• Title/Summary/Keyword: Technology Vulnerability Guide

Search Result 8, Processing Time 0.019 seconds

Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement (PC보안 강화를 위한 기술적 취약점 진단항목 개선 연구)

  • Cho, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-7
    • /
    • 2019
  • There are various cyber attacks on business PCs. In order to reduce the threat of PC security, we are preventing the vulnerability from being diagnosed beforehand. However, this guideline is difficult to cope with because the domestic vulnerability guide does not update the diagnostic items. In this paper, we examine the cyber infringement cases of PCs and the diagnostic items of foreign technical vulnerabilities in order to cope with security threats. In addition, an improved guide is provided by comparing the differences in the diagnostic items of technical vulnerability from abroad and domestic. Through 41 proposed technical vulnerability improvement items, it was found that various security threats can be coped with. Currently, it is mainly able to respond to only known vulnerabilities, but we hope that applying this guideline will reduce unknown security threats.

Research on Education and Training of the Analyzer for Security Enhancement of SW Vulnerability (SW 취약점의 보안성 강화를 위한 진단원의 교육 양성 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.945-950
    • /
    • 2017
  • Due to the vulnerability of the software, there is a hacking attack on the country's cyber infrastructure and real financial assets. Software is an integral part of the operating system and execution system that controls and operates Internet information provision, cyber financial settlement and cyber infrastructures. Analyzing these software vulnerabilities and enhancing security will enhance the security of cyber infrastructures and enhance the security of actual life in the actual country and people. Software development security system analysis and software development Security diagnosis analysis and research for enhancing security of software vulnerability. In addition, we will develop a textbook for the training of software vulnerability diagnosis and maintenance education, develop pilot test problems, pilot test of diagnostic staff, The purpose of this study is to enhance the software security of the cyber infrastructures of national and national life by presenting curriculum and diagnosis guide to train the software vulnerability examiner.

A Study On The Cloud Hypervisor ESXi Security Vulnerability Analysis Standard (클라우드 하이퍼바이저 ESXi 보안 취약점 진단 기준에 관한 연구)

  • Kim, Sun-Jib;Heo, Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.31-37
    • /
    • 2020
  • The cloud computing industry is regarded as a key element of the ICT industry and an important industry that will be a watershed for the future development of ICT industry. Korea has established the 1st~2nd cloud computing development basic plan to induce the growth of the cloud industry. However, the domestic information security guide provides technical vulnerability analysis criteria for Unix and Windows servers, DBMS, network equipment, and security equipment, but fails to provide vulnerability analysis criteria for hypervisors that are key elements of cloud computing. Organizations that have deployed cloud systems will be able to assist in vulnerability analysis using the criteria presented in this paper.

Secure Coding Guide of Design Step-Verification and Expression of Input Data (설계 단계의 보안 코딩 지침-입력 데이터 검증 및 표현)

  • Shin, SSeong-Yoon;Lee, Hyun-Chang;Ahn, Woo-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.105-106
    • /
    • 2016
  • 본 논문에서는 S/W 개발 보안 지침에서 설계 단계의 보안 코딩 지침을 알려준다. 크로스 사이트 스크립트 공격 취약점(XSS)에서부터 자원 삽입 까지 S/W 보안 취약점의 주요 내용을 입력 데이터의 검증 및 표현에 맞추어 지침을 전달하도록 한다.

  • PDF

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

Modelling protection behaviour towards micronutrient deficiencies: Case of iodine biofortified vegetable legumes as health intervention for school-going children

  • Mogendi, Joseph Birundu;De Steur, Hans;Gellynck, Xavier;Makokha, Anselimo
    • Nutrition Research and Practice
    • /
    • v.10 no.1
    • /
    • pp.56-66
    • /
    • 2016
  • BACKGROUND/OBJECTIVES: Despite successes recorded in combating iodine deficiency, more than 2 billion people are still at risk of iodine deficiency disorders. Rural landlocked and mountainous areas of developing countries are the hardest hit, hence the need to explore and advance novel strategies such as biofortification. SUBJECTS/METHODS: We evaluated adoption, purchase, and consumption of iodine biofortified vegetable legumes (IBVL) using the theory of protection motivations (PMT) integrated with an economic valuation technique. A total of 1,200 participants from three land-locked locations in East Africa were recruited via multi-stage cluster sampling, and data were collected using two, slightly distinct, questionnaires incorporating PMT constructs. The survey also elicited preferences for iodine biofortified foods when offered at a premium or discount. Determinants of protection motivations and preferences for iodine biofortified foods were assessed using path analysis modelling and two-limit Tobit regression, respectively. RESULTS: Knowledge of iodine, iodine-health link, salt iodization, and biofortification was very low, albeit lower at the household level. Iodine and biofortification were not recognized as nutrient and novel approaches, respectively. On the other hand, severity, fear, occupation, knowledge, iodine status, household composition, and self-efficacy predicted the intention to consume biofortified foods at the household level; only vulnerability, self-efficacy, and location were the most crucial elements at the school level. In addition, results demonstrated a positive willingness-to-pay a premium or acceptance of a lesser discount for biofortification. Furthermore, preference towards iodine biofortified foods was a function of protection motivations, severity, vulnerability, fear, response efficacy, response cost, knowledge, iodine status, gender, age. and household head. CONCLUSIONS: Results lend support for prevention of iodine deficiency in unprotected populations through biofortification; however 'threat' appraisal and socio-economic predictors are decisive in designing nutrition interventions and stimulating uptake of biofortification. In principle, the contribution is threefold: 1) Successful application of the integrated model to guide policy formulation; 2) Offer guidance to stakeholders to identify and tap niche markets; 3) stimulation of rural economic growth around school feeding programmes.

Stress distribution in implant abutment components made of titanium alloy, zirconia, and polyetheretherketone: a comparative study using finite element analysis (티타늄 합금, 지르코니아, 폴리에테르에테르케톤 지대주 재질에 따른 임플란트 구성요소의 응력분포: 유한 요소 분석을 통한 비교 연구)

  • Sung-Min Kim
    • Journal of Technologic Dentistry
    • /
    • v.46 no.2
    • /
    • pp.21-27
    • /
    • 2024
  • Purpose: This study aimed to analyze the stress distribution and deformation in implant abutments made from titanium (Ti-6Al-4V), zirconia, and polyetheretherketone (PEEK), including their screws and fixtures, under various loading conditions using finite element analysis (FEA). Methods: Three-dimensional models of the mandible with implant abutments were created using Siemens NX software (NX10.0.0.24, Siemens). FEA was conducted using Abaqus to simulate occlusal loads and assess stress distribution and deformation. Material properties such as Young's modulus and Poisson's ratio were assigned to each component based on literature and experimental data. Results: The FEA results revealed distinct stress distribution patterns among the materials. Titanium alloy abutments exhibited the highest stress resistance and the most uniform stress distribution, making them highly suitable for long-term stability. Zirconia abutments showed strong mechanical properties with higher stress concentration, indicating potential vulnerability to fracture despite their aesthetic advantages. PEEK abutments demonstrated the least stress resistance and higher deformation compared to other abutment materials, but offered superior shock absorption, though they posed a higher risk of mechanical failure under high load conditions. Conclusion: The study emphasizes the importance of selecting appropriate materials for dental implants. Titanium offers durability and uniform stress distribution, making it highly suitable for long-term stability. Zirconia provides aesthetic benefits but has a higher risk of fracture compared to titanium. PEEK excels in shock absorption but has a higher risk of mechanical failure compared to both titanium and zirconia. These insights can guide improved implant designs and material choices for various clinical needs.

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.