• Title/Summary/Keyword: security vulnerability

Search Result 1,104, Processing Time 0.026 seconds

Association between health financial capacity of local governments and health behaviors of local residents: a cross-sectional study (지방자치단체의 보건재정역량과 지역주민의 건강행태 간 관련성에 대한 단면조사연구)

  • Miyong Yon
    • Korean Journal of Community Nutrition
    • /
    • v.28 no.2
    • /
    • pp.95-103
    • /
    • 2023
  • Objectives: The budget gap in the health sector of local governments affects the supply of health services, which can cause the health gap. This study classified local governments according to their financial characteristics, such as local financial independence and health budget level. It analyzed the health behaviors and disease prevalence of local residents to examine the effect of local government financial investment on the health of local residents. Methods: To classify types according to the financial characteristics of local governments, financial independence and the health budget data for 17 local governments were collected from the local fiscal yearbook of the Ministry of Public Administration and Security. The prevalence of chronic diseases and healthy behavior was compared using the 16,333 data of adults between the ages of 30 and 65 years among the original data of the National Health and Nutrition Examination Survey (2016-2020). Results: Cluster analysis was used to classify local governments into five clusters according to the health financial capacity type. A comparison of the prevalence of local residents by cluster revealed a similar prevalence of hypertension, diabetes, and hypercholesterolemia. On the other hand, the obesity rate (P < 0.01), high-risk drinking rate (P < 0.01), aerobic physical activity rate (P < 0.001), and healthy eating practice rate (P < 0.001) were significantly different. In addition, an analysis of the odds ratio based on the Seoul area revealed a higher risk of health behavior of non-Seoul residents. Conclusions: It is necessary to review the universal health promotion project budget considering the degree of regional financial vulnerability from the viewpoint of health equity to narrow the health gap among regions.

Efficient Attack Traffic Detection Method for Reducing False Alarms (False Alarm 감축을 위한 효율적인 공격 트래픽 탐지 기법)

  • Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.65-75
    • /
    • 2009
  • The development of IT technology, Internet popularity is increasing geometrically. However, as its side effect, the intrusion behaviors such as information leakage for key system and infringement of computation network etc are also increasing fast. The attack traffic detection method which is suggested in this study utilizes the Snort, traditional NIDS, filters the packet with false positive among the detected attack traffics using Nmap information. Then, it performs the secondary filtering using nessus vulnerability information and finally performs correlation analysis considering appropriateness of management system, severity of signature and security hole so that it could reduce false positive alarm message as well as minimize the errors from false positive and as a result, it raised the overall attack detection results.

Design for Position Protection Secure Keypads based on Double-Touch using Grouping in the Fintech (핀테크 환경에서 그룹핑을 이용한 이중 터치 기반의 위치 차단이 가능한 보안 키패드 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.38-45
    • /
    • 2022
  • Due to the development of fintech technology, financial transactions using smart phones are being activated. The password for user authentication during financial transactions is entered through the virtual keypad displayed on the screen of the smart phone. When the password is entered, the attacker can find out the password by capturing it with a high-resolution camera or spying over the shoulder. A virtual keypad with security applied to prevent such an attack is difficult to input on a small touch-screen, and there is still a vulnerability in peeping attacks. In this paper, the entire keypad is divided into several groups and displayed on a small screen, touching the group to which the character to be input belongs, and then touching the corresponding character within the group. The proposed method selects the group to which the character to be input belongs, and displays the keypad in the group on a small screen with no more than 10 keypads, so that the size of the keypad can be enlarged more than twice compared to the existing method, and the location is randomly placed, hence location of the touch attacks can be blocked.

Economic analysis of irrigation facilities for securing water for field crops

  • Hyung Jin Shin;Jae Young Lee;Jae Nam Lee;Han Na Lee;Sang Hyeon Park;Bum Soo Shin;Sang Sun Cha;Se Myung Kwon;Jung Il Seo;Chan Gi Park
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.4
    • /
    • pp.785-798
    • /
    • 2023
  • Considering irrigation facilities are currently insufficient and drought vulnerability due to climate change is high, efficient measures are required to secure water supply for field crops. This study, therefore, calculated the water shortage to secure water for representative field crops. An economic analysis was further conducted by comparing the production income to the input cost for each method. Here, five distinct regions were selected to represent each crop-Cheongyang-gun for chili peppers, Yesan-gun for apples, Dangjin-si for cabbages, Seosan-si for garlic, and Goesan for beans. The regions with insufficient water supply were estimated by calculating the water requirements and the supplied water from public groundwater wells for each area. A comprehensive set of four scenarios was presented as a strategy to ensure water security and manage irrigation facilities. These scenarios comprised the maintenance of existing groundwater wells, the construction of new water storage tanks, the installation of additional groundwater wells, and the utilization of surface water. B/C (benefit/cost) analysis was conducted for each scenario. As a result, the construction of water storage tanks was selected as a facility and water management plan in Cheongyang-gun, Dangjin-si, and Seosan-si. The analysis additionally indicated the economic viability of installing surface water utilization facilities in Yesan-gun and developing water storage tanks and groundwater (aquifer) wells in Goesan-gun. The results of this study are considered to serve as foundation data that may be utilized in the selection of water management plans for drought-prone areas in the future.

Damage rate assessment of cantilever RC walls with backfill soil using coupled Lagrangian-Eulerian simulation

  • Javad Tahamtan;Majid Gholhaki;Iman Najjarbashi;Abdullah Hossaini;Hamid Pirmoghan
    • Geomechanics and Engineering
    • /
    • v.36 no.3
    • /
    • pp.231-245
    • /
    • 2024
  • In recent decades, the protection and vulnerability of civil structures under explosion loads became a critical issue in terms of security, which may cause loss of lives and structural damage. Concrete retaining walls also restrict soils and slopes from displacements; meanwhile, intensive temporary loading may cause massive damage. In the current study, the modified Johnson-Holmquist (also known as J-H2) material model is implemented for concrete materials to model damages into the ABAQUS through user-subroutines to predict the blasting-induced concrete damages and volume strains. For this purpose, a 3D finite-element model of the concrete retaining wall was conducted in coupled Eulerian-Lagrangian simulation. Subsequently, a blast load equal to 500 kg of TNT was considered in three different positions due to UFC 3-340-02. Influences of the critical parameters in smooth blastings, such as distance from a free face, position, and effective blasting time, on concrete damage rate and destroy patterns, are explored. According to the simulation results, the concrete penetration pattern at the same distance is significantly influenced by the density of the progress environment. The result reveals that the progress of waves and the intensity of damages in free-air blasting is entirely different from those that progress in a dense surrounding atmosphere such as soil. Half-damaged elements in air blasts are more than those of embedded explosions, but dense environments such as soil impose much more pressure in a limited zone and cause more destruction in retaining walls.

Integrating physics-based fragility for hierarchical spectral clustering for resilience assessment of power distribution systems under extreme winds

  • Jintao Zhang;Wei Zhang;William Hughes;Amvrossios C. Bagtzoglou
    • Wind and Structures
    • /
    • v.39 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • Widespread damages from extreme winds have attracted lots of attentions of the resilience assessment of power distribution systems. With many related environmental parameters as well as numerous power infrastructure components, such as poles and wires, the increased challenge of power asset management before, during and after extreme events have to be addressed to prevent possible cascading failures in the power distribution system. Many extreme winds from weather events, such as hurricanes, generate widespread damages in multiple areas such as the economy, social security, and infrastructure management. The livelihoods of residents in the impaired areas are devastated largely due to the paucity of vital utilities, such as electricity. To address the challenge of power grid asset management, power system clustering is needed to partition a complex power system into several stable clusters to prevent the cascading failure from happening. Traditionally, system clustering uses the Binary Decision Diagram (BDD) to derive the clustering result, which is time-consuming and inefficient. Meanwhile, the previous studies considering the weather hazards did not include any detailed weather-related meteorologic parameters which is not appropriate as the heterogeneity of the parameters could largely affect the system performance. Therefore, a fragility-based network hierarchical spectral clustering method is proposed. In the present paper, the fragility curve and surfaces for a power distribution subsystem are obtained first. The fragility of the subsystem under typical failure mechanisms is calculated as a function of wind speed and pole characteristic dimension (diameter or span length). Secondly, the proposed fragility-based hierarchical spectral clustering method (F-HSC) integrates the physics-based fragility analysis into Hierarchical Spectral Clustering (HSC) technique from graph theory to achieve the clustering result for the power distribution system under extreme weather events. From the results of vulnerability analysis, it could be seen that the system performance after clustering is better than before clustering. With the F-HSC method, the impact of the extreme weather events could be considered with topology to cluster different power distribution systems to prevent the system from experiencing power blackouts.

South Korea's strategy to cope with local provocations by nuclear armed North Korea (핵위협하 국지도발 대비 대응전략 발전방향)

  • Kim, Tae-Woo
    • Strategy21
    • /
    • s.31
    • /
    • pp.57-84
    • /
    • 2013
  • North Korea's continuous threats and provocative behaviors have aggravated tension on the Korean peninsula particularly with the recent nuclear weapons test. South Korea's best way to cope with this situation is to maintain the balance among three policy directions: dialogue, sanctions, and deterrence. Among the three, I argue that deterrence should be prioritized. There are different sources of deterrence such as military power, economic power, and diplomatic clouts. States can build deterrence capability independently. Alternatively, they may do so through relations with other states including alliances, bilateral relations, or multilateral relations in the international community. What South Korea needs most urgently is to maintain deterrence against North Korea's local provocations through the enhancement of independent military capability particularly by addressing the asymmetric vulnerability between militaries of the South and the North. Most of all, the South Korean government should recognize the seriousness of the negative consequences that North Korea's 'Nuclear shadow strategy' would bring about for the inter-Korea relations and security situations in Northeast Asia. Based on this understanding, it should develop an 'assertive deterrence strategy' that emphasizes 'multi-purpose, multi-stage, and tailored deterrence whose main idea lies in punitive retaliation.' This deterrence strategy requires a flexible targeting policy and a variety of retaliatory measures capable of taking out all targets in North Korea. At the same time, the force structures of the army, the air force, and the navy should be improved in a way that maximizes their deterrence capability. For example, the army should work on expanding the guided missile command and the special forces command and reforming the reserve forces. The navy and the air force should increase striking capabilities including air-to-ground, ship-to-ground, and submarine-to-ground strikes to a great extent. The marine corps can enhance its deterrence capability by changing the force structure from the stationary defense-oriented one that would have to suffer some degree of troop attrition at the early stage of hostilities to the one that focuses on 'counteroffensive landing operations.' The government should continue efforts for defense reform in order to obtain these capabilities while building the 'Korean-style triad system' that consists of advanced air, ground, and surface/ subsurface weapon systems. Besides these measures, South Korea should start to acquire a minimum level of nuclear potential within the legal boundary that the international law defines. For this, South Korea should withdraw from the Nuclear Non-proliferation Treaty. Moreover, it should obtain the right to process and enrich uranium through changing the U.S.-South Korea nuclear cooperation treaty. Whether or not we should be armed with nuclear weapons should not be understood in terms of "all or nothing." We should consider an 'in-between' option as the Japanese case proves. With regard to the wartime OPCON transition, we need to re-consider the timing of the transition as an effort to demonstrate the costliness of North Korea's provocative behaviors. If impossible, South Korea should take measures to make the Strategic Alliance 2015 serve as a persisting deterrence system against North Korea. As the last point, all the following governments of South Korea should keep in mind that continuing reconciliatory efforts should always be pursued along with other security policies toward North Korea.

  • PDF

Rainfed Areas and Animal Agriculture in Asia: The Wanting Agenda for Transforming Productivity Growth and Rural Poverty

  • Devendra, C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.1
    • /
    • pp.122-142
    • /
    • 2012
  • The importance of rainfed areas and animal agriculture on productivity enhancement and food security for economic rural growth in Asia is discussed in the context of opportunities for increasing potential contribution from them. The extent of the rainfed area of about 223 million hectares and the biophysical attributes are described. They have been variously referred to inter alia as fragile, marginal, dry, waste, problem, threatened, range, less favoured, low potential lands, forests and woodlands, including lowlands and uplands. Of these, the terms less favoured areas (LFAs), and low or high potential are quite widely used. The LFAs are characterised by four key features: i) very variable biophysical elements, notably poor soil quality, rainfall, length of growing season and dry periods, ii) extreme poverty and very poor people who continuously face hunger and vulnerability, iii) presence of large populations of ruminant animals (buffaloes, cattle, goats and sheep), and iv) have had minimum development attention and an unfinished wanting agenda. The rainfed humid/sub-humid areas found mainly in South East Asia (99 million ha), and arid/semi-arid tropical systems found in South Asia (116 million ha) are priority agro-ecological zones (AEZs). In India for example, the ecosystem occupies 68% of the total cultivated area and supports 40% of the human and 65% of the livestock populations. The area also produces 4% of food requirements. The biophysical and typical household characteristics, agricultural diversification, patterns of mixed farming and cropping systems are also described. Concerning animals, their role and economic importance, relevance of ownership, nomadic movements, and more importantly their potential value as the entry point for the development of LFAs is discussed. Two examples of demonstrated success concern increasing buffalo production for milk and their expanded use in semi-arid AEZs in India, and the integration of cattle and goats with oil palm in Malaysia. Revitalised development of the LFAs is justified by the demand for agricultural land to meet human needs e.g. housing, recreation and industrialisation; use of arable land to expand crop production to ceiling levels; increasing and very high animal densities; increased urbanisation and pressure on the use of available land; growing environmental concerns of very intensive crop production e.g. acidification and salinisation with rice cultivation; and human health risks due to expanding peri-urban poultry and pig production. The strategies for promoting productivity growth will require concerted R and D on improved use of LFAs, application of systems perspectives for technology delivery, increased investments, a policy framework and improved farmer-researcher-extension linkages. These challenges and their resolution in rainfed areas can forcefully impact on increased productivity, improved livelihoods and human welfare, and environmental sustainability in the future.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF