• Title/Summary/Keyword: Spread Vulnerability

Search Result 42, Processing Time 0.022 seconds

A Study on Fire Risk of Apartment House with Pilotis Structure - Focused on the Fire case of Uijeongbu-si Urban Livig Homes - (필로티 구조의 공동주택 화재 위험성 연구 - 의정부 대봉그린 도시형아파트 화재 사례를 중심으로 -)

  • Choi, Seung-Bok;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.30 no.3
    • /
    • pp.48-54
    • /
    • 2016
  • Pilotis are support columns that lift a building above the ground. Thus, they can elevate the lowest floor to the secondfloor level and, in Korea, are used to leav a parking area below multifamily housing. However, if there is a fire in the piloti area, the cars and main entrance door are wrapped in flames. Due to the inflammability of the materials, the combustion of the cars and insulation at the ceiling of the pilotis, having a high heat release rate, can quickly destroy the front entrance of the building and spread heat, flames and a poisonous gas to the stairs and elevator pit. Therefore, the fire can quickly spread to the whole building, putting the lives of the residents in danger. This study was an in-depth accidental case study of the "Uijeongbu Fire Accident" that killed 5 residents and injured 139 others. The study identified the relationships between the fire at the piloti structure of multifamily housing and the vulnerability of this structure and its inherent weaknesses.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

Disaster Prevention Planning through Analysis of Debris Flow Vulnerability Based on Mountain Basin Features (산지유역 기반의 토석류 취약성 분석을 통한 재해방지 계획수립 연구)

  • Kim, Man-Il;Lee, Moon-Se;Hong, Kwan-Pyo
    • The Journal of Engineering Geology
    • /
    • v.27 no.4
    • /
    • pp.393-403
    • /
    • 2017
  • Mountain disasters in Korea have caused massive social and economic damage. During the period 2005-2014 there has been an annual average of 7 deaths and disaster recovery costs of 79.8 billion won in the country's 4393 ha of mountainous areas. The primary mountain disasters are landslides on mountain slopes, and secondary debris flows can spread along mountain streams, damaging facilities and settlements in lower areas. Typhoons and local rainfall can cause such disasters, while anthropogenic factors include development that damages the mountainous terrain. The study area was divided into three basins. For each basin, a debris flow vulnerability assessment method was proposed considering FLO-2D analysis results and the local topography, geology, and forestation. To establish an in situ investigation, analysis, and evaluation plan for potential mountain disasters, we selected mountain basins that are potentially vulnerable to mountain disasters through analysis of their mountain slopes and streams. This work suggests the establishment of a comprehensive plan for disaster prevention based on a mountain basin feature.

Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools (공개 보안 도구를 이용한 리눅스 기반 통합 보안 시스템의 설계 및 구현)

  • Jeon, Yong-Hee;Kim, Min-Soo;Jang, Jung-Sook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.485-496
    • /
    • 2004
  • The wide spread of Internet makes susceptible to the attacks via communication Web from hackers using the vulnerability of both computer and network systems. In this paper, we design and implement an integrated security system, named as LISS(Linux-based Integrated Security System) in which an integrated security management is possible. This system is based on the open operating system, Linux and consists of open security tools, which is effective in security management of Linux based-servers. We also construct a test-bed in order to testify the performance of the LISS. It is revealed that the implemented system captures all the attack Patterns generated from Network Mapper.

Analysis of Privacy Vulnerability Caused by Location-Based Service (위치기반 서비스에 따른 개인정보보안 취약점의 사례분석)

  • Choi, Hee Sik;Cho, Yang Hyun;Kim, Jung Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.151-159
    • /
    • 2014
  • Recently, spread of large amount Smartphones made users to download location-based service applications, which provided by application developers. These location-based service applications are convenient tool for users. Location-based service use technology to find location of user and provide information of user's location. Leakage of information of user's location and expose of privacy life raised new controversy. In this thesis, it will analyze relations of increase of Smartphone market, usage of Location-based service and severity of personal information leakage. Also, it will analyze examples of user's case of damage which caused by leakage personal information and find solutions to reduce damage of personal information leakage. In research, it will find cases of damage that cause by Location-based service. Also it will analyze and research cases of damage and present with graph and chart. In conclusion, to reduce and prevent from damage which caused by leakage personal information, it is important that users and application developers to realize danger of private and personal information leakage. Also, user's personal information must deal with cautiously and application developers have to research and develop the application with powerful security.

Seismic assessment of mixed masonry-reinforced concrete buildings by non-linear static analyses

  • Cattari, S.;Lagomarsino, S.
    • Earthquakes and Structures
    • /
    • v.4 no.3
    • /
    • pp.241-264
    • /
    • 2013
  • Since the beginning of the twentieth century, the progressive and rapid spread of reinforced concrete (RC) has led to the adoption of mixed masonry-RC solutions, such as the confined masonry. However, together with structures conceived with a definite role for earthquake behaviour, the spreading of RC technology has caused the birth of mixed solutions inspired more by functional aspects than by structural ones, such as: internal masonry walls replaced by RC frames, RC walls inserted to build staircases or raising made from RC frames. Usually, since these interventions rise from a spontaneous build-up, any capacity design or ductility concepts are neglected being designed only to bear vertical loads: thus, the vulnerability assessment of this class becomes crucial. To investigate the non-linear seismic response of these structures, suitable models and effective numerical tools are needed. Among the various modelling approaches proposed in the literature and codes, the authors focus their attention on the equivalent frame model. After a brief description of the adopted model and its numerical validation, the authors aim to point out some specific peculiarities of the seismic response of mixed masonry-RC structures and their repercussions on safety verification procedures (referring in particular way to the non-linear static ones). In particular, the results of non-linear static analyses performed parametrically to various configurations representative of different interventions are discussed.

Trends and methods of preventing router attacks using network vulnerability (네트워크 취약점을 통한 공유기 공격동향 및 예방방법)

  • Lee, Young-Hyeon;Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.262-265
    • /
    • 2015
  • In modern society, the spread of computers and smart phones, the Internet has become part of life. Therefore, the most places, wired/wireless router is installed. Crackers can attack the user to use the router by exploiting network vulnerabilities. therefore, the administrator is able to try cracker variety of attacks sloppy router, vaccine is installed also computer and smartphone users, appearance and address of the usual Internet is not deer medium and similar. In this paper, we look at a method for preventing in each attack seen for typical network attacks.

  • PDF

Network security and legal protection of the Criminal (네트워크보안의 형사법적 보호)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.11-19
    • /
    • 2011
  • The spread of computer and network gets various social and economic activities done quickly and efficiently. As a result, it makes a crime using network easy and increases the vulnerability of a social system. As there is a crime as a social being, we need to give careful consideration to the crime occurring in virtual space. Accordingly, the purpose of this paper is to investigate the regulatory need of the Criminal Procedure concerning the network security issues as the new legal and regulatory space that begins to be realized from the late of 20th century because of the extent of social threat. Above all, we addresses whether the amendment of existing legal regulations is necessary, based on the special characteristics of the virtual space.

Implementation of Under Voltage Load Shedding for Fault Induced Delayed Voltage Recovery Phenomenon Alleviation

  • Lee, Yun-Hwan;Park, Bo-Hyun;Oh, Seung-Chan;Lee, Byong-Jun;Shin, Jeong-Hoon;Kim, Tae-Kyun
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.406-414
    • /
    • 2014
  • Significant penetration of induction motor loads into residential neighborhood and commercial regions of local transmission systems at least partially determine a vulnerability to a fault induced delayed voltage recovery (FIDVR) event. Highly concentrated induction motor loads with constant torque could stall in response to low voltages associated with system faults. FIDVR is caused by wide spread stalling of small HVAC units (residential air conditioner) during transmission level faults. An under voltage load shedding scheme (UVLS) can be an effective component in a strategy to manage FIDVR risk and limit the any potential disturbance. Under Voltage Load Shedding take advantage of the plan to recovery the voltage of the system by shedding the load ways to alleviation FIDVR.

Development of LMS Evaluation Index for Non-Face-to-Face Information Security Education (비대면 정보보호 교육을 위한 LMS 평가지표 개발)

  • Lee, Ji-Eun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1055-1062
    • /
    • 2021
  • As face-to-face education becomes difficult due to the spread of COVID-19, the use of e-learning content and virtual training is increasing. In the case of information security education, practice to learn response techniques is important, so simulation hacking and vulnerability analysis activities have been supported as virtual training for a long time. In order to increase the educational effect, contents should be designed similar to real situation, and learning activities to achieve the learning goals should be designed. In addition, excellent functions and scalability of the system supporting learning activities are required. The researcher developed an LMS evaluation index that supports non-face-to-face education by considering the key elements of non-face-to-face education and training. The developed evaluation index was applied to the information security education platform to verify its practical utility.