• 제목/요약/키워드: Vulnerability Level

검색결과 390건 처리시간 0.021초

재난 취약성 분석에 관한 사례연구(N공단의 화재·폭발을 중심으로) (Case Study on the Analysis of Disaster Vulnerabilities (Focused on the Fire & Explosion in the N-Industrial Complex))

  • 하각천
    • 한국안전학회지
    • /
    • 제36권2호
    • /
    • pp.94-100
    • /
    • 2021
  • In general, the industrial complex is a place where factories of various industries are concentrated. It is only as efficient as it is designed. However, the risks vary as there are various industries. These features are also associated with various types of disasters. The dangers of natural disasters such as a typhoon, flood, and earthquake, as well as fire and explosions, are also latent. Many of these risks can make stable production and business activities difficult, resulting in massive direct and indirect damage. In particular, decades after its establishment, the vulnerabilities increase even more as aging and small businesses are considered. In this sense, it is significant to assess the vulnerability of the industrial complex. Thus analysing fire and explosion hazards as stage 1 of the vulnerability evaluation for the major potential disasters for the industrial complex. First, fire vulnerabilities were analyzed quantitatively. It is displayed in blocks for each company. The assessment block status and the fire vulnerability rating status were conducted by applying the five-step criteria. Level A is the highest potential risk step and E is the lowest step. Level A was 11.8% in 20 blocks, level B was 22.5% in 38 blocks, level C was 25.4% in 43 blocks, level D was 26.0% in 44 blocks, and level E was 14.2% in 24 blocks. Levels A and B with high fire vulnerabilities were analyzed at 34.3%. Secondly, the vulnerability for an explosion was quantitatively analyzed. Explosive vulnerabilities were analyzed at 4.7% for level A with 8 blocks, 3.0% for level B with 5, 1.8% for level C with 3, 4.7% for level D with 8, and 85.8% for level E with 145. Levels A and B, which are highly vulnerable to explosions, were 7.7 %. Thirdly, the overall vulnerability can be assessed by adding disaster vulnerabilities to make future assessments. Moreover, it can also assist in efficient safety and disaster management by visually mapping quantified data. This will also be used for the integrated control center of the N-Industrial Complex, which is currently being installed.

취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링 (Cyber Attack and Defense Modeling Using Vulnerability Metrics)

  • 이장세;지승도;최규석
    • 한국시뮬레이션학회논문지
    • /
    • 제13권3호
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링 (Cyber Attack and Defense Modeling Using Vulnerability Metrics)

  • 이장세;지승도
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2003년도 춘계학술대회논문집
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

폭염 취약지역 도출에 관한 연구 - 충청남도를 대상으로 - (A Study on Identification of the Heat Vulnerability Area - Case Study in Chungcheongnamdo -)

  • 이경진;차정우
    • 농촌계획
    • /
    • 제25권1호
    • /
    • pp.67-74
    • /
    • 2019
  • This study is to identify the heat vulnerability area as represented by heat risk factors which could be attributable to heat-related deaths. The heat risk factors were temperature, Older Adults(OA), Economic Disadvantage(ED), Accessibility of Medical Services(AMS), The population Single Person Households(SPH). The factors are follow as; the temperature means to the number of days for decades average daily maximum temperature above $31^{\circ}C$, the Older Adults means to population ages 65 and above, furthermore, the Economic Disadvantage means to the population of Basic Livelihood Security Recipients(BLSR), the Accessibility of Medical Services(AMS) means to 5 minutes away from emergency medical services. The results of the analysis are showed that the top-level of temperature vulnerability areas is Dong, the top-level of vulnerability OA areas is Eup, the top-level of AMS vulnerability is Eup. Moreover, the top-level of vulnerability ED area appears in the Eup and Dong. The result of analysing relative importance to each element, most of the Eup were vulnerable to heat. Since, there are many vulnerable groups such as Economic Disadvantage, Older Adults in the Eup. We can be figured out estimated the number of heat-related deaths was high in the Eup and Dong by the data of emergency activation in the Chungcheongnam-do Fire Department. Therefore, the result of this study could be reasonable.

실시간 저수위 및 용수공급 취약성 지표를 활용한 농업용 저수지 운영 기준 개발 (Development of Operation Rules in Agricultural Reservoirs using Real-Time Water Level and Irrigation Vulnerability Index)

  • 남원호;최진용
    • 한국농공학회논문집
    • /
    • 제55권6호
    • /
    • pp.77-85
    • /
    • 2013
  • The efficient operation and management strategies of reservoirs in irrigation periods of drought events are an essential element for drought planning and countermeasure. Korea Rural Community Corporation has developed the real-time water level observation system of agricultural reservoirs to efficiently operate reservoirs, however, it is not possible to predict drought conditions, and only provides information of current situation. Hence, it is necessary to evaluate accurate irrigation vulnerability and efficiently reservoir operation rules using current water level. In this paper, the improvement methods of reservoir operation planning were developed with water supply vulnerability characteristic curves comparing to automatic water gauge at agricultural reservoirs. The 11 reservoirs were simulated applying the reservoir operation rules which was determined by irrigation vulnerability characteristic curves criteria and real time water level, and evaluated water supply situation in 2012 year. The analysis of results can be identified probabilistic possibility of water supply failures compared with the existing reservoir operation criteria. These results of efficient reservoir operation rules can be achieved enable irrigation planners to optimally manage available water resources for decision making, and contributed to maintain the water supply according to demand strategy for agricultural reservoirs management.

취약성 평가 기반 함정 임무수행능력 측정 방법: 해군 교전급 분석모델을 중심으로 (A Mission Capability Measuring Methodology of Warship based on Vulnerability Assessment: Focused on Naval Engagement Level Analysis Model)

  • 양정관;김봉석;최봉완;김종수
    • 산업경영시스템학회지
    • /
    • 제46권4호
    • /
    • pp.218-228
    • /
    • 2023
  • Maintaining sea superiority through successful mission accomplishments of warships is being proved to be an important factor of winning a war, as in the Ukraine-Russia war. in order to ensure the ability of a warship to perform its duties, the survivability of the warship must be strengthened. In particular, among the survivability factors, vulnerability is closely related to a damage assessment, and these vulnerability data are used as basic data to measure the mission capability. The warship's mission capability is usually measured using a wargame model, but only the operational effects of a macroscopic view are measured with a theater level resolution. In order to analyze the effectiveness and efficiency of a weapon system in the context of advanced weapon systems and equipments, a warship's mission capability must be measured at the engagement level resolution. To this end, not the relationship between the displacement tonnage and the weight of warheads applied in the theater level model, but an engagement level resolution vulnerability assessment method that can specify physical and functional damage at the hit position should be applied. This study proposes a method of measuring a warship's mission capability by applying the warship vulnerability assessment method to the naval engagement level analysis model. The result can be used as basic data in developing engagement algorithms for effective and efficient operation tactics to be implemented from a single unit weapon system to multiple warships.

정성적 위험 분석을 위한 버디 시스템의 구조 분석 (The Architectural Analysis of the Buddy System for Qualitative Risk Analysis)

  • Jeongwon Yoon;Kim, Hong-Keun
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1995년도 종합학술발표회논문집
    • /
    • pp.51-58
    • /
    • 1995
  • The importance of the risk analysis tool has been recognized and its use also has been emphasized by a number of researchers recently The methodology were examined but neither algorithms nor practical applications have been implemented or practiced in Korea. In this paper, the architecture of the Buddy System, one of the automated risk assessment tools. is analyzed in depth to provide the algorithmic understanding and to promote the development of the risk analysis methodology. The Buddy System mainly uses three main factors of vulnerability, threat and countermeasures as a nucleus of the qualatative analysis with the modified loss expectancy value. These factors are identified and assessed by the separation of duties between the end user and security analyst. The Buddy System uses five axioms as its bases of assessment algorithm and the assessed vulnerability level is strictly within these axioms. Since the In-place countermeasures reduce the vulnerability level up to a certain level. the security analyst may use "what if " model to examine the impact of additional countermeasures by proposing each to reduce the vulnerability level further to within the acceptable range. The emphasis on the qualitative approach on vulnerability leveling is very well balanced with the quantitative analysis that the system performance is prominent.prominent.

  • PDF

기후변화에 따른 제방의 안전성 영향 분석을 위한 제방홍수취약성지수의 적용 (Application of Flood Vulnerability Index for analyzing safety change of levee according to climate change)

  • 이후상;이재준
    • 한국수자원학회논문집
    • /
    • 제51권4호
    • /
    • pp.293-299
    • /
    • 2018
  • 본 연구에서는 하천 제방에 대한 홍수취약성을 평가하는 새로운 기법을 기후변화에 따라 달라지는 하천의 수위변화를 고려하여 제방의 취약성 변화 정도를 파악해보고자 한다. 이를 위해 미래 기후변화 시나리오를 기반으로 대상유역의 홍수량을 산정하여 홍수위를 구하고 제방의 2차원 지하수침투 모형인 SEEP/W를 이용하여 침투거동을 분석함으로써 침투안정성을 평가하였다. 대상지역은 한강 본류 서울 구간으로 선정하여 대표 제방을 선정한 후, 대표 제방의 현재 계획홍수위와 기후변화를 고려한 홍수위를 고려하여 제방의 안전율을 분석하였다. 제방의 취약성 분석에 필요한 인자를 도출하고 이를 활용하여 기후변화 시나리오에 따른 제방의 수위변화를 고려한 제방의 취약성 분석을 실시하였으며 분석결과를 본 연구자가 기 개발한 제방홍수취약성지수(Levee Flood Vulnerability Index, LFVI) 값을 이용하여 제방의 취약성에 미치는 영향을 분석하였다.

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권3호
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

기후변화에 따른 제방의 홍수취약성지수 민감도 분석 (Sensitivity analysis of flood vulnerability index of levee according to climate change)

  • 이후상;이재준
    • 한국수자원학회논문집
    • /
    • 제51권spc1호
    • /
    • pp.1161-1169
    • /
    • 2018
  • 본 연구에서는 하천 제방에 대한 홍수취약성을 평가하는 새로운 기법을 제시하고 기후변화에 따라 변화하는 수위에 대하여 제방에 미치는 영향을 분석하였다. 이를 위해 먼저 2차원 지하수침투 모형인 SEEP/W를 이용하여 제방의 침투거동을 분석하여 침투안전성을 평가하였다. 침투거동뿐만 아니라 기후변화에 따른 하천환경여건을 고려하는 제방의 취약성 분석 기술이 필요함으로써 본 연구에서는 추가적으로 제방의 취약성 분석에 필요한 인자를 도출하여 제방의 홍수취약성지수(levee flood vulnerability index; LFVI)에 의한 취약성 평가기법을 새로이 개발 하였다. 대상지역을 한강 본류 서울 구간으로 선정하여 하도별 제방의 크기를 조사하였고 조사한 제방을 상류부, 중류부, 하류부로 구분하여 3개의 대표 제방을 선정하였다. 이들 대표 제방지점에서 현재의 계획홍수위와 기후변화 시나리오 RCP8.5를 고려한 계획홍수위를 적용하여 제방의 활동 안전율과 제방홍수취약성지수를 분석하였다. 그리고 제방홍수취약성지수를 구성하는 각각 인자들에 대하여 기후변화에 따른 변화 정도를 파악하였다. 이들 인자들을 종합적으로 활용한 제방홍수취약성지수 값을 이용하여 최종적으로 기후변화에 따른 제방의 취약성을 추정할 수 있도록 하였다.