• Title/Summary/Keyword: Infrastructure Vulnerability

Search Result 133, Processing Time 0.039 seconds

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

Flood fragility analysis of bridge piers in consideration of debris impacts (부유물 충돌을 고려한 교각의 홍수 취약도 해석 기법)

  • Kim, Hyunjun;Sim, Sung-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.325-331
    • /
    • 2016
  • This research developed a flood fragility curve of bridges considering the debris impacts. Damage and failures of civil infrastructure due to natural disasters can cause casualties as well as social and economic losses. Fragility analysis is an effective tool to help better understand the vulnerability of a structure to possible extreme events, such as earthquakes and floods. In particular, flood-induced failures of bridges are relatively common in Korea, because of the mountainous regions and summer concentrated rainfall. The main failure reasons during floods are reported to be debris impact and scour; however, research regarding debris impacts is considered challenging due to various uncertainties that affect the failure probability. This study introduces a fragility analysis methodology for evaluating the structural vulnerability due to debris impacts during floods. The proposed method describes how the essential components in fragility analysis are considered, including limit-state function, intensity measure of the debris impact, and finite element model. A numerical example of the proposed fragility analysis is presented using a bridge pier system under a debris impact.

Establishment Strategics for Making a Port Specialized in Liquid Cargoes Safer - Focusing on Accident Scenario and Risk Analysis - (액체화물특화 항만의 해양환경사고 안전항만 구축방안 연구 -사고 시나리오 및 위험도 분석을 중심으로-)

  • Jung, Won-Jo;Lim, Sang-Seop;Park, Nam-Ki
    • Journal of Navigation and Port Research
    • /
    • v.46 no.3
    • /
    • pp.227-235
    • /
    • 2022
  • The purpose of this study was to analyze the risk and vulnerability of marine accidents based on statistical data on marine accidents at Ulsan Port, which has the largest amount of liquid cargo in Korea. It was found to be quite vulnerable to the risk of marine accidents, environmental damage, and vulnerability to environmental pollution accidents. Based on analysis results, marine accident scenarios and accident response strategies were prepared. Additionally, as a response strategy to prepare for large-scale marine pollution accidents at Ulsan Port, it is necessary to establish control equipment and infrastructure, as well as establish a control center to integrate marine accident safety functions. In particular, in the case of liquid cargo specialized ports such as Ulsan Port, considering the size of the cargo volume and the frequency of marine pollution accidents, it is urgent to build professional safety management institutions, which should make the port safer.

A Study on security characteristics and vulnerabilities of BAS(Building Automation System) (BAS의 보안 특성 및 취약점에 관한 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.669-676
    • /
    • 2017
  • Recently, due to the importance of information security, security vulnerability analysis and various information protection technologies and security systems are being introduced as a countermeasure against cyber-attacks in new as well as existing buildings, and information security studies on high-rise buildings are also being conducted. However, security system introduction and research are generally performed from the viewpoint of general IT systems and security policies, so there is little consideration of the infrastructure of the building. In particular, the BAS or building infrastructure, is a closed system, unlike typical IT systems, but has unique structural features that accommodate open functions. Insufficient understanding of these system structures and functions when establishing a building security policy makes the information security policies for the BAS vulnerable and increases the likelihood that all of the components of the building will be exposed to malicious cyber-attacks via the BAS. In this paper, we propose an architecture reference model that integrates three different levels of BAS structure (from?) different vendors. The architectures derived from this study and the security characteristics and vulnerabilities at each level will contribute to the establishment of security policies that reflect the characteristics of the BAS and the improvement of the safety management of buildings.

A Feasibility Study on the Infrastructure Project of PCB Industrial Technology (PCB 산업기술 기반구축 사업의 타당성 분석 연구)

  • Kim, Dae Ho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.4
    • /
    • pp.57-66
    • /
    • 2013
  • Domestic PCB industry formed by orders of demand companies is extremely vulnerable in its innovation infrastructure including high value-added technology development and information exchange. The majority of PCB products produced in the country relies on the imports from abroad and it causes its vulnerability to external market changes. Due to the negative perceptions about the industry (e.g., 3D job), low treatment (especially SMEs) and expertise employment avoidance in PCB industry, the job market conditions of PCB industry is not so good. In these circumstances, the PCB industry is completely dependent on the demand market such as cellular phones, and tablet PC, and as a result the responsiveness of PCB industry to the changes in demand market is also vulnerable. In this PCB industry, Korean government is trying to build the research infrastructure for PCB industry that realizes the sharing of information among companiesthrough the operation of the PCB industry innovation forum (information innovation), builds SME suppot platform and supports quality improvement (technology innovation), and supports enterprise collaboration processes (material-process-equipment) utilizing PCM open laboratory. The PCB industry technology infratstructure project is going to be promoted by the government(1.3 billion won, each year) and the private investmen(434 million won each year) from 2013 to 2017(5 years project)(table 1). This study analyzes the feasibility of the project, by using the AHP analysis and the results shows that this project is considered feasible because the AHP overall score is evaluated as 0.841, the overall score is greater than or equal to 0.55.

  • PDF

Measure Improvement on Vulnerable Area based on Climate Change Impact on Agriculture Infrastructure (기후변화에 따른 농업생산기반시설 영향분석을 통한 정책추진 방안 연구)

  • Jeong, Kyung-Hun;Song, Suk-Ho;Jung, Hyoung-Mo;Oh, Seung-Heon;Kim, Soo-Jin;Lim, Se-Yun;Joo, Dong-Hyuk;Hwang, Syewoon;Jang, Min-Won;Bae, Seung-Jong;Yoo, Seung-Hwan
    • Journal of Korean Society of Rural Planning
    • /
    • v.26 no.4
    • /
    • pp.81-91
    • /
    • 2020
  • This study was conducted to analyse climate change impact on agriculture infrastructure and propose improved measures on vulnerable areas. Recently, Climate change has resulted in damaging effects on agricultural fields through increases in drought intensity and flood risk. It is expected that this impact will increase over time. This study shows that Gyeong-gi and Chung-nam provinces are affected by drought and Gyeong-buk and Gyeong-nam provinces are affected by heavy rain. However, there are also regional variations within each province. Agricultural infrastructure affected by drought may also be affected by heavy rain. Increased damages on the infrastructure due to increased extreme weather events require preventive measures especially in vulnerable areas. In order to minimize the damage by climate change, we need to introduce a reform in the system which selects project region by analysing climate change impacts. Furthermore, impact assessment of climate change from projects such as 'water supply diversification', 'flooded farmland improvement', and 'irrigation facility reinforcement' also need to be adopted to improve the measures. The results of this study are expected to provide a foundation for establishing measures on coping with climate change in the agricultural sector.

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication (효율적인 인증을 위한 해시 저장방식의 가상카드번호 결제 시스템)

  • Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.5-15
    • /
    • 2015
  • Electronic transactions have been increasing with the development of the high-speed Internet and wireless communication. However, in recent years financial corporations and mobile carriers were attacked by hackers. And large numbers of privacy information have been leaked. In particular, in the case of credit card information can be misused in the online transaction, and the damage of this given to cardholder. To prevent these problems, it has been proposed to use a virtual card number instead of the actual card number. But it has security vulnerability and requires additional security infrastructure. In this paper, we analyzed the proposed virtual card number schemes. and we propose a new virtual credit card number scheme. In the newly proposed scheme, cardholder generates a key pair (public key/private key) and pre-register public key to the issuer. then, cardholder can pay no additional security infrastructure while still efficiently satisfy the security requirements.

The Design and Implementation for Practical Risk Analysis Method & Modules (실용적인 위험분석 방법론 설계와 모듈 구현)

  • 정윤정;김인중;이철원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1081-1089
    • /
    • 2002
  • In these days many Organizations recognize risk of information asset by rapid change of information system environments, and need suitable management for that. Also many organization which operate important information-communication infrastructure take interest in threat, vulnerability and risk analysis of important asset by enforcement of Act on protection of information and communication infrastructure. But, it is most that methodology and tools that analyze risk for organization's information asset are developed in abroad up to now, domestic research of this field is insufficient stage. An research of this field is necessary in domestic because it can't reflect domestic actuality by depending on most foreign methodology or a tool. In this paper we proposed design and implementation for the risk analysis methodology, a prototype and important modules that considers the user convenience. We expect that the result of this paper will for step improvement of domestic risk analysis methodology and tool development.