• Title/Summary/Keyword: Statistics of Vulnerabilities

Search Result 10, Processing Time 0.029 seconds

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

A Study on Web Vulnerability Risk Assessment Model Based on Attack Results: Focused on Cyber Kill Chain (공격 결과 기반의 웹 취약점 위험도 평가 모델 연구: 사이버 킬체인 중심으로)

  • Jin, Hui Hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.779-791
    • /
    • 2021
  • Common web services have been continuously targeted by hackers due to an access control policy that must be allowed to an unspecified number of people. In order to cope with this situation, companies regularly check web vulnerabilities and take measures according to the risk of discovered vulnerabilities. The risk of these web vulnerabilities is calculated through preliminary statistics and self-evaluation of domestic and foreign related organizations. However, unlike static diagnosis such as security setting and source code, web vulnerability check is performed through dynamic diagnosis. Even with the same vulnerability item, various attack results can be derived, and the degree of risk may vary depending on the subject of diagnosis and the environment. In this respect, the predefined risk level may be different from that of the actual vulnerability. In this paper, to improve this point, we present a web vulnerability risk assessment model based on the attack result centering on the cyber kill chain.

A Study on the Impedimental Factors for Flight Safety of Cockpit Automation Systems (조종석 자동화 시스템의 안전저해요인에 관한 연구)

  • 한경근;이병기
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.1
    • /
    • pp.99-116
    • /
    • 2000
  • Accident statistics cite the flightcrew as a primary contributor in about 70 percent of accidents involving transport category airplanes. The introduction of modem flight deck designs, which have automated many piloting tasks, has reduced or eliminated some types of flightcrew errors, but other types of errors have been introduced. To identify the impedimental factors in highly automated modem airplane cockpit systems, this study used readily available information sources and case study, From the evidence, this study identified issues that show vulnerabilities in pilot management of automation, situation awareness, communication between pilots and controllers, pilot's training and evaluation methods. The next step will require the aviation community to solve these problems for the safety improvement.

  • PDF

Optimization of Information Security Investment Portfolios based on Data Breach Statistics: A Genetic Algorithm Approach (침해사고 통계 기반 정보보호 투자 포트폴리오 최적화: 유전자 알고리즘 접근법)

  • Jung-Hyun Lim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.201-217
    • /
    • 2020
  • Information security is an essential element not only to ensure the operation of the company and trust with customers but also to mitigate uncertain damage by preventing information data breach. Therefore, It is important to select appropriate information security countermeasures and determine the appropriate level of investment. This study presents a decision support model for the appropriate investment amount for each countermeasure as well as an optimal portfolio of information countermeasures within a limited budget. We analyze statistics on the types of information security breach by industry and derive an optimal portfolio of information security countermeasures by using genetic algorithms. The results of this study suggest guidelines for investing in information security countermeasures in various industries and help to support objective information security investment decisions.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

A Structural Equation Model for Happiness in Mothers with Young Children (영유아기 자녀를 둔 어머니의 행복감 구조모형)

  • Yeom, Mijung;Yang, Soo
    • Journal of Korean Academy of Nursing
    • /
    • v.49 no.3
    • /
    • pp.241-253
    • /
    • 2019
  • Purpose: This study aimed to develop and test a model of the happiness of mothers with young children based on the stress-coping-adaptation model of Lazarus and Folkman. Methods: The data collection period was from May to July 2016. A self-report questionnaire was used to collect data from 210 mothers with children under 5 years of age living in Seoul, Gyeonggi, and Gangwon provinces. The exogenous variable was parenting stress, and the endogenous variables were parenting alliance, depression, optimism, ways of coping, and happiness. Data from 201 questionnaires were analyzed using the SPSS 22.0 and AMOS 20.0 programs. Data analyses included descriptive statistics, factor analysis, and structural equation modeling. Results: The final modified model showed a reasonable fit to the data, and out of 25 paths, 13 were statistically significant. This model explained 78.4% of the variance in the happiness of mothers with young children and confirmed that depression, optimism, parenting alliance, and social support-focused coping have a direct effect on the subject's happiness. Parenting stress also influenced happiness through parenting alliance, depression, and optimism. Conclusion: In order to bolster the happiness of mothers with young children, positive psychological interventions that can minimize psychological vulnerabilities, such as depression, and that can enhance their strengths, such as optimism, may serve as effective ways of coping with and adapting to stress.

A Study on the Classification of OVAL Definitions for the Application of SCAP to the Korea Security Evaluation System (국내 보안평가체제에 SCAP을 활용하기 위한 OVAL 정의 분류 연구)

  • Kim, Se-Eun;Park, Hyun-Kyung;Ahn, Hyo-Beom
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.54-61
    • /
    • 2022
  • With the increase in the types of information systems managed by public institutions and companies, a security certification system is being implemented in Korea to quickly respond to vulnerabilities that may arise due to insufficient security checks. The korea security evaluation system, such as ISMS-P, performs a systematic security evaluation for each category by dividing the categories for technical inspection items. NIST in the United States has developed SCAP that can create security checklists and automate vulnerability checks, and the security checklists used for SCAP can be written in OVAL. Each manufacturer prepares a security check list and shares it through the SCAP community, but it's difficult to use it in Korea because it is not categorized according to the korea security evaluation system. Therefore, in this paper, we present a mechanism to categorize the OVAL definition, which is an inspection item written in OVAL, to apply SCAP to the korea security evaluation system. It was shown that 189 out of 230 items of the Red Hat 8 STIG file could be applied to the korea security evaluation system, and the statistics of the categorized Redhat definition file could be analyzed to confirm the trend of system vulnerabilities by category.

A Study on the Regional Difference of Obesity in the Social Vulnerabilities -Focused on the Suwon City (사회취약계층 비만의 지역 격차에 관한 연구 -수원시를 중심으로)

  • Kim, Han-Yee;Kim, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.682-689
    • /
    • 2019
  • This study aims to spatialize the gap between obesity levels through the body mass index, an objective indicator of the level of health among vulnerable people. Thus, areas where the BMI showed cluster patterns with spatial high and low values were extracted and the characteristics of the region were analyzed. The analysis showed that the I statistics for the obesity rate were 0.07 and the z-score was 4.39, confirming spatial autocorrelation. For z-score, it was much larger than the maximum threshold of 2.57. This means that the rate of obesity among the socially vulnerable is regional, and this gap is spatially significant. The results of comparing and analyzing the local environment for these areas of obesity and health care were found to be areas with poor public transportation, less readily available parks, and a concentration of single and multi-generation housing. The analysis results of this study are meaningful in that they provide spatial implications for the health of the socially vulnerable class that previous studies have neglected.

A Spatial Analysis of Seismic Vulnerability of Buildings Using Statistical and Machine Learning Techniques Comparative Analysis (통계분석 기법과 머신러닝 기법의 비교분석을 통한 건물의 지진취약도 공간분석)

  • Seong H. Kim;Sang-Bin Kim;Dae-Hyeon Kim
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.159-165
    • /
    • 2023
  • While the frequency of seismic occurrence has been increasing recently, the domestic seismic response system is weak, the objective of this research is to compare and analyze the seismic vulnerability of buildings using statistical analysis and machine learning techniques. As the result of using statistical technique, the prediction accuracy of the developed model through the optimal scaling method showed about 87%. As the result of using machine learning technique, because the accuracy of Random Forest method is 94% in case of Train Set, 76.7% in case of Test Set, which is the highest accuracy among the 4 analyzed methods, Random Forest method was finally chosen. Therefore, Random Forest method was derived as the final machine learning technique. Accordingly, the statistical analysis technique showed higher accuracy of about 87%, whereas the machine learning technique showed the accuracy of about 76.7%. As the final result, among the 22,296 analyzed building data, the seismic vulnerabilities of 1,627(0.1%) buildings are expected as more dangerous when the statistical analysis technique is used, 10,146(49%) buildings showed the same rate, and the remaining 10,523(50%) buildings are expected as more dangerous when the machine learning technique is used. As the comparison of the results of using advanced machine learning techniques in addition to the existing statistical analysis techniques, in spatial analysis decisions, it is hoped that this research results help to prepare more reliable seismic countermeasures.

Assessment of water use vulnerability in the unit watersheds using TOPSIS approach with subjective and objective weights (주관적·객관적 가중치를 활용한 TOPSIS 기반 단위유역별 물이용 취약성 평가)

  • Park, Hye Sun;Kim, Jeong Bin;Um, Myoung-Jin;Kim, Yeonjoo
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.8
    • /
    • pp.685-692
    • /
    • 2016
  • This study aimed to develop the indicator-based approach to assess water use vulnerability in watersheds and applied to the unit watershed within the Han River watershed. Vulnerability indices were comprised of three sub-components (exposure, sensitivity, adaptive capacity) with respect to water use. The indicators were made up of 16 water use indicators. Then we estimated vulnerability indices using the Technique for Order of Preference by Similarity to Ideal Solution approach (TOPSIS). We collected environmental and socio-economic data from national statistics database, and used them for simulated results by the Soil and Water Assessment Tool (SWAT) model. For estimating the weighted values for each indicator, expert surveys for subjective weight and data-based Shannon's entropy method for objective weight were utilized. With comparing the vulnerability ranks and analyzing rank correlation between two methods, we evaluated the vulnerabilities for the Han River watershed. For water use, vulnerable watersheds showed high water use and the water leakage ratio. The indices from both weighting methods showed similar spatial distribution in general. Such results suggests that the approach to consider different weighting methods would be important for reliably assessing the water use vulnerability in watersheds.