• 제목/요약/키워드: system vulnerability

검색결과 992건 처리시간 0.038초

Vulnerability assessment of upland public groundwater wells against climate change

  • Shin, Hyung Jin;Lee, Jae Young;Jo, Sung Mun;Cha, Sang Sun;Park, Chan Gi
    • 농업과학연구
    • /
    • 제47권3호
    • /
    • pp.577-596
    • /
    • 2020
  • Drought is a natural disaster that directly affects agriculture, which has a great impact on the global agricultural production system and yield. The lack of water storage in most parts of the country due to the lack of precipitation has caused a great increase in social interest in drought due to the dryness of rice fields and crops. As the drought period increases and the drought intensity becomes stronger, it is believed that drought damage to crops will continue; thus, it is necessary to understand the vulnerability to irrigation performance and the ability of irrigation facilities. Therefore, this study conducted a vulnerability assessment of irrigation facilities (public Groundwater well) in cities across the country. The survey was conducted using statistical data from 2007 to 2016, and the vulnerability score was calculated according to the vulnerability evaluation procedure for drought in the irrigation facilities (public groundwater wells). Among 157 regions, 136 areas were very vulnerable; 14 areas were vulnerable; 3 areas were normal; 4 areas were good, and 0 areas were excellent. The vulnerability assessment can be used as basic data for the development or maintenance of field irrigation facilities in the future by understanding the vulnerability of irrigation facilities.

급경사지 재해도 분석 (Disaster Vulnerability Analysis for Steep Slope Failure)

  • 최은경;김성욱;김상현;박덕근;오정림
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2009년도 춘계 학술발표회
    • /
    • pp.930-939
    • /
    • 2009
  • Most of steep slope failures occurring in Korea have appeared during the localized heavy rain period, whereas the evaluation model of a disaster vulnerability analysis that has been proposed to date, has been prepared in consideration only of external factors comprising geographical features. This study calculated a wetness index and a contributory area which delivers moisture to the upper slant surface during the rainfall period, and also conducted a disaster vulnerability analysis in consideration of the convergence of surface water as well as the water system created during the occurrence of rainfall by including a curvature that shows a close relevance with the shape of the minute water system that is created temporarily during the occurrence of rainfall and with the convergence and divergence of surface water. When compared with a steep slope failure occurring within a selected model district in order to verify the prepared disaster analysis, a landslide occurring in the model district had emerged in a region in which the disaster vulnerability analysis was high and the density of the minor water system was also high. If these research results are extended nationwide, it is the most effective to use a disaster vulnerability analysis and the density of the minute water system; and it is supposed to be the simplest and the most effective method for preparing a disaster analysis of mountainous land shape such as the model district.

  • PDF

송전 계통 감시 시스템을 위한 취약도 평가 방법 개발 (Vulnerability Evaluation for Monitoring Wide Area Outage in Transmission Systems)

  • 김진환;임일형;이승재;최면송;임성일;김상태;진보건
    • 전기학회논문지
    • /
    • 제59권3호
    • /
    • pp.506-514
    • /
    • 2010
  • Defense systems are needed to prevent catastrophic failures of a power grid due to cascaded events. Cascaded events can be occurred by power flow overload. Especially, it is the most dangerous problem that overload line is outage, because it can make the power system face danger of cascaded. In this paper, vulnerability evaluation for monitoring wide are outage is proposed using by configuration information of transmission systems. This method of vulnerability evaluation is considered direct effect and indirect effect of power flow, especially overload. What is more, it can be used when the configuration of power system changes, as simple fault occurs or maintenance of facility. In the case studies, the estimation and simulation network have been testified and analysed in PSSE and C programming.

Assessment of Water Quality Vulnerability to Extreme Drought in the Nakdong River Basin

  • Kim, Jong-Suk;Park, Seo-Yeon;Sur, Chanyang;Lee, Joo-Heon
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2018년도 학술발표회
    • /
    • pp.50-50
    • /
    • 2018
  • As the frequency of drought due to climate change is increasing and the severity of drought becomes severe, it is urgent to prepare measures against extreme drought. Despite the significant impacts of drought on the coupled human-environment system, we have not fully understood the consequences of extreme droughts affecting all parts of the environment and our communities, and there is no system to assess environmental droughts quantitatively. Even if a drought disaster occurs on the same scale, the severity of the drought depends on the vulnerability of the region. Therefore, this study proposes environmental drought assessment based on water quality vulnerability to extreme drought for the resilient proactive response.

  • PDF

SCADA 시스템과 정보망의 연동을 위한 위험분석 연구 (The Security Analysis Consideration for SCADA System with Information System)

  • 김인중;정윤정;민병길;박중길
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2004년도 춘계학술발표대회
    • /
    • pp.1245-1248
    • /
    • 2004
  • 최근 SCADA 시스템은 국가기반시설의 중요한 시스템으로 인식됨에 따라 사이버상의 침해사고 대응 및 복구대책이 요구되고 있다. 일반적으로 기존에는 SCADA 시스템 설계시 공정 절차에 따라 이식성, 확장성, 가용성, 유연성을 고려하였으나 최근 안전하고 신뢰성있는 시스템 운영을 위하여 보안에 많은 관심을 갖게 되었다. 본 논문에서는 SCADA 시스템에 대한 보안 설계에 필요한 위험분석 절차를 제시함으로써 사이버테러에 의하여 발생될 국가적 재난 재해를 사전에 예방하고자 한다.

  • PDF

개선된 OCTAVE 접근방법을 이용한 정보시스템 취약성 평가 사례연구 (Case Study for Information System Vulnerability Assessment through Improved OCTAVE Approach)

  • 김기윤;양동구
    • 정보보호학회논문지
    • /
    • 제13권5호
    • /
    • pp.69-79
    • /
    • 2003
  • 업무연속성 관점에서 IDEF 접근방법에 의해서 주요 업무 프로세스를 파악하고, 관련 정보자산을 Skandia 모형으로 식별 한 후에, OCTAVE 접근방법에 의해서 위협을 단계적으로 분석하기 위해서, Nessus Version 1.4.2를 이용하여 도서관 정보시스템 중에서 가장 중요한 자산인 서버에 대해서 취약성을 평가했다. 기존 OCTAVE 접근방법에 IDEF 접근방법과 Skandia 모형을 동시에 이용하는 개선된 OCTAVE 접근방법을 이용한 취약성 평가 사례를 제시했다.

Evaluation of waste disposal site using the DRASTIC system in Southern Korea

  • Lee, S.
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2003년도 Proceedings of ACRS 2003 ISRS
    • /
    • pp.126-128
    • /
    • 2003
  • As a systematic approach to waste disposal site screening for groundwater pollution protection, the DRASTIC system developed by the US Environmental Protection Agency (USEPA) was introduced at Younggwang County in Korea. Hydrogeologic spatial databases for the system include info rmation on depth to water, net recharge, aquifer media, soil media, topographic slope, hydraulic conductivity and lineament. Using the databases, the DRASTIC system and a GIS, the regional groundwater pollution vulnerability of the study area was assessed. The fracture density extracted from lineament maps was added to the DRASTIC system to take into account the preferential migration of contaminants through fractures. From the results of the study, a degree of groundwater pollution vulnerability through the study area was easily interpreted, and waste disposal sites could be screened for groundwater protection.

  • PDF

FTA 기법을 활용한 피격 확률 기반의 전차 취약성 분석 시스템 개발 (A Development of Hit Probability-based Vulnerability Analysis System for Armored Fighting Vehicle using Fault Tree Analysis Technique)

  • 황훈규;유병규;이재웅;이장세
    • 한국정보통신학회논문지
    • /
    • 제19권8호
    • /
    • pp.1981-1989
    • /
    • 2015
  • 최근 전투 시스템의 신뢰성을 통합적으로 분석하는 것에 관한 연구의 필요성이 강조되고 있으며, 이와 관련하여 전투 시스템 신뢰성 분석 시스템의 개발 요구가 생겨나게 되었다. 이러한 이유로 본 논문에서는 시스템의 고장 원인 및 확률 분석을 위한 대표적인 신뢰성 분석 기법인 FTA를 적용하여 이를 기반으로 전차의 취약성을 분석하는 시스템을 개발하는 것에 관한 내용을 다룬다. 이를 위해 FTA를 전투 시스템의 취약성 분석에 적용하기 위한 방법을 제안하였으며, 제안한 방법을 기반으로 FTA 기반의 전차 취약성 분석 시스템을 개발하였다. 개발한 시스템은 3차원 전차 모델을 기반으로 다중 관통선을 설정하여 주요 부품의 피격 확률을 도출하고, 이를 통해 기능별 상실 확률을 분석한다. 분석된 기능별 상실 확률을 통해 피격면에 따른 전차의 취약성을 분석할 수 있다.

u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계 (A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System)

  • 노시춘
    • 융합보안논문지
    • /
    • 제13권4호
    • /
    • pp.11-17
    • /
    • 2013
  • 모든 u-헬스케어 시스템은 보안 취약점을 가지고 있다. 이 취약점은 로컬(local) 또는 네트워크(network) 상에서 잠재적인 위험이 된다. 의료정보 기술의 Smart 환경, Ad-hoc networking, 무선통신 환경은, u-헬스케어 보안 취약성을 증가시키는 주요 요인이다. u-헬스케어 의료정보시스템 도메인은 사용자단말 구간, 공중통신망 인프라구간, 네트워킹구간, 인트라넷구간으로 구분된다. 의료정보시스템 도메인별을 구분하여 취약점을 평가하는 이유는 도메인별로 취약점에 대한 대처방법이 다르기 때문이다. u-헬스케어시스템 5단계의 보안위험도 평가체계는 도메인별 보안취약성 진단체계를 설계하여 보안대책을 강구하기 위해 필요하다. 제안하는 모델을 사용할 경우 현재까지 막연하게 진행 되어온 USN 기반 의료정보네트워크 보안취약성 진단대책을 좀 더 체계적으로 수행할 수 있는 모형을 제공한다.