• Title/Summary/Keyword: Threat mitigation

Search Result 42, Processing Time 0.026 seconds

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Climate Change and Psychological Adaptation: Psychological Response, Adaptation, and Prevention (기후변화와 심리적 적응: 심리적 반응, 적응, 예방)

  • Moon, Sung-Won
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.32 no.3
    • /
    • pp.237-247
    • /
    • 2016
  • Global climate change is becoming one of the greatest challenges facing humanity. This article proposes a psychological perspective of climate change adaptation. Climate change-related severe adverse weather events may trigger mental health problems, including increased post-traumatic stress disorder (PTSD), depression, anxiety, violence, and even suicide. Forced migration could be considered a coping method for dealing with weather events, but it may also pose a psychological threat. People respond to severe weather events in different ways based on their individual characteristics. Psychological risks from adverse weather events are mediated and moderated by these factors, which are influenced by personal cognition, affect, and motivation. Examinations from a psychological perspective, which have been neglected in the science of climate change thus far, may provide keys to successful adaptation and the prevention of serious psychological problems resulting from the experience of severe weather events. A new prevention strategy has been suggested for coping with climate threats through encouraging attitude change, establishing proactive support systems for vulnerable groups, establishing a PTSD network, and implementing a stress inoculation program.

Mitigating Antibiotic Resistance at the Livestock-Environment Interface: A Review

  • Ma, Zhengxin;Lee, Shinyoung;Jeong, K. Casey
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.11
    • /
    • pp.1683-1692
    • /
    • 2019
  • The rise of antimicrobial resistance (AR) is a major threat to global health. The food animal industry contributes to the increasing occurrence of AR. Multiple factors can affect the occurrence and dissemination of AR in the animal industry, including antibiotic use and farm management. Many studies have focused on how the use of antibiotics in food-producing animals has led to the development of AR. However, a few effective mitigating strategies for AR have been developed in food-producing animals, especially those exposed to the environment. The aim of this review is to summarize potential strategies applicable for mitigating AR at the environment-livestock interface.

OVERVIEW OF CONTAINMENT FILTERED VENT UNDER SEVERE ACCIDENT CONDITIONS AT WOLSONG NPP UNIT 1

  • Song, Y.M.;Jeong, H.S.;Park, S.Y.;Kim, D.H.;Song, J.H.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.597-604
    • /
    • 2013
  • Containment Filtered Vent Systems (CFVSs) have been mainly equipped in nuclear power plants in Europe and Canada for the controlled depressurization of the containment atmosphere under severe accident conditions. This is to keep the containment integrity against overpressure during the course of a severe accident, in which the radioactive gas-steam mixture from the containment is discharged into a system designed to remove the radionuclides. In Korea, a CFVS was first introduced in the Wolsong unit-1 nuclear power plant as a mitigation measure to deal with the threat of over pressurization, following post-Fukushima action items. In this paper, the overall features of a CFVS installation such as risk assessments, an evaluation of the performance requirements, and a determination of the optimal operating strategies are analyzed for the Wolsong unit 1 nuclear power plant using a severe accident analysis computer code, ISAAC.

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

Assessment of riparian buffers for reducing pollution according to land-cover pattern using RS and GIS

  • Ha, Sung-Ryong;Lee, Seung-Chul;Ko, Chang-Hwan;Jo, Yun-Won
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.5
    • /
    • pp.445-449
    • /
    • 2006
  • Diffuse pollution has been considering as a major source of the quality deterioration of water resources. The establishment of riparian vegetation strips or buffers along those areas of water bodies is used to reduce the threat of diffuse pollution. Remote sensing offers a means by which critical areas could be identified, so that subsequent action toward the establishment of riparian zones can be taken. On the behalf of KOMPSAT-2 satellite imagery as a high resolution spatial data, Landsat TM satellite data are used to aquire the land cover for the riparian buffers studied. This investigation aims to assess the riparian buffers established on the upper Geum river as a pollution mitigation. Through comparing the delineation of riparian buffer zones developed with the existing zones established by the government, we can find the critical distortion points of the existing riparian buffer zone.

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

  • Abdullahi Aminu, Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.4
    • /
    • pp.14-39
    • /
    • 2023
  • Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often elusive endeavor. However, tracing the source of sensitive data in online cyberspace is critically challenging, and detecting cyber-criminals on the other hand remains a time-consuming process, especially in social networks. Cyber-criminals target individuals for financial gain or to cause harm to their assets, resulting in the loss or theft of millions of user data over the past few decades. Forensic professionals play a vital role in conducting successful investigations and acquiring legally acceptable evidence admissible in court proceedings using modern techniques. This study aims to provide an overview of forensic investigation methods for extracting digital evidence from computer systems and mobile devices to combat persistent cybercrime. It also discusses current cybercrime issues and mitigation procedures.

Assessment of the Extreme 2014~2015 Drought Events in North Korea Using Weekly Standardized Precipitation Evapotranspiration Index (SPEI) (주단위 표준강수증발산지수를 활용한 2014~2015년 북한의 극한 가뭄 평가)

  • Nam, Won-Ho;Hong, Eun-Mi;Choi, Jin-Yong;Kim, Taegon;Hayes, Michael J.;Svoboda, Mark D.
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.4
    • /
    • pp.65-74
    • /
    • 2017
  • North Korea is one of the high vulnerable countries facing the threat of natural disaster and has experienced more frequent disasters in recent years. These disasters have significantly led to food shortages and large reductions in crop yields. In 2015, both North Korean officials and international agencies had identified the extreme drought event, the worst in one hundred years according to the North Korean government. The objective of this study was an assessment of the extreme drought events in 2014~2015, and to apply climatic drought indices for drought monitoring in North Korea. Characteristics of the extreme drought in North Korea are examined by using the weekly-based Standardized Precipitation Evapotranspiration Index (SPEI). The drought characteristics illustrated by the SPEI results are compared with a Standardized Precipitation Index (SPI) results and drought impact information to understand how these indices can explain the drought conditions within the country. These results demonstrated that the SPEI could be an effective tool to provide improved spatial and temporal drought conditions to inform management decisions for drought policy.

A Study on the Cooling Center Manual of Facility and Maintenance for Extreme Heat Disaster (폭염재난에 대응하는 Cooling Center 시설 및 운영기준에 관한 연구)

  • Kim, Jin-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.4
    • /
    • pp.17-22
    • /
    • 2008
  • Including heat wave, Climate change caused 150,000 casualty in 2000 and heat waves are meteorological events that pose a serious threat to human health. A heat wave is defined as "a period of abnormally and uncomfortably hot and usually humid weather". There is a need for the prevention of health effects due to weather and climate extremes. This study intends to propose the necessity of Response System to correspond to extreme heat. And this research focused on Cooling Center manual of facility and maintenance for extreme heat disaster. It would be useful to be planned based on community and to be taken a role as an E.O.C.(Emergency Operating Center). As a conclusion elderly watching system and the requirements regional cooling center facility was proposed.

A Warning and Forecasting System for Storm Surge in Masan Bay (마산만 국지해일 예경보 모의 시스템 구축)

  • Han, Sung-Dae;Lee, Jung-Lyul
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.5
    • /
    • pp.131-138
    • /
    • 2009
  • In this paper, a dynamic warning system to forecast inland flooding associated with typhoons and storms is described. The system is used operationally during the typhoon season to anticipate the potential impact such as inland flooding on the coastal zone of interest. The system has been developed for the use of the public and emergency management officials. Simple typhoon models for quick prediction of wind fields are implemented in a user-friendly way by using a Graphical User Interface (GUI) of MATLAB. The main program for simulating tides, depth-averaged tidal currents, wind-driven surges and currents was also vectorized for the fast performance by MATLAB. By pushing buttons and clicking the typhoon paths, the user is able to obtain real-time water level fluctuation of specific points and the flooding zone. This system would guide local officials to make systematic use of threat information possible. However, the model results are sensitive to typhoon path, and it is yet difficult to provide accurate information to local emergency managers.