• Title/Summary/Keyword: Vulnerability Risk

Search Result 466, Processing Time 0.026 seconds

Debris Flow Risk Evaluation and Ranking Method for Drainage Basin adjacent to Road (도로인근 유역의 토석류 위험평가 및 등급화 방안)

  • Kim, Kyung-Suk;Jang, Hyun-Ick
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.279-290
    • /
    • 2010
  • Technical countermeasures against debris flow should be established upon the risk level of the target location. Risk of debris flow should consider the hazard imposed by debris flow and vulnerability of the facilities to debris flow. In this research, we have defined the target location for risk evaluation and suggested scoring method of hazard of debris flow and vulnerability of road to debris flow. By defining risk rank into 6 categories in terms of possibility of damage during rainfall and using the risk scores of 46 debris flow cases, we have suggested risk ranking matrix. The method can be used in ranking the drainage basin adjacent to road by simply determining the hazard with vulnerability score and can be used for planning the debris flow countermeasures.

  • PDF

A Study on Web Vulnerability Risk Assessment Model Based on Attack Results: Focused on Cyber Kill Chain (공격 결과 기반의 웹 취약점 위험도 평가 모델 연구: 사이버 킬체인 중심으로)

  • Jin, Hui Hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.779-791
    • /
    • 2021
  • Common web services have been continuously targeted by hackers due to an access control policy that must be allowed to an unspecified number of people. In order to cope with this situation, companies regularly check web vulnerabilities and take measures according to the risk of discovered vulnerabilities. The risk of these web vulnerabilities is calculated through preliminary statistics and self-evaluation of domestic and foreign related organizations. However, unlike static diagnosis such as security setting and source code, web vulnerability check is performed through dynamic diagnosis. Even with the same vulnerability item, various attack results can be derived, and the degree of risk may vary depending on the subject of diagnosis and the environment. In this respect, the predefined risk level may be different from that of the actual vulnerability. In this paper, to improve this point, we present a web vulnerability risk assessment model based on the attack result centering on the cyber kill chain.

The Impact of Adverse Employment and Working Conditions on the Risk of Workplace Injury in Canada

  • Nadalin, Victoria;Mustard, Cameron;Smith, Peter M.
    • Safety and Health at Work
    • /
    • v.12 no.4
    • /
    • pp.471-478
    • /
    • 2021
  • Background: Employment standards (ES) include having a regular payday, regular breaks, the right to paid sick or vacation time, and paid wages. Inadequate ES contribute to the labour market vulnerability of workers; however, they are not typically considered to be risk factors for workplace injury. In a sample of Canadian workers, we examine the risk of injury associated with inadequate ES, independent of, and combined with inadequate workplace protections from workplace hazards. Methods: Data from 2,803 adults working 15 hours or more/week in workplaces with at least five employees were analysed. We explored associations between exposure to workplace hazards with inadequate protections [termed occupational health and safety (OHS) vulnerability] and inadequate ES on workplace injury (physical or mental injury; injury requiring time off). Additive interaction models were used to examine the independent and combined effects of these exposures. Results: Occupational health and safety vulnerability and inadequate ES were independently associated with increased injury outcomes. Adjusted models showed an additive relationship for all injury outcomes between OHS vulnerability and inadequate ES. Statistically significant superadditive relationships were observed for physical injury risk with policy and procedure vulnerability plus inadequate ES [synergy index (S) 1.50, 95% CI: 1.13-2.00] and for overall OHS vulnerability plus inadequate ES (S 1.53, 95% CI: 1.16-2.02), suggesting a combined effect greater than independent effects. Conclusion: Occupational health and safety vulnerability and inadequate ES are independently associated with workplace injury. For certain injury outcomes, the combined effect of OHS vulnerability and inadequate ES is greater than the independent effects of each individual exposure.

Analysis of Typhoon Vulnerability According to Quantitative Loss Data of Typhoon Maemi (태풍 매미의 피해 데이터 기반 국내 태풍 취약성 분석에 관한 연구)

  • Ahn, Sung-Jin;Kim, Tae-Hui;Kim, Ji-Myong
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.05a
    • /
    • pp.125-126
    • /
    • 2019
  • This study aims to recognize damage indicators of typhoon and to develop damage function's indicators, using information derived from the actual loss of typhoon Maemi. As typhoons engender significant financial damage all over the world, governments and insurance companies, local or global, develop hurricane risk assessment models and use it in quantifying, avoiding, mitigating, or transferring the risks. For the reason, it is crucial to understand the importance of the risk assessment model for typhoons, and the importance of reflecting local vulnerabilities for more advanced evaluation. Although much previous research on the economic losses associated with natural disasters has identified the risk indicators that are indispensable, more comprehensive research addressing the relationship between vulnerability and economic loss are still called for. Hence this study utilizes and analyzes the actual loss record of the typhoon Maemi provided by insurance companies to fill such gaps. In this study, natural disaster indicators and basic building information indicators are used in order to generate the vulnerability functions; and the results and indicators suggest a practical approach to create the vulnerability functions for insurance companies and administrative tasks, while reflecting the financial loss and local vulnerability of the actual buildings.

  • PDF

Development of integrated disaster mapping method (II) : disaster mapping with risk analysis (통합 재해지도 작성 기법 개발(II) : 리스크 분석을 적용한 재해지도 작성)

  • Park, Jun Hyung;Kim, Byunghyun
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.1
    • /
    • pp.85-97
    • /
    • 2022
  • In this study, a method for an integrated flood risk mapping was proposed that simultaneously considers the flood inundation map indicating the degree of risk and the disaster vulnerability index. This method creates a new disaster map that can be used in actual situations by providing various and specific information on a single map. In order to consider the human, social and economic factors in the disaster map, the study area was divided into exposure, vulnerability, responsiveness, and recovery factors. Then, 7 indicators for each factor were extracted using the GIS tool. The data extracted by each indicator was classified into grades 1 to 5, and the data was selected as a disaster vulnerability index and used for integrated risk mapping by factor. The risk map for each factor, which overlaps the flood inundatoin map and the disaster vulnerability index factor, was used to establish an evacuation plan by considering regional conditions including population, assets, and buildings. In addition, an integrated risk analysis method that considers risks while converting to a single vulnerability through standardization of the disaster vulnerability index was proposed. This is expected to contribute to the establishment of preparedness, response and recovery plans for providing detailed and diverse information that simultaneously considers the flood risk including social, humanistic, and economic factors.

Groundwater pollution risk mapping using modified DRASTIC model in parts of Hail region of Saudi Arabia

  • Ahmed, Izrar;Nazzal, Yousef;Zaidi, Faisal
    • Environmental Engineering Research
    • /
    • v.23 no.1
    • /
    • pp.84-91
    • /
    • 2018
  • The present study deals with the management of groundwater resources of an important agriculture track of north-western part of Saudi Arabia. Due to strategic importance of the area efforts have been made to estimate aquifer proneness to attenuate contamination. This includes determining hydrodynamic behavior of the groundwater system. The important parameters of any vulnerability model are geological formations in the region, depth to water levels, soil, rainfall, topography, vadose zone, the drainage network and hydraulic conductivity, land use, hydrochemical data, water discharge, etc. All these parameters have greater control and helps determining response of groundwater system to a possible contaminant threat. A widely used DRASTIC model helps integrate these data layers to estimate vulnerability indices using GIS environment. DRASTIC parameters were assigned appropriate ratings depending upon existing data range and a constant weight factor. Further, land-use pattern map of study area was integrated with vulnerability map to produce pollution risk map. A comparison of DRASTIC model was done with GOD and AVI vulnerability models. Model validation was done with $NO_3$, $SO_4$ and Cl concentrations. These maps help to assess the zones of potential risk of contamination to the groundwater resources.

The Architectural Analysis of the Buddy System for Qualitative Risk Analysis (정성적 위험 분석을 위한 버디 시스템의 구조 분석)

  • Jeongwon Yoon;Kim, Hong-Keun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.51-58
    • /
    • 1995
  • The importance of the risk analysis tool has been recognized and its use also has been emphasized by a number of researchers recently The methodology were examined but neither algorithms nor practical applications have been implemented or practiced in Korea. In this paper, the architecture of the Buddy System, one of the automated risk assessment tools. is analyzed in depth to provide the algorithmic understanding and to promote the development of the risk analysis methodology. The Buddy System mainly uses three main factors of vulnerability, threat and countermeasures as a nucleus of the qualatative analysis with the modified loss expectancy value. These factors are identified and assessed by the separation of duties between the end user and security analyst. The Buddy System uses five axioms as its bases of assessment algorithm and the assessed vulnerability level is strictly within these axioms. Since the In-place countermeasures reduce the vulnerability level up to a certain level. the security analyst may use "what if " model to examine the impact of additional countermeasures by proposing each to reduce the vulnerability level further to within the acceptable range. The emphasis on the qualitative approach on vulnerability leveling is very well balanced with the quantitative analysis that the system performance is prominent.prominent.

  • PDF

An Estimation of Landslide's Vulnerability by Analysis of Static Natural Environmental Factors with GIS (GIS를 이용한 정적 자연환경인자의 분석에 의한 산사태 취약성 평가)

  • Yang, In-Tae
    • 한국지형공간정보학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.61-72
    • /
    • 2005
  • The landslide risk assessment process consists of hazard risk assessment and vulnerability analysis. landslide hazard risk is location dependent. Therefore, maps and spatial technologies such as GIS are very important components of the risk assessment process. This paper discusses the advantages of using GIS technology in the risk assessment process and illustrates the benefits through case studies of live projects undertaken. The goal of this study is to generate a map of landslide vulnerability map by analysis of static natural factors with GIS. A simple and efficient algorithm is proposed to generate a landslide potentialities map from DEM and existing maps. The categories of controlling factors for landslides, aspect of slope, soil, vegetation are defined. The weight values for landslide potentialities are calculated from AHP method. Slope and slope-direction are extracted from DEM, and soil informations are extracted from digital soil map. Also, vegetation informations are extracted from digital vegetation map. Finally, as overlaying, landslide potentialities map is made out, and it is verified with landslide place.

  • PDF

Windborne debris risk analysis - Part II. Application to structural vulnerability modeling

  • Lin, Ning;Vanmarcke, Erik;Yau, Siu-Chung
    • Wind and Structures
    • /
    • v.13 no.2
    • /
    • pp.207-220
    • /
    • 2010
  • The 'chain reaction' effect of the interaction between wind pressure and windborne debris is likely to be a major cause of damage to residential buildings during severe wind events. The current paper (Part II) concerns the quantification of such pressure-debris interaction in an advanced vulnerability model that integrates the debris risk model developed in Part I and a component-based wind-pressure damage model. This vulnerability model may be applied to predict the cumulative wind damage during the passage of particular hurricanes, to estimate annual hurricane losses, or to conduct system reliability analysis for residential developments, with the effect of windborne debris fully considered.

Insights from existing earthquake loss assessment research in Croatia

  • Hadzima-Nyarko, Marijana;Sipos, Tanja Kalman
    • Earthquakes and Structures
    • /
    • v.13 no.4
    • /
    • pp.365-375
    • /
    • 2017
  • Seismic risk management has two main technical aspects: to recommend the construction of high-performance buildings and other structures using earthquake-resistant designs or evaluate existing ones, and to prepare emergency plans using realistic seismic scenarios. An overview of seismic risk assessment methodologies in Croatia is provided with details regarding the components of the assessment procedures: hazard, vulnerability and exposure. For Croatia, hazard is presented with two maps and it is expressed in terms of the peak horizontal ground acceleration during an earthquake, with the return period of 95 or 475 years. A standard building typology catalogue for Croatia has not been prepared yet, but a database for the fourth largest city in Croatia is currently in its initial stage. Two methods for earthquake vulnerability assessment are applied and compared. The first is a relatively simple and fast analysis of potential seismic vulnerability proposed by Croatian researchers using damage index (DI) as a numerical value indicating the level of structural damage, while the second is the Macroseismic method.