• Title/Summary/Keyword: Vulnerability Risk

Search Result 455, Processing Time 0.033 seconds

Monitoring regional inequalities in climate change risk - A Focus on Heatwave - (기후변화 리스크의 지역 불평등 모니터링 : 폭염을 중심으로)

  • Kim, Geun-Han
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.6
    • /
    • pp.97-107
    • /
    • 2021
  • Abnormal climate caused by climate change causes enormous social and economic damage. And such damage and its impact may vary depending on the location and regional characteristics of the region and the social and economic conditions of local residents. Therefore, it is necessary to continuously monitor whether there are indicators that are weaker than other regions among the detailed indicators that constitute the risk, exposure and vulnerability of climate change risk. In this study, the concept of climate change risk was used for heatwave to determine regional inequality of climate change risk. In other words, it was judged that inequality in climate change risk occurred in regions with high risk but high exposure and low vulnerability compared to other regions. As a result of the analysis, it was found that 13 local governments in Korea experienced regional inequality in climate change risk. In order to resolve regional inequality in climate change risks, the current status of regional inequality in climate change should be checked based on the analysis proposed in this study, there is a need for an evaluation and monitoring system that can provide appropriate feedback on areas where inequality has occurred. This continuous evaluation and monitoring-based feedback system is expected to be of great help in resolving regional inequality in climate change risks.

Attack Detection Technology through Log4J Vulnerability Analysis in Cloud Environments (클라우드 환경에서 Log4J 취약점 분석을 통한 공격 탐지 기술)

  • Byeon, Jungyeon;Lee, Sanghee;Yoo, Chaeyeon;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.557-559
    • /
    • 2022
  • The use of open source has the advantage that the development environment is convenient and maintenance is easier, but there is a limitation in that it is easy to be exposed to vulnerabilities from a security point of view. In this regard, the LOG4J vulnerability, which is an open source logging library widely used in Apache, was recently discovered. Currently, the risk of this vulnerability is at the 'highest' level, and developers are using it in many systems without being aware of such a problem, so there is a risk that hacking accidents due to the LOG4J vulnerability will continue to occur in the future. In this paper, we analyze the LOG4J vulnerability in detail and propose a SNORT detection policy technology that can detect vulnerabilities more quickly and accurately in the security control system. Through this, it is expected that in the future, security-related beginners, security officers, and companies will be able to efficiently monitor and respond quickly and proactively in preparation for the LOG4J vulnerability.

  • PDF

Vulnerability to human immunodeficiency virus infection and associated factors among married women in northwest Ethiopia: a cross-sectional study

  • Asiya Hussien;Abdissa Boka;Asnake Fantu
    • Women's Health Nursing
    • /
    • v.28 no.4
    • /
    • pp.307-316
    • /
    • 2022
  • Purpose: This study investigated the vulnerability to human immunodeficiency virus (HIV) infection and associated factors among married women in northwest Ethiopia. Methods: A community-based cross-sectional survey (n=657) was conducted from April 1 to 15, 2020, in Metema District, northwest Ethiopia, in four randomly selected kebele administrations (the lowest level of local government). The inclusion criteria were married women aged ≥18 years residing with their husbands. Logistic regression analysis was conducted to identify factors associated with married women's vulnerability to HIV infection. Results: Participants were on average 33.70±9.50 years and nearly one-fourth (n=148, 22.5%) were identified as vulnerable to HIV infection (i.e., experienced sexually transmitted disease symptoms or an extramarital affair of either spouse within the past 12 months). Only 18.9% reported sexual communication with their husband. Respondents who did not discuss the risk of HIV infection with their husbands had fivefold odds of vulnerability (adjusted odds ratio [AOR], 5.02; 95% confidence interval [CI], 1.43-17.5). Those who did not have premarital sex (AOR, 0.20; 95% CI, 0.05-0.77) had no worries about HIV infection (AOR, 0.27; 95% CI, 0.08-0.94), sufficient income (AOR, 0.56; 95% CI, 0.16-0.86), and less than four children (AOR, 0.69; 95% CI, 0.50-0.97) had decreased odds of being vulnerable to HIV than their counterparts. Conclusion: Not discussing risk of HIV infection with husband was a major factor of vulnerability to HIV infection as was premarital sex, worry about HIV, income, and number of children. Measures to strengthen couple's sexual communication and support economical stability is important for decreasing HIV vulnerability.

Human Responses as Landscape Indicators of the Place Vulnerability (장소 취약도에 대한 경관지표로서의 인간의 대응)

  • HAN, Joo-Yup;LEE, Min-Boo
    • Journal of The Geomorphological Association of Korea
    • /
    • v.19 no.1
    • /
    • pp.109-121
    • /
    • 2012
  • Human responses, such as construction of levees, are a spatial representation of the place vulnerability which is induced by a geomorphic hazard like flooding. Human responses include all forms of human activities to reduce the place vulnerability and they seem to be related with reducing vulnerability rather than reducing geomorphic hazards. Diverse human responses to the perceived environment bring about changes in the place vulnerability. People respond spatially to their vulnerability of the place in diverse ways from their experience and perceived risk. Human responses have quantitative possibilities in predicting and modeling the place vulnerability. Building the model of a dynamic place vulnerability to the diverse geomorphic hazards requires basic maps of geomorphic processes and human responses in the region.

Lake Vulnerability Assessment (호소의 취약성 평가)

  • Kim, Eung-Seok;Yoon, Ki-Yong;Lee, Seung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6877-6883
    • /
    • 2014
  • The continuous social development has led to increasing pollution in lakes. This study proposed the LVRI (Lake Vulnerability Resilience Indicator) based on the vulnerability assessment of climate change for an environmental risk assessment in lakes sufferign water pollution in an integrated aspect of the characteristics in lake watersheds. A total of 11 representative assessment factors were selected and constructed for 6 lake basins in the Geum River Watershed to calculate the exposure, sensitivity and adaptation indicators in a vulnerability assessment classification system. The weight coefficients for assessment factors of the LVRI were also calculated using the Entropy method. This study also compared the rank results of the lake environmental risk with/without the weight coefficients of assessment factors for the practical application of the proposed lake environmental risk assessment method. The lake environmental risk results estimated in this study can be used for long-term water quality analysis and management in lakes.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

Differences of Psychosocial Vulnerability Factors between Internet and Smartphone Addiction Groups Consisting of Children and Adolescents in a Small to Medium-Sized City (일 중소도시 소아청소년의 인터넷 및 스마트폰중독 수준에 따른 심리사회적 취약요인의 차이)

  • Jun, Young-Soon;Kim, Tae-Ho;Shin, Yong-Tae;Jo, Seongwoo
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.27 no.3
    • /
    • pp.188-195
    • /
    • 2016
  • Objectives: The aim of this study was to investigate the relationship between internet addiction, smartphone addiction, and psychosocial factors. This study was designed to examine the vulnerability factors for internet and smartphone addiction. Methods: The participants were 1041 children and adolescents in a small and medium-sized cities. All of the participants were evaluated in terms of their demographic characteristics and present use of the internet and smartphone, as well as using internet and smartphone addiction and other psychological scales. Statistical analyses were performed to compare the psychosocial factors between the high risk, potential risk, and general user groups of internet and smartphone addiction. Results: The participants were classified into three groups, the high risk (N=33), potential risk (N=203), and general user (N=805) groups with regard to their internet and smartphone addiction level. There were statistical significantly differences between the groups in terms of the economic status of the family, academic performance, parents, use of internet and smartphone, loneliness, family cohesion, family adaptability, perceived social support, and peer relationship. Conclusion: These results suggest that the internet and smartphone addiction of children and adolescents is related to various psychosocial vulnerability factors.

A study on the cyber security assessment modeling of critical infrastructure (핵심기반시설 사이버 보안 평가 모델링 기법 연구)

  • Euom, Ieck-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.105-113
    • /
    • 2019
  • The purpose of this study is to analyze cyber security risk modeling of critical infrastructure, draw out limitations and improvement measures. This paper analyzed cyber security risk modeling of national critical infrastructure like as electricity sector, nuclear power plant, SCADA. This paper analyzed the 26 precedent research cases of risk modeling in electricity sector, nuclear power plant, SCADA. The latest Critical Infrastructure is digitalized and has a windows operating system. Critical Infrastructure should be operated at all times, it is not possible to patch a vulnerability even though find vulnerability. This paper suggest the advanced cyber security modeling characteristic during the life cycle of the critical infrastructure and can be prevented.

Household Over-indebtedness and Financial Vulnerability in Korea: Evidence from Credit Bureau Data

  • KIM, YOUNG IL;KIM, HYOUNG CHAN;YOO, JOO HEE
    • KDI Journal of Economic Policy
    • /
    • v.38 no.3
    • /
    • pp.53-77
    • /
    • 2016
  • Financial soundness in the household sector matters for financial stability and for the real economy. The level of household debt in Korea raises concern about the financial soundness of the household sector due to its size, growth rate and quality. Against this backdrop, we assess the financial vulnerability of borrowers based on an analysis of credit bureau (CB) data, in which the actual credit activities of most individuals are recorded at a high frequency in Korea. We construct over-indebtedness indicators from the CB data and then assess the predictability of forthcoming defaults. Based on the over-indebtedness indicators, we show how borrowers are distributed in terms of over-indebtedness and how the over-indebted differ from average borrowers in terms of their characteristics. Furthermore, we show how the aggregate credit risk in the household sector would change under macroeconomic distress by analyzing how each borrower's credit quality would be affected by adverse shocks. The findings of this paper may contribute to assessing household debt vulnerability and to enhancing regulatory and supervisory practices for financial stability.

  • PDF

Web browser secureness with respect to CVSS

  • Joh, HyunChul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.464-465
    • /
    • 2014
  • Analysis of characteristics in software vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerability discovered. Being a new research area, the quantitative aspects of software vulnerabilities and risk assessments have not been fully investigated. However, further detailed studies are required related to the security risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers (Internet Explorer (IE), Firefox (FX), Chrome (CR) and Safari (SF)) with respect to the Common Vulnerability Scoring System (CVSS). The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems, and exploitation aftermath is getting worse.