• Title/Summary/Keyword: Protection vulnerability

Search Result 220, Processing Time 0.031 seconds

The Study on the Fire Safety Plans by a Field the Actual Condition Analysis of Traditional Temples - With Special Reference to Eunpyeonggu Seoul - (전통사찰의 현장실태분석을 통한 소방안전대책에 관한 연구 - 서울특별시 은평구를 중심으로 -)

  • Song, Yun-Suk;Hyun, Seong-Ho;Kim, Wan-Seop
    • Fire Science and Engineering
    • /
    • v.22 no.5
    • /
    • pp.137-147
    • /
    • 2008
  • This study has investigated fire safety rules related with traditional temples and main fire causes and cases to traditional temples among traditional wooden buildings so has analyzed fire vulnerability, and through a field probe of three traditional temples in Eunpyeonggu Seoul which have cultural properties, has analyzed geographical conditions, going out path spot reaching time required of a fire brigade, fire protection system, fire prevention administration and security system, factors of fire vulnerability, and has presented about fire safety plans of traditional temples.

Vulnerability Case Analysis of the High Power Electromagnetic Pulse on Digital Control System (디지털 제어장치의 고출력 전자기펄스에 대한 취약성 사례 분석)

  • Woo, Jeong Min;Ju, Mun-No;Lee, Hong-Sik;Kang, Sung-Man;Choi, Seung-Kyu;Lee, Jae-Bok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.9
    • /
    • pp.698-706
    • /
    • 2017
  • The risk of high power electromagnetic(HPEM) pulse exposure to the devices used in digital control system such as PLC(programmable logic controller) and communication cable is increasing. In this paper, two different frequency ranges HPEMs were exposed to those control systems to assess the each vulnerability. The vulnerability of the EUTs exposed from HPEM were analyzed and compared with a variation of distances and source power. As the EUTs were exposed to higher level of HPEM, the voltage and communication waveform of the control system had shown a distorted response. And the unshielded twisted pair(UTP) cable connected to the EUTs showed operation failures with induced voltage. However, the foiled twisted pair(FTP) cable shielded the connected device efficiently from the HPEM exposure. Therefore, the necessity of the protection measures against the vulnerability of HPEM exposure for the digital control system used in power facilities and industrial site were verified.

Browser fuzzing and analysis using known vulnerability (소프트웨어 취약점의 종류와 탐색 방법)

  • Kim, Nam-gue;Kim, Hyun Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.753-756
    • /
    • 2015
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

Event and Command based Fuzzing Method for Verification of Web Browser Vulnerabilities (웹 브라우저 취약성 검증을 위한 이벤트 및 커맨드 기반 퍼징 방법)

  • Park, Seongbin;Kim, Minsoo;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.535-545
    • /
    • 2014
  • As the software industry has developed, the attacks making use of software vulnerability has become a big issue in society. In particular, because the attacks using the vulnerability of web browsers bypass Windows protection mechanism, web browsers can readily be attacked. To protect web browsers against security threat, research on fuzzing has constantly been conducted. However, most existing web browser fuzzing tools use a simple fuzzing technique which randomly mutates DOM tree. Therefore, this paper analyzed existing web browser fuzzing tools and the patterns of their already-known vulnerability to propose an event and command based fuzzing tool which can detect the latest web browser vulnerability more effectively. Three kinds of existing fuzzing tools were compared with the proposed tool. As a result, it was found that the event and command based fuzzing tool proposed was more effective.

Effects of Parenting Attitude on K-CBCL Scales (부모의 양육태도가 유아 행동평가 척도에 미치는 영향 연구)

  • Jung, HaeRee;Ha, Hyun-Yee;Lee, Soo Jin;Chae, Han
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2013
  • Objectives The aim of this study was to explore the effect of parental attitude on the behavioral problems in children who visited the traditional Korean pediatrics clinic. Methods The subjects were consist of 190 outpatients ($56.6{\pm}12.9$ months) and their mother. The Behavior problems of children were measured with Korean version of Child Behavior Checklist for Ages 1.5-5 (K-CBCL1.5-5) while parental perception of child vulnerability, parent overprotection, parenting stress were measured by Child Vulnerability Scale (CVS), Parent Protection Scale (PPS), Korean-Parenting Stress Index-Short Form scale (K-PSI-SF), respectively. Correlation and multiple regression were conducted for the analysis. Results Significant correlations between child total problems score and child vulnerability (r=.272, p<.001), parent overprotection (r=.243, p=.001), and parenting stress (r=.597, p<.001) were reported. Multiple regression analysis revealed that the parenting stress (${\beta}$=.548, p<.001) was a major predictor for the child behavior problems rather than child vulnerability and parent overprotection. Conclusions It was shown that the parenting stress has a significant influence on the emotional and behavioral development of children. These results can be useful for improving clinical diagnosis and treatment in traditional Korean pediatrics.

Vulnerability AssessmentunderClimateChange and National Water Management Strategy

  • Koontanakulvong, Sucharit;Suthinon, Pongsak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.204-204
    • /
    • 2016
  • Thailand had set the National Water Management Strategy which covered main six areas in the next 12 years, i.e., by priority: (1) water for household, (2) water for agricultural and industrial production, (3) water for flood and drought management, (4) water for quality issue, (5) water from forest conservation and soil erosion protection, (6) water resources management. However due to the climate change impact, there is a question for all strategies is whether to complete this mission under future climate change. If the impact affects our target, we have to clarify how to mitigate or to adapt with it. Vulnerability assessment was conducted under the framework of ADB's (with the parameters of exposure, sensitivity and adaptive capacity) and the assessments were classified into groups due to their different characteristic and the framework of the National Water Management Strategy, i.e., water supply (rural and urban), water for development (agriculture and others), water disasters (floods (flash, overflow), drought, water quality). The assessments identified the parameters concerned and weight factors used for each groups via expert group discussions and by using GIS mapping technology, the vulnerability maps were produced. The maps were verified with present water situation data (floods, drought, water quality). From the analysis result of this water resources management strategy, we found that 30% of all projects face the big impacts, 40% with low impact, and 30% for no impact. It is clear that water-related agencies have to carefully take care approximately 70% of future projects to meet water resources management strategy. It is recommended that additional issues should be addressed to mitigate the impact from climate risk on water resource management of the country, i.e., water resources management under new risk based on development scenarios, relationship with area-based problems, priority definition by viewpoints of risk, vulnerability (impact and occurrence probability in past and future), water management system in emergency case and water reserve system, use of information, knowledge and technology in management, network cooperation and exchange of experiences, knowledge, technique for sustainable development with mitigation and adaptation, education and communication systems in risk, new impact, and emergency-reserve system. These issues will be described and discussed.

  • PDF

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

Groundwater vulnerability assessment in the southern coastal sedimentary basin of Benin using DRASTIC, modified DRASTIC, Entropy Weight DRASTIC and AVI

  • Agossou, Amos;Yang, Jeong-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.152-152
    • /
    • 2021
  • The importance of groundwater has long been recognized, but the ground water potential to become contaminated as a result of human activities has only been recognized in recently. Before 1980 it was thought that soils served as filters, preventing harmful substances deposited at the surface from migrating into groundwater. Today it is known that soils have a finite capacity to protect groundwater. It can be contaminated from divers sources. Therefore, Assessment of aquifer vulnerability to pollution is essential for the protection and management of groundwater and land use planning. In this study, we used DRASTIC and AVI for groundwater vulnerability to contamination assessment. the different methods were applied to the southern coastal sedimentary basin of Benin and DRASTIC method was modified in two different steps. First, we modified DRASTIC by adding land use parameter to include the actual pollution sources (DRASTICLcLu) and second, classic DRASTIC weights was modified using Shannon's entropy (Entropy weight DRASTIC). The reliability of the applied approaches was verified using nitrate (NO3-) concentration and by comparing the overall vulnerability maps to the previous researches in the study area and in the world. The results from validation showed that the addition of landcover/land use parameter to the classic DRASTIC helps to improve the method for better definition of the vulnerable areas in the basin and also, the weight modification using entropy improved better the method because Entropy weight DRASTICLcLu showed the highest correlation with nitrate concentration in the study basin. In summary the weight modification using entropy approach reduced the uncertainty of the human subjectivity in assigning weights and ratings in the standard DRASTIC.

  • PDF

An Analysis Measure for Cybersecurity linked Threat against Diverse Protection Systems (다양성보호계통 사이버보안 연계 위협 분석 방안)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • With the development of information technology, the cybersecurity threat continues as digital-related technologies are applied to the instrumentation and control system of nuclear power plants. The malfunction of the instrumentation and control system can cause economic damage due to shutdown, and furthermore, it can lead to national disasters such as radioactive emissions, so countering cybersecurity threats is an important issue. In general, the study of cybersecurity in instrumentation and control systems is concentrated on safety systems, and diverse protection systems perform protection and reactor shutdown functions, leading to reactor shutdown or, in the worst case, non-stop situations. To accurately analyze cyber threats in the diverse protection system, its linked facilities should be analyzed together. Risk analysis should be conducted by analyzing the potential impact of inter-facility cyberattacks on related facilities and the impact of cybersecurity on each configuration module of the diverse protection system. In this paper, we analyze the linkage of the diverse protection system and discuss the cybersecurity linkage threat by analyzing the availability of equipment, the cyber threat impact of the linked equipment, and the configuration module's cybersecurity vulnerability.

Passive seismic protection systems with mechanical metamaterials: A current review

  • Guevara-Corzo, Jeffrey J.;Begambre-Carrillo, Oscar J.;Garcia-Sanchez, Jesus A.;Sanchez-Acevedo, Heller G.
    • Structural Engineering and Mechanics
    • /
    • v.82 no.4
    • /
    • pp.417-434
    • /
    • 2022
  • In this work, a review of mechanical metamaterials and seismic protection systems that use them is carried out, focusing on passive protection systems. During the last years, a wide variety of classical systems of seismic protection have demonstrated to be an effective and practical way of reducing the seismic vulnerability of buildings, maintaining their health and structural integrity. However, with the emergence of metamaterials, which allow obtaining uncommon mechanical properties, new procedures and devices with high performance have been developed, reducing the seismic risk through novel approaches such as: seismic shields and the redirection of seismic waves; the use of stop band gaps and the construction of buried mass resonators; the design of pentamodal base isolators. These ideas are impacting traditional areas of structural engineering such as the design and building of highly efficient base isolation systems. In this work, recent advances in new seismic protection technologies and researches that integrate mechanical metamaterials are presented. A complete bibliometric analysis was carried out to identify and classify relevant authors and works related with passive seismic protection system based on mechanical metamaterial (pSPSmMMs). Finally, possible future scenarios for study and development of seismic isolators based on mechanical metamaterials are shown, identifying the relevant topics that have not yet been explored, as well as those with the greatest potential for future application.