• 제목/요약/키워드: Threat Assessment

검색결과 186건 처리시간 0.024초

복합 공간데이터베이스 적용을 통한 해안 시설영역 지진 유발 지반재해의 가시적 평가 (Visible Assessment of Earthquake-induced Geotechnical Hazards by Adopting Integrated Geospatial Database in Coastal Facility Areas)

  • 김한샘;선창국
    • 한국지진공학회논문집
    • /
    • 제20권3호
    • /
    • pp.171-180
    • /
    • 2016
  • Earthquake event keeps increasing every year, and the recent cases of earthquake hazards invoke the necessity of seismic study in Korea, as geotechnical earthquake hazards, such as strong ground motion, liquefaction and landslides, are a significant threat to structures in industrial hub areas including coastal facilities. In this study, systemized framework of integrated assessment of earthquake-induced geotechnical hazard was established using advanced geospatial database. And a visible simulation of the framework was specifically conducted at two coastal facility areas in Incheon. First, the geospatial-grid information in the 3D domain were constructed with geostatistical interpolation method composed of multiple geospatial coverage mapping and 3D integration of geo-layer construction considering spatial outliers and geotechnical uncertainty. Second, the behavior of site-specific seismic responses were assessed by incorporating the depth to bedrock, mean shear wave velocity of the upper 30 m, and characteristic site period based on the geospatial-grid. Third, the normalized correlations between rock-outcrop accelerations and the maximum accelerations of each grid were determined considering the site-specific seismic response characteristics. Fourth, the potential damage due to liquefaction was estimated by combining the geospatial-grid and accelerations correlation grid based on the simplified liquefaction potential index evaluation method.

위험 평가 모델 기반의 정량적 사이버 보안 평가 체계 (Quantitative Cyber Security Scoring System Based on Risk Assessment Model)

  • 김인경;박남제
    • 정보보호학회논문지
    • /
    • 제29권5호
    • /
    • pp.1179-1189
    • /
    • 2019
  • 사이버보안성 평가란 자산분석, 위협분석, 취약성 분석을 통하여 자산 및 시스템의 위험 수준을 평가하여 적절한 보안조치를 적용하는 일련의 과정으로 증가하는 사이버 공격에 대한 대비를 위해 체계적인 사이버보안성 평가가 요구된다. 이에 CWSS, CVSS 등 사이버 보안 수준 측정을 위한 다양한 지표가 개발되고 있으나 표준화된 보안성 평가 결과를 통해 위험 우선순위에 따라 적절한 보안조치를 적용하기 위한 정량적 방법은 미흡한 실정으로 대상자산이 가지는 특성, 적용되어 있는 환경, 자산에 미치는 영향 등을 고려한 평가 체계가 필요하다. 이에 본 논문에서는 기존의 사이버 보안 평가 방법 분석을 기반으로 정량적 위험 평가 모델을 정립하고 정립한 모델에 적용하기 위한 평가 요소들의 정량화를 위한 방법을 제시한다. 사이버 보안성 평가 시 필요한 정성적 속성 요소들의 수준을 AHP 기법을 통한 보안요건별 가중치, 위협 별 영향도, 취약점 요소 별 점수화를 통한 위협 성공 가능성에 대한 확률값 산출을 통해 통계적 데이터를 적용해야 하는 정량적 방법의 한계점을 보완하여 표준화된 사이버 보안 평가 체계를 확립할 것으로 기대된다.

식물의 희소성 평가를 위한 환경영향평가기법 개발 (Development of the Environmental Impact Assessment Techniques for the Grading of Rareness in Plant)

  • 이유미
    • 환경영향평가
    • /
    • 제6권2호
    • /
    • pp.153-164
    • /
    • 1997
  • This study was conducted to develop the new Environmental Impact Assessment techniques for the grading of rareness in plant. 17 EISs which were submitted in 1996 were analyzed to know the problems in existent EIA techniques for the conservation of rare plants. Category of rare plant was reevaluated and evaluation technique for the grading of rareness in plant was developed. The results obtained from this study were as follows: 1. The evaluation technique of rareness in plant was not reflected in the current preparation provision for EIS. And t his fact also appeared in most of the EIS which were reexamined in this study. 2. The category of rare species which have been considered as the subject of protection in EIA have to be enlarged to more than legally protected species designated by MOE. 3. The taxonomic characteristics and status of species, characteristics of population, geographical characters, extent of threat and its possibility by man resulted from the habitat loss were investigated. Each item was endowed scores from 1 to 5 and all the scores were summed, and then this value was used to evaluate the order of conservation. 4. Conservation measures for the rare plants have to be applied according to the levels of rareness grade, and they are absolute conservation, in situ conservation, transplanting and ex situ conservation, post observation and none by the levels from A to E. 5. Considering the phenology of rare plants, investigation for the rare plants have to be made a1 least three times. 6. Size of the MVP(Minimum Viable Population), pollination ecology also have to be considered for the conservation of rare plants. And in the case of adopting ex situ conservation measure, the site and methods for the conservation of rare plants have to be proposed in detail.

  • PDF

농촌지역 삵(Prionailurus bengalensis)의 서식지 선택과 관리방안 (Habitat Selection and Management of the Leopard Cat(Prionailurus bengalensis) in a Rural Area of Korea)

  • 최태영;권혁수;우동걸;박종화
    • 한국환경생태학회지
    • /
    • 제26권3호
    • /
    • pp.322-332
    • /
    • 2012
  • 본 연구는 원격무선추적 자료를 바탕으로 우리나라의 농촌지역에 서식하는 삵의 행동권, 서식지 선택, 개체군 위협요인을 파악하고자 하였으며 3개체(수컷 2, 암컷 1)를 대상으로 한 연구결과는 다음과 같다. 첫째, 행동권은 평균 $2.64{\pm}1.99km^2$(K 95)와 $3.69{\pm}1.34km^2$(MCP 100)이었으며, 핵심공간은 평균 $0.64{\pm}0.47km^2$(K 50)를 나타냈고, 겨울철에 추적된 수컷의 행동권이 가장 넓었다($5.19km^2$, MCP 100). 둘째, Jacobs index에 기반을 둔 Johnson의 서식지 선택모형을 분석한 결과 삵은 2단계 선택(경관 내에서의 서식지 선택)에서 초지와 논을 선호하고 산림은 회피하는 반면에, 3단계 선택(행동권 내에서의 서식지 선택)에서는 하천변의 초지를 매우 선호하고 논을 회피하였다. 셋째, 로드킬은 삵의 심각한 개체군 위협요인으로 판단되며, 논의 토지피복 비율이 높고, 하천변에 도로가 존재하며, 산림이 마을 주위에만 소규모로 존재하는 지역에서는 삵의 개체군 유지가 매우 불안정할 수 있어 이러한 지역에 로드킬 대책과 하천변 초지보호 등의 노력이 보다 집중되어야 할 것이다.

해상분야 사이버보안 위험도 분석 (A Study on Cybersecurity Risk Assessment in Maritime Sector)

  • 유윤자;박한선;박혜리;박상원
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2019년도 추계학술대회
    • /
    • pp.134-136
    • /
    • 2019
  • 국제해사기구(IMO)는 2017년 해상 사이버 위험관리 지침(Guidelines on maritime cyber risk management)을 발표했다. IMO의 해상 사이버 위험관리 지침에 따라 각 기국은 2021년 1월 1일 이후 도래하는 첫 번째 연차심사 전까지 안전관리규약(ISM, International Safety Management Code)의 선박안전관리시스템(SMS, Safety Management System)에서 사이버 리스크에 관한 사항을 통합·관리 하여야 한다. 본 논문에서는 해상분야의 사이버 보안 관리대상 및 위험요소를 식별하고 취약성 분석을 수행하기 위하여 IMO가 제시한 산업계 지침 및 국제표준을 근거로 해상분야의 사이버 보안 취약분야를 관리적·기술적·물리적 보안의 세 가지 영역으로 구분하였다. 또한, 리스크 매트릭스(Risk Matrix)를 사용하여 보안영역별 위험요소에 따른 정성적 리스크 평가(RA, Risk Assessment)를 수행하였다.

  • PDF

루브릭 적용을 통한 영화교육 평가 및 효과 연구 (A Study on the Effects and Evaluation of Movies Education through Application of Rubric)

  • 성창환
    • 문화기술의 융합
    • /
    • 제8권6호
    • /
    • pp.471-478
    • /
    • 2022
  • 좋은 수업은 수업을 구성하는 요소들이 하나의 체제로서 유기적 연관성을 갖는다. 평가 준거에 대한 충분한 설명이나 합의 없는 일방적 평가, 평가과정의 신뢰성을 담보할 수 없는 주관적 평가 그리고 학습 과정과 분리된 탈 맥락화된 평가는 좋은 수업이나 건강한 학습생태계를 위협하는 요소가 될 수 있다. 이 연구는 교육 평가와 관련된 문제를 해결하기 위해 루브릭(rubric)을 통한 평가와 그 효과를 분석하였다. '루브릭'은 수업목표를 토대로 수행과제를 평가하는 준거와 수행의 질을 여러 단계로 상세히 묘사한 서술적 평가도구다. 영화 리터러시 평가를 위해 적용한 루브릭은 '분석적 루브릭'으로서 영화 이해 리터러시, 영화 제작 리터러시, 그리고 영화 활용 리터러시를 포괄한다. 루브릭에 대해 학습자들은 타당하고 매우 유용한 학습 성찰 도구로 인식하였다.

크롬환원제와 인산염으로 처리된 6가 크롬 오염토양의 고정화 (Immobilization Characteristics of Hexavalent Chromium Contaminated Soils Treated with Phosphate and Chromium Reducing Agent)

  • 이의상
    • 환경영향평가
    • /
    • 제16권1호
    • /
    • pp.27-33
    • /
    • 2007
  • Hexavalent chromium-contaminated soils are encounted at many unregulated discharge and improper handling of wastes from electroplating, leather tanning, steelmaking, corrosion control, and wood preservation industries. Contamination of hexavalent chromium in the soil is a major concern because of its toxicity and threat to human life and environment. Current technologies for hexavalent chromium-contaminated soil remediation are usually costly and/or cannot permanently prohibit the toxic element from entering into the biosphere. Thus, as an alternative technique, immobilization is seen as a cost-effective and promising remediation technology that may reduce the leachable potential of hexavalent chromium. The purpose of this paper is to develope an immobilization technique for the formation of the geochemically stabilized hexavalent chromium-contaminated soil from the reactions of labile soil hexavalent chromium forms with the added soluble phosphate and chromium reducing agent. From the liquid phase experiment, reaction order of chromium reducing agent, soluble phosphate, alkali solution shows the best removal efficiency of 95%. In addition, actual soil phase experiment demonstrates up to 97.9% removal efficiency with 1:1 molar ratio of chromium reducing agent and soluble phosphate. These results provide evidence for the potential use of soluble phosphate and chromium reducing agent for the hexavalent chromium-contaminated soil remediation.

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

THE APPLICATION OF PSA TECHNIQUES TO THE VITAL AREA IDENTIFICATION OF NUCLEAR POWER PLANTS

  • HA JAEJOO;JUNG WOO SIK;PARK CHANG-KUE
    • Nuclear Engineering and Technology
    • /
    • 제37권3호
    • /
    • pp.259-264
    • /
    • 2005
  • This paper presents a vital area identification (VAI) method based on the current fault tree analysis (FTA) and probabilistic safety assessment (PSA) techniques for the physical protection of nuclear power plants. A structured framework of a top event prevention set analysis (TEPA) application to the VAI of nuclear power plants is also delineated. One of the important processes for physical protection in a nuclear power plant is VAI that is a process for identifying areas containing nuclear materials, structures, systems or components (SSCs) to be protected from sabotage, which could directly or indirectly lead to core damage and unacceptable radiological consequences. A software VIP (Vital area Identification Package based on the PSA method) is being developed by KAERI for the VAI of nuclear power plants. Furthermore, the KAERI fault tree solver FTREX (Fault Tree Reliability Evaluation eXpert) is specialized for the VIP to generate the candidates of the vital areas. FTREX can generate numerous MCSs for a huge fault tree with the lowest truncation limit and all possible prevention sets.

정성적 위험 분석을 위한 버디 시스템의 구조 분석 (The Architectural Analysis of the Buddy System for Qualitative Risk Analysis)

  • Jeongwon Yoon;Kim, Hong-Keun
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1995년도 종합학술발표회논문집
    • /
    • pp.51-58
    • /
    • 1995
  • The importance of the risk analysis tool has been recognized and its use also has been emphasized by a number of researchers recently The methodology were examined but neither algorithms nor practical applications have been implemented or practiced in Korea. In this paper, the architecture of the Buddy System, one of the automated risk assessment tools. is analyzed in depth to provide the algorithmic understanding and to promote the development of the risk analysis methodology. The Buddy System mainly uses three main factors of vulnerability, threat and countermeasures as a nucleus of the qualatative analysis with the modified loss expectancy value. These factors are identified and assessed by the separation of duties between the end user and security analyst. The Buddy System uses five axioms as its bases of assessment algorithm and the assessed vulnerability level is strictly within these axioms. Since the In-place countermeasures reduce the vulnerability level up to a certain level. the security analyst may use "what if " model to examine the impact of additional countermeasures by proposing each to reduce the vulnerability level further to within the acceptable range. The emphasis on the qualitative approach on vulnerability leveling is very well balanced with the quantitative analysis that the system performance is prominent.prominent.

  • PDF