• Title/Summary/Keyword: Security Risk Assessment

Search Result 198, Processing Time 0.026 seconds

Innovation and Improvement of National Emergency Management System in Korea - Focused on All-Hazard Approach - (국가 재난관리 체계의 혁신과 발전방향: 모든 위험 접근법을 중심으로)

  • Kang, Uk;Park, Jun-Seok;Jo, Jun-Teak
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.7-35
    • /
    • 2015
  • The Ministry of Public Safety and Security was established in order to handle all sorts of disasters because of Sewol ferry tragedy and the fundamental reform on the emergency management system will be performed. The establishment of the Ministry of Public Safety and Security is considered as the landmark for the emergency management when it is compared to those in the United States and Japan in terms of the size and the authority. However, there are many tasks to be done for the settlement of the Ministry of Public Safety and Security. More specifically, a real and substantial plan should be prepared because the organization was established without blueprints or detailed implementation plan. This study suggests that all-hazard approach which is the one of the disaster management principles should be applied when the substantial plan is prepared. All possible hazard should be analyzed, assessed, and prioritized. In addition, Based on the results, the effective policies should be established with the consideration of Korean context.

  • PDF

Using the SIEM Software vulnerability detection model proposed (SIEM을 이용한 소프트웨어 취약점 탐지 모델 제안)

  • Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.961-974
    • /
    • 2015
  • With the advancement of SIEM from ESM, it allows deep correlated analysis using huge amount of data. By collecting software's vulnerabilities from assessment with certain classification measures (e.g., CWE), it can improve detection rate effectively, and respond to software's vulnerabilities by analyzing big data. In the phase of monitoring and vulnerability diagnosis Process, it not only detects predefined threats, but also vulnerabilities of software in each resources could promptly be applied by sharing CCE, CPE, CVE and CVSS information. This abstract proposes a model for effective detection and response of software vulnerabilities and describes effective outcomes of the model application.

Flood Runoff Computation for Mountainous Small Basins using WMS Model (WMS 모형을 활용한 산지 소하천 유역의 유출량 산정)

  • Chang, Hyung Joon;Lee, Jung Young;Lee, Hyo Sang
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.9-15
    • /
    • 2021
  • The frequency of flash floods in mountainous areas is increasing due to the abnormal weather that occurs increasingly in the recent, and it causes human and material damages is increasing. Various plans for disaster mitigation have been established, but artificial plans such as raising embankment and dredging operation are inappropriate for valleys and rivers in national parks that prioritize nature protection. In this study, flood risk assessment was conducted for Gyeryongsan National Park in Korea using the WMS (Watershed Modeling System)which is rainfall runoff model for valleys and rivers in the catchment. As the result, it was simulated that it is flooding in three sub-catchments (Jusukgol, Sutonggol, Dinghaksa) of a total in Gyeryongsan National Park when rainfall over the 50 years return period occurs, and it was confirmed that the risk of trails and facilities what visitors are using was high. The risk of trails in national parks was quantitatively presented through the results of this study, and we intend to present the safe management guidelines of national parks in the future.

A Study on Estimation of Road Vulnerability Criteria for Vehicle Overturning Hazard Impact Assessment (차량 전도 위험 영향 평가를 위한 도로 취약성 기준 산정에 관한 연구)

  • Kyung-Su Choo;Dong-Ho Kang;Byung-Sik Kim;In-Jae Song
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.49-56
    • /
    • 2023
  • Impact based forecast refers to providing information on potential socioeconomic risks according to weather conditions, away from the existing weather factor-oriented forecast. Developed weather countries are investing manpower and finances in technology development to provide and spread impact information, but awareness of impact based forecasts has not spread in Korea. In addition, the focus is on disasters such as floods and typhoons, which cause a lot of damage to impact based forecasts, and research on evaluating the impact of vehicle risks due to strong winds in the transportation sector with relatively low damage is insufficient. In Korea, there are not many cases of damage to vehicle conduction caused by strong winds, but there are cases of damage and the need for research is increasing. Road vulnerability is required to evaluate the risk of vehicles caused by strong winds, and the purpose of this study was to calculate the criteria for road vulnerability. The road vulnerability evaluation was evaluated by the altitude of the road, the number of lanes, the type of road. As a result of the analysis, it was found that the vulnerable area was well reproduced. It is judged that the results of this study can be used as a criterion for preparing an objective evaluation of potential risks for vehicle drivers.

Investigating Key Security Factors in Smart Factory: Focusing on Priority Analysis Using AHP Method (스마트팩토리의 주요 보안요인 연구: AHP를 활용한 우선순위 분석을 중심으로)

  • Jin Hoh;Ae Ri Lee
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.185-203
    • /
    • 2020
  • With the advent of 4th industrial revolution, the manufacturing industry is converging with ICT and changing into the era of smart manufacturing. In the smart factory, all machines and facilities are connected based on ICT, and thus security should be further strengthened as it is exposed to complex security threats that were not previously recognized. To reduce the risk of security incidents and successfully implement smart factories, it is necessary to identify key security factors to be applied, taking into account the characteristics of the industrial environment of smart factories utilizing ICT. In this study, we propose a 'hierarchical classification model of security factors in smart factory' that includes terminal, network, platform/service categories and analyze the importance of security factors to be applied when developing smart factories. We conducted an assessment of importance of security factors to the groups of smart factories and security experts. In this study, the relative importance of security factors of smart factory was derived by using AHP technique, and the priority among the security factors is presented. Based on the results of this research, it contributes to building the smart factory more securely and establishing information security required in the era of smart manufacturing.

Improvement of the Administration System of Customs Payments in the Modern Conditions

  • Mishina, Natalya V.;Kuzminov, Vitaly A.;Kuzminova, Olga A.;Konovalova, Elena E.;Gubanova, Natalia V.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.347-351
    • /
    • 2022
  • The article is devoted to the formation of approaches to improving the system of administration of customs payments in modern conditions. It is established that important components of the administration of customs payments are customs expertise, customs value assessment, and control over the declaration of goods to ensure the completeness and timeliness of customs duties payments to the budget. It is found that the practice of customs administration shifts the emphasis of foreign trade regulation to the use of the principles of work implying the use of the latest technologies for the preliminary electronic exchange of information, remote customs clearance of goods without the physical presence of an official, and consistent application of risk management. It is established that an important place in the structure of the state authorities regulating the foreign economic activity is given to the customs service. Furthermore, the existing problems in the implementation of international trade operations necessitate the improvement of approaches to the customs regulation of export-import activities of enterprises.

Root cause analys is and improving strategy of suicidal sentinel events (의료기관 내 자살사건의 근본원인분석과 개선전략)

  • Lim, Hun-Sun;Kim, Hong-Soon;Yum, Ho-Kee
    • Quality Improvement in Health Care
    • /
    • v.19 no.2
    • /
    • pp.50-64
    • /
    • 2013
  • Objectives : Suicide is a serious sentinel event in healthcare organization. Suicide and suicidal attempt are fatal and long lasting mental and physical damage to themselves, family, and medical staffs. To develope the system to prevent suicidal accident in hospital, we reviewed and analysed one case of suicidal sentinel event. Methods: The risks of suicidal sentinel event were evaluated and analysed through the root cause analysis and failure mode effects analysis. Result: We found several root causes such as initial assessment of oldest patient and security issues. Couple of action plans to fix the problems were done immediately. According to failure mode, we evaluate the risk priority number to modify the action plans. Conclusion: To reduce the risk of sentinel events, we reviewed the suicidal event and established the new system and action plan to prevent sentinel events.

A Study on the Safety Management Procedures during Theme Groups Experiential Learning Experiences (단체 테마 현장체험학습의 안전관리에 관한 연구)

  • Bang, Sungmin;Kim, Changho
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.63-72
    • /
    • 2015
  • This study aims to examine the state of accidents and related issues related to Theme Groups experiential learning experiences of students and suggest ways to improve security measures to prevent future incidents. Case studies of the sunken Sewol ferry and the collapse of the gymnasium at Mauna resort in Gyeongju are conducted by analyzing the existing literature and the data collected from the media sources and related agencies. With a basis on the findings of the analyses, it is suggested that legal foundation and disaster and risk management systems (systematic revision of the laws, raised safety awareness among citizens, production and education of security managers, formation of disaster management organizations, establishment of headquarters in case of emergency and installation of first aid facilities, improved national response system, enforcement of disaster drills, introduction of assessment system, etc.) must be established to contribute to creating a safer society.

A Study on Cybersecurity Regulation for Financial Sector: Policy Suggestion based on New York's Cybersecurity Regulation (23 NYCRR 500) (국내 금융 사이버보안 규제의 국제경쟁력 제고를 위한 연구: 미(美) 뉴욕 주 금융 사이버보안 규정 (23 NYCRR 500)을 중심으로)

  • Kim, Docheol;Kim, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.87-107
    • /
    • 2018
  • In March 2017, the State of New York became the first state to implement regulation specific to cybersecurity for financial institutions. Unlike previous regulations regarding information security, it has set a minimum requirements to establish cybersecurity program based on risk assessment results, protect Nonpublic Information, designate of CISO, and report to regulatory entity. This paper presents a need for a new cybersecurity policy in Korea by examining newly adopted cybersecurity regulation in the United States. Finally, the paper identify policy suggestions based on the United States's approach as they have successfully implemented the program.

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.