• Title/Summary/Keyword: Threat Assessment

Search Result 183, Processing Time 0.029 seconds

Improvement of the EIA for Land Reclamation Projects in the Coastal Areas of Korea (해양매립사업 환경영향평가의 개선방안)

  • Jang, Ju-Hyoung;Eom, Ki-Hyuk;Kwon, Kee-Young;Hong, Sok-Jin;Park, Jae-Hyeon;Kim, Gui-Young
    • Journal of Environmental Science International
    • /
    • v.16 no.7
    • /
    • pp.847-853
    • /
    • 2007
  • In Korean coastal areas, land reclamations are main development projects that should be based on environmental impact assessment(EIA), because those human interventions can change coastlines, damage tidal flats, and pollute adjacent areas to threat seafood safety and devaluate overall ecosystem service value. Existing procedures of the EIA for land reclamation projects were diagnosed and evaluated to enhance them. Problems were identified in the designation of survey areas, the consistency in survey sites and periods, the standardization of survey methods and reports, the confidence of survey results and the verification of predictions. Lack of integration was noticeable and could be improved by synthesizing different assessments from topography geography, marine physics, marine chemistry and marine biology. We suggest that successful precautionary marine environment management requires readjusting the cost of EIA, recruiting experts in marine environment, constructing database and establishing specialized assessment system.

Structural robustness of RC frame buildings under threat-independent damage scenarios

  • Ventura, Antonio;De Biagi, Valerio;Chiaia, Bernardino
    • Structural Engineering and Mechanics
    • /
    • v.65 no.6
    • /
    • pp.689-698
    • /
    • 2018
  • This study focuses on a novel procedure for the robustness assessment of reinforced concrete (RC) framed structures under threat-independent damage scenarios. The procedure is derived from coupled dynamic and non-linear static analyses. Two robustness indicators are defined and the method is applied to two RC frame buildings. The first building was designed for gravity load and earthquake resistance in accordance with Eurocode 8. The second was designed according to the tie force (TF) method, one of the design quantitative procedures for enhancing resistance to progressive collapse. In addition, in order to demonstrate the suitability and applicability of the TF method, the structural robustness and resistance to progressive collapse of the two designs is compared.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

Assessment of Development and Opertation for Maritime Leisure in Mokpo Port using SWOT&AHP (목포항 요트산업 개발과 운영 주체 선정)

  • Jang, Woon-Jae;Keum, Jong-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.451-456
    • /
    • 2005
  • This paper proposes an evaluation model to assessment of development and operation for maritime leisure in Mokpo Port.. The proposed model is combination of SWOT(Strength, Weakness, Opportunity, Threat) and AHP(Analytic Hierarchy Process) to evaluate development and operation for maritime leisure. The evaluation hierarchical structure is structured by ISM(Interpretive structural modeling) and composed of five level. At the third level, It combine SWOT into the assessment system. Strength and Weakness are internal factors. Opportunities and threats are external factors. There are economic and maritime leisure development in the model. There are three development and operation investment as Third-Sector, company, local organization. According to the results, the participants perceive prefer to strength and opportunity and found that the priority for the development and operation for maritime leisure of Third-Sector.

  • PDF

Assessment of Development and Operation for Maritime Leisure In Mokpo Port using SWOT&AHP (SWOT&AHP을 이용한 목포항 요트산업 개발과 운영 주체 평가)

  • Jang Woon-Jae;Park Sung-Hyun;Keum Jong-Soo
    • Journal of Navigation and Port Research
    • /
    • v.29 no.8 s.104
    • /
    • pp.715-721
    • /
    • 2005
  • This paper proposes an evaluation model to assessment of development and operation for maritime leisure in Mokpo Port.. The proposed model is combination of SWOT(Strength, Weakness, Opportunity, Threat} and AHP(Analytic Hierarchy Process) to evaluate development and operation for maritime leisure. The evaluation hierarchical structure is structured by ISM(interpretive structural modeling} and composed of five level. At the third level, It combine SWOT into the assessment system Strength and Weakness are internal factors. Opportunities and threats are external factors. There are economic and maritime leisure development in the model. There are three development and operation investment as Third-Sector, company, local organization. According to the results, the participants perceive prefer to strength and opportunity and found that the priority for the development and operation for maritime leisure of Third-Sector.

Proposed RASS Security Assessment Model to Improve Enterprise Security (기업 보안 향상을 위한 RASS 보안 평가 모델 제안)

  • Kim, Ju-won;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.635-637
    • /
    • 2021
  • Cybersecurity assessment is the process of assessing the risk level of a system through threat and vulnerability analysis to take appropriate security measures. Accurate security evaluation models are needed to prepare for the recent increase in cyberattacks and the ever-developing intelligent security threats. Therefore, we present a risk assessment model through a matrix-based security assessment model analysis that scores by assigning weights across security equipment, intervals, and vulnerabilities. The factors necessary for cybersecurity evaluation can be simplified and evaluated according to the corporate environment. It is expected that the evaluation will be more appropriate for the enterprise environment through evaluation by security equipment, which will help the cyber security evaluation research in the future.

  • PDF

East Asian Security in the Multipolar World Order: A Review on the Security Threat Assessment of the Korean Peninsula Amid the Restructuring of International Order (다극체제와 동아시아 안보: 국제질서 재편에 따른 한반도 안보 위협 논의의 재고찰)

  • Lee, Sungwon
    • Analyses & Alternatives
    • /
    • v.6 no.2
    • /
    • pp.37-78
    • /
    • 2022
  • The U.S.-led international order, sustained by overwhelming national power since the end of the Cold War, is gradually being restructured from a unipolar international system to a bipolar international system or a multipolar international system, coupled with the weakening of U.S. global leadership and the rise of regional powers. Geopolitically, discussions have been constantly raised about the security instability that the reshaping of the international order will bring about, given that East Asia is a region where the national interests of the United States and regional powers sharply overlap and conflict. This study aims to critically analyze whether security discussions in Korea are based on appropriate crisis assessment and evaluation. This paper points out that the security crisis theory emerging in Korea tends to arise due to threat exaggeration and emphasizes the need for objective evaluation and conceptualization of the nature and the level of threats that the restructured international order can pose to regional security. Based on the analysis of changes in conflict patterns (frequency and intensity), occurring in East Asia during the periods divided into a bipolar system (1950-1990), a unipolar system (1991-2008), and a multipolar system (2009-current), this study shows that East Asia has not been as vulnerable to power politics as other regions. This investigation emphasizes that the complexity of Korea's diplomatic and security burden, which are aggravated by the reorganization of the international order, do not necessarily have to be interpreted as a grave security threat. This is because escalating unnecessary security issues could reduce the diplomatic strategic space of the Republic of Korea.

Risk Assessment of Tall Buildings in Korea by comparative study of Modified RVS and IRVS system (수정 RVS와 IRVS시스템의 비교분석을 통한 국내 고층건물 테러위험도 평가)

  • Yu, Young-Su;Yoon, Sung-Won;Ju, Young-Kyu
    • Journal of Korean Association for Spatial Structures
    • /
    • v.12 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • As the occurrence rate of terror and hazard is increasing throughout the world, GSA, DoD, and FEMA are proceeding a study about mitigating the damage of terror. Korea is no more a safe place from the terrorist's threat, so we need to make measures against them. In this study we developed modified RVS System by revising some items to adjust the system to the domestic condition and conducted a risk assessment on several tall buildings in Korea. By using IRVS system which is developed by DHS, we also carried out the risk assessment. Comparing the results between RVS with IRVS, we performed terror risk evaluation of tall buildings. Through risk assessment of several tall buildings, we analyzed key factors of each scenarios and suggested the mean value of each items, so we would like to help the counter-terrorism in the design phase.

Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle (소프트웨어 생명주기 단계별 사이버보안 평가 방법론 제안)

  • Seo, Dal-Mi;Cha, Ki-Jong;Shin, Yo-Soon;Jeong, Choong-Heui;Kim, Young-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.363-374
    • /
    • 2015
  • Instrumentation and control(I&C) system has been mainly designed and operated based on analog technologies in existing Nuclear Power Plants(NPPs). However, As the development of Information Technology(IT), digital technologies are gradually being adopted in newly built NPPs. I&C System based on digital technologies has many advantages but it is vulnerable to cyber threat. For this reason, cyber threat adversely affects on safety and reliability of I&C system as well as the entire NPPs. Therefore, the software equipped to NPPs should be developed with cyber security attributes from the initiation phase of software development life cycle. Moreover through cyber security assessment, the degree of confidence concerning cyber security should be measured and if managerial, technical and operational work measures are implemented as intended should be reviewed in order to protect the I&C systems and information. Currently the overall cyber security program, including cyber security assessment, is not established on I&C systems. In this paper, we propose cyber security assessment methods in the Software Development Life Cycle by drawing cyber security activities and assessment items based on regulatory guides and standard technologies concerned with NPPs.

Neural and Genetic Basis of Evasion, Approach and Predation

  • Park, Seahyung;Ryoo, Jia;Kim, Daesoo
    • Molecules and Cells
    • /
    • v.45 no.2
    • /
    • pp.93-97
    • /
    • 2022
  • Evasion, approach and predation are examples of innate behaviour that are fundamental for the survival of animals. Uniting these behaviours is the assessment of threat, which is required to select between these options. Far from being comprehensive, we give a broad review over recent studies utilising optic techniques that have identified neural circuits and genetic identities underlying these behaviours.