• Title/Summary/Keyword: Specific vulnerability

Search Result 148, Processing Time 0.03 seconds

Development of Vulnerability Scanner using Search Engine (검색엔진을 이용한 취약점 분석 시스템 개발)

  • Joo, Bok-Gyu;Min, Beung-Woo;Chang, Moon-Suk;Ahn, Chang-Kyum;Yang, Dong-Hyuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.19-24
    • /
    • 2009
  • In these days, security threat is ever increasing as computer systems and networking is everywhere. This paper is on the development of security scanner using search engine, with which site managers can easily check security vulnerability on their systems. Our security server automatically collects security-related information on the Internet, and indexes them in the database. To check the vulnerability of a customer server, the client system collects various system-specific information, and sends necessary queries to our security server for vulnerability checking. Up-to-date and site-specific vulnerability information is retrieved through the viewer, which allows the customer effectively to check and respond to security threat on client systems.

  • PDF

Consideration of Trends and Applications of Groundwater Vulnerability Assessment Methods in South Korea (지하수 오염취약성 평가 기법 동향과 국내 적용성 고찰)

  • Kim, Gyoo-Bum
    • Journal of Soil and Groundwater Environment
    • /
    • v.13 no.6
    • /
    • pp.1-16
    • /
    • 2008
  • There are generally two types of groundwater vulnerability assessments. Intrinsic vulnerability is based on the assessment of natural climatic, geological and hydrogeological attributes and specific vulnerability relates to a specific contaminant, contaminant class, or human activity. Several methods to assess groundwater vulnerability, which are based on hydrogeologic setting and socio-economical environment, have been developed in USA and Europe. A Modified-DRASTIC model including a lineament factor has been developed in South Korea, but it still has some limitations. To develop a solid and applicable method in this country, many data of quality, hydraulic features, GIS data, and pollution source, produced from a Basic Survey based on Article 5 of the Groundwater Act and other research projects, need to be collected, analyzed and verified introducing the previous methods.

A study on automation of AV(Atomic Vulnerability) ID assignment (단위 취약점 식별자 부여 자동화에 대한 연구)

  • Kim, Hyung-Jong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.49-62
    • /
    • 2008
  • AV (Atomic Vulnerability) is a conceptual definition representing a vulnerability in a systematic way, AVs are defined with respect to its type, location, and result. It is important information for meaning based vulnerability analysis method. Therefore the existing vulnerability can be expressed using multiple AVs, CVE (common vulnerability exposures) which is the most well-known vulnerability information describes the vulnerability exploiting mechanism using natural language. Therefore, for the AV-based analysis, it is necessary to search specific keyword from CVE's description and classify it using keyword and determination method. This paper introduces software design and implementation result, which can be used for atomic vulnerability analysis. The contribution of this work is in design and implementation of software which converts informal vulnerability description into formal AV based vulnerability definition.

  • PDF

A Study On Advanced Model of Web Vulnerability Scoring Technique (웹 취약점 스코어링 기법의 advanced 모델 연구)

  • Byeon, Autumn;Lim, Jong In;Lee, Kyong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1217-1224
    • /
    • 2015
  • Web application security problems are addressed by the web vulnerability analysis which in turn supports companies to understand those problems and to establish their own solutions. Ministry of Science, ICT and Future Planning (MSIP) has released its guidelines for analysis and assessment of the web vulnerability. Although it is possible to distinguish vulnerability items in a manner suggested in the MSIP's guidelines, MSIP's factors and criteria proposed in the guidelines are neither sufficient nor efficient in analyzing specific vulnerability entries' risks. This study discusses analysis of the domestic and international Vulnerability Scoring system and proposes an appropriate evaluating method for web vulnerability analysis.

Analysis of Hazard of Disaster in the Aspect of Human Damage (인적 피해 중심의 재해취약성 분석)

  • Wang, Soon-Joo;Lee, Myung-Sun
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.87-101
    • /
    • 2007
  • The definition and concept of disasters and their preparedness have been changing according to the modern situation. The basic change is that the concept of absolute standard and prevention of hardware damage in the past have been changing to the concept of relative standard and mitigation of direct damage to human. For achieving the purpose, advanced countries developed and used their own analysis method of hazard and vulnerability for disaster ; ASHE hazard and vulnerability evaluation method, hazard matrix method by CDC, FEMA model method and SMUG hazard priority method. Because each analysis method cannot evaluate the hazard and vulnerability for specific disaster, the advantages and disadvantages should be applied for specific situation of disaster in Korea and new analysis method should be extracted in the future.

  • PDF

Modeling approach in mapping groundwater vulnerability

  • Im Jeong-Won;Bae Gwang-Ok;Lee Gang-Geun;Seok Hui-Jun
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2005.04a
    • /
    • pp.304-307
    • /
    • 2005
  • A numerical modelling method using a backward-in-time advection dispersion equation is introduced in assessing the vulnerability of groundwater to contaminants as an alternative to classical vulnerability mapping methods. The flux and resident concentration measurements are normalized by the total contaminants mass released to the system to provide the travel time probability density function and the location probability function. With the results one can predict the expected travel time of a contaminant from up stream location to a well and also the relative concentration of the contaminant at a well. More specific groundwater vulnerability can be mapped by these predicted measurements.

  • PDF

Adaptation Experience of Living Kidney Donors after Donation (생체 신장 공여자의 공여 후 적응 경험)

  • Kang, Da-Hai-Som;Yang, Jinhyang
    • Journal of Korean Academy of Nursing
    • /
    • v.46 no.2
    • /
    • pp.271-282
    • /
    • 2016
  • Purpose: This study was done to explore adaptation experience of living kidney donors after donation. Specific aims were to identify challenges donors face in the process of adaptation following surgery and how they interact with recipients and other people. Methods: Grounded theory methodology was utilized. Participants were 13 living kidney donors at six months or more after donation. Data were collected by in-depth interviews with individual participants. Data were analyzed using constants comparative method with theoretical saturation. Results: A core category emerged as 'keeping the fences of my family in spite of vulnerability'. The adaptation process after donation was manifested in four phases: exploration, balance, maintenance, and acclimatization. Phenomenon was perception of vulnerability. Strategies to manage the vulnerability were assessing changes of body awareness, tailoring regimen to one's own body condition, coping with health problems, keeping restoration of health, and ruminating on the meaning of one's kidney donation. Consequences were reestablishing family well-being, realizing the values of one's kidney donation, and living with uncertainty. Conclusion: Findings of the study indicate that there is a need for health professionals to understand the vulnerability of living kidney donors and help their family system maintain a healthy and productive life. The results of this study can be used to develop phase-specific, patient-centered, and tailored interventions for living kidney donors.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

Seismic vulnerability macrozonation map of SMRFs located in Tehran via reliability framework

  • Amini, Ali;Kia, Mehdi;Bayat, Mahmoud
    • Structural Engineering and Mechanics
    • /
    • v.78 no.3
    • /
    • pp.351-368
    • /
    • 2021
  • This paper, by applying a reliability-based framework, develops seismic vulnerability macrozonation maps for Tehran, the capital and one of the most earthquake-vulnerable city of Iran. Seismic performance assessment of 3-, 4- and 5-story steel moment resisting frames (SMRFs), designed according to ASCE/SEI 41-17 and Iranian Code of Practice for Seismic Resistant Design of Buildings (2800 Standard), is investigated in terms of overall maximum inter-story drift ratio (MIDR) and unit repair cost ratio which is hereafter known as "damage ratio". To this end, Tehran city is first meshed into a network of 66 points to numerically locate low- to mid-rise SMRFs. Active faults around Tehran are next modeled explicitly. Two different combination of faults, based on available seismological data, are then developed to explore the impact of choosing a proper seismic scenario. In addition, soil effect is exclusively addressed. After building analytical models, reliability methods in combination with structure-specific probabilistic models are applied to predict demand and damage ratio of structures in a cost-effective paradigm. Due to capability of proposed methodology incorporating both aleatory and epistemic uncertainties explicitly, this framework which is centered on the regional demand and damage ratio estimation via structure-specific characteristics can efficiently pave the way for decision makers to find the most vulnerable area in a regional scale. This technical basis can also be adapted to any other structures which the demand and/or damage ratio prediction models are developed.

A Comparative Study of Groundwater Vulnerability Assessment Methods: Application in Gumma, Korea (지하수 오염 취약성 기법의 비교 적용 연구: 충남 홍성군 금마면 일대에의 적용)

  • Ki, Min-Gyu;Yoon, Heesung;Koh, Dong-Chan;Hamm, Se-Yeong;Lee, Chung-Mo;Kim, Hyun-Su
    • Journal of Soil and Groundwater Environment
    • /
    • v.18 no.3
    • /
    • pp.119-133
    • /
    • 2013
  • In the present study, several groundwater vulnerability assessment methods were applied to an agricultural area of Gumma in Korea. For the groundwater intrinsic vulnerability assessment, the performance of DRASTIC, SINTACS and GOD models was compared and an ensemble approach was suggested. M-DRASTIC and multi-linear regression (MLR) models were applied for the groundwater specific vulnerability assessment to nitrate of the study site. The correlation coefficient between the nitrate concentration and M-DRASTIC index was as low as 0.24. The result of the MLR model showed that the correlation coefficient is 0.62 and the areal extents of livestock farming and upland field are most influential factors for the nitrate contamination of groundwater in the study site.