• Title/Summary/Keyword: Target Vulnerability

Search Result 122, Processing Time 0.025 seconds

Numerical Analysis Approach to Calculate the Damage Degree of the Combat Vehicle (전투차량의 피해 정도를 계산하기 위한 수치해석적 접근법)

  • Cho, A Hyoun;Park, Kang;Kim, Gun In
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.2
    • /
    • pp.101-109
    • /
    • 2017
  • In order to reduce the number of casualties by improving the survivability of the combat vehicle, the vulnerability analysis of the combat vehicle is needed. However, the actual test for the vulnerability analysis requires large experimental space and expensive equipment costs long time and large expense. It is needed to develop a new method that can replace the actual test. In the paper, we suggested a new approach to analyzing the vulnerability using the M&S method instead of the actual test. To analyze the vulnerability, the shot line analysis is performed to find out which part is penetrated by the bullet. The component of the parts is simplified to "Single-Target", "Double-Target", "Air gapped-Target" and can be performed the penetration analysis using the ANSYS Explicit Dynamics. The penetration depth and the residual velocity of the bullet are calculated by analyzing penetration of each part of the combat vehicle. The penetration data calculated the penetration analysis can be used to define the damage level of the combat vehicle. The purpose of this paper is to collect penetration data for various targets and bullets. And "7.62mmAP" is used as the bullet, "7075-T6" is used as a target.

A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA (사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구)

  • Jang, Youngcheon;Kang, Kyongran;Choi, Bongwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

Vulnerability Assessment Procedure for the Warship Including the Effect of Shotline and Penetration of Fragments (탄두의 관통 효과를 고려한 함정 취약성 평가 절차에 관한 기본 연구)

  • Kim, Kwang-Sik;Lee, Jang-Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.49 no.3
    • /
    • pp.254-263
    • /
    • 2012
  • The survivability of warship is assessed by susceptibility, vulnerability and recoverability. Essentially, a vulnerability assessment is a measure of the effectiveness of a warship to resist hostile weapon effects. Considering the shot line and its penetration effect on the warship, present study introduces the procedural aspects of vulnerability assessments of warship. Present study also considers the prediction of penetration damage to a target caused by the impact of projectiles. It reflects the interaction between the weapon and the target from a perspective of vulnerable area method and COVART model. The shotline and tracing calculation have been directly integrated into the vulnerability assessment method based on the penetration equation empirically obtained. A simplified geometric description of the desired target and specification of a threat type is incorporated with the penetration effect. This study describes how to expand the vulnerable area assessment method to the penetration effect. Finally, an example shows that the proposed method can provide the vulnerability parameters of the warship or its component under threat being hit through tracing the shotline path thereby enabling the vulnerability calculation. In addition, the proposed procedure enabling the calculation of the component's multi-hit vulnerability introduces a propulsion system in dealing with redundant Non-overlapping components.

The Target Modeling and The Shot Line Analysis System to Assess Vulnerability of the Ground Combat Vehicle (지상전투차량 취약성 평가를 위한 표적 모델링과 피격선 분석 시스템)

  • Yoo, Chul;Jang, Eun Su;Park, Kang;Choi, Sang Yeong
    • Korean Journal of Computational Design and Engineering
    • /
    • v.20 no.3
    • /
    • pp.238-245
    • /
    • 2015
  • Vulnerability assessment is a process to calculate the damage degree of a combat vehicle when the combat vehicle is attacked by an enemy. When the vehicle is hit, it is necessary to analyze the shot line to calculate which components are damaged and judge whether the armor of the vehicle is penetrated by enemy's warhead. To analyze the shot line efficiently, this paper presents the target modeling and the shot line analysis system to assess vulnerability of the ground combat vehicle. This system is easily able to do several functions: 1) the program reads STL files converted from CAD model which is designed by commercial CAD software. 2) It calculates the intersection between triangle of STL mesh and the shot line, and check if the components of the model are penetrated. 3) This program can visualize the results using OpenGL. The vulnerability assessment using the shot line analysis can be used to model the armor of the combat vehicle and arrange the inner components effectively in the early stage of development of the combat vehicle.

An Analysis of The Relationship Among Nursing Students' Perception of Target Vulnerability and Target Advocacy, Child Rights Awareness, and Child Abuse Reporting Intention (간호대학생이 지각한 대상자 취약성 및 옹호, 아동권리인식, 아동학대 신고의도 간의 관계 분석)

  • Ji-Ah Song;Jae Woo Oh
    • Journal of Industrial Convergence
    • /
    • v.22 no.3
    • /
    • pp.155-163
    • /
    • 2024
  • Nursing students, as prospective nurses, are expected to act as child abuse reporters and advocates for child targets. Therefore, this study aimed to provide a basis for developing a child abuse prevention education program for nursing students by determining the extent of nursing students' perceived target vulnerability and target advocacy, child rights awareness, and intention to report child abuse, and analyzing the relationships among the variables. This study is a descriptive survey study to identify the effects of target vulnerability, target advocacy, and child rights awareness on intention to report child abuse among 154 nursing students, and the data collection period was from July 3 to July 31, 2023, and the collected data were analyzed using SPSS 25.0 program. As a result of identifying the influential factors on nursing students' intention to report child abuse, child abuse education, championing social justice as a sub-variable of target advocacy, and target vulnerability, the explanatory power of these variables was 35.8%. Based on the results of this study, it is suggested that it is necessary to increase activities through the development and application of simulation education based on actual clinical cases in order to increase nursing students' interest in and education about child abuse.

A Study on the Design and Implementation of System for Predicting Attack Target Based on Attack Graph (공격 그래프 기반의 공격 대상 예측 시스템 설계 및 구현에 대한 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.79-92
    • /
    • 2020
  • As the number of systems increases and the network size increases, automated attack prediction systems are urgently needed to respond to cyber attacks. In this study, we developed four types of information gathering sensors for collecting asset and vulnerability information, and developed technology to automatically generate attack graphs and predict attack targets. To improve performance, the attack graph generation method is divided into the reachability calculation process and the vulnerability assignment process. It always keeps up to date by starting calculations whenever asset and vulnerability information changes. In order to improve the accuracy of the attack target prediction, the degree of asset risk and the degree of asset reference are reflected. We refer to CVSS(Common Vulnerability Scoring System) for asset risk, and Google's PageRank algorithm for asset reference. The results of attack target prediction is displayed on the web screen and CyCOP(Cyber Common Operation Picture) to help both analysts and decision makers.

Assessment of Vulnerable Area and Naval Ship's Vulnerability based on the Carleton Damage Function (칼튼 손상함수를 이용한 주요장비의 취약 면적 산정과 함정 취약성 평가 방법)

  • Lee, Jang Hyun;Choi, Won Jun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.3
    • /
    • pp.274-280
    • /
    • 2018
  • This paper deals with the calculation of vulnerable areas of critical components required for the assessment of naval ship's vulnerability. Taking into account the effectiveness of threatening weapons, the probability density function of damage was used to assess vulnerable areas or vulnerabilities of critical components. It is shown that the vulnerable area of critical component can be simply computed from the damage function. Considering the weapon effectiveness of fragmentation and explosion on the target, both Carleton Damage Function and Rectangular Cookie Cutter Function representing the probability of damage are applied to the vulnerable area assessment. Carleton damage function is utilized to describe the weapon-target interaction in the vulnerability analyses. A problem of blast effect against an assumed naval ship is chosen as a case study. Vulnerability is evaluated by applying the suggested method to the equipments arranged in the engine room of the virtual ship.

Methodologies for Analyzing Interaction between Shape Charge Jets and Targets (성형작약제트와 표적 상호작용 해석 방법론)

  • Kang, Min Ah;Park, Sung Jun;Greulich, S.;Hartmann, T.;Moon, Sei-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.11-21
    • /
    • 2022
  • Two methods for analyzing interaction between shaped charge jets and targets are taken in AVEAM-MT (ADD Vulnerability and Effectiveness Assessment Model for Materiel Target), which is a model for vulnerability analysis of materiel targets and being developed by ADD. One is an empirical method improved from the Fireman-Pugh technique for rapid penetration calculation into target components. The other is ADD-TSC(ADD Tandem Shaped Charge), which is a physics-based model extended to be applicable for shaped charge jets from the Walker-Anderson penetration model for higher fidelity analysis. In this paper, the two methods are briefly described, and the empirical technique is compared to the physics-based model in the prediction of residual penetration capacity. The latter is also compared to experimental results found in literature in predicting penetration capacity. These comparisons show that both methods can be used for fast calculations or higher fidelity calculations in vulnerability analysis models like AVEAM-MT which is required to perform a considerable amount of iterative simulation for damage analysis.

Debris Flow Risk Evaluation and Ranking Method for Drainage Basin adjacent to Road (도로인근 유역의 토석류 위험평가 및 등급화 방안)

  • Kim, Kyung-Suk;Jang, Hyun-Ick
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.279-290
    • /
    • 2010
  • Technical countermeasures against debris flow should be established upon the risk level of the target location. Risk of debris flow should consider the hazard imposed by debris flow and vulnerability of the facilities to debris flow. In this research, we have defined the target location for risk evaluation and suggested scoring method of hazard of debris flow and vulnerability of road to debris flow. By defining risk rank into 6 categories in terms of possibility of damage during rainfall and using the risk scores of 46 debris flow cases, we have suggested risk ranking matrix. The method can be used in ranking the drainage basin adjacent to road by simply determining the hazard with vulnerability score and can be used for planning the debris flow countermeasures.

  • PDF

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.