• Title/Summary/Keyword: Infrastructure Vulnerability

Search Result 136, Processing Time 0.028 seconds

Vulnerable Homogeneous Hotspot Areas of the Industrial Sector for the Climate Change - Focused on Mitigation and Adaptation Perspective - (기후변화에 대한 산업부문 취약 핫스팟 지역 분석 -적응 및 완화 측면에서-)

  • Yoon, Eun Joo;Lee, Dong Kun;Kim, Hogul;Choi, Kwang Lim
    • Journal of Climate Change Research
    • /
    • v.7 no.1
    • /
    • pp.69-75
    • /
    • 2016
  • Recently, many countries all over the world have been suffered from disaster caused by climate change. Especially in case of developed countries, the disaster is concentrated in the industry sector. In this research, we analyzed industrial vulnerable homogeneous hotspot for the climate change using spatial autocorrelation analysis on the south Korea. Homogeneous hot spot areas through autocorrelation analysis indicate the spatial pattern of areas interacted each other. Industry sector have responsibility of green house gas emissions, and should adapt to the climate change caused by greenhouse gas already released. So, we integrated the areas sensitive to mitigation option with the areas hardly adapt to climate change because of vulnerable infrastructure. We expected that the result of this research could contribute to the decision-making system of climate change polices.

Mobile Auto questions and scoring system (국가 사이버안보 시스템 관련 법률안 분석과 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.363-365
    • /
    • 2014
  • Internet baking, e-commerce, business processing, etc on smartphone handing could be possible in present days. Ambiguity between cyber and real life has made vulnerability on infrastructure, Gov't Service and National security by cyber terrorism. Especially, Lots of Infrastructure and Gov't Service based on Information Technology were exposed by Cyber terror. Legal system should be improved to keep from these threats. This paper proposed needs of cyber legal system by analyzing proposed cyber related code on Korean National Assembly, issue on Cyber Control Tower, National Cyber Security Industry and Human resource.

  • PDF

Development of comprehensive earthquake loss scenarios for a Greek and a Turkish city: seismic hazard, geotechnical and lifeline aspects

  • Pitilakis, Kyriazis D.;Anastasiadis, Anastasios I.;Kakderi, Kalliopi G.;Manakou, Maria V.;Manou, Dimitra K.;Alexoudi, Maria N.;Fotopoulou, Stavroula D.;Argyroudis, Sotiris A.;Senetakis, Kostas G.
    • Earthquakes and Structures
    • /
    • v.2 no.3
    • /
    • pp.207-232
    • /
    • 2011
  • The development of reliable earthquake mitigation plans and seismic risk management procedures can only be based on the establishment of comprehensive earthquake hazard and loss scenarios. Two cities, Grevena (Greece) and D$\ddot{u}$zce (Turkey), were used as case studies in order to apply a comprehensive methodology for the vulnerability and loss assessment of lifelines. The methodology has the following distinctive phases: detailed inventory, identification of the typology of each component and system, evaluation of the probabilistic seismic hazard, geotechnical zonation, ground response analysis and estimation of the spatial distribution of seismic motion for different seismic scenarios, vulnerability analysis of the exposed elements at risk. Estimating adequate earthquake scenarios for different mean return periods, and selecting appropriate vulnerability functions, expected damages of the water and waste water systems in D$\ddot{u}$zce and of the roadway network and waste water system of Grevena are estimated and discussed; comparisons with observed earthquake damages are also made in the case of D$\ddot{u}$zce, proving the reliability and the efficiency of the proposed methodology. The results of the present study constitute a sound basis for the development of efficient loss scenarios for lifelines and infrastructure facilities in seismic prone areas. The first part of this paper, concerning the estimation of the seismic ground motions, has been utilized in the companion paper by Kappos et al. (2010) in the same journal.

Security Vulnerability and Technology Status of AMI (AMI의 보안 취약성 및 기술 현황)

  • Jo, Han-Seong;Lee, Yong-Gu;Jeong, Sang-In;Choe, Jin-Ho
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.2
    • /
    • pp.73-78
    • /
    • 2017
  • Recently, a number of foreign electric power companies including domestic Korea Electric Power Corporation (KEPCO) have actively engaged in the construction of a power grid with the concept of a smart grid. The Smart grid is a technology that increases the efficiency of the power by converging the information network with the power grid. It can maximize the energy efficiency through the two-way communication between the utility and the consumer. However, as the power grid converges with the information and communication network, security threats are increasing more than existing power grids. Due to the nature of the power grid, the damage caused by security threats is not only personal privacy but also economic loss of society. So smart grid becomes the target of hackers. In this paper, we discuss security vulnerabilities of Advanced Metering Infrastructure (AMI), which is a core technology of smart grid construction, and the corresponding security technologies to prevent security damage of smart grid.

An Access Control using SPKI Certificate in Peer-to-Peer Environment (P2P 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Shin, Jung-Hwa;Lee, Young-Kyung;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.793-798
    • /
    • 2003
  • The P2P service is a technology that can share their information with each other who is able to be connected ith a relating program without passing by a server. Since all personal compiters that linked to the internet under the P2P service can opetate as server or a client, they can provide and share both their information and services through the direct connection. Currently, the P2P service is giving an equal privilege to all users for sharing their resources,.Under this situation, a lot of vulnerability against the various sttacks through the Unternet is possoble, more sophisticated security services are necessary. In this paper, We propose and access control schemae using SPKI(Simple Public Key Infrastructure). The scheme designates and access and acces control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

Lifetime seismic performance assessment of high-rise steel-concrete composite frame with buckling-restrained braces under wind-induced fatigue

  • Liu, Yang;Li, Hong-Nan;Li, Chao;Dong, Tian-Ze
    • Structural Engineering and Mechanics
    • /
    • v.77 no.2
    • /
    • pp.197-215
    • /
    • 2021
  • Under a severe environment of multiple hazards such as earthquakes and winds, the life-cycle performance of engineering structures may inevitably be deteriorated due to the fatigue effect caused by long-term exposure to wind loads, which would further increase the structural vulnerability to earthquakes. This paper presents a framework for evaluating the lifetime structural seismic performance under the effect of wind-induced fatigue considering different sources of uncertainties. The seismic behavior of a high-rise steel-concrete composite frame with buckling-restrained braces (FBRB) during its service life is systematically investigated using the proposed approach. Recorded field data for the wind hazard of Fuzhou, Fujian Province of China from Jan. 1, 1980 to Mar. 31, 2019 is collected, based on which the distribution of wind velocity is constructed by the Gumbel model after comparisons. The OpenSees platform is employed to establish the numerical model of the FBRB and conduct subsequent numerical computations. Allowed for the uncertainties caused by the wind generation and structural modeling, the final annual fatigue damage takes the average of 50 groups of simulations. The lifetime structural performance assessments, including static pushover analyses, nonlinear dynamic time history analyses and fragility analyses, are conducted on the time-dependent finite element (FE) models which are modified in lines with the material deterioration models. The results indicate that the structural performance tends to degrade over time under the effect of fatigue, while the influencing degree of fatigue varies with the duration time of fatigue process and seismic intensity. The impact of wind-induced fatigue on structural responses and fragilities are explicitly quantified and discussed in details.

Evacuation Route Simulation for Tsunami Preparedness Using Remote Sensing Satellite Data (Case Study: Padang City, West Sumatera Province, Indonesia)

  • Trisakti, Bambang;Carolita, Ita;Nur, Mawardi
    • Proceedings of the KSRS Conference
    • /
    • v.1
    • /
    • pp.47-50
    • /
    • 2006
  • Tsunami disaster caused great damages and very large victims especially when occurs in urban area along coastal region. Therefore information of evacuation in a map is very important for disaster preparedness in order to minimize the number of victims in affected area. Here, information generated from remote sensing satellite data (SPOT 5 and DEM) and secondary data (administration boundary and field survey data) are used to simulate evacuation route and to produce a map for Padang City. Vulnerability and evacuation areas are determined based on DEM. Landuse/landcover, accessibility areas, infrastructure and landmark are extracted from SPOT 5 data. All the data obtained from remote sensing and secondary data are integrated using geospatial modelling to determine evacuation routes. Finally the simulation of evacuation route in Padang City for tsunami preparedness is provided based on the parameters derived from remote sensing data such as distances from shelters, save zones, city's landmarks and the local community experiences how they can survive with the disaster.

  • PDF

A Study on Improvement Stability of Cloud Service using Attack Information Collection (공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.

A Basic Study on the Jamming Mechanisms and Characteristics against GPS/GNSS Based on Navigation Warfare

  • Ko, Kwang-Soob
    • Journal of Navigation and Port Research
    • /
    • v.34 no.2
    • /
    • pp.97-103
    • /
    • 2010
  • It has been recognized that the risk from the vulnerability of GPS can lead to the extreme damage in the infrastructure of the civil and military in recent years. As an example, the intentional interference to GPS signal, named GPS jamming, was really performed to misguide GPS guided weapons during Iraq war in 2003, and the fact has also followed by the serious issues on GPS in civilian community. In the modernized military society, the navigation warfare(NAVWAR) based on the GPS jamming has been emerged and introduced as a military operation. The intentional interference to the future global navigation satellite system(GNSS) involving GPS must be also an important issue to civilian users in near future. This study is focused on the fundamental research prior to the research on "Potential principle of NAVWAR" under NAVWAR of the future warfare. In this paper, we would study on the investigation of NAVWAR based on electronic warfare(EW) and analyze characteristics of the jamming against GNSS's receivers. Then the general mechanism on GNSS jamming is proposed.

Assessment of Vulnerability in Active Security Infrastructure (능동보안 기반구조의 취약점 분석)

  • Yun, Jong-Chul;Kang, Heung-Seek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.825-828
    • /
    • 2002
  • 분산시스템의 증가와 인터넷의 확산으로 인하여 네트워크를 통한 공격의 가능성은 점점 커지고 있다. 이러한 잠재적인 위협으로부터 시스템을 보호하기 위해 IDS와 Firewall같은 정보보호 시스템들이 개발되었으나 이들은 네트워크 차원의 효율적인 대응이 어렵고 또한 새로운 공격 패턴이나 보안정책 변화에 적응이 어렵다는 단점을 가지고 있다. 이를 해결하기 위하여 능동보안이라는 분야가 활발히 연구중이나, 능동보안의 기반인 능동 네트워크는 동적이고 유연한 본성으로 인해 그 자체적으로도 심각한 위협을 가지고 있다. 본 논문에서는 능동보안 기반구조의 구성요소와 메커니즘에 대해서 알아보고 능동보안 기반구조에 내포된 취약점을 분석 한다.

  • PDF