• Title/Summary/Keyword: multimedia risk assessment

Search Result 26, Processing Time 0.028 seconds

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Experiment on countermeasures against cyber security vulnerabilities using redundancy of ISO 19847 Shipboard Data Server (ISO 19847 선박 데이터 서버 이중화를 통한 사이버 보안 취약성 대응 방안 실험)

  • Lee, ChangUi;Lee, Seojeong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.6
    • /
    • pp.793-806
    • /
    • 2022
  • As the IMO introduced MASS (Maritime Autonomous Surface Ships), ISO(International Organization for Standardization) announced ISO 19847 of a maritime data sharing standard for collecting and remotely managing data of ship systems. Previous literature evaluated the risk using HAZOP for ISO 19847 and proved that risk assessment is useful through experiments. However, redundancy of ISO 19847 ship data server which is one of the risk reduction method suggested in previous literature, was designed but couldn't tested due to the limitations of the conditions. So, in this study, to prove the usefulness of the ship data server redundancy of ISO 19847 which was not tested in previous literature. It based on the design of previous literature, and the network of ship data servers was modeled using the SES/DEVS format and simulated using the DEVS# open source library.

Implementation of CARA System (CARA 시스템 구현)

  • Oh, Haeng-Eon;Yang, Gi-Chul;Cho, Kwang-Moon
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.11a
    • /
    • pp.277-280
    • /
    • 2007
  • CARA(CAncer Risk Assessment) 시스템은 과거의 데이터와 유전적 정보를 이용하여 암 발생 위험도가 높은 사람을 선별할 수 있는 시스템이다. 본 논문에서는 과거의 데이터와 유전적 정보를 가계도를 이용하여 표현하고 이를 암 발생 위험도 평가 시스템 개발에 활용한 CARA 시스템의 구현을 시스템의 인터페이스를 중심으로 설명한다.

  • PDF

Human Health Risk, Environmental and Economic Assessment Based on Multimedia Fugacity Model for Determination of Best Available Technology (BAT) for VOC Reduction in Industrial Complex (산업단지 VOC 저감 최적가용기법(BAT) 선정을 위한 다매체 거동모델 기반 인체위해성·환경성·경제성 평가)

  • Kim, Yelin;Rhee, Gahee;Heo, Sungku;Nam, Kijeon;Li, Qian;Yoo, ChangKyoo
    • Korean Chemical Engineering Research
    • /
    • v.58 no.3
    • /
    • pp.325-345
    • /
    • 2020
  • Determination of Best available technology (BAT) was suggested to reduce volatile organic compounds (VOCs) in a petrochemical industrial complex, by conducting human health risk, environmental, and economic assessment based on multimedia fugacity model. Fate and distribution of benzene, toluene, ethylbenzene, and xylene (BTEX) was predicted by the multimedia fugacity model, which represent VOCs emitted from the industrial complex in U-city. Media-integrated human health risk assessment and sensitivity analysis were conducted to predict the human health risk of BTEX and identify the critical variable which has adverse effects on human health. Besides, the environmental and economic assessment was conducted to determine the BAT for VOCs reduction. It is concluded that BTEX highly remained in soil media (60%, 61%, 64% and 63%), and xylene has remained as the highest proportion of BTEX in each environment media. From the candidates of BAT, the absorption was excluded due to its high human health risk. Moreover, it is identified that the half-life and exposure coefficient of each exposure route are highly correlated with human health risk by sensitivity analysis. In last, considering environmental and economic assessment, the regenerative thermal oxidation, the regenerative catalytic oxidation, the bio-filtration, the UV oxidation, and the activated carbon adsorption were determined as BAT for reducing VOCs in the petrochemical industrial complex. The suggested BAT determination methodology based on the media-integrated approach can contribute to the application of BAT into the workplace to efficiently manage the discharge facilities and operate an integrated environmental management system.

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

Assessing Web Browser Security Vulnerabilities with respect to CVSS

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.199-206
    • /
    • 2015
  • Since security vulnerabilities newly discovered in a popular Web browser immediately put a number of users at risk, urgent attention from developers is required to address those vulnerabilities. Analysis of characteristics in the Web browser vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerabilities discovered. So far, being a new research area, the quantitative aspects of the Web browser vulnerabilities and risk assessments have not been fully investigated. However, due to the importance of Web browser software systems, further detailed studies are required related to the Web browser risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers with respect to the Common Vulnerability Scoring System. Further, vulnerability discovery trends in the Web browsers are also investigated. The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems. It is also found that a vulnerability discovery model which was originally introduced for operating systems is also applicable to the Web browsers.

Development of Multimedia Exposure Model for PCBs

  • Park, Shinai;Han, Jee-Yeun;Park, Jongsei
    • Proceedings of the Korea Society of Environmental Toocicology Conference
    • /
    • 2003.05a
    • /
    • pp.166-166
    • /
    • 2003
  • In terms of the risk assessment, qualitative and quantitative informations are needed to estimate the exposures of environmental pollutants, which may be potentiality of risks, and those are the information about the changes caused by the chemical transportation among environmental media and transformation in environmental media by duration. The various fate mechanism of chemical is possible for estimation of chemical concentration in environmental media. Since there are limitations in measuring the change of chemical concentration within all medium according to the time period, estimating method through modeling are developed.

  • PDF

Evaluation and Analysis of VR Content Dementia Prevention Training based on Musculoskeletal Motion Tracking (근골격계 동작 추적 기반 VR 콘텐츠 치매 예방 훈련 평가 및 분석)

  • Lee, Min-Tae;Youn, Jae-Hong;Kim, Eun-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.15-23
    • /
    • 2020
  • Recently, the increase in the elderly population due to an aging society has led to a relative increase in senile diseases such as vascular dementia or Alzheimer's disease, and the social burden for rehabilitation has increased. In addition, studies have been conducted for the risk assessment and prevention of musculoskeletal disorders. The purpose of this study is to suggest a system that can be used to help with dementia prevention training by tracking the movement of motion and virtual reality contents for the risk factors of musculoskeletal disorders of the elderly. We propose a training method for preventing dementia through musculoskeletal motion analysis algorithm and virtual reality content. Through motion recognition algorithm based on motion region design, we will track and analyze the moving radius of the target joint. The purpose of this study is to calculate and evaluate scores based on the time to accomplish the goals on virtual reality contents for the prevention of musculoskeletal disorders and the support of dementia prevention training, and the degree of difficulty, and to analyze the correlation between the results of performing K-MMSE and VR contents.

Estimation of Multimedia Environmental Distribution for Benzoyl peroxide Using EQC Model (EQC 모델을 이용한 벤조일 퍼록사이드의 다매체 환경거동 예측)

  • Kim, Mi-Kyoung;Bae, Hee-Kyung;Song, Sang-Hwan;Koo, Hyun-Ju;Kim, Hyun-Mi;Choi, Kwang-Soo;Jeon, Sung-Hwan;Lee, Moon-Soon
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.27 no.10
    • /
    • pp.1090-1098
    • /
    • 2005
  • Benzoyl peroxide is very toxic to aquatic organisms but environmental concentration or exposure effects were not studied. Distribution of the chemical among multimedia environment was estimated using EQC(Equilibrium Criterion) model based on the physical-chemical properties to evaluate the risk of benzoyl peroxide in environment. Level I describes a situation that 100,000 kg of benzoyl peroxide is emitted into the environment which is equilibrium and steady-state without degradation and advection condition. Level II describes a situation that a constant rate of 1,000kg/h of benzoyl peroxide is continuously discharged into the environment which is equilibrium and steady-state with degradation and advection condition. Level III describes a situation that 1,000 kg/h of benzoyl peroxide is continuously introduced in each air, water, soil, and sediment compartment which are non-equilibrium and steady-state with degradation, advection, and inter-media transfer condition. In Level I and II calculations the chemical was distributed to soil(68.3%) and water(28.7%). In Level III calculation it was primarily distributed to soil(99.9%) and overall residence time was estimated to be 3.4 years. Benzoyl peroxide can be persistent in environment.

Development of Korean Food-Chemical Ranking and Scoring System (Food-CRS-Korea) and Its Application to Prioritizing Food Toxic Chemicals Associated with Environmental Pollutants (환경유래 식품오염물질의 우선순위 선정 기법 (Food-CRS-Korea)의 개발과 적용)

  • Yang, Ji-Yeon;Jang, Ji-Young;Kim, Soo-Hwaun;Kim, Yoon-Kwan;Lee, Hyo-Min;Shin, Dong-Chun;Lim, Young-Wook
    • Environmental Analysis Health and Toxicology
    • /
    • v.25 no.1
    • /
    • pp.41-55
    • /
    • 2010
  • The aims of this study were to develop the suitable "system software" in chemical ranking and scoring (CRS) for the food hazardous chemicals associated with environmental emission and to suggest the priority lists of food contamination by environmental-origined pollutants. Study materials were selected with reference to the priority pollutants list for environment and food management from domestic and foreign research and the number of study materials is 103 pollutants (18 heavy metals, 10 PBTs, 10 EDs, and 65 organic compounds). The Food-CRS-Korea system consisted of the environmental fate model via multimedia, transfer environment to food model, and health risk assessment by contaminated food intake. We have established that health risks of excess cancer risks, hazard quotients (HQs) by chronic toxicity and HQs by reproductive toxicity convert to score, respectively. The creditable scoring system was designed to consider uncertainty of quantitative risk assessment based on VOI (Value-Of-Information). The predictability of the Food-CRS-Korea model was evaluated by comparing the presumable values and the measured ones of the environmental media and foodstuffs. The priority lists based on emissions with background-level-correction are 15 pollutants such as arsenic, cadmium, and etc. The priority lists based on environmental monitoring date are 17 pollutants including DEHP, TCDD, and so on. Consequently, we suggested the priority lists of 13 pollutants by considering the several emission and exposure scenarios. According to the Food-CRS-Korea system, arsenics, cadmium, chromes, DEHP, leads, and nickels have high health risk rates and reliable grades.