• Title/Summary/Keyword: Vulnerability Database

Search Result 83, Processing Time 0.027 seconds

Security of Password Vaults of Password Managers (패스워드 매니저의 패스워드 저장소 보안 취약점 분석)

  • Jeong, Hyera;So, Jaewoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1047-1057
    • /
    • 2018
  • As the number of services offered on the Internet exponentially increases, password managers are increasing popular applications that store several passwords in an encrypted database (or password vault). Browser-integrated password managers or locally-installed password managers store the password vault on the user's device. Although a web-based password manager stores the password vault on the cloud server, a user can store the master password used to sign in the cloud server on her device. An attacker that steals a user's encrypted vault stored in the victim's device can make an offline attack and, if successful, all the passwords in the vault will be exposed to the attacker. This paper investigates the vulnerability of the password vault stored in the device and develops attack programs to verify the vulnerability of the password vault.

Factors Influencing Medical Care Utilization according to Decline of Region: Urban Decline Index and Medical Vulnerability Index as Indicators (지역쇠퇴 유형별 의료이용행태 영향요인: 도시쇠퇴 지표와 의료취약지 지표를 활용하여)

  • Jeong, Ji Yun;Jeong, Jae Yeon;Yoon, In Hye;Choi, Hwa Young;Lee, Hae Jong
    • Health Policy and Management
    • /
    • v.32 no.2
    • /
    • pp.205-215
    • /
    • 2022
  • Background: The purpose of this study is to identify the factors infecting the medical care utilization from a new perspective by newly classifying the categories of administrative districts using the urban decline index and medical vulnerability index as indicators. Methods: This study targeted 150,940 people who used medical services using the 2015 cohort database (DB), 2010-2015 urban regeneration analysis index DB, and 2014-2015 public health and medical statistics DB. The decline of the region was classified using the urban decline index typed using k-means clustering and the medical vulnerability index typed using the quantile score calculation. Regression analysis was performed 3 times with medical expenditure, length of stay, and the number of outpatient visits as dependent variables. Results: There were 37 stable region (47.4%), 29 health vulnerable region (37.2%), and 12 decline region (15.4%). The health vulnerable region had lower medical expenditure, fewer outpatient visits, and a higher length of stay than the stable region. The decline region was all higher than the stable region but had no significant effect. Conclusion: The factors that cause the health disparity between regions are not only factors related to individual health behavior but also environmental factors of the local community. Therefore, there is a need for a systematic alternative that properly considers the resources within the community and reflects the characteristics of the population.

A systemic study on the vulnerability and fatality of prostate cancer patients towards COVID-19 through analysis of the TMPRSS2, CXCL10 and their co-expressed genes

  • Raza, Md. Thosif;Mizan, Shagufta
    • Genomics & Informatics
    • /
    • v.20 no.3
    • /
    • pp.31.1-31.15
    • /
    • 2022
  • A pandemic of respiratory disease named coronavirus disease 2019 (COVID-19) is caused by a novel coronavirus, severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It is reported prostate cancer patients are susceptible to COVID-19 infection. To understand the possible causes of prostate cancer patients' increased vulnerability and mortality from COVID-19 infection, we focused on the two most important agents, transmembrane protease serine subtype 2 (TMPRSS2) and the C-X-C motif 10 (CXCL10). When SARS-CoV-2 binds to the host cell via S protein-angiotensin-converting enzyme-2 receptor interaction, TMPRSS2 contributes in the proteolytic cleavage of the S protein, allowing the viral and cellular membranes to fuse. CXCL10 is a cytokine found in elevated level in both COVID-19 and cancer-causing cytokine storm. We discovered that TMPRSS2 and CXCL10 are overexpressed in prostate cancer and COVID-19 using the UALCAN and GEPIA2 datasets. The functional importance of TMPRSS2 and CXCL10 in prostate cancer development was then determined by analyzing the frequency of genetic changes in their amino acid sequences using the cBioPortal online portal. Finally, we used the PANTHER database to examine the pathology of the targeted genes. We observed that TMPRSS2 and CXCL10, together with their often co-expressed genes, are important in the binding activity and immune responses in prostate cancer and COVID-19 infection, respectively. Finally, we found that TMPRSS2 and CXCL10 are two putative biomarkers responsible for the increased vulnerability and fatality of prostate cancer patients to COVID-19.

Analysis of Safety and Performance Vulnerabilities Using Heat-Using Equipment(Industrial Boiler) Inspection Results (열사용기자재 검사대상기기(산업용 보일러) 검사결과를 활용한 안전 및 성능 취약점 분석)

  • Kim, Hyung-Jun;Oh, Choong-Hyeon
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.4
    • /
    • pp.18-26
    • /
    • 2022
  • The Korean government is conducting heat-using equipment(industrial boiler) inspection in accordance with the Energy Use Rationalization Act because of the heat-using equipment(industrial boiler)'s risks such as explosion and fire, and safe use and management. This paper aimed to setup the safe and performance vulnerabilities from database based on the inspection results for heat-using equipment(industrial boiler). This study surveyed the inspection results of 1,249 heat-using equipment(industrial boiler) which were failed inspection of heat-using equipment(industrial boiler) from january 2016 to december 2020. And the analysis method is to inform safety and performance vulnerability categories of heat-using equipment(industrial boiler) by statistically analyzing the failure reasons of boiler type and inspection type which are high variance in failure rate. The safety and performance vulnerability categories was abbreviated into 18 cases. And each catagory's main reason for failure was suggested by additional analyzing the opinions of inspectors. This paper would be the basic source and the comprehensive information dealing with the safety and performance vulnerability of heat-using equipment(industrial boiler).

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

Effect of Stress Level and Stress Vulnerability of Workers on Heart Rate Variability (직장인의 스트레스 수준, 스트레스 취약성이 심박변이도에 미치는 영향)

  • Lee, Jonggook;Seo, Heeyoung;Jeon, Seonyeong;Park, Sun Kyu;Bang, Ju Hyun;Hwang, Young Baum;Im, Kyung Bin
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.30 no.1
    • /
    • pp.7-15
    • /
    • 2022
  • Objectives : The purpose of this study is to identify the effect of office workers' stress level and stress vulnerability on heart rate variability (HRV), confirm the significance of objective stress indicators obtained through subjective stress and heart rate variability devices, and examine their effectiveness as an integrated stress measurement tool in community mental health projects. Methods : From June to July in 2020, 929 workers participated in the stress management and mental health promotion project carried out by K hospital, and their recorded database was used for study analysis with their agreements. Multiple linear regression analysis was performed to find out the effects of general stress level, and stress vulnerability on heart rate variability. Results : All general characteristics were found to have a significant effect on SDNN (ln), RMSSD (ln), LF (ln), and HF (ln), but work experience did not significantly affect RMSSD (ln). Stress level and stress vulnerability did not significantly affect heart rate variability, but stress perception, a sub-factor of stress level, was found to have a significant effect on RMSSD (ln) (β=0.118, p=0.023). Conclusions : In this study, stress perception, a sub-factor of stress level, was found to be a factor affecting RMSSD (ln). This indicates an association with the activity of parasympathetic nerves in stressful situations, and more follow-up studies are needed to use it as a direct indicator of chronic stress and integrated stress in the community mental health field.

Test and estimation of ballistic armor performance for recent naval ship structural materials

  • Shin, Yun-ho;Chung, Jung-hoon;Kim, Jong-Hwan
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.10 no.6
    • /
    • pp.762-781
    • /
    • 2018
  • This paper presents the ballistic armor performance examination and thickness estimation for the latest naval ship structure materials in the Republic of Korea. Up to date, research regarding methods of ballistic experiments establishing database on the latest hull structure materials as well as a precise method of estimating required thickness of armor against specific projectiles have been rarely researched. In order to build a database and estimate proper thicknesses of structure materials, this study used four structure materials that have been widely applied in naval ships such as AH36 steel, AL5083, AL5086, and Fiber Reinforced Plastics (FRP). A $7.62{\times}39mm$ mild steel core bullet normally fired by AK-47 gun was considered as a threat due to its representativeness. Tate and Alekseevskii's penetration algorithm was also used to calculate a correction factor (${\alpha}$) and then estimate the armor thickness of naval ship hull structure materials with a given impact velocity. Through live fire experiments, the proposed method performance difference was measured to be 0.6% in AH36, 0.4% in AL5083, 0.0% in AL5086, and 8.0% in FRP compared with the experiment results.

Producing Firefighting Vulnerability Maps Using GIS - A Case Study of Dalseo-gu, Daegu - (GIS를 이용한 화재진압 취약성 지도 제작 - 대구광역시 달서구를 사례로 -)

  • KIM, Sung-Jae;CHOI, Gap-Yong;CHANG, Eun-Mi;SONG, Wan-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.11-20
    • /
    • 2015
  • Fire incidents, which occur every year, cause huge damage to properties and humans. Significant time and costs have been invested in minimizing and responding to such accidents. With the recent advances in the development of spatial information, in the firefighting field, studies have been conducted to effectively bring fires under control using GIS(Geographic Information System). Most of such studies, however, focused on individual analyses of firefighting-related factors, but comprehensive research on the vulnerability factors in fire control activities, a major part of firefighting activity, has yet to be done. This study sought to pinpoint and analyze the factors that obstruct fire controlling, and to gather relevant data and create GIS-based databases. Based on such database, GIS-based overlay analysis was conducted to produce a fire control vulnerability map. The findings of this study will enable a quantitative analysis of firefighting obstruction factors to assist the personnel engaging in firefighting in rational decision-making, such as in formulating a firefighting operation plan for securing golden time.

A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code (공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구)

  • Kim, Jeom-Goo;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection techniques disclosed web hacking years passed, but these are classified the most dangerous attac ks. Recent web programming data for efficient storage and retrieval using a DBMS is essential. Mainly PHP, JSP, A SP, and scripting language used to interact with the DBMS. In this web environments application does not validate the client's invalid entry may cause abnormal SQL query. These unusual queries to bypass user authentication or da ta that is stored in the database can be exposed. SQL Injection vulnerability environment, an attacker can pass the web-based authentication using username and password and data stored in the database. Measures against SQL Inj ection on has been announced as a number of methods. But if you rely on any one method of many security hole ca n occur. The proposal of four levels leverage is composed with the source code, operational phases, database, server management side and the user input validation. This is a way to apply the measures in terms of why the accident preventive steps for creating a phased step-by-step response nodel, through the process of management measures, if applied, there is the possibility of SQL Injection attacks can be.

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment (RFID 환경에서 태그 ID의 식별 비트를 이용한 효율적인 태그 인증 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.195-202
    • /
    • 2011
  • RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.