• Title/Summary/Keyword: Protection vulnerability

검색결과 221건 처리시간 0.025초

키보드 보안의 근본적인 취약점 분석 (Analysis of an Intrinsic Vulnerability on Keyboard Security)

  • 임강빈;배광진
    • 정보보호학회논문지
    • /
    • 제18권3호
    • /
    • pp.89-95
    • /
    • 2008
  • 본 논문은 인터넷 금융거래에서 공통적으로 이용하는 키보드 기반 사용자 아이디 및 패스워드 인증에서의 근본적인 취약점을 제시한다. 또한, 키보드 입력정보의 유출 방지를 위한 기존 기술이 동작하고 있는 실제의 상황에서 사용자 패스워드의 취득이 매우 간단하게 이루어질 수 있음을 보인다. 추가적으로 이러한 취약점을 해결하기 위한 방안으로서 장단기적으로 고려하여야 하는 하드웨어 및 소프트웨어 관점에서의 접근방법에 대하여 제시한다. 다양한 방안들을 구현하고 적용하여 보다 신속하게 대응책을 마련함으로써 기존의 인터넷 금융거래 환경의 보안 수준을 개선해야 할 것으로 사료된다.

부산지역 119구조대 증설을 통한 건축물 접근취약성 개선효과 분석 (Analysis of Improvement Effects on Building Approach Vulnerability by Expanding Emergency Rescue Centers in Busan)

  • 최준호;이지수;홍원화
    • 한국화재소방학회논문지
    • /
    • 제29권5호
    • /
    • pp.79-87
    • /
    • 2015
  • 우리나라의 소방행정력은 도심지역에 집중 배치되어 지역적 불균형을 나타내고 있는 실정이다. 모든 시민들에게 균등한 서비스가 공급되는 것이 가장 이상적인 형태이나 지역적 여건이나 예산 등과 같은 문제로 인해 이를 실현하기에는 한계가 있다. 부산시의 경우 전체 건축물의 절반가량이 구조대가 5분 이내에 도달이 어렵다는 결과가 도출되었는데, 특히 관할면적이 상대적으로 넓은 권역은 구조대의 접근성이 더욱 더 취약했다. 기존 119구조대의 접근 취약성을 평가한 결과, 현재 구조대 권역의 지리적 위치 때문에 관할 권역의 조정에 따른 개선 효과는 사실상 미비할 것으로 예측되었는데, 이에 따라 본 연구에서는 추가적인 구조대의 신설을 제시하였다. 구조대 증설을 통해 접근 취약성을 해결한 권역은 북부, 강서, 금정, 기장, 해운대 순으로 나타났는데, 해당지역 내 건축물 수는 총 53,546개소로 나타났다.

스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인 (The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW)

  • 장재영;김지동;김범수
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

소셜 게임 특징이 몰입을 통해 중독에 미치는 영향 (Effects of Social Game Features on Addiction through Flow)

  • 이은정;변상해
    • 디지털산업정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.205-218
    • /
    • 2018
  • The purpose of this study is to examine the factors that the characteristics of Protection Motivation Theory affects the addiction of social game users in Korea and then, to verify how these factors make an impact on the addiction through the immersion. The characteristics of protection motivation theory are vulnerability, severity, efficiency, and disability, and we want to study the influence of each characteristic on social game flow and the relationship leading to addiction. The results of this research can be useful for 'social game addiction prevention education'. This study was conducted to survey the users who had experienced using the social game to verify the suggested hypothesis. As the results of the survey, first of all, vulnerability appeared to have a positive effect on the flow. Secondly, severity appeared not to have a positive impact on the flow. Thirdly, efficiency turned out to affect the flow. Fourthly, disability turned out to have a positive impact upon the flow. Lastly, flow was revealed to make a positive impact on the addiction. The results of this study will help to construct the content of 'social game addiction prevention education program'.

재난 취약성 분석에 관한 사례연구(N공단의 화재·폭발을 중심으로) (Case Study on the Analysis of Disaster Vulnerabilities (Focused on the Fire & Explosion in the N-Industrial Complex))

  • 하각천
    • 한국안전학회지
    • /
    • 제36권2호
    • /
    • pp.94-100
    • /
    • 2021
  • In general, the industrial complex is a place where factories of various industries are concentrated. It is only as efficient as it is designed. However, the risks vary as there are various industries. These features are also associated with various types of disasters. The dangers of natural disasters such as a typhoon, flood, and earthquake, as well as fire and explosions, are also latent. Many of these risks can make stable production and business activities difficult, resulting in massive direct and indirect damage. In particular, decades after its establishment, the vulnerabilities increase even more as aging and small businesses are considered. In this sense, it is significant to assess the vulnerability of the industrial complex. Thus analysing fire and explosion hazards as stage 1 of the vulnerability evaluation for the major potential disasters for the industrial complex. First, fire vulnerabilities were analyzed quantitatively. It is displayed in blocks for each company. The assessment block status and the fire vulnerability rating status were conducted by applying the five-step criteria. Level A is the highest potential risk step and E is the lowest step. Level A was 11.8% in 20 blocks, level B was 22.5% in 38 blocks, level C was 25.4% in 43 blocks, level D was 26.0% in 44 blocks, and level E was 14.2% in 24 blocks. Levels A and B with high fire vulnerabilities were analyzed at 34.3%. Secondly, the vulnerability for an explosion was quantitatively analyzed. Explosive vulnerabilities were analyzed at 4.7% for level A with 8 blocks, 3.0% for level B with 5, 1.8% for level C with 3, 4.7% for level D with 8, and 85.8% for level E with 145. Levels A and B, which are highly vulnerable to explosions, were 7.7 %. Thirdly, the overall vulnerability can be assessed by adding disaster vulnerabilities to make future assessments. Moreover, it can also assist in efficient safety and disaster management by visually mapping quantified data. This will also be used for the integrated control center of the N-Industrial Complex, which is currently being installed.

원자로보호계통 사이버보안 연계 위협 분석 연구 (A Study on Chaining Threat Analysis of Cybersecurity against Reactor Protection Systems)

  • 정성민;김태경
    • 디지털산업정보학회논문지
    • /
    • 제18권2호
    • /
    • pp.39-48
    • /
    • 2022
  • The application of digital technology to instrumentation and control systems in nuclear power plants has overcome many shortcomings of analog technology, but the threat of cybersecurity has increased. Along with other systems, the reactor protection system also uses digital-based equipment, so responding to cybersecurity threats is essential. We generally determine cybersecurity threats according to the role and function of the system. However, since the instrumentation and control system has various systems linked to each other, it is essential to analyze cybersecurity threats together between the connected systems. In this paper, we analyze the cybersecurity threat of the reactor protection system with the associated facilities. To this end, we quantitatively identified the risk of the reactor protection system by considering safety functions, a communication type, the use of analog or digital-based equipment of the associated systems, and the software vulnerability of the configuration module of the reactor protection system.

Seismic vulnerability assessment of buildings based on damage data after a near field earthquake (7 September 1999 Athens - Greece)

  • Eleftheriadou, Anastasia K.;Karabinis, Athanasios I.
    • Earthquakes and Structures
    • /
    • 제3권2호
    • /
    • pp.117-140
    • /
    • 2012
  • The proposed research includes a comprehensive study on the seismic vulnerability assessment of typical building types, representative of the structural materials, the seismic codes and the construction techniques of Southern Europe. A damage database is created after the elaboration of the results of the observational data obtained from post-earthquake surveys carried out in the area struck by the September 7, 1999 Athens earthquake, a near field seismic event in an extended urban region. The observational database comprises 180.945 buildings which developed damage of varying degree, type and extent. The dataset is elaborated in order to gather useful information about the structural parameters influence on the seismic vulnerability and their correlation to the type and degree of building damages in near field earthquakes. The damage calibration of the observational data was based on label - damage provided by Earthquake Planning and Protection Organization (EPPO) in Greece and referred to the qualitative characterization for the recording of damage in post-earthquake surveys. Important conclusions are drawn on the parameters that influence the seismic response based on the wide homogeneous database which adds to the reliability of the collected information and reduces the scatter on the produced results.

지역별 홍수피해주기를 고려한 홍수위험잠재능 평가 (Assessment of Potential Flood Damage Considering Regional Flood Damage Cycle)

  • 김수진;배승종;김성필;배연정
    • 한국농공학회논문집
    • /
    • 제57권4호
    • /
    • pp.143-151
    • /
    • 2015
  • Recently, flood has been increased due to climate change resulting in numerous damages for humans and properties. The main objective of this study was to suggest a methodology to estimate the flood vulnerability using Potential Flood Damage (PFD) concept. To evaluate the PFD at a spatial resolutions of city/county units, the 19 representative evaluation indexing factors were carefully selected for the three categories such as damage target ($F_{DT}$), damage potential ($F_{DP}$) and prevention ability ($F_{PA}$). The three flood vulnerability indices of $F_{DT}$, $F_{DP}$ and $F_{PA}$ were applied for the 162 cities and counties in Korea for the pattern classification of potential flood damage. It is expected that the supposed PFD can be utilized as the useful flood vulnerability index for more rational and practical protection plans against flood damage.

시군별 홍수위험잠재능 유형화 및 특성분석 (A Study on Potential Flood Damage Classification and characteristic analysis)

  • 김수진;은상규;김성필;배승종
    • 농촌계획
    • /
    • 제23권3호
    • /
    • pp.21-36
    • /
    • 2017
  • Climate change is intensifying storms and floods around the world. Where nature has been destroyed by development, communities are at risk from these intensified climate patterns. This study was to suggest a methodology for estimating flood vulnerability using Potential Flood Damage(PFD) concept and classify city/county about Potential Flood Damage(PFD) using various typology techniques. To evaluate the PFD at a spatial resolutions of city/county units, the 20 representative evaluation indexing factors were carefully selected for the three categories such as damage target(FDT), damage potential(FDP) and prevention ability(FPA). The three flood vulnerability indices of FDT, FDP and FPA were applied for the 167 cities and counties in Korea for the pattern classification of potential flood damage. Potential Flood Damage(PFD) was classified by using grouping analysis, decision tree analysis, and cluster analysis, and characteristics of each type were analyzed. It is expected that the suggested PFD can be utilized as the useful flood vulnerability index for more rational and practical risk management plans against flood damage.

키보드컨트롤러의 하드웨어 취약점에 대한 대응 방안 (Countermeasures to the Vulnerability of the Keyboard Hardware)

  • 정태영;임강빈
    • 정보보호학회논문지
    • /
    • 제18권4호
    • /
    • pp.187-194
    • /
    • 2008
  • 본 논문은 문자열 기반 패스워드 인증에서 키보드 감시 문제를 유발하는 하드웨어 취약점에 대한 효과적인 대응방안을 제안한다. 악의적인 공격자가 해당 취약점을 이용하면 기존의 보안 소프트웨어가 실행되고 있는 상황에서도 키보드로부터 입력되는 사용자의 모든 문자열을 탈취할 수 있었으나 본 논문에서 제시하는 방안을 활용하면 공격자가 키보드 감시에 성공한다 하더라도 사용자의 입력 문자열을 온전히 탈취할 수 없다. 따라서 제안한 방안을 구현하여 적용하면 보다 안전한 인터넷 기반 금융거래가 가능해질 것으로 사료된다.