• Title/Summary/Keyword: Threat Evaluation

Search Result 219, Processing Time 0.033 seconds

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.

Field Applicability of Design Methodologies for Groundwater Quality Monitoring Network

  • Lee, Sang-Il
    • Korean Journal of Hydrosciences
    • /
    • v.10
    • /
    • pp.47-58
    • /
    • 1999
  • Protection of groundwater resources from contamination has been of increasing concern throughout the past decades. In practice, however, groundwater monitoring is performed based on the experience and intuition of experts or on the convenience. In dealing with groundwater contamination, we need to know what contaminants have the potential to threat the water quality and the distribution and concentration of the plumes. Monitoring of the subsurface environment through remote geophysical techniques or direct sampling from wells can provide such information. Once known, the plume can be properly menaged. Evaluation of existing methodologies for groundwater monitoring network design revealed that one should select an appropriate design method based on the purpose of the network and the avaliability of field information. Integer programming approach, one of the general purpose network design tools, and a cost-to-go function evaluation approach for special purpose network design were tested for field applicability. For the same contaminated aquifer, two approaches resulted in different well locations. The amount of information, however, was about the same.

  • PDF

Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection (계층분석기법을 활용한 전장관리정보체계 소프트웨어 시큐어 코딩룰 선정 평가 방안)

  • Choi, June-Sung;Kim, Woo-Je;Park, Won-Hyung;Kook, Kwang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.651-662
    • /
    • 2013
  • In this study, we suggest the selecting evaluation method considering 6 major factors like Compliance system application (Development language conformance, Platform Compliance), threat evaluation (criticality of security incident, possibility of security incident), application benefit (Reliability / quality improvement, Modify Cost) for appropriate secure coding rule selecting evaluation. Using this method, we selected and make a set consist of 197 secure coding rules for Battlefield Management System Software. And calculated the application priority for each rules.

Serviceability evaluation methods for high-rise structures considering wind direction

  • Ryu, Hye-Jin;Shin, Dong-Hyeon;Ha, Young-Cheol
    • Wind and Structures
    • /
    • v.30 no.3
    • /
    • pp.275-288
    • /
    • 2020
  • High-rise buildings are very slender and flexible. Their low stiffness values make them vulnerable to horizontal loads, such as those associated with wind or earthquakes. For high-rise buildings, the threat to serviceability caused by wind-induced vibration is an important problem. To estimate the serviceability under wind action, the response acceleration of a building at the roof height is used. The response acceleration is estimated by the same wind speed at all wind directions. In general, the effect of wind direction is not considered. Therefore, the response accelerations obtained are conservative. If buildings have typical plans and strong winds blow from relatively constant wind directions, it is necessary to account for the wind direction to estimate the response accelerations. This paper presents three methods of evaluating the response accelerations while considering the effects of wind direction. These three serviceability evaluation methods were estimated by combining the wind directional frequency data obtained from a weather station with the results of a response analysis using wind tunnel tests. Finally, the decrease in the efficiencies of the response acceleration for each serviceability evaluation method was investigated by comparing the response acceleration for the three methods accounting for wind direction with the response acceleration in which wind direction was not considered.

Distribution Status and Extinction Threat Evaluation of Ladislabia taczanowskii (Cypriniformes, Cyprinidae), a Cold Water Fish in Korea (한국산 냉수성 어류 새미(잉어목, 잉어과)의 분포현황 및 멸종위협평가)

  • Choi, Kwang-Seek;Bae, Yang-Seop;Ko, Myeong-Hun
    • Korean Journal of Ichthyology
    • /
    • v.34 no.1
    • /
    • pp.34-43
    • /
    • 2022
  • A distribution survey was conducted from March to August 2021 to evaluate the distribution status, habitat characteristics, and threat of extinction of the Korean cold-water fish Ladislabia taczanowskii Dybowski (Cypriniformes, Cyprinidae). Historical distribution reports were divided into 1997~2005, 2006~2012, 2013~2019, and distribution surveyed 169 sampling sites, and 1,040 individuals were collected from 72 sites. Areas where the habitat was confirmed were Namhan River (27 stations), Han River (17 stations), Bukhan River (16 stations), Samcheok Osipcheon (4 stations), Yeongokcheon (3 stations), Gangneung Namdaecheon (2 stations), Jeoncheon (1 station), Chucheon (2 stations). The main habitat of L. taczanowskii was upstream of the river with a high altitude of more than 300 m, 2~30 m water flow width, 0.3~1.5 m water depth, and high ratio (50~90%) boulder bottoms. The main reasons for the decline in population size were assumed as river works, construction of reservoirs and bridges, discharge of contaminated water into the river, the inflow of summer vacationers, and weir. Compared to our results there exists evidence that states a 36.1% reduction in occupancy within 10 years, in a small appearance range (7,820 km2) and occupancy area (288 km2), number of disconnected locations (19 locations), and a decline in habitat quality. Therefore, L. taczanowskii is now considered as Vulnerable (VU) based on the results (VU A2ac, Near meets B1b (i, ii, iii)+B2b (i, ii, iii)) of IUCN Red List categories and criteria. Lastly, the conservation plan of Ladislabia taczanowskii was discussed.

Distribution Status and Extinction Threat Evaluation of the Short Ninespine Stickleback Pungitius kaibarae (Gasterosteidae) in Korea (잔가시고기 Pungitius kaibarae (큰가시고기과)의 분포 현황 및 멸종위협평가)

  • Myeong-Hun Ko;Mee-Sook Han;Hyeong-Su Kim
    • Korean Journal of Ichthyology
    • /
    • v.34 no.4
    • /
    • pp.262-269
    • /
    • 2022
  • A distribution survey was conducted from 2018 to 2020 to evaluate the distribution status, habitat characteristics, and extinction threat of the short ninespine stickleback Pungitius kaibarae (Gasterosteidae). Literature reports of P. kaibarae distribution have been sorted by each period, 1980~1996, 1997~2005, and 2007~2017, and the samples were collected in 32, 43, and 64 stations for each period. Among the 75 streams and 193 sampling sites investigated during the study period, 1,400 P. kaibarae individuals were collected from 26 streams at 39 sites. The main habitat of P. kaibarae was downstream or brackish water zones with a low altitude, slow water velocity, and many aquatic plants. The main reasons for the decline in population size were assumed to be drought and flood, river work for flood restoration and river maintenance, bridges construction, and predation by the exotic fish species Micropterus salmoides. Previous evidence reported a 42.6% reduction in occupancy within 10 years, a decline in habitat quality, and the spread and impact of the exotic fish species Micropterus salmoides. Therefore, P. kaibarae is now considered a Vulnerable (VU A2ace) species based on the IUCN Red List categories and criteria. Therefore, P. kaibarae should be redesignated as an endangered species by the Ministry of Environment and systematically managed.

Development of Dataset Evaluation Criteria for Learning Deepfake Video (딥페이크 영상 학습을 위한 데이터셋 평가기준 개발)

  • Kim, Rayng-Hyung;Kim, Tae-Gu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.193-207
    • /
    • 2021
  • As Deepfakes phenomenon is spreading worldwide mainly through videos in web platforms and it is urgent to address the issue on time. More recently, researchers have extensively discussed deepfake video datasets. However, it has been pointed out that the existing Deepfake datasets do not properly reflect the potential threat and realism due to various limitations. Although there is a need for research that establishes an agreed-upon concept for high-quality datasets or suggests evaluation criterion, there are still handful studies which examined it to-date. Therefore, this study focused on the development of the evaluation criterion for the Deepfake video dataset. In this study, the fitness of the Deepfake dataset was presented and evaluation criterions were derived through the review of previous studies. AHP structuralization and analysis were performed to advance the evaluation criterion. The results showed that Facial Expression, Validation, and Data Characteristics are important determinants of data quality. This is interpreted as a result that reflects the importance of minimizing defects and presenting results based on scientific methods when evaluating quality. This study has implications in that it suggests the fitness and evaluation criterion of the Deepfake dataset. Since the evaluation criterion presented in this study was derived based on the items considered in previous studies, it is thought that all evaluation criterions will be effective for quality improvement. It is also expected to be used as criteria for selecting an appropriate deefake dataset or as a reference for designing a Deepfake data benchmark. This study could not apply the presented evaluation criterion to existing Deepfake datasets. In future research, the proposed evaluation criterion will be applied to existing datasets to evaluate the strengths and weaknesses of each dataset, and to consider what implications there will be when used in Deepfake research.

An Exploring Study on the Evaluation Strategies of the Extra-Curricula Area for Admission to a University using SWOT Analysis (SWOT 분석을 통한 대학 입학 전형에서 비교과 영역 평가 전략 탐색)

  • Heo, Gyun;Sung, Eun-Mo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.24 no.2
    • /
    • pp.234-245
    • /
    • 2012
  • This study aims to analyze the factors of the extra-curricula area in personal school performance record and propose the practical strategies for entrance examination affairs on this area. To address this goal, we have applied a SWOT analysis with related documents and research results. We found out five strengths: (S1) Link the students' experience to right people for the university, (S2) Quantitative Indicators, (S3) Qualitative Indicators, (S4) Link to other evaluation factors, and (S5) Analysis of Human Resource. The weakness included: (W1) Fairness, (W2) Reliability, (W3) Difficulties to set standards, (W4) Difficulties to set environments, and (W5) Lack of systemic experience of an evaluation. We also discovered five opportunities (O1) Recognition of public education, (O2) The need of national support, (O3) The importance of autonomy, (O4) Specialization, and (O5) Networks. Finally, threat factors consisted of: (T1) Frequent change of educational policy, (T2) Increasing of private education, (T3) Lack of information and preparation time, and (T4) The accuracy and reliability of personal school records. Based on these results, we suggested practical strategies with these four dimensions: S-O, W-O, S-T, and W-T.

Comparative Analysis of Risk Assessment Tools for Infectious Diseases (국외 감염병 위험도 평가체계의 비교분석)

  • Choi, Eunmi;Woo, Darae;Choe, YoungJune;Yeh, Jungyong;Park, Sangshin
    • Health Policy and Management
    • /
    • v.32 no.4
    • /
    • pp.380-388
    • /
    • 2022
  • Background: Emerging infectious diseases, such as Middle East respiratory syndrome or coronavirus disease 2019, pose a continuous threat to public health, making a risk assessment necessary for infectious disease control and prevention. Therefore, we aimed to investigate the risk assessment methods for infectious diseases used by major foreign countries and organizations. Methods: We conducted an investigation and comparative analysis of risk assessment and risk determination methods for infectious diseases. The risk assessment tools included the strategic toolkit for assessing risks, influenza risk assessment tool, pandemic severity assessment framework, and rapid risk assessment methodology. Results: The most frequently reported risk elements were disease severity, antiviral treatment, attack rate, population immunity, and basic productive ratio. The risk evaluation method was evaluated quantitatively and qualitatively by the stakeholders at each institution. Additionally, the final risk level was visualized in a matrix, framework, and x and y-axis. Conclusion: Considering the risk assessment tools, the risk element was classified based on the duplicate of each indicator, and risk evaluation and level of risk assessment were analyzed.

Modeling and Simulation for Performance Evaluation of VoIP Spam Detection Mechanism (VoIP 스팸 탐지 기술의 성능 평가를 위한 모델링 및 시물레이션)

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Kim, Myuhng-Joo;Jeong, Jong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.95-105
    • /
    • 2009
  • Spam call is one of the main security threat in VoIP services. In this paper, we have designed simulation model for performance evaluation of VoIP spam defense mechanism. The simulation model has functions for performance evaluation such as calls generation and input/output comparison. Four representative caller models have been developed for performance evaluation and each model has its own characteristics as statistical parameters. The target mechanism of performance evaluation is SPIT(Spam over Internet Telephony) level decision algorithm, and we have derived SPIT levels of caller models. The performance evaluation model is designed using the DEVS formalism and DEVSJAVA$^{TM}$ is exploited for development and execution of simulation models.