• Title/Summary/Keyword: Vulnerability analysis

Search Result 1,279, Processing Time 0.031 seconds

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

A Development of Component Vulnerability Analysis Program for Armored Fighting Vehicle using Criticality based on FMECA (FMECA 기반 위험도를 활용한 전차의 구성 부품별 취약성 분석 프로그램의 개발)

  • Hwang, Hun-Gyu;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1973-1980
    • /
    • 2015
  • The combat system has a different purpose depending on its mission. All functions of combat system are important, but, the components that related main functions for the purpose, are important than other components. Also, the hit probability of component is proportional to area of the component. Therefore, when we analyze vulnerability of combat system, to consider the importance and hit probability of component. Thus to improve reliability of combat system, we apply the analyzed result to design combat system. In this paper, we develop a vulnerability analysis program based on criticality which calculated from importance and hit probability of components by related researches. To do this, we propose a methodology to apply criticality of components, and define classification rates for calculating criticality based on FMECA. Additionally, we propose a technique of vulnerability analysis using criticality of components, and apply the proposed technique to develop and test the vulnerability analysis program for automation of analysis.

Disaster Vulnerability Analysis for Steep Slope Failure (급경사지 재해도 분석)

  • Choi, Eun-Kyeong;Kim, Sung-Wook;Kim, Sang-Hyun;Park, Dug-Keun;Oh, Jeong-Rim
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.930-939
    • /
    • 2009
  • Most of steep slope failures occurring in Korea have appeared during the localized heavy rain period, whereas the evaluation model of a disaster vulnerability analysis that has been proposed to date, has been prepared in consideration only of external factors comprising geographical features. This study calculated a wetness index and a contributory area which delivers moisture to the upper slant surface during the rainfall period, and also conducted a disaster vulnerability analysis in consideration of the convergence of surface water as well as the water system created during the occurrence of rainfall by including a curvature that shows a close relevance with the shape of the minute water system that is created temporarily during the occurrence of rainfall and with the convergence and divergence of surface water. When compared with a steep slope failure occurring within a selected model district in order to verify the prepared disaster analysis, a landslide occurring in the model district had emerged in a region in which the disaster vulnerability analysis was high and the density of the minor water system was also high. If these research results are extended nationwide, it is the most effective to use a disaster vulnerability analysis and the density of the minute water system; and it is supposed to be the simplest and the most effective method for preparing a disaster analysis of mountainous land shape such as the model district.

  • PDF

Developing the Vulnerability Factor Structure Affecting Injuries and Health Problems Among Migrant Seafood Processing Industry Workers

  • Jiaranai, Itchaya;Sansakorn, Preeda;Mahaboon, Junjira
    • Safety and Health at Work
    • /
    • v.13 no.2
    • /
    • pp.170-179
    • /
    • 2022
  • Background: The vulnerability of international migrant workers is on the rise, affecting the frequency of occupational accidents at workplaces worldwide. If migrant workers are managed in the same way as native workers, the consequences on safety assurance and risk management will be significant. This study aimed to develop the vulnerability factor model for migrant workers in seafood processing industries because of significant risk-laden labor of Thailand, which could be a solution to control the risk effectively. Methods: A total of 569 migrant workers were surveyed (432 Burmese and 137 Cambodian), beginning with 40 initial vulnerability factors identified in the questionnaire established from experts. The data were analyzed through descriptive analysis; exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) were used to ascertain the model. Results: The result of content validity >0.67 and the Cronbach's alpha of 0.957 specified the high reliability of 40 factors. The EFA indicated a total variance of 65.49%. The final CFA validated the model and had an empirical fitting; chi-square = 85.34, Adjust Goodness-of-Fit Index = 0.96, and root mean square error of approximation = 0.016. The structure concluded with three dimensions and 18 factors. Dimension 1 of the structure, "multicultural safety operation," contained 12 factors; Dimension 2, "wellbeing," contained four factors; and Dimension 3, "communication technology," contained two factors. Conclusion: The vulnerability factor structure developed in this study included three dimensions and 18 factors that were significantly empirical. The knowledge enhanced safety management in the context of vulnerability factor structure for migrant workers at the workplace.

The Target Modeling and The Shot Line Analysis System to Assess Vulnerability of the Ground Combat Vehicle (지상전투차량 취약성 평가를 위한 표적 모델링과 피격선 분석 시스템)

  • Yoo, Chul;Jang, Eun Su;Park, Kang;Choi, Sang Yeong
    • Korean Journal of Computational Design and Engineering
    • /
    • v.20 no.3
    • /
    • pp.238-245
    • /
    • 2015
  • Vulnerability assessment is a process to calculate the damage degree of a combat vehicle when the combat vehicle is attacked by an enemy. When the vehicle is hit, it is necessary to analyze the shot line to calculate which components are damaged and judge whether the armor of the vehicle is penetrated by enemy's warhead. To analyze the shot line efficiently, this paper presents the target modeling and the shot line analysis system to assess vulnerability of the ground combat vehicle. This system is easily able to do several functions: 1) the program reads STL files converted from CAD model which is designed by commercial CAD software. 2) It calculates the intersection between triangle of STL mesh and the shot line, and check if the components of the model are penetrated. 3) This program can visualize the results using OpenGL. The vulnerability assessment using the shot line analysis can be used to model the armor of the combat vehicle and arrange the inner components effectively in the early stage of development of the combat vehicle.

Quantitative Assessment of Coastal Groundwater Vulnerability to Seawater Intrusion using Density-dependent Groundwater Flow Model (분산형 해수침투 모델을 이용한 양적 지표 기반의 해안지하수 취약성 평가연구)

  • Chang, Sun Woo
    • Journal of Soil and Groundwater Environment
    • /
    • v.26 no.6
    • /
    • pp.95-105
    • /
    • 2021
  • Extensive groundwater abstraction has been recognized as one of the major challenges in management of coastal groundwater. The purpose of this study was to assess potential changes of groundwater distribution of northeastern Jeju Island over 10-year duration, where brackish water have been actively developed. To quantitatively estimate the coastal groundwater resources, numerical simulations using three-dimensional finite-difference density-dependent flow models were performed to describe spatial distribution of the groundwater in the aquifer under various pumping and recharge scenarios. The simulation results showed different spatial distribution of freshwater, brackish, and saline groundwater at varying seawater concentration from 10 to 90%. Volumetric analysis was also performed using three-dimensional concentration distribution of groundwater to calculate the volume of fresh, brackish, and saline groundwater below sea level. Based on the volumetric analysis, a quantitative analysis of future seawater intrusion vulnerability was performed using the volume-based vulnerability index adopted from the existing analytical approaches. The result showed that decrease in recharge can exacerbate vulnerability of coastal groundwater resources by inducing broader saline area as well as increasing brackish water volume of unconfined aquifers.

Study of a Flood Vulnerability Assessment for Climate Change and Utilizing the Vulnerability-based Disaster Response in Jeju-do (기후변화에 따른 제주도의 홍수 취약성 평가 및 취약성 기반 소방 대응 활용 연구)

  • Lim, Chae-Hyun;Park, Yong-Yi
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.64-70
    • /
    • 2016
  • This study assessed the flood vulnerability of Jeju-do depending on climate change using VESTAP. The results showed that the flood vulnerability of Jeju-do in the future (2020s, 2030s and 2040s) will increase continuously compared to the present time (2010s). In particular, the flood vulnerability of Jeju-si is expected to be higher than Seogwipo-si prior to 2030s. Conversely, the flood vulnerability of Seogwipo-si is expected to be higher than Jeju-si after 2030. These analysis results confirmed the characteristics of flood vulnerability between Seogwipo-si and Jeju-si and the growth of flood vulnerability entirely within Jeju-do.

Vulnerability Assessment Procedure for the Warship Including the Effect of Shotline and Penetration of Fragments (탄두의 관통 효과를 고려한 함정 취약성 평가 절차에 관한 기본 연구)

  • Kim, Kwang-Sik;Lee, Jang-Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.49 no.3
    • /
    • pp.254-263
    • /
    • 2012
  • The survivability of warship is assessed by susceptibility, vulnerability and recoverability. Essentially, a vulnerability assessment is a measure of the effectiveness of a warship to resist hostile weapon effects. Considering the shot line and its penetration effect on the warship, present study introduces the procedural aspects of vulnerability assessments of warship. Present study also considers the prediction of penetration damage to a target caused by the impact of projectiles. It reflects the interaction between the weapon and the target from a perspective of vulnerable area method and COVART model. The shotline and tracing calculation have been directly integrated into the vulnerability assessment method based on the penetration equation empirically obtained. A simplified geometric description of the desired target and specification of a threat type is incorporated with the penetration effect. This study describes how to expand the vulnerable area assessment method to the penetration effect. Finally, an example shows that the proposed method can provide the vulnerability parameters of the warship or its component under threat being hit through tracing the shotline path thereby enabling the vulnerability calculation. In addition, the proposed procedure enabling the calculation of the component's multi-hit vulnerability introduces a propulsion system in dealing with redundant Non-overlapping components.

Seismic assessment of a R/C strategic existing building

  • Mehani, Youcef;Kibboua, Abderrahmane
    • Structural Engineering and Mechanics
    • /
    • v.26 no.6
    • /
    • pp.617-634
    • /
    • 2007
  • Algeria is a country with a high seismic activity. During the last decade, many destructive earthquakes occurred, particularly in the northern part, causing enormous losses in human lives, buildings and equipments. In order to reduce this risk in the capital and avoid serious damages to the strategic existing buildings, the government decided to invest into seismic upgrade, strengthening and retrofitting of these buildings. In doing so, seismic vulnerability study of this category of buildings has been considered. Structural analysis is performed on the basis of site investigation (inspection of the building, collecting data, materials, general conditions of the building, etc), and existing drawings (architectural plans, structural design, etc). The aim of these seismic vulnerability studies is to develop guidelines and a methodology for rehabilitation of existing buildings. This paper will provide insight to the vulnerability assessment and strengthening of the telecommunication centre, according to the new code RPA 99/version 2003. Both, static equivalent method and non linear dynamic analysis are performed in this study.