• Title/Summary/Keyword: Spread Vulnerability

Search Result 42, Processing Time 0.019 seconds

Relative Weight Evaluation for the Vulnerability Indicators of Infectious Disease Using Analytic Hierarchy Process in Local Governments (계층분석과정(AHP)을 이용한 지자체 감염병 취약지표의 가중치 평가)

  • Bae, Min-Ki;Oh, Hoo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.704-713
    • /
    • 2021
  • The purpose of this study was to evaluate the relative weight of infectious disease vulnerability indicators that affect the occurrence and spread of infectious diseases in local communities. For this, the infectious disease vulnerability indicators were classified as facilities vulnerable to spread, vulnerable groups of infections, social vulnerable conditions, and response capabilities based on literature and case review, and the relative weights among indicators were determined using Analytic Hierarchy Process(AHP) by 22 experts. As a result of the analysis, the weight of each sector was found to be the highest in the facilities vulnerable to spread, and the overall weight was highest in the following order: sickbed securing rate(1st), density of religious facilities(2nd), medical personnel rate(3rd), elderly person ratio(4th), and entertainment establishment density(5th). These results can be used to prepare the supporting data necessary for the establishment of infectious disease response policies of local governments.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

A Case Study of Bridge Scour Vulnerability Evaluation and Prioritization for National Highway Bridges in the National Capital Region (수도권 국도교량 세굴위험도 평가 및 등급화 사례 연구)

  • Park, Jae-Hyun;Kim, Jeong-Hun;An, Seong-Chul;Lee, Ju-Hyung;Chung, Moon-Kyung;Kwak, Ki-Seok
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.2
    • /
    • pp.7-21
    • /
    • 2008
  • Foundation failure due to bridge scour during floods is the leading cause of bridge failure. Performed were the evaluation of bridge scour vulnerability and prioritization on real bridges registered in the National Highway Bridge Inventory of the capital region. The case studies for 30 national highway bridges consist of site investigation including boring test, bridge scour analysis fur the design flood, bearing capacity evaluation of the bridge foundation before and after scour, comprehensive evaluation of bridge scour vulnerability, and prioritization. Nine of 26 spread (feting bridges showed the potential future vulnerability to scour with significant decrease in the bearing capacity of foundations due to scour and the remaining 17 spread footing bridges were expected to maintain their stability to resist the effects of scour. Three of 4 pile foundation bridges exhibited considerable decrease in the bearing capacity of foundation after scour.

A Study on Estimation of Road Vulnerability Criteria for Vehicle Overturning Hazard Impact Assessment (차량 전도 위험 영향 평가를 위한 도로 취약성 기준 산정에 관한 연구)

  • Kyung-Su Choo;Dong-Ho Kang;Byung-Sik Kim;In-Jae Song
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.49-56
    • /
    • 2023
  • Impact based forecast refers to providing information on potential socioeconomic risks according to weather conditions, away from the existing weather factor-oriented forecast. Developed weather countries are investing manpower and finances in technology development to provide and spread impact information, but awareness of impact based forecasts has not spread in Korea. In addition, the focus is on disasters such as floods and typhoons, which cause a lot of damage to impact based forecasts, and research on evaluating the impact of vehicle risks due to strong winds in the transportation sector with relatively low damage is insufficient. In Korea, there are not many cases of damage to vehicle conduction caused by strong winds, but there are cases of damage and the need for research is increasing. Road vulnerability is required to evaluate the risk of vehicles caused by strong winds, and the purpose of this study was to calculate the criteria for road vulnerability. The road vulnerability evaluation was evaluated by the altitude of the road, the number of lanes, the type of road. As a result of the analysis, it was found that the vulnerable area was well reproduced. It is judged that the results of this study can be used as a criterion for preparing an objective evaluation of potential risks for vehicle drivers.

Concept Design for Measurement against Large Fire Spreading based on BuildingDatabaseofaFolkCultureVillage

  • Umegane, Takuji;Uchida, Daisuke;Mishima, Nobuo;Wakuya, Hiroshi;Okazaki, Yasuhisa;Hayashida, Yukuo;Kitagawa, Keiko;Park, Sun-gyu;Oh, Yong-sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.21-22
    • /
    • 2015
  • This study aims to develop a current building condition database of an important folk culture village of South Korea considering their fire spread risk. We have selected a folk cultral village, and conducted field survey to reveal structure of buildings, materials of building wall, and roof style which make us understand current vulnerability of the village to fire spread. As a result, we made a current building condition database with map, which showed that the village had mixture of reinforced concrete and wood. Besides, we proposed a conceptual idea to prevent from large fire accident in the village.

  • PDF

Analysis of the Effect of Urban Characteristics on the Number of COVID-19 Confirmed Patients (도시특성이 코로나19 확진자 수에 미치는 영향 분석)

  • Oh, Hoo;Bae, Min Ki
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.4
    • /
    • pp.80-91
    • /
    • 2022
  • The purpose of this study is to contribute to strengthening the response of local governments to the emergence of new infectious diseases by identifying the urban characteristics affecting their spread. To this end, the urban characteristics influencing the spread of infectious diseases were identified from previous studies. Moreover, the variations in the impact of urban characteristics that affected the number of confirmed COVID-19 patients was spatially analyzed using geographically weighted regression (GWR). The analysis indicated that the explanatory power of the GWR was approximately 12.4% higher than that of the ordinary least squares method. Moreover, the explanatory power of the model in the northern regions, such as Seoul, Gyeonggi, and Gangwon, was particularly high, indicating that the urban characteristics affecting the spread of COVID-19 vary by region. The results of this study can be used as a basis for suggesting the formulation of customized policies reflecting the characteristics of each local government rather than a uniform spread reduction policy.

Estimating Economic Loss by S/W Vulnerability (S/W 취약점으로 인한 손실비용 추정)

  • Kim, Min-Jeong;Yoo, Jinho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.31-43
    • /
    • 2014
  • These days a lot of cyber attacks are exploiting the vulnerabilities of S/W. According to the trend of vulnerabilities is announced periodically, security directions are suggested and security controls are updated with this trend. Nevertheless, cyber attacks like hacking during the year 2011 are increased by 81% compared to 2010. About 75% of these cyber attacks are exploiting the vulnerabilities of S/W itself. In this paper, we have suggested a VIR model, which is a spread model of malware infection for measuring economic loss by S/W vulnerability, by applying the SIR model which is a epidemic model. It is applied to estimate economic loss by HWP(Hangul word) S/W vulnerabilities.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation (위험 전파 모형을 고려한 공급사슬의 구조적 취약성 평가 지표 설계)

  • Moon, Hyangki;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.125-140
    • /
    • 2015
  • It is general that the impact of supply chain risk spread out to the whole network along the connected structure. Due to the risk propagation the probability to exposure a certain risk is affected by not only the characteristics of each risk factor but also network structure. It means that the structural connectivity among vertices should be considered while designing supply chain network in order to minimize disruption cost. In this research, the betweenness centrality has been utilized to quantitatively assess the structural vulnerability. The betweenness centrality is interpreted as the index which can express both the probability of risk occurrence and propagation of risk impact. With the structural vulnerability index, it is possible to compare the stability of each alternative supply chain structure and choose the better one.

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.