• Title/Summary/Keyword: Vulnerability analysis

Search Result 1,273, Processing Time 0.028 seconds

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification (실증검증을 통한 N/A 점검항목이 보안 수준 결과에 미치는 영향에 관한 연구)

  • Lee, Jun Ho;Sung, Kyung Sang;Oh, Hea Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.271-276
    • /
    • 2014
  • This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis evaluation. For this, we were used vulnerability analysis evaluation range, check items and quantitative calculation method. Furthermore, were applied grade and weight for the importance of the items. In addition, because technology develop rapidly, the institution is always exposed risk. therefore, this study was carried out empirical analysis by applying RAL(Risk Acceptabel Level). According to the analyzed result N/A check items factors affecting the level of security has been proven. In other words, this study found that we shall exclude inspection items irrelevant to the institution characteristics, when perform vulnerability analysis evaluation. In this study suggested that security level evaluation shall performed, after that exclude items irrelevant to the institution characteristics based on empirical verification. And also, it proposed that model research is required for establish check items for which analysis-evaluate vulnerability based on empirical verification.

Failure Mode Effective Analysis for selection of Single Point Vulnerability in New type Nuclear Power Plant (신규노형 원전의 발전정지유발기기 선정을 위한 고장모드영향분석)

  • Hyun, Jin Woo;Yeam, Dong Un
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.10 no.1
    • /
    • pp.31-36
    • /
    • 2014
  • For decreasing an unexpected shutdown of Nuclear Power Plants, Korea Hydro & Nuclear Power co.(KHNP) has developed Single Point Vulnerability(SPV) of NPPs since 2008. SPV is the equipment that cause reactor shutdown & turbine trip or more than 50% power rundown due to its malfunction. New type Nuclear Power Plants need to develop the SPV list, so performed the SPV selection for about 1 year. To develop this, Failure Mode Effect Analysis(FMEA) methods are used. As results of FMEA analysis, about 700 equipment are selected as SPV. Thereafter those are going to be applied to new type Nuclear Power Plants to enhance equipment reliability.

A Study On The Cloud Hypervisor ESXi Security Vulnerability Analysis Standard (클라우드 하이퍼바이저 ESXi 보안 취약점 진단 기준에 관한 연구)

  • Kim, Sun-Jib;Heo, Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.31-37
    • /
    • 2020
  • The cloud computing industry is regarded as a key element of the ICT industry and an important industry that will be a watershed for the future development of ICT industry. Korea has established the 1st~2nd cloud computing development basic plan to induce the growth of the cloud industry. However, the domestic information security guide provides technical vulnerability analysis criteria for Unix and Windows servers, DBMS, network equipment, and security equipment, but fails to provide vulnerability analysis criteria for hypervisors that are key elements of cloud computing. Organizations that have deployed cloud systems will be able to assist in vulnerability analysis using the criteria presented in this paper.

Development of User Oriented Vulnerability Analysis Application on Smart Phone (사용자 중심의 스마트폰 보안 취약성 분석 어플리케이션 개발)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.2
    • /
    • pp.7-12
    • /
    • 2012
  • An advanced and proactive response mechanism against diverse attacks should be proposed for enhance its security and reliability on android based commercial smart work device. In this study, we propose a user-oriented vulnerability analysis and response system on commercial smart work device based on android when diverse attacks are activated. Proposed mechanism uses simplified and optimized memory for monitoring and detecting the abnormal behavior on commercial smart work device, with which we can find and determine the attacker's attempts. Additionally, proposed mechanism provides advanced vulnerability analysis and monitoring/control module.

A Study on Potential Flood Damage Classification and characteristic analysis (시군별 홍수위험잠재능 유형화 및 특성분석)

  • Kim, Soo-Jin;Eun, Sang-Kyu;Kim, Seong-Pil;Bae, Seung-Jong
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.3
    • /
    • pp.21-36
    • /
    • 2017
  • Climate change is intensifying storms and floods around the world. Where nature has been destroyed by development, communities are at risk from these intensified climate patterns. This study was to suggest a methodology for estimating flood vulnerability using Potential Flood Damage(PFD) concept and classify city/county about Potential Flood Damage(PFD) using various typology techniques. To evaluate the PFD at a spatial resolutions of city/county units, the 20 representative evaluation indexing factors were carefully selected for the three categories such as damage target(FDT), damage potential(FDP) and prevention ability(FPA). The three flood vulnerability indices of FDT, FDP and FPA were applied for the 167 cities and counties in Korea for the pattern classification of potential flood damage. Potential Flood Damage(PFD) was classified by using grouping analysis, decision tree analysis, and cluster analysis, and characteristics of each type were analyzed. It is expected that the suggested PFD can be utilized as the useful flood vulnerability index for more rational and practical risk management plans against flood damage.

Evaluation for conjunctive operation of multi-regional water supply system through risk analysis (위기대응 취약성 분석을 통한 광역상수도 연계운영 평가)

  • Hwang, Jinsoo;Choi, Taeho;Hong, Gonghyun;Lee, Doojin;Koo, Jayong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.4
    • /
    • pp.269-279
    • /
    • 2019
  • This study would present a risk analysis method to evaluate stable tap water supply in a multi-regional water supply system and propose a measure for the evaluation of the effect of the conjunctive operation of the multi-regional water supply system using this. Judging from the vulnerability for the crisis response of the entire N. multi-regional water supply system, as compared to the result of Scenario 1 in which no conjunctive pipes were operated, it was found that in Scenario 2, in which conjunctive pipes were partially operated, the vulnerability of crisis response decreased by about 30.6%, and as compared to Scenario 3, the vulnerability of crisis response decreased by 86.2%. In setting a plan for stable tap water supply in N multi-regional water supply system, using the estimated value and the method for the evaluation of the vulnerability of crisis response by pipe, by interval and by line, it is judged that this can be utilized as a basis for the judgment of the evaluation of the operation or the additional installation of conjunctive pipes.

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.479-482
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.

  • PDF

The relationship between the stress in college life, vulnerability to depression, and smartphone overuse among undergraduate students majoring in public health (보건계열 학부생의 대학생활 스트레스, 우울 취약성 및 스마트폰 과다사용의 관련성)

  • Kwon, Hay-Ran;Park, Si-Eun;Park, Dae-Sung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.17 no.3
    • /
    • pp.87-100
    • /
    • 2013
  • purpose: This study aims to understand the relationship between stress in college life, vulnerability to depression, and smartphone overuse among undergraduate students majoring in public health. Methods: The subjects of the study were 320 students who were selected through convenience sampling from the department of emergency medical technology, physical therapy, and public health and administration attending G University in Gwangju. The study was carried out from October 22 to 26, 2012. For final analysis, 266 copies were used. Statistical analysis was done using SPSS WIN 12.0. Results: Excessive use of smartphones had a negative effect on stress in college life and vulnerability to depression. The stress of college life had an effect on students' sense of value, their friends of the same sex, and job. Depressive vulnerability had an effect on a students' dependency. Conclusion: For the prevention of smartphone overuse, programs to prevent college life stress and vulnerability to depression should be developed. Counselling programs for the groups should be made available to the students.

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1217-1222
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.