dry conditions, but there were no other significant differences in the MAS change. Furthermore, there was a clear difference in temperature for the change in porosity and temperature, but the gap in 2% porosity at 20% did not show a clear difference. Therefore, it is necessary to develop a more durable PAP through quantitative evaluations of the factors affecting the PAP durability.

Flooding Risk under Climate Change of Fast Growing Cities in Vietnam (베트남 급성장 도시지역의 기후변화 홍수재해 위험성 분석)

  • Kim, So Yoon;Lee, Byoung Jae;Lee, Jongso
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.1-9
    • /
    • 2020
  • Vietnamese cities have a high risk of flooding under climate change due to their geographical characteristics. In this situation, the urban area is expanding with rapid growth of urban population. However, the risk of flooding is increasing due to the increase in impermeable areas and insufficient infrastructure. This study analyzed the urban expansion trend at the national level in Vietnam for the past 10 years (2007-2017) by using the Urban Expansion Intensity Index. Also, this study selected Hue City as a region with a large impact of climate change and a rapid expansion and found the possibility of flooding in the urban expansion area. The result showed that cities have been expanded around major cities in the Red River Delta, Mekong Delta, and coastal areas. In the case of Hue City, the area with fast expansion rate has a higher expected flood area. It implies that the risk of flood disasters may increase if the urabn expansion is carried out without disaster prevention measures. It is expected that Korean urban disaster prevention policies such as urban climate change disaster vulnerability analysis system will be helpful in establishing urban plans considering climate change in the fast growing regions such as Vietnam.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Study on Green Space Location Selection to Reduce Particulate Matter by Projecting Distributions of Emission Source and Vulnerable Groups - focusing on Seongdong-gu, Seoul - (미세먼지 배출원과 취약계층 분포 추정을 통한 미세먼지 저감 녹지 입지 선정 연구 - 서울시 성동구를 대상으로 -)

  • Shin, Ye-Eun;Park, Jin-Sil;Kim, Su-Yeon;Lee, Sang-Woo;An, Kyung-Jin
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.1
    • /
    • pp.53-68
    • /
    • 2021
  • The study aims to propose a locating method of green space for reducing Particulate Matter (PM) in ambient air in conjunction with its source traces and vulnerable groups. In order to carry out the aims and purposes, a literature review was conducted to derive indicators of vulnerable area to PM. Based on the developed indicators, the vulnerable areas and green spaces creation strategies for each cluster were developed for the case of Seongdong-gu, Seoul. As a result, six indicators for vulnerability analysis were came out including the vulnerable groups (children's facilities, old people's facilities), emission sources (air pollutant emission workplaces, roads), and environmental indicators (particulate matter concentration, NDVI). According to the six selected indicators, the target area was divided into 39 hexagons and analyzed to result the most vulnerable areas to particulate matter. As a result of comprehensive vulnerability analysis, the Seongsu-dong area was found to be the most vulnerable to particulate matter, and 5 clusters were derived through k-means cluster analysis. Cluster 1 was analyzed as areas that most vulnerable to particulate matter as a result of the comprehensive analysis, therefore urgent need to create green spaces to reduce particulate matter. Cluster 2 was areas that mostly belonged to the Han River. Cluster 3 corresponds to the largest number of hexagons, and since many vulnerable groups are distributed, it was analyzed as a cluster that required the creation of a green spaces to reduce particulate matter, focusing on facilities for vulnerable groups. Three hexagons are included in cluster 4, and the cluster has many roads and lacks vegetation in common. Cluster 5 has a lot of green spaces and is generally distributed with fewer vulnerable groups and emission sources; however, it has a high level of particulate matter concentration. In a situation where various green spaces creation projects for reducing particulate are being implemented, it is necessary to consider the vulnerable groups and emission sources and to present green space creation strategies for each space characteristic in order to increase the effectiveness of such projects. Therefore, this study is regarded as meaningful in suggesting a method for selecting a green area for reducing PM.

Review on Prior Evaluation for Terrorism Risk of High-rise Buildings (초고층건축물의 테러 위험도 사전평가에 관한 연구)

  • Seong, Bin;Lee, Yoon-Ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.293-316
    • /
    • 2013
  • Today's high-rise buildings are increasing concern about the safety and evacuation of people related to the fire and threat from outside. Terrorism breaking out in high-rise buildings, a symbol of the national economy results in a number of casualties, economic loss, social fear and damage to national status. That's why high-rise building has also emerged as a target of major terrorist attacks, compared to other types of buildings. We have 54 high-rise buildings in 15 regions over the country. The Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government have offered the guidelines to prevent terrorist attacks toward high-rise buildings. Since the 9/11 terrorist attacks, the U.S. Federal Emergency Management Agency (FEMA) has developed and taken advantage of the Risk Management Manual Series. According to this manual, pre-assessment is conducted for the prevention of terrorism and particularly in FEMA 455, risk of the surrounding areas, vulnerability, possibility from terrorist attacks are checked. After the check, experts classify the risk of terrorist attacks toward the high-rise buildings and according to the risk classification, architects, security experts and structure engineers can carry out terrorism prevention program for high-rise buildings. The U.K. NaCTSO has also offered the terrorism prevention guidelines. Therefore, the Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government should make more concrete guidelines for high-rise buildings such as what U.S. FEMA and U.K. NaCTSO implement, including prior evaluation technique for terrorism risk.

  • PDF

Evaluating and Improving Urban Resilience to Climate Change in Local Government: Focused on Suwon (기초지자체 기후변화 대응을 위한 도시회복력 평가 및 증진방안: 수원시를 대상으로)

  • Kim, Eunyoung;Jung, Kyungmin;Song, Wonkyong
    • Journal of Environmental Impact Assessment
    • /
    • v.27 no.4
    • /
    • pp.335-344
    • /
    • 2018
  • As the damage caused by the abnormal climate due to climate change is increasing, the interest in resilience is increasing as a countermeasure to this. In this study, the resilience of Suwon city was examined and the plan to improve the resilience were derived against climate impacts such as drought, heatwave, and heavy rain. Urban resilience is divided into social resilience (e.g. vulnerable groups, access to health services, and training of human resources), economic resilience (e.g. housing stability, employment stability, income equality, and economic diversity), urban infrastructure resilience (e.g.residential vulnerability, capacity to accommodate victims, and sewage systems), and ecological resilience (e.g. protection resources, sustainability, and risk exposure). The study evaluated the urban resilience according to the selected indicators in local level. In this study, the planning elements to increase the resilience in the urban dimension were derived and suggested the applicability. To be a resilient city, the concept and value of resilience should be included in urban policy and planning. It is critical to monitor and evaluate the process made by the actions in order to continuously adjust the plans.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.