• Title/Summary/Keyword: system vulnerability

Search Result 982, Processing Time 0.047 seconds

Vulnerability assessment of upland public groundwater wells against climate change

  • Shin, Hyung Jin;Lee, Jae Young;Jo, Sung Mun;Cha, Sang Sun;Park, Chan Gi
    • Korean Journal of Agricultural Science
    • /
    • v.47 no.3
    • /
    • pp.577-596
    • /
    • 2020
  • Drought is a natural disaster that directly affects agriculture, which has a great impact on the global agricultural production system and yield. The lack of water storage in most parts of the country due to the lack of precipitation has caused a great increase in social interest in drought due to the dryness of rice fields and crops. As the drought period increases and the drought intensity becomes stronger, it is believed that drought damage to crops will continue; thus, it is necessary to understand the vulnerability to irrigation performance and the ability of irrigation facilities. Therefore, this study conducted a vulnerability assessment of irrigation facilities (public Groundwater well) in cities across the country. The survey was conducted using statistical data from 2007 to 2016, and the vulnerability score was calculated according to the vulnerability evaluation procedure for drought in the irrigation facilities (public groundwater wells). Among 157 regions, 136 areas were very vulnerable; 14 areas were vulnerable; 3 areas were normal; 4 areas were good, and 0 areas were excellent. The vulnerability assessment can be used as basic data for the development or maintenance of field irrigation facilities in the future by understanding the vulnerability of irrigation facilities.

Disaster Vulnerability Analysis for Steep Slope Failure (급경사지 재해도 분석)

  • Choi, Eun-Kyeong;Kim, Sung-Wook;Kim, Sang-Hyun;Park, Dug-Keun;Oh, Jeong-Rim
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.930-939
    • /
    • 2009
  • Most of steep slope failures occurring in Korea have appeared during the localized heavy rain period, whereas the evaluation model of a disaster vulnerability analysis that has been proposed to date, has been prepared in consideration only of external factors comprising geographical features. This study calculated a wetness index and a contributory area which delivers moisture to the upper slant surface during the rainfall period, and also conducted a disaster vulnerability analysis in consideration of the convergence of surface water as well as the water system created during the occurrence of rainfall by including a curvature that shows a close relevance with the shape of the minute water system that is created temporarily during the occurrence of rainfall and with the convergence and divergence of surface water. When compared with a steep slope failure occurring within a selected model district in order to verify the prepared disaster analysis, a landslide occurring in the model district had emerged in a region in which the disaster vulnerability analysis was high and the density of the minor water system was also high. If these research results are extended nationwide, it is the most effective to use a disaster vulnerability analysis and the density of the minute water system; and it is supposed to be the simplest and the most effective method for preparing a disaster analysis of mountainous land shape such as the model district.

  • PDF

Vulnerability Evaluation for Monitoring Wide Area Outage in Transmission Systems (송전 계통 감시 시스템을 위한 취약도 평가 방법 개발)

  • Kim, Jin-Hwan;Lim, Il-Hyung;Lee, Seung-Jae;Choi, Myeon-Song;Lim, Seong-Il;Kim, Sang-Tae;Jin, Bo-Gun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.3
    • /
    • pp.506-514
    • /
    • 2010
  • Defense systems are needed to prevent catastrophic failures of a power grid due to cascaded events. Cascaded events can be occurred by power flow overload. Especially, it is the most dangerous problem that overload line is outage, because it can make the power system face danger of cascaded. In this paper, vulnerability evaluation for monitoring wide are outage is proposed using by configuration information of transmission systems. This method of vulnerability evaluation is considered direct effect and indirect effect of power flow, especially overload. What is more, it can be used when the configuration of power system changes, as simple fault occurs or maintenance of facility. In the case studies, the estimation and simulation network have been testified and analysed in PSSE and C programming.

Assessment of Water Quality Vulnerability to Extreme Drought in the Nakdong River Basin

  • Kim, Jong-Suk;Park, Seo-Yeon;Sur, Chanyang;Lee, Joo-Heon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.50-50
    • /
    • 2018
  • As the frequency of drought due to climate change is increasing and the severity of drought becomes severe, it is urgent to prepare measures against extreme drought. Despite the significant impacts of drought on the coupled human-environment system, we have not fully understood the consequences of extreme droughts affecting all parts of the environment and our communities, and there is no system to assess environmental droughts quantitatively. Even if a drought disaster occurs on the same scale, the severity of the drought depends on the vulnerability of the region. Therefore, this study proposes environmental drought assessment based on water quality vulnerability to extreme drought for the resilient proactive response.

  • PDF

The Security Analysis Consideration for SCADA System with Information System (SCADA 시스템과 정보망의 연동을 위한 위험분석 연구)

  • Kim, Injung;Jung, YoonJung;Min, ByeongGil;Park, JoonGil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1245-1248
    • /
    • 2004
  • 최근 SCADA 시스템은 국가기반시설의 중요한 시스템으로 인식됨에 따라 사이버상의 침해사고 대응 및 복구대책이 요구되고 있다. 일반적으로 기존에는 SCADA 시스템 설계시 공정 절차에 따라 이식성, 확장성, 가용성, 유연성을 고려하였으나 최근 안전하고 신뢰성있는 시스템 운영을 위하여 보안에 많은 관심을 갖게 되었다. 본 논문에서는 SCADA 시스템에 대한 보안 설계에 필요한 위험분석 절차를 제시함으로써 사이버테러에 의하여 발생될 국가적 재난 재해를 사전에 예방하고자 한다.

  • PDF

Case Study for Information System Vulnerability Assessment through Improved OCTAVE Approach (개선된 OCTAVE 접근방법을 이용한 정보시스템 취약성 평가 사례연구)

  • 김기윤;양동구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.69-79
    • /
    • 2003
  • We analyze key business process by using IDEF method in the perspective of business continuity, identify key information assets by using Skandia model, and use Nessus Version 1.4.2 to assess vulnerability about the sever of library information system according to OCTAVE(The Operationally Critical Threat, Asset, and Vulnerability Evaluation) approach. We suggest the vulnerability assessment case for introducing improved OCTAVE method including IDEF method and Skandia model.

Evaluation of waste disposal site using the DRASTIC system in Southern Korea

  • Lee, S.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.126-128
    • /
    • 2003
  • As a systematic approach to waste disposal site screening for groundwater pollution protection, the DRASTIC system developed by the US Environmental Protection Agency (USEPA) was introduced at Younggwang County in Korea. Hydrogeologic spatial databases for the system include info rmation on depth to water, net recharge, aquifer media, soil media, topographic slope, hydraulic conductivity and lineament. Using the databases, the DRASTIC system and a GIS, the regional groundwater pollution vulnerability of the study area was assessed. The fracture density extracted from lineament maps was added to the DRASTIC system to take into account the preferential migration of contaminants through fractures. From the results of the study, a degree of groundwater pollution vulnerability through the study area was easily interpreted, and waste disposal sites could be screened for groundwater protection.

  • PDF

A Development of Hit Probability-based Vulnerability Analysis System for Armored Fighting Vehicle using Fault Tree Analysis Technique (FTA 기법을 활용한 피격 확률 기반의 전차 취약성 분석 시스템 개발)

  • Hwang, Hun-Gyu;Yoo, Byeong-Gyu;Lee, Jae-Woong;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1981-1989
    • /
    • 2015
  • Recently, the development of reliability analysis system for combat system is required, because, necessities of integrated reliability analysis research are emphasized. In this paper, we develop a system which analyzes vulnerabilities for tank(or armored vehicle) based on the fault tree analysis(FTA) technique. The FTA is representative technique of reliability analysis to find cause of fault and calculate probability of fault. To do this, we propose a method to apply FTA technique into domain of vulnerability analysis for tank. Also, we develop the vulnerability analysis system using the proposed method. The system analyzes hit probabilities of components of tank based on multiple shot-lines, and calculates kill probabilities. The analyzed and calculated data support vulnerability analysis of tank.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.