• Title/Summary/Keyword: Target vulnerability

Search Result 123, Processing Time 0.032 seconds

Development of Safety Assessment Indicators and Facility Management System for Crime Prevention - A Case Study of Park -

  • Lee, Su-Ji;Lee, Seung-Su;Song, Ki-Sung;Hwang, Jung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.109-116
    • /
    • 2019
  • In this study, a GIS-based park safety assessment index was developed to enable objective park vulnerability assessment through data-based GIS analysis, a safety assessment was conducted by selecting a target site where various parks are operated and applying the park safety assessment index. In addition, a facility management system was developed for efficient management of the park safety assessment to update the park safety and provide a foothold for indirect PPGIS. In the case of the assessment index of the safety rating of the park, it was possible to conclude that the accurate quantitative performance was given to the calculation of the safety grade of the park based on the fact that the facilities are different depending on the environment and the size of the park. In addition, the marking the safety grade of parks, as well as the function to show the safety facilities of parks, a common living area for citizens, the management system is expected to have an impact on promoting the use of parks. In the future, in functions such as reporting of facility failures and verifying civil information are implemented by applying civic group participation programs and crowd-sourcing technologies, it is believed that all facilities as well as parks managed by the local government can be managed more efficiently.

Socio-Economic and Demographic Determinants of Financial Inclusion in Underdeveloped Regions: A Case Study in India

  • KANDARI, Prashant;BAHUGUNA, Uma;SALGOTRA, Ajay Kumar
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.1045-1052
    • /
    • 2021
  • The main purpose of this paper is to explore the relationship between financial inclusion and socio-economic and demographic factors. Ownership of bank accounts, availing of credit facility, and use of mobile banking were considered the major indicators of financial inclusion. To achieved this objective, the present study was conducted in the rural regions of three hill districts of Uttarakhand. 780 rural households were selected by using stratified and judgment sampling technique. To measure the association between the variables, binary logistic regression model was employed. The findings of the study revealed that there is a significant association of socio-economic variables with financial inclusion. The overall analysis of the study indicates that the likelihood of having bank account, usage of mobile banking facility, and availing credit facility increases with the increase in the financial literacy of an individual in hill rural regions of the state. Further, the study also indicates the vulnerability of women relative to that of men in both cases of mobile usage and availing credit. The findings of the study suggest to target the economically vulnerable section of population (as identified in case of having low financial inclusion) and enhancing the financial literacy in these regions.

Analysis of Iran's Air Defense Network and Implications for the Development of South Korea's Air Defense Network

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.249-257
    • /
    • 2024
  • This study analyzes the current status and prospects of Iran's air defense network, focusing on the Russian-made S-300 system, and derives implications for the development of South Korea's air defense network. Iran's air defense network exhibits strengths such as long-range detection and interception capabilities, multi-target processing, high-altitude interception, and electronic warfare response. However, it also reveals weaknesses, including lack of mobility, difficulty in detecting low-altitude targets, obsolescence, training level of operating personnel, and vulnerability to electronic warfare. Real-world cases confirm these weaknesses, making the system susceptible to enemy evasion tactics, swarm drone attacks, and electronic warfare. Drawing from Iran's case, South Korea should establish a multi-layered defense system, strengthen low-altitude air defense and electronic warfare capabilities, foster the domestic defense industry for technological self-reliance, and enhance international cooperation. By addressing these aspects, South Korea can establish a robust air defense network and firmly protect its national security. Future research should aim to secure and analyze materials from the Iranian perspective for a more objective evaluation of Iran's air defense network and continuously track Iran's efforts to improve its air defense network and the trend of strengthening drone forces to predict changes in the Middle East security situation.

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.

GIS Spatial Analysis of Vulnerability of Protected Cultivation Area to Meteorological Disaster : A Case Study of Jeollanambuk Province, South Korea (GIS를 이용한 시설재배의 기상재해 취약지역 해석 - 전라남북도의 사례를 중심으로 -)

  • Kim, Dong Hyeon;Kang, Dong Hyeon;Lee, Si Young;Son, Jin Kwan;Park, Min Jung;Yoon, Yong-Cheol;Yun, Sung-Wook
    • Journal of Bio-Environment Control
    • /
    • v.26 no.2
    • /
    • pp.87-99
    • /
    • 2017
  • Recently the increase in an abnormal climate events and meteorological disasters which causes a great damage to greenhouse facilities. To minimize and evaluate the expected damages it is necessary to prepare countermeasures and a management system in advance. For this purpose, a quantitative analysis of weather and abnormal climate are needed to investigate protected cultivation areas which are vulnerable to natural disasters. This study focused on protected cultivation areas in Jeolla province, South Korea. Surrogate variables were calculated to analyze the vulnerable areas to meteorological disasters, and spatial distribution analysis was also performed by using GIS to present vulnerable areas on map. The map thus created and was compared with actual data of damages by meteorological disasters which occurred in target areas. The result of the comparison is as follows: About 50% of the target areas showed an agreement between the map created in this study and the actual data, these areas includes Gwangju metropolitan city, Naju city, Yeongam County, Jangseong County, Hampyeong County, and Haenam County. On the other hand, other areas, including Gunsan city, Mokpo city, and Muan County, suffered low damage in spite of high levels of vulnerability to meteorological disasters. This result was considered to be affected by such variables as different structural designs and management systems of greenhouses by region. This study carried out an analysis of meteorological data to find out more detailed vulnerability to protected cultivation area and to create a map of vulnerable protected cultivation areas. In addition, the map was compared with the record of natural disasters to identify actual vulnerable areas. In conclusion, this study can be utilized as basic data for preventing and reducing damages by meteorological disasters in terms of design and management of greenhouses.

A Study on the Penetration Characteristics of a Steel Fragment Impacting on the Target Plate of Aluminum 2024 (알루미늄 2024 표적에 대한 HE 탄두 파편의 관통 특성 연구)

  • Kim, Deuksu;Kang, Sunbu;Jung, Daehan;Chung, Youngjin;Park, Yongheon;Park, Seikwon;Hwang, Changsu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.3
    • /
    • pp.257-268
    • /
    • 2018
  • We have studied the damage mechanism of a metallic thin plate by the highly energetic fragments generated from high explosive(HE) warhead. The penetration process has presumed that the velocity of a fragment is in the range of 350 m/s to 3353 m/s, the thickness of Aluminum 2024 target plate is in the range of 1 mm~6.3 mm thick. The mass of fragment with hemisphere nose shape is in the range of 0.32 g to 16 g. The analytical solution for penetration process has been derived by using the report of the project THOR. The results of analysis implied that the closed forms by an exponentially decay function well fit the change of the ballistic limit velocity, loss velocity and loss mass of fragment as the mass of fragment and the thickness of target plate increase.

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.

A Study on Green Space Location Selection to Reduce Particulate Matter by Projecting Distributions of Emission Source and Vulnerable Groups - focusing on Seongdong-gu, Seoul - (미세먼지 배출원과 취약계층 분포 추정을 통한 미세먼지 저감 녹지 입지 선정 연구 - 서울시 성동구를 대상으로 -)

  • Shin, Ye-Eun;Park, Jin-Sil;Kim, Su-Yeon;Lee, Sang-Woo;An, Kyung-Jin
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.1
    • /
    • pp.53-68
    • /
    • 2021
  • The study aims to propose a locating method of green space for reducing Particulate Matter (PM) in ambient air in conjunction with its source traces and vulnerable groups. In order to carry out the aims and purposes, a literature review was conducted to derive indicators of vulnerable area to PM. Based on the developed indicators, the vulnerable areas and green spaces creation strategies for each cluster were developed for the case of Seongdong-gu, Seoul. As a result, six indicators for vulnerability analysis were came out including the vulnerable groups (children's facilities, old people's facilities), emission sources (air pollutant emission workplaces, roads), and environmental indicators (particulate matter concentration, NDVI). According to the six selected indicators, the target area was divided into 39 hexagons and analyzed to result the most vulnerable areas to particulate matter. As a result of comprehensive vulnerability analysis, the Seongsu-dong area was found to be the most vulnerable to particulate matter, and 5 clusters were derived through k-means cluster analysis. Cluster 1 was analyzed as areas that most vulnerable to particulate matter as a result of the comprehensive analysis, therefore urgent need to create green spaces to reduce particulate matter. Cluster 2 was areas that mostly belonged to the Han River. Cluster 3 corresponds to the largest number of hexagons, and since many vulnerable groups are distributed, it was analyzed as a cluster that required the creation of a green spaces to reduce particulate matter, focusing on facilities for vulnerable groups. Three hexagons are included in cluster 4, and the cluster has many roads and lacks vegetation in common. Cluster 5 has a lot of green spaces and is generally distributed with fewer vulnerable groups and emission sources; however, it has a high level of particulate matter concentration. In a situation where various green spaces creation projects for reducing particulate are being implemented, it is necessary to consider the vulnerable groups and emission sources and to present green space creation strategies for each space characteristic in order to increase the effectiveness of such projects. Therefore, this study is regarded as meaningful in suggesting a method for selecting a green area for reducing PM.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Life Risk Assessment of Landslide Disaster Using Spatial Prediction Model (공간 예측 모델을 이용한 산사태 재해의 인명 위험평가)

  • Jang, Dong-Ho;Chung, C.F.
    • Journal of Environmental Impact Assessment
    • /
    • v.15 no.6
    • /
    • pp.373-383
    • /
    • 2006
  • The spatial mapping of risk is very useful data in planning for disaster preparedness. This research presents a methodology for making the landslide life risk map in the Boeun area which had considerable landslide damage following heavy rain in August, 1998. We have developed a three-stage procedure in spatial data analysis not only to estimate the probability of the occurrence of the natural hazardous events but also to evaluate the uncertainty of the estimators of that probability. The three-stage procedure consists of: (i)construction of a hazard prediction map of "future" hazardous events; (ii) validation of prediction results and estimation of the probability of occurrence for each predicted hazard level; and (iii) generation of risk maps with the introduction of human life factors representing assumed or established vulnerability levels by combining the prediction map in the first stage and the estimated probabilities in the second stage with human life data. The significance of the landslide susceptibility map was evaluated by computing a prediction rate curve. It is used that the Bayesian prediction model and the case study results (the landslide susceptibility map and prediction rate curve) can be prepared for prevention of future landslide life risk map. Data from the Bayesian model-based landslide susceptibility map and prediction ratio curves were used together with human rife data to draft future landslide life risk maps. Results reveal that individual pixels had low risks, but the total risk death toll was estimated at 3.14 people. In particular, the dangerous areas involving an estimated 1/100 people were shown to have the highest risk among all research-target areas. Three people were killed in this area when landslides occurred in 1998. Thus, this risk map can deliver factual damage situation prediction to policy decision-makers, and subsequently can be used as useful data in preventing disasters. In particular, drafting of maps on landslide risk in various steps will enable one to forecast the occurrence of disasters.