• Title/Summary/Keyword: Threat Assessment

Search Result 187, Processing Time 0.03 seconds

Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle (소프트웨어 생명주기 단계별 사이버보안 평가 방법론 제안)

  • Seo, Dal-Mi;Cha, Ki-Jong;Shin, Yo-Soon;Jeong, Choong-Heui;Kim, Young-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.363-374
    • /
    • 2015
  • Instrumentation and control(I&C) system has been mainly designed and operated based on analog technologies in existing Nuclear Power Plants(NPPs). However, As the development of Information Technology(IT), digital technologies are gradually being adopted in newly built NPPs. I&C System based on digital technologies has many advantages but it is vulnerable to cyber threat. For this reason, cyber threat adversely affects on safety and reliability of I&C system as well as the entire NPPs. Therefore, the software equipped to NPPs should be developed with cyber security attributes from the initiation phase of software development life cycle. Moreover through cyber security assessment, the degree of confidence concerning cyber security should be measured and if managerial, technical and operational work measures are implemented as intended should be reviewed in order to protect the I&C systems and information. Currently the overall cyber security program, including cyber security assessment, is not established on I&C systems. In this paper, we propose cyber security assessment methods in the Software Development Life Cycle by drawing cyber security activities and assessment items based on regulatory guides and standard technologies concerned with NPPs.

Neural and Genetic Basis of Evasion, Approach and Predation

  • Park, Seahyung;Ryoo, Jia;Kim, Daesoo
    • Molecules and Cells
    • /
    • v.45 no.2
    • /
    • pp.93-97
    • /
    • 2022
  • Evasion, approach and predation are examples of innate behaviour that are fundamental for the survival of animals. Uniting these behaviours is the assessment of threat, which is required to select between these options. Far from being comprehensive, we give a broad review over recent studies utilising optic techniques that have identified neural circuits and genetic identities underlying these behaviours.

COVID-19 International Collaborative Research by the Health Insurance Review and Assessment Service Using Its Nationwide Real-world Data: Database, Outcomes, and Implications

  • Rho, Yeunsook;Cho, Do Yeon;Son, Yejin;Lee, Yu Jin;Kim, Ji Woo;Lee, Hye Jin;You, Seng Chan;Park, Rae Woong;Lee, Jin Yong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.1
    • /
    • pp.8-16
    • /
    • 2021
  • This article aims to introduce the inception and operation of the COVID-19 International Collaborative Research Project, the world's first coronavirus disease 2019 (COVID-19) open data project for research, along with its dataset and research method, and to discuss relevant considerations for collaborative research using nationwide real-world data (RWD). COVID-19 has spread across the world since early 2020, becoming a serious global health threat to life, safety, and social and economic activities. However, insufficient RWD from patients was available to help clinicians efficiently diagnose and treat patients with COVID-19, or to provide necessary information to the government for policy-making. Countries that saw a rapid surge of infections had to focus on leveraging medical professionals to treat patients, and the circumstances made it even more difficult to promptly use COVID-19 RWD. Against this backdrop, the Health Insurance Review and Assessment Service (HIRA) of Korea decided to open its COVID-19 RWD collected through Korea's universal health insurance program, under the title of the COVID-19 International Collaborative Research Project. The dataset, consisting of 476 508 claim statements from 234 427 patients (7590 confirmed cases) and 18 691 318 claim statements of the same patients for the previous 3 years, was established and hosted on HIRA's in-house server. Researchers who applied to participate in the project uploaded analysis code on the platform prepared by HIRA, and HIRA conducted the analysis and provided outcome values. As of November 2020, analyses have been completed for 129 research projects, which have been published or are in the process of being published in prestigious journals.

Computer vision and deep learning-based post-earthquake intelligent assessment of engineering structures: Technological status and challenges

  • T. Jin;X.W. Ye;W.M. Que;S.Y. Ma
    • Smart Structures and Systems
    • /
    • v.31 no.4
    • /
    • pp.311-323
    • /
    • 2023
  • Ever since ancient times, earthquakes have been a major threat to the civil infrastructures and the safety of human beings. The majority of casualties in earthquake disasters are caused by the damaged civil infrastructures but not by the earthquake itself. Therefore, the efficient and accurate post-earthquake assessment of the conditions of structural damage has been an urgent need for human society. Traditional ways for post-earthquake structural assessment rely heavily on field investigation by experienced experts, yet, it is inevitably subjective and inefficient. Structural response data are also applied to assess the damage; however, it requires mounted sensor networks in advance and it is not intuitional. As many types of damaged states of structures are visible, computer vision-based post-earthquake structural assessment has attracted great attention among the engineers and scholars. With the development of image acquisition sensors, computing resources and deep learning algorithms, deep learning-based post-earthquake structural assessment has gradually shown potential in dealing with image acquisition and processing tasks. This paper comprehensively reviews the state-of-the-art studies of deep learning-based post-earthquake structural assessment in recent years. The conventional way of image processing and machine learning-based structural assessment are presented briefly. The workflow of the methodology for computer vision and deep learning-based post-earthquake structural assessment was introduced. Then, applications of assessment for multiple civil infrastructures are presented in detail. Finally, the challenges of current studies are summarized for reference in future works to improve the efficiency, robustness and accuracy in this field.

Consideration of Species-specific Risk Assessment Method of Ballast Water (선박평형수 종별 특이성 위해도 평가 방법에 관한 고찰)

  • Lee, S.G.;Kang, W.S.;Kim, E.C.;Shin, K.S.;Oh, J.H.
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.14 no.4
    • /
    • pp.293-300
    • /
    • 2011
  • Many countries of the world, including IMO, has noticed that foreign marine hazardous organisms, which were introduced by ballast water, have disturbed the marine ecosystem of its own nation, and posed a serious threat to human health and the value of environment and economy. Therefore, IMO has tried to manage the introduced species by assessing the risk of ballast water, and suggested three risk assessment methods, such as environmental matching risk assessment, speciesbiogeographical risk assessment, and species-specific risk assessment. In this thesis, species-specific risk assessment method was considered, and a risk assessment program established by applying it was described.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

The Spatial Distribution Analysis of Coastal Wetland Vegetation in Sihwa Lake (시화호 연안습지 식생의 공간 분포 분석)

  • Jeong, Jong-Chul;Cho, Hong-Lae
    • Journal of Environmental Impact Assessment
    • /
    • v.17 no.2
    • /
    • pp.105-112
    • /
    • 2008
  • Human activity has been the major threat to wetlands. Agriculture, industrial development, and urban and suburban sprawl have caused the greatest losses of coastal wetlands. In fact, riceland agriculture, because of the flooding that goes with it, provides some additional wetland habitat not otherwise available. The biggest current source of loss for freshwater coastal wetlands is from urban sprawl. In this study, spatial analysis method such as landscape index were applied to Sihwa area in Ansan city. The SMA (Spectral Mixture Analysis) method using Landsat image showed the change distribution of wetland vegetation from 1996 to 2004. The southern part of Sihwa wetland have been changed with Suda japonica of 24% and reed vegetation of 34% on coastal wetland which were covered with tidal flat.

A Risk Management Model for Efficient Domestic Information Technology Security (효율적 국내 정보기술 보안을 위한 위험관리 모형)

  • Ahn, Choon-soo;Cho, Sung-Ku
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.28 no.1
    • /
    • pp.44-56
    • /
    • 2002
  • For the risk analysis and risk assessment techniques to be effectively applied to the field of information technology (IT) security, it is necessary that the required activities and specific techniques to be applied and their order of applications are to be determined through a proper risk management model. If the adopted risk management model does not match with the characteristics of host organization, an inefficient management of security would be resulted. In this paper, a risk management model which can be well adapted to Korean domestic IT environments is proposed for an efficient security management of IT. The structure and flow of the existing IT-related risk management models are compared and analysed, and their common and/or strong characteristics are extracted and incorporated in the proposed model in the light of typical threat types observed in Korean IT environments.

Impact Assessment of Plug-in Hybrid Electric Vehicles on Electric Utilities (플러그인 하이브리드 자동차의 시장 형성 시의 전력망에의 영향 분석)

  • Roh, Chul-Woo;Kim, Min-Soo
    • Proceedings of the KSME Conference
    • /
    • 2008.11b
    • /
    • pp.2001-2006
    • /
    • 2008
  • The most concerning issue of these days is the energy crisis by increasing threat of dependency on foreign oil and its volatility itself. In the situations, the PHEV is drawing attention for the next generation's car which could give a chance to decrease the dependency on foreign oil. As well as, the Korean electric power infrastructure is a strategic national asset that is under utilized most of the time. With the proper changes in the operational paradigm, it could generate and deliver necessary energy to charge the PHEVs which could penetrate the market within few years. In doing so, it would reduce greenhouse gas emissions, improve the economics of the electricity industry, and reduce the energy dependency. This paper investigate the technical potential and impacts of using the existing idle capacity of the electric infrastructure in conjunction with the emerging PHEVs technology to meet the majority of daily energy needs of the Korean LDV fleet.

  • PDF

Causal Factors of Hazardous Event for People Struck Considering Environment Properties (환경특성을 고려한 열차충격 위험사건의 원인 인자 분석)

  • Kim, Min-Su;Wang, Jong-Bae;Park, Chan-Woo;Choi, Don-Bum
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.2116-2120
    • /
    • 2008
  • Recently, in the national railway industry there has been interested in the methodology of hazard analysis and risk assessment. The need of safety management system based on the technology of hazard analysis and risk assessment is being extended to identify in advance the weakness and threat factors causing the accident and cope with the accident actively. It is important to manage the risk of railway casualty accidents having a majority of railway accident. Especially, a hazard event of people struck takes the highest proportion of the railway casualty accidents. This paper describes the result of analysis for environment properties such as an age of casualty, time happened, day, month and weather conditions being concerned in the hazard event of people struck.

  • PDF