• Title/Summary/Keyword: Threat Evaluation

Search Result 226, Processing Time 0.027 seconds

A Study on Security Evaluation for Mobile Web Services Message (모바일 웹서비스 메시지의 보안 평가에 관한 연구)

  • Lee, Seoung-Hyeon;Lee, Jae-Seung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.765-768
    • /
    • 2007
  • In this paper, the security evaluation method about mobile web services message is suggested in the method for improving the safety an reliability about the mobile web services message. In order that the goal of this paper is accomplished, the security threat and the security vulnerability which can be occurred in the mobile web services message are defined. The evaluation method for performing the security evaluation about the mobile web services message is defined. Also, the requirements for the mobile web services message security evaluation are defined. Finally, the evaluation framework for performing the mobile web services message security evaluation is constituted, and the evaluation scenario example is suggested. By using the mobile web services message security evaluation defined in the paper, before the mobile web services is deployed, the security threats and security vulnerability can be verified. Also, the countermeasure for the security threat and security vulnerability discovered in the verification result can be prepared. Therefore, the sorority and reliability about the mobile web services can be improved.

  • PDF

Factors that Affect Sharing Cyber Threat Information in South Korea (국내 사이버위협 정보 공유에 영향을 미치는 요인)

  • Kim, Ha-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1167-1188
    • /
    • 2017
  • The purpose of this study is to investigate the factors affecting cyber threat information provision in order to activate cyber threat information sharing in Korea. In particular, we looked at the intention to provide simple information and important information according to the importance of information. The research method was conducted on the information security practitioners' online survey in terms of users of information sharing system. And empirical analysis was conducted. As a result of the study, only the CEO's attitude influenced the intention to provide simple information. On the other hand, important information was influenced not only by the CEO's attitude but also by the information evaluation system, privatization, and mitigating legal penalties. The results of this study can identify the problems of the cyber threat information sharing system in Korea. And we can confirm the priority of improvement and the change of information providing intention before and after improvement of information sharing system.

Priority Assessment of Cyber Threat Indicators (사이버 위협 지표 간 중요도 비교 분석 연구)

  • Lee, Ro-woon;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.951-958
    • /
    • 2021
  • With the growing cyber threat to information assets, it has become important to share threat information quickly. This paper examines the sharing of cyber threat information and presents a method to determine the importance of threat indicators in the information sharing market by calculating weights. The analysis was conducted using AHP techniques, with a pairwise comparison of the four factors(attacker & infected system indicators, role indicators, malicious file indicators, technique & spread indicators) and the details of each factor. Analysis shows that malicious file indicators are the most important among the higher evaluation factors and infected system IP, C&C and Smishing are the most important factors in comparison between detailed items. These findings could be used to measure the preference of consumers and the contribution of information provider for facilitating information sharing.

Distribution Aspects and Extinction Threat Evaluation of the Endangered Species, Rhynchocypris semotilus (Pisces: Cyprinidae) (멸종위기어류 버들가지 Rhynchocypris semotilus(Pisces: Cyprinidae)의 분포양상과 멸종위협 평가)

  • Choi, Kwang-Seek;Kim, Deokki;Ko, Myeong-Hun
    • Korean Journal of Ichthyology
    • /
    • v.33 no.3
    • /
    • pp.177-183
    • /
    • 2021
  • Distribution aspects and extinction threat evaluation of the endangered species, Rhynchocypris semotilus were investigated in Goseong-gun, Gangwon-do, Korea, June 2020. Among the 12 sampling sites investigated during the study period, samples of R. semotilus were collected 268 individuals at 6 sites. The streams inhabited of R. semotilus were Songhyeoncheon (3 stations), Gojindong (2 stations) and Osodong (1 station). The main habitats of R. semotilus were uppermost and upper stream (Aa type) with 3~15 m water flow width, 0.3~1.3 m depth and high ratio boulder and cobble bottoms. The estimated age of the R. semotilus (June) based on their total length distribution indicated that 0-, 1-, 2-, 3- and more than 4-year-old were 6~27 mm, 38~59 mm, 60~75 mm, 78~93 mm and 96~125 mm, respectively, and their has matured reproductive organs over two years old. R. semotilus investigation results of the threat of extinction showed no tendency to decrease in population size, but estimated to be less than 1,000 mature individuals, with a small range of extend of occurrence (39.668 km2), area of occupancy (16 km2), and number of disconnected locations (3 locations). Therefore, R. semotilus is now considered vulnerable (VU D2) based on the IUCN Red List categories and criteria.

A Study on the Mitigation of Threat Zones for Indoor Chlorine Release using Effective Leakage Areas of Building and Box Model (건물의 유효누출면적 및 박스모델을 이용한 염소 실내 누출의 위험지역 완화에 관한 연구)

  • Kwak, Sollim;Lee, Eunbyul;Choi, Youngbo
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.5
    • /
    • pp.51-59
    • /
    • 2018
  • It is difficult to determine the outdoor toxic level of hazardous chemicals that are leaked in the building, since there are no efficient ways to calculate how much percentage of the leaked chemicals is released into the outdoor atmosphere. In address to these problems, we propose a reasonable box model that can quantitatively evaluate the mass rate of the indoor chlorine leakage into the outside of the building. The proposed method assumes that the indoor chlorine leakage is fully mixed with the indoor air, and then the mixture of the chlorine and indoor air is exfiltrated into the outside of the building through effective leakage areas of the building. It is found that the exfiltration rate of the mixture of the chlorine and indoor air is strongly dependent on the temperature difference between inside and outside the building than the atmospheric wind speed. As compared with a conventional method that uses a vague mitigation factor, our method is more effective to evaluate the outdoor toxic threat zone of the chlorine that are leaked in the building, because it can consider the degree of airtight of the building in the evaluation of the threat zone.

A Security Evaluation Model in Aspects of Product, Process and Control (제품, 프로세스, 통제 관점의 통합된 보안평가 모델)

  • Lee Jieun;Choi Byoungju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.192-207
    • /
    • 2005
  • As the evaluation for the information security has been an important issue, numerous security evaluation methods have been proposed. Those security evaluation methods can be categorized into three different aspects in large including product, process and control. In this paper we identify the possible problems that may occur when one-sided security evaluation is conducted that is on the aspect of product, process or control alone, present with the actual example of threat, and propose an approach to resolve each problem. Based on these approaches, we propose the security evaluation model, which incorporates these three aspects of product, process and control.

The Mental Health of Hospital Workers During the Initial Phase and Third Wave of the COVID-19 Pandemic: Exploring Risk and Protective Factors in the Prolonged Pandemic

  • Choi, Huiyoung;Lee, Wangjun;You, Myoungsoon;Chang, Jhin Goo;Hong, Minha;Kim, Hyun-Soo;Lee, Su Young
    • Anxiety and mood
    • /
    • v.18 no.2
    • /
    • pp.80-91
    • /
    • 2022
  • Objective : Hospital workers' mental health has deteriorated because of the ongoing COVID-19 pandemic. The purpose of this study was to investigate the impact of the prolonged COVID-19 pandemic on the mental health of hospital workers and its determinants. Methods : Two surveys were conducted among employees working in a hospital that received COVID-19 patients from the early phase of the pandemic in South Korea. Data on demographics, perceived threat, workplace evaluation, resilience, and mental health status were collected using the Korean General Health Questionnaire-20 in the initial phase (February 2020) and during the third wave of COVID-19 (December 2020) for 467 and 545 workers, respectively. The mental health of hospital workers in the two phases was compared, and the risk and protective factors during the third wave were investigated. Results : The proportion of patients in the psychiatric high-risk group increased from 2.8% in the initial phase to 11.4% during the third wave. The perceived threat, workplace evaluation, and resilience of respondents deteriorated. Risk factors for mental health during the third wave included the perceived threat items of job stress, loss of control, and considering resignation. Protective factors included presence of children, workplace satisfaction, and hardiness in resilience. Conclusion : Hospital workers' mental health deteriorated as the pandemic progressed. General stress and tension such as job stress, loss of control, considering resignation rather than COVID-19-specific stress had negative effects on mental health of hospital workers. Therefore, care for work stress itself can be helpful to maintain the mental health of hospital workers. Also, governance to improve workplace satisfaction or hardiness in resilience can be a potential protective factor for hospital workers' mental health during the prolonged pandemic.

A Study on the Development of Test Evaluation in the Naval Ship Survival Field through the Analysis of Russia-Ukraine War Cases (러시아-우크라이나 전쟁사례 분석을 통한 생존성 분야 함정 설계 및 시험평가 발전방안)

  • Byeongjun An;Taehoon Kim
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.20 no.1
    • /
    • pp.26-33
    • /
    • 2024
  • Since the positive viability field remains the way it was in the 2010s, the ship test evaluation in the viability field is being applied to withstand the attack on an extremely limited kind of weapon system even the latest ship. In response, this paper analyzed and considered maritime warfare during the Russia-Ukraine War, which is an example of the latest war paradigm shift, and diagnosed the status of test evaluation in the field of Naval ship survivability to derive realistic development measures such as reflecting threat development trends, strengthening attack and damage control evaluation, confirming ship viability limits, and realizing test evaluation plans.

Application and Evaluation of a Web-based Education Program on Blood-borne Infection Control for Nurses (간호사를 위한 웹기반 혈액매개 감염관리 프로그램의 적용 및 평가)

  • Choi, Jeong-Sil;Kim, Keum-Soon
    • Journal of Korean Academy of Nursing
    • /
    • v.39 no.2
    • /
    • pp.298-309
    • /
    • 2009
  • Purpose: To develop a web-based program on blood-borne infection control and to examine the effect of the newly developed program on perceived threat of diseases, knowledge, preventive health behaviors for blood-borne infections, and incidence rates of accidental needle sticks and other sharp object injuries in nurses. Methods: The program was developed through the processes of analysis, design, development, implementation, and evaluation. The research design involved a nonequivalent control group for pretest and posttest experiments. The setting was a 745-bed general hospital located in Korea. Results: The program was designed and developed after consulting previous studies. After development of the program was completed, it was evaluated and revised by a panel of experts. The total score for perceived threat of diseases, knowledge, preventive health behaviors in the experimental group was significantly higher compared to the control group (p<.05). The incidence rates for needle sticks and other sharp object injuries in the experimental group were significantly lower compared to the control group (p<.05). Conclusion: Application of a Web-based, blood-borne infection control program is effective, and can be expanded to other healthcare workers who also have a high risk of blood-borne infections.