• Title/Summary/Keyword: Risk Metric

Search Result 54, Processing Time 0.024 seconds

Design and Verification of the Hardware Architecture for the Active Seat Belt Control System Compliant to ISO 26262 (ISO 26262에 부합한 능동형 안전벨트 제어 시스템의 하드웨어 아키텍처 설계 및 검증)

  • Lee, Jun Hyok;Koag, Hyun Chul;Lee, Kyung-Jung;Ahn, Hyun-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2030-2036
    • /
    • 2016
  • This paper presents a hardware development procedure of the ASB(Active Seat Belt) control system to comply with ISO 26262. The ASIL(Automotive Safety Integrity Level) of an ASB system is determined through the HARA(Hazard Analysis and Risk Assessment) and the safety mechanism is applied to meet the reqired ASIL. The hardware architecture of the controller consists of a microcontroller, H-bridge circuits, passive components, and current sensors which are used for the input comparison. The required ASIL for the control systems is shown to be satisfied with the safety mechanism by calculation of the SPFM(Single Point Fault Metric) and the LFM(Latent Fault Metric) for the design circuits.

Survey on the use of security metrics on attack graph

  • Lee, Gyung-Min;Kim, Huy-Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.95-105
    • /
    • 2018
  • As the IT industry developed, the information held by the company soon became a corporate asset. As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics. Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.

Latent Mean Analysis of Health Behavior between Adolescents with a Health Problem and Those without: Using the 2009 Korean Youth Health Behavior Survey

  • Park, Jeong-Mo;Kim, Mi-Won;Cho, Yoon Hee
    • Research in Community and Public Health Nursing
    • /
    • v.24 no.4
    • /
    • pp.488-497
    • /
    • 2013
  • Purpose: The purpose of this study was to identify the construct equivalence of the general five factors of health behavior and to compare the latent means between adolescents with a health problem and those without in Korea. Methods: The 2009 KYRBS (Korean Youth Risk Behavior Survey) data were used for the analysis. Multi-group confirmatory factor analysis was performed to test whether the scale had configural, metric, and scalar invariances across the existence of health problems in adolescents. Results: Configural, metric, and factor invariances were satisfied for the latent mean analysis (LMA) between adolescents with health problem and those without. Adolescents with health problem and those without were not different in the LMA of all factors. Conclusion: Health providers should give more interest to the group of adolescents with health problems and consider prudential school life to the same group.

Non-chemical Risk Assessment for Lifting and Low Back Pain Based on Bayesian Threshold Models

  • Pandalai, Sudha P.;Wheeler, Matthew W.;Lu, Ming-Lun
    • Safety and Health at Work
    • /
    • v.8 no.2
    • /
    • pp.206-211
    • /
    • 2017
  • Background: Self-reported low back pain (LBP) has been evaluated in relation to material handling lifting tasks, but little research has focused on relating quantifiable stressors to LBP at the individual level. The National Institute for Occupational Safety and Health (NIOSH) Composite Lifting Index (CLI) has been used to quantify stressors for lifting tasks. A chemical exposure can be readily used as an exposure metric or stressor for chemical risk assessment (RA). Defining and quantifying lifting nonchemical stressors and related adverse responses is more difficult. Stressor-response models appropriate for CLI and LBP associations do not easily fit in common chemical RA modeling techniques (e.g., Benchmark Dose methods), so different approaches were tried. Methods: This work used prospective data from 138 manufacturing workers to consider the linkage of the occupational stressor of material lifting to LBP. The final model used a Bayesian random threshold approach to estimate the probability of an increase in LBP as a threshold step function. Results: Using maximal and mean CLI values, a significant increase in the probability of LBP for values above 1.5 was found. Conclusion: A risk of LBP associated with CLI values > 1.5 existed in this worker population. The relevance for other populations requires further study.

Oxygenation Index in the First 24 Hours after the Diagnosis of Acute Respiratory Distress Syndrome as a Surrogate Metric for Risk Stratification in Children

  • Kim, Soo Yeon;Kim, Byuhree;Choi, Sun Ha;Kim, Jong Deok;Sol, In Suk;Kim, Min Jung;Kim, Yoon Hee;Kim, Kyung Won;Sohn, Myung Hyun;Kim, Kyu-Earn
    • Acute and Critical Care
    • /
    • v.33 no.4
    • /
    • pp.222-229
    • /
    • 2018
  • Background: The diagnosis of pediatric acute respiratory distress syndrome (PARDS) is a pragmatic decision based on the degree of hypoxia at the time of onset. We aimed to determine whether reclassification using oxygenation metrics 24 hours after diagnosis could provide prognostic ability for outcomes in PARDS. Methods: Two hundred and eighty-eight pediatric patients admitted between January 1, 2010 and January 30, 2017, who met the inclusion criteria for PARDS were retrospectively analyzed. Reclassification based on data measured 24 hours after diagnosis was compared with the initial classification, and changes in pressure parameters and oxygenation were investigated for their prognostic value with respect to mortality. Results: PARDS severity varied widely in the first 24 hours; 52.4% of patients showed an improvement, 35.4% showed no change, and 12.2% either showed progression of PARDS or died. Multivariate analysis revealed that mortality risk significantly increased for the severe group, based on classification using metrics collected 24 hours after diagnosis (adjusted odds ratio, 26.84; 95% confidence interval [CI], 3.43 to 209.89; P=0.002). Compared to changes in pressure variables (peak inspiratory pressure and driving pressure), changes in oxygenation (arterial partial pressure of oxygen to fraction of inspired oxygen) over the first 24 hours showed statistically better discriminative power for mortality (area under the receiver operating characteristic curve, 0.701; 95% CI, 0.636 to 0.766; P<0.001). Conclusions: Implementation of reclassification based on oxygenation metrics 24 hours after diagnosis effectively stratified outcomes in PARDS. Progress within the first 24 hours was significantly associated with outcomes in PARDS, and oxygenation response was the most discernable surrogate metric for mortality.

Development of Security Metric of Network Access Control (네트워크 접근제어 시스템의 보안성 메트릭 개발)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.219-227
    • /
    • 2017
  • Network access control should be able to effectively block security threats to the IT infrastructure, such as unauthorized access of unauthorized users and terminals, and illegal access of employees to internal servers. From this perspective, it is necessary to build metrics based on relevant standards to ensure that security is being met. Therefore, it is necessary to organize the method for security evaluation of NAC according to the related standards. Therefore, this study builds a model that combines the security evaluation part of ISO / IEC 15408 (CC: Common Criteria) and ISO 25000 series to develop security metric of network access control system. For this purpose, we analyzed the quality requirements of the network access control system and developed the convergence evaluation metric for security of the two international standards. It can be applied to standardization of evaluation method for network access control system in the future by constructing evaluation model of security quality level of network access control system.

Development of Security Metrics of Enterprise Security Management System (통합보안관리시스템의 보안성 메트릭 개발)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.303-311
    • /
    • 2017
  • As new information technology emerges, companies are introducing an Enterprise Security Management system to cope with new security threats, reducing redundant investments and waste of resources and counteracting security threats. Therefore, it is necessary to construct a security evaluation metric based on related standards to demonstrate that the Enterprise Security Management(ESM) System meets security. Therefore, in order to construct a metric for evaluating the security of the ESM, this study analyzed the security quality related requirements of the ESM and constructed a metric for measuring the degree of satisfaction. This metric provides synergies through the unification of security assessments that comply with ISO/IEC 15408 and ISO/IEC 25000 standards. It is expected that the evaluation model of the security quality level of ESM will be established and the evaluation method of ESM will be standardized in the future.

Developing Warning Map for Risk Monitoring on Personal Information Security (개인정보보호를 위한 리스크 모니터링: 경고맵)

  • Lee, Youngjai;Shin, Sangchul;Min, Geumyoung
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.33-40
    • /
    • 2008
  • Personal information security has been as risk ever since the development of information technology increased its internet use. As personal information security is compromised there will be a rise in personal privacy conflicts and this will become an important social issue. The following research is a presentation of the warning map for risk monitoring on personal information security. First, the personal information security process is identified then defined. Second, in order to achieve the personal information security's objective, a survey was taken and the data was collected. Third, factor in the Fishbone Diagram's analysis and figure out the key indicators that include metric and threshold. Last, develop the warning map which has the matrix table composed of the process and the risk. It displays the warning based on the threshold and the value of key indicators related to risks.

  • PDF

An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks (신뢰도와 위험도로부터 합성된 지표에 기반을 둔 온라인 소셜 네트워크를 위한 접근 제어 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.15-26
    • /
    • 2010
  • Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.

Asbestos Exposure and Health Risk Assessment in Asbestos-Containing Buildings (석면함유 건축물의 석면 노출 및 위해성 평가)

  • Jeong, Jae-Won;Kim, Kwang-Su;Cho, Sun-Ja;Lee, Sang-Joon
    • Journal of Environmental Science International
    • /
    • v.21 no.9
    • /
    • pp.1069-1078
    • /
    • 2012
  • This study was performed to evaluate the asbestos exposure levels and to calculate excess lifetime cacer risks(ELCRs) in asbestos-containing buildings for maintenance and management. The range of airborne asbestos concentration of 33 buildings was 0.0018 ~ 0.0126 f/cc and one site exceeded indoor air-quality recommended limit 0.01 f/cc. And ELCRs based on US EPA IRIS(Integrated risk information system) model are 1.5E-06 ~ 3.9E-05 levels, and there was no site showed 1.0E-04 (one person per million) level or more, and 11 sites showed 1.0E-05 (one person per 100,000 people) level or more. To prevent the release of asbestos fibers, it needs operation and maintenance of asbestos-containing building materials, and there are some methods such as removal, repairment, enclosure and encapsulation. In conclusion, a risk-based air action level for asbestos in air is an appropriate metric for asbestos-containing building management.