• Title/Summary/Keyword: Vulnerability Measurement

Search Result 56, Processing Time 0.026 seconds

The Precariousness Employment in the Eurasian Economic Space: Measurement Problems, Factors and Main Forms of Development

  • Kaliyeva, Saule A.;Alzhanova, Farida G.;Meldakhanova, Marziya K.;Sadykov, Ilyas М.;Adilkhanov, Murat А.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.3
    • /
    • pp.157-167
    • /
    • 2018
  • This research aims to generalize the conceptual basis of precariousness of employment, study the factors and scale of unsustainable of employment in the countries of the Eurasian Economic Union (EAEU). The concept of precariousness of employment is formed in social and economic studies about 40 years ago, but objective and subjective conditions and forms of unsustainable employment existed before. This study proposes a classification of forms of precariousness of employment on 16 criteria: the duration and timing of agreements, contract terms, the nature of income; the degree of labor autonomy; the level of formality; the level of openness; the level of vulnerability; the conditions of growth of qualification; the level of flexibility; the level of stability; regularity; the severity of the danger of work; in relation to the workplace; the quality of employment, the level of social security. In this research highlighted factors (globalization, demography, migration, structure factors, shadow and informal economy, social development and living standards, unemployment), and systematized certain trends of precariousness of employment, channels and means, forms of manifestation. The empirical analysis identified of the labor potential of the Eurasian countries and new quantitative estimates of the levels of unsustainable employment in the Eurasian Economic Space.

International Research on Geotechnical Risk & Landslide Hazards (지반공학적 재해 및 산사태 위험도 분석에 관한 연구)

  • Yoon, Gil-Lim;Yoon, Yeo-Won;Kim, Hong-Yeon
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.444-455
    • /
    • 2009
  • Great concerns on geotechnical risk & hazard assessment have been increased due to human and economic damage by natural disasters with recent global climate changes. In this paper, geotechnical problems in particular, landslides which is interested in European countries and North America, were mainly discussed. For these, 18 key topics on geotechnical risk and hazards which had been discussed at the LARAM 2008 workshop in Italy were analyzed after grouping by subjects. Main topic contents consisted of applications such as field measurement, early warning systems, uncertainty analysis of parameters using radar, optical data and statistical theory and so on. And the problems related to analysis of vulnerability and deformation due to earthquakes, investigation of gas zone using seismic reflection data in a landslide area, risk quantification and hazard assessment of landslide movements and multi-dimensional analysis for stability of complex slopes were attracted. Also, there were studies on risk matters of cultural heritage, the blockglide of clayey ground, simulations of debris flows based on GIS, quantification of the failure processes of rock slopes, a meshless method for 3D crack modelling, and finally risk assessment for cryological processes due to global warming.

  • PDF

A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique (ZCN과 N2N 인증 기법을 이용한 패킷 전송에 대한 신뢰성 향상에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.61-68
    • /
    • 2015
  • MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.

Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level) (전자금융기반시설 정보보호 수준강화 방안 (정보보호 관리수준 분석을 통한))

  • Park, Keun-dug;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1605-1618
    • /
    • 2016
  • In recent years, security incidents - such as personal information leakage, homepage hacking, DDoS and etc. - targeting finance companies(banks, securities companies, credit card companies, insurance companies and etc.) have increased steadily. In this paper, we analyze problems of information security management level in the existing electronic financial infrastructure from perspective of compliance and information security certification system and propose improvements to enable sustainable high level of information security activities under a comprehensive management system for the financial sector characteristics using ISMS, SECU-STAR and CNIVAM system.

Effective Use of Radio Altimeter in GPS/DME Integrated Navigation Systems (GPS/DME 통합항법시스템에서 전파고도계의 효과적인 사용)

  • Koo, Moonsuk;So, Hyoungmin;Oh, Sang Heon;Hwang, Dong-Hwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.2
    • /
    • pp.272-279
    • /
    • 2016
  • Many researches on use of local ground navigation systems can be found to overcome vulnerability of GNSS. Effective use of an altimeter is proposed in GNSS/DME integrated navigation systems. A weighted DOP based on statistics of measurement error is derived for a given vehicle motion trajectory. From the derived DOP, the vertical error is estimated. By comparing the estimated vertical error with error specification of the altimeter, use of the altimeter is determined in the GPS/DME integrated navigation systems. In order to show effectiveness of the proposed method, 50 times Monte-Carlo simulations were performed for a GPS/DME integrated navigation system. The results show that the proposed method gives more accurate navigation outputs when the number of GPS satellites in view varies.

Concealed Modular Hardware Keylogger Detection Methods (은닉된 모듈식 하드웨어 키로거 탐지 방안)

  • Park, Jae-kon;Kang, Sung-moon;Goh, Sung-cheol
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.11-17
    • /
    • 2018
  • Hardware Keyloggers are available in a variety of modular keylogger products with small size and Wi-Fi communication capabilities that can be concealed inside the keyboard. Such keyloggers are more likely to leak important information and sensitive information from government, military, business and individuals because they are difficult to detect if they are used by a third party for malicious purposes. However, unlike software keyloggers, research on security solutions and detection methods are relatively small in number. This paper, we investigate security vulnerability caused by hardware keylogger and existing detection methods, and improve the detection possibility of modular hardware keylogger through non-destructive measurement methods, such as power consumption of keyboard, infrared temperature, and X-ray. Furthenmore, We propose a method that can be done with experimental results.

  • PDF

A Study on Accelerated Fatigue Life Testing for Industrial Inverter (산업용 인버터의 가속 피로수명 평가에 관한 연구)

  • Lee, Sanghoon;Kim, Won-Jin
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.21 no.6
    • /
    • pp.67-73
    • /
    • 2022
  • Industrial inverters are used in a variety of fields for electric power supply. They may be exposed to vibration and heat once they are installed. This study focused on a framework of accelerated life testing of an industrial inverter considering fatigue damage as the primary source of deterioration. Instead of analyzing detailed failure mechanisms and the product's vulnerability to them, the potential of fatigue failure is considered using the fatigue damage spectrum calculated from the environmental vibration signals. The acceleration and temperature data were gathered using field measurement and spectral analysis was conducted to calculate the vibration signal's power spectral density (PSD). The fatigue damage spectrum is then calculated from the input PSD data and is used to design an accelerated fatigue life testing. The PSD for the shaker table test is derived that has the equivalent fatigue damage to the original input signal. The tests were performed considering the combined effect of random vibration and elevated temperature, and the product passed all the planned tests. It was successfully demonstrated that the inverter used in this study could survive environmental vibration up to its guarantee period. The fatigue damage spectrum can effectively be used to design accelerated fatigue life testing.

Interpretation and Statistical Analysis of Ethereum Node Discovery Protocol (이더리움 노드 탐색 프로토콜 해석 및 통계 분석)

  • Kim, Jungyeon;Ju, Hongteak
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.48-55
    • /
    • 2021
  • Ethereum is an open software platform based on blockchain technology that enables the construction and distribution of distributed applications. Ethereum uses a fully distributed connection method in which all participating nodes participate in the network with equal authority and rights. Ethereum networks use Kademlia-based node discovery protocols to retrieve and store node information. Ethereum is striving to stabilize the entire network topology by implementing node discovery protocols, but systems for monitoring are insufficient. This paper develops a WireShark dissector that can receive packet information in the Ethereum node discovery process and provides network packet measurement results. It can be used as basic data for the research on network performance improvement and vulnerability by analyzing the Ethereum node discovery process.

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.