• Title/Summary/Keyword: Vulnerability Level

Search Result 390, Processing Time 0.021 seconds

Case Study on the Analysis of Disaster Vulnerabilities (Focused on the Fire & Explosion in the N-Industrial Complex) (재난 취약성 분석에 관한 사례연구(N공단의 화재·폭발을 중심으로))

  • Ha, Kag Cheon
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.94-100
    • /
    • 2021
  • In general, the industrial complex is a place where factories of various industries are concentrated. It is only as efficient as it is designed. However, the risks vary as there are various industries. These features are also associated with various types of disasters. The dangers of natural disasters such as a typhoon, flood, and earthquake, as well as fire and explosions, are also latent. Many of these risks can make stable production and business activities difficult, resulting in massive direct and indirect damage. In particular, decades after its establishment, the vulnerabilities increase even more as aging and small businesses are considered. In this sense, it is significant to assess the vulnerability of the industrial complex. Thus analysing fire and explosion hazards as stage 1 of the vulnerability evaluation for the major potential disasters for the industrial complex. First, fire vulnerabilities were analyzed quantitatively. It is displayed in blocks for each company. The assessment block status and the fire vulnerability rating status were conducted by applying the five-step criteria. Level A is the highest potential risk step and E is the lowest step. Level A was 11.8% in 20 blocks, level B was 22.5% in 38 blocks, level C was 25.4% in 43 blocks, level D was 26.0% in 44 blocks, and level E was 14.2% in 24 blocks. Levels A and B with high fire vulnerabilities were analyzed at 34.3%. Secondly, the vulnerability for an explosion was quantitatively analyzed. Explosive vulnerabilities were analyzed at 4.7% for level A with 8 blocks, 3.0% for level B with 5, 1.8% for level C with 3, 4.7% for level D with 8, and 85.8% for level E with 145. Levels A and B, which are highly vulnerable to explosions, were 7.7 %. Thirdly, the overall vulnerability can be assessed by adding disaster vulnerabilities to make future assessments. Moreover, it can also assist in efficient safety and disaster management by visually mapping quantified data. This will also be used for the integrated control center of the N-Industrial Complex, which is currently being installed.

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

A Study on Identification of the Heat Vulnerability Area - Case Study in Chungcheongnamdo - (폭염 취약지역 도출에 관한 연구 - 충청남도를 대상으로 -)

  • Lee, Gyeongjin;Cha, Jungwoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.25 no.1
    • /
    • pp.67-74
    • /
    • 2019
  • This study is to identify the heat vulnerability area as represented by heat risk factors which could be attributable to heat-related deaths. The heat risk factors were temperature, Older Adults(OA), Economic Disadvantage(ED), Accessibility of Medical Services(AMS), The population Single Person Households(SPH). The factors are follow as; the temperature means to the number of days for decades average daily maximum temperature above $31^{\circ}C$, the Older Adults means to population ages 65 and above, furthermore, the Economic Disadvantage means to the population of Basic Livelihood Security Recipients(BLSR), the Accessibility of Medical Services(AMS) means to 5 minutes away from emergency medical services. The results of the analysis are showed that the top-level of temperature vulnerability areas is Dong, the top-level of vulnerability OA areas is Eup, the top-level of AMS vulnerability is Eup. Moreover, the top-level of vulnerability ED area appears in the Eup and Dong. The result of analysing relative importance to each element, most of the Eup were vulnerable to heat. Since, there are many vulnerable groups such as Economic Disadvantage, Older Adults in the Eup. We can be figured out estimated the number of heat-related deaths was high in the Eup and Dong by the data of emergency activation in the Chungcheongnam-do Fire Department. Therefore, the result of this study could be reasonable.

Development of Operation Rules in Agricultural Reservoirs using Real-Time Water Level and Irrigation Vulnerability Index (실시간 저수위 및 용수공급 취약성 지표를 활용한 농업용 저수지 운영 기준 개발)

  • Nam, Won Ho;Choi, Jin Yong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.55 no.6
    • /
    • pp.77-85
    • /
    • 2013
  • The efficient operation and management strategies of reservoirs in irrigation periods of drought events are an essential element for drought planning and countermeasure. Korea Rural Community Corporation has developed the real-time water level observation system of agricultural reservoirs to efficiently operate reservoirs, however, it is not possible to predict drought conditions, and only provides information of current situation. Hence, it is necessary to evaluate accurate irrigation vulnerability and efficiently reservoir operation rules using current water level. In this paper, the improvement methods of reservoir operation planning were developed with water supply vulnerability characteristic curves comparing to automatic water gauge at agricultural reservoirs. The 11 reservoirs were simulated applying the reservoir operation rules which was determined by irrigation vulnerability characteristic curves criteria and real time water level, and evaluated water supply situation in 2012 year. The analysis of results can be identified probabilistic possibility of water supply failures compared with the existing reservoir operation criteria. These results of efficient reservoir operation rules can be achieved enable irrigation planners to optimally manage available water resources for decision making, and contributed to maintain the water supply according to demand strategy for agricultural reservoirs management.

A Mission Capability Measuring Methodology of Warship based on Vulnerability Assessment: Focused on Naval Engagement Level Analysis Model (취약성 평가 기반 함정 임무수행능력 측정 방법: 해군 교전급 분석모델을 중심으로)

  • Jeong-kwan Yang;Bong-seok Kim;Bong-wan Choi;Chong-su Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.218-228
    • /
    • 2023
  • Maintaining sea superiority through successful mission accomplishments of warships is being proved to be an important factor of winning a war, as in the Ukraine-Russia war. in order to ensure the ability of a warship to perform its duties, the survivability of the warship must be strengthened. In particular, among the survivability factors, vulnerability is closely related to a damage assessment, and these vulnerability data are used as basic data to measure the mission capability. The warship's mission capability is usually measured using a wargame model, but only the operational effects of a macroscopic view are measured with a theater level resolution. In order to analyze the effectiveness and efficiency of a weapon system in the context of advanced weapon systems and equipments, a warship's mission capability must be measured at the engagement level resolution. To this end, not the relationship between the displacement tonnage and the weight of warheads applied in the theater level model, but an engagement level resolution vulnerability assessment method that can specify physical and functional damage at the hit position should be applied. This study proposes a method of measuring a warship's mission capability by applying the warship vulnerability assessment method to the naval engagement level analysis model. The result can be used as basic data in developing engagement algorithms for effective and efficient operation tactics to be implemented from a single unit weapon system to multiple warships.

The Architectural Analysis of the Buddy System for Qualitative Risk Analysis (정성적 위험 분석을 위한 버디 시스템의 구조 분석)

  • Jeongwon Yoon;Kim, Hong-Keun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.51-58
    • /
    • 1995
  • The importance of the risk analysis tool has been recognized and its use also has been emphasized by a number of researchers recently The methodology were examined but neither algorithms nor practical applications have been implemented or practiced in Korea. In this paper, the architecture of the Buddy System, one of the automated risk assessment tools. is analyzed in depth to provide the algorithmic understanding and to promote the development of the risk analysis methodology. The Buddy System mainly uses three main factors of vulnerability, threat and countermeasures as a nucleus of the qualatative analysis with the modified loss expectancy value. These factors are identified and assessed by the separation of duties between the end user and security analyst. The Buddy System uses five axioms as its bases of assessment algorithm and the assessed vulnerability level is strictly within these axioms. Since the In-place countermeasures reduce the vulnerability level up to a certain level. the security analyst may use "what if " model to examine the impact of additional countermeasures by proposing each to reduce the vulnerability level further to within the acceptable range. The emphasis on the qualitative approach on vulnerability leveling is very well balanced with the quantitative analysis that the system performance is prominent.prominent.

  • PDF

Application of Flood Vulnerability Index for analyzing safety change of levee according to climate change (기후변화에 따른 제방의 안전성 영향 분석을 위한 제방홍수취약성지수의 적용)

  • Lee, Hoo Sang;Lee, Jae Joon
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.4
    • /
    • pp.293-299
    • /
    • 2018
  • In this study, a new technique for evaluating the flood vulnerability of river banks is proposed. For this purpose, flood quantities of the basin were estimated based on the future climate change scenarios and the infiltration stability was evaluated by analyzing the infiltration behavior using SEEP/W which is a 2D groundwater infiltration model of the levee. The size of the river levee was investigated. The size of river levee was investigated by selecting the target area. The safety factor of the levee was analyzed considering the current flood level of the levee and the flood level considering the climate change. The factor needed to analyze the levee vulnerability was derived. We analyzed the vulnerability of the levee considering the change of the levee level according to the climate change scenarios. Levee Flood Vulnerability Index (LFVI) were used to evaluate the vulnerability of the levee.

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

Sensitivity analysis of flood vulnerability index of levee according to climate change (기후변화에 따른 제방의 홍수취약성지수 민감도 분석)

  • Lee, Hoo Sang;Lee, Jae Joon
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.spc
    • /
    • pp.1161-1169
    • /
    • 2018
  • In this study, a new methodology was proposed to evaluate the flood vulnerability of river levee and to investigate the effect on the levee where the water level changes according to climate change. The stability of levee against seepage was evaluated using SEEP/W model which is two-dimensional groundwater infiltration model. In addition to the infiltration behavior, it is necessary to analyze the vulnerability of the embankment considering the environmental conditions of the river due to climate change. In this study, the levee flood vulnerability index (LFVI) was newly developed by deriving the factors necessary for the analysis of the levee vulnerability. The size of river levee was investigated by selecting the target area. The selected levees were classified into upstream part, midstream part and downstream part at the nearside of Seoul in the Han river, and the safety factor of the levee was analyzed by applying the design flood level of the levee. The safety ratio of the levee was analyzed by applying the design flood level considering the current flood level and the scenario of climate change RCP8.5. The degree of change resulting from climate change was identified for each factor that forms the levee flood vulnerability index. By using the levee flood vulnerability index value utilizing these factors comprehensively, it was finally possible to estimate the vulnerability of levee due to climate change.