• Title/Summary/Keyword: threat assessment

Search Result 182, Processing Time 0.029 seconds

Impact Assessment Model of Bird Species for Land Developments (개발사업에 따른 조류종 영향평가모형 개발 및 적용)

  • Lee, Dong-Kun;Kim, Eun-Young;Lee, Eun-Jae;Song, Won-Kyong
    • Journal of Environmental Impact Assessment
    • /
    • v.19 no.3
    • /
    • pp.347-356
    • /
    • 2010
  • Forests are being seriously fragmented as a result of land development. Land development with disregard to its subsequent environmental impacts is a primary threat to biodiversity by incurring massive habitat losses and changes in structure and composition of forests. The purpose of this study was to develop the impact assessment model for quantitative distance or degree of disturbance by land developments. This study conducted a survey about structure and composition of forest species to determine degree of impact from land development. The edge effect of forest fragmentation on the number of bird species, population size, and bird diversity was obvious. In particular, the bird diversity sharply declines around the forest edge where intensive land development projects take place. To assess the disturbance of forest species, the factors selected were the bird diversity and the rate of edge species. The impact assessment model about bird diversity was explained by type of forest fragmentation and type of vegetation ($R^2$=0.23, p<0.005). The other model about edge species explained by a distance, type of forest fragmentation, type of vegetation, and width of road ($R^2$=0.34, p<0.001). In order to test the applicability of the model developed in this study, the models was applied to the Samsong housing development in Goyang-si, Gyunggi-do. The impacts of land development on the bird species were reasonably quantified to suggest effective mitigation measure. The impact assessment model developed in this study is useful to assess the magnitude of disturbance of bird species. Particularly, the model could be applied to the current Environmental Impact Assessment practices to predict and quantify the impacts of land developments projects on forest bird species.

A Study on the Development of Analysis Model for Maritime Security Management (해상보안관리 분석모델 개발에 관한 연구)

  • Jeong, Woo-Lee
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.9-14
    • /
    • 2012
  • Maritime security incidents by pirates and by terrorists increase, but maritime incidents investigation models are limited to figure out the maritime security incidents. This paper provides the analysis model for maritime security incidents. To develop this analysis model, this categorizes five threat factors, the ship, the cargo type, port system, human factor, information flow system, makes the risk assessment matrix to quantify the risk related to threat factors and classifies four priority categories of risk assessment matrix. Also, this model makes from the frameworks which include a variety of security initiatives implementing in stakeholder levels like international organizations, individual governments, shipping companies, and the ship. Therefore, this paper develops the Analysis for Maritime Security Management model based on various security initiatives responding to the stakeholder levels of maritime security management and top-bottom/bottom-up decision trees, and shows the validity through verifying the real maritime security incident of M/V Petro Ranger.

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.

The Present State of Domestic Alert Systems for Cyber Threats (사이버 위협에 대한 국내 경보 체계 현황)

  • 이도훈;백승현;오형근;이진석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.251-257
    • /
    • 2004
  • Todays, the more information technologies(IT) like internet is developed, the more main facilities of individuals and social organizations get deeply involved in IT. Also, the trend of cyber threats such as internet worms and viruses is moving from local pc attacks to IT infrastructure attacks by exploiting inherent vulnerabilities of IT. Social organizations has a limit to response these attacks individually, and so the systematic coordinate center for social organizations is necessary. To analyze and share cyber threat information is performed prior to the construction of the coordinate center. In this paper, we survey domestic alert systems for cyber threats of related organizations and companies, and then classify them into two categories by the range of threat assessment: global alert systems for global If infrastructure and individual alert systems for each threat. Next, we identify problems of domestic alert systems and suggest approaches to resolve them.

  • PDF

Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants (원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법)

  • Koo, In-Soo;Kim, Kwan-Woong;Hong, Seok-Boong;Park, Geun-Ok;Park, Jae-Yoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.839-847
    • /
    • 2011
  • Instrumentation & Control(I&C) System in NPP(Nuclear Power Plant) plays a important role as the brain of human being, it performs protecting, controling and monitoring safety operation of NPP. Recently, the I&C system is digitalized as digital technology such as PLC, DSP, FPGA. The different aspect of digital system which use digital communication to analog system is that it has potential vulnerability to cyber threat in nature. Possibility that digital I&C system is defected by cyber attack is increasing day by day. The result of cyber attack can be adverse effect to safety function in NPP. Therefore, I&C system required cyber security counter-measures that protect themselves from cyber threat efficiently and also cyber security design should be taken into consideration at concept stage in I&C system development process. In this study, we proposed the digital asset analysis method for cyber security assessment of I&C system design in NPP and we performed digital asset analysis of I&C system by using the proposed method.

Research on the application of Machine Learning to threat assessment of combat systems

  • Seung-Joon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.47-55
    • /
    • 2023
  • This paper presents a method for predicting the threat index of combat systems using Gradient Boosting Regressors and Support Vector Regressors among machine learning models. Currently, combat systems are software that emphasizes safety and reliability, so the application of AI technology that is not guaranteed to be reliable is restricted by policy, and as a result, the electrified domestic combat systems are not equipped with AI technology. However, in order to respond to the policy direction of the Ministry of National Defense, which aims to electrify AI, we conducted a study to secure the basic technology required for the application of machine learning in combat systems. After collecting the data required for threat index evaluation, the study determined the prediction accuracy of the trained model by processing and refining the data, selecting the machine learning model, and selecting the optimal hyper-parameters. As a result, the model score for the test data was over 99 points, confirming the applicability of machine learning models to combat systems.

The Experiences of Workplace Violence toward Nurses in Hospitals in Jeju Province, South Korea (제주 지역 병원 간호사의 직장 폭력 경험 실태)

  • Park, Eun-Ok;Kim, Jeong-Hee
    • Korean Journal of Occupational Health Nursing
    • /
    • v.20 no.2
    • /
    • pp.212-220
    • /
    • 2011
  • Purpose: This study was to investigate the prevalence & types of workplace violence toward nurses in hospitals, and to understand nurse's coping response, cause of violence and prevention strategy. Methods: The data were collected from 254 nurses working in 9 hospitals in Jeju Province by the self-report from June to August 2010. Results: The respondents experienced unpleasant or insulting words (89.8%), verbal threat (38.2%), physical threat (67.7%), physical injury (32.7%), severe physical injury (2.8%), and sexual harassment (26.4%) during the last one year. The frequent offenders were patients, patients' family and physicians in order. The causes of violence which nurses perceived were personality of offenders (76.4%), lack of assessment of aggressive patients or care givers (42.1%), and lack of explanation to patients or caregivers (33.5%). They reported that coping strategies for workplace violence were 'established reporting system (63.4%)', 'building a cooperative circumstances within team members (58.3%)', and 'formulation of hospital policies for violence prevention and coping (54.3%)'. Conclusion: These findings showed nurses are at considerable risk for workplace violence, and they experience various types of violence from patients, caregivers, and physicians. We suggest that hospitals formulate appropriate policies, guidelines and programs to prevent and cope with workplace violence in hospitals.

Effect of excitation intensity on slope stability assessed by a simplified approach

  • Korzec, Aleksandra;Jankowski, Robert
    • Earthquakes and Structures
    • /
    • v.21 no.6
    • /
    • pp.601-612
    • /
    • 2021
  • The paper concerns the selection of a design accelerograms used for the slope stability assessment under earthquake excitation. The aim is to experimentally verify the Arias Intensity as an indicator of the excitation threat to the slope stability. A simple dynamic system consisting of a rigid block on a rigid inclined plane subjected to horizontal excitation is adopted as a slope model. Strong ground motions recorded during earthquakes are reproduced on a shaking table. The permanent displacement of the block serves as a slope stability indicator. Original research stand allows us to analyse not only the relative displacement but also the acceleration time history of the block. The experiments demonstrate that the Arias Intensity of the accelerogram is a good indicator of excitation threat to the stability of the slope. The numerical analyses conducted using the experimentally verified extended Newmark's method indicate that both the Arias Intensity and the peak velocity of the excitation are good indicators of the impact of dynamic excitation on the dam's stability. The selection can be refined using complementary information, which is the dominant frequency and duration of the strong motion phase of the excitation, respectively.

A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea (사이버전의 역량평가 개선과 역량 강화 방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1251-1258
    • /
    • 2015
  • Recently, as the development of cyber weapons, the threat of cyber warfare has been increasing. Nations, which experienced cyber warfare already, have been damaged not only in the cyber space as well as in real war field. Therefore, each nation is constantly making efforts to prepare for cyber warfare. First of all, to prepare for cyber warfare, each nation's capability of cyber warfare should be understood. A plan of reaction of cyber warfare should be searched by comparison and analysis of capability of cyber warfare. This paper compares and analyzes established methodology of capability assessment about cyber warfare, and this paper finds a better point to suggest the improvement of capability assessment about cyber warfare. This paper applies capability assessment of cyber warfare to nations, which can influence on Korea with improved capability assessment of cyber warfare. Comparing and analyzing the result of assessment, this paper deducts complementary point of Korean cyber warfare to suggest the plan to enhancing capability of cyber warfare.

Visible Assessment of Earthquake-induced Geotechnical Hazards by Adopting Integrated Geospatial Database in Coastal Facility Areas (복합 공간데이터베이스 적용을 통한 해안 시설영역 지진 유발 지반재해의 가시적 평가)

  • Kim, Han-Saem;Sun, Chang-Guk
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.171-180
    • /
    • 2016
  • Earthquake event keeps increasing every year, and the recent cases of earthquake hazards invoke the necessity of seismic study in Korea, as geotechnical earthquake hazards, such as strong ground motion, liquefaction and landslides, are a significant threat to structures in industrial hub areas including coastal facilities. In this study, systemized framework of integrated assessment of earthquake-induced geotechnical hazard was established using advanced geospatial database. And a visible simulation of the framework was specifically conducted at two coastal facility areas in Incheon. First, the geospatial-grid information in the 3D domain were constructed with geostatistical interpolation method composed of multiple geospatial coverage mapping and 3D integration of geo-layer construction considering spatial outliers and geotechnical uncertainty. Second, the behavior of site-specific seismic responses were assessed by incorporating the depth to bedrock, mean shear wave velocity of the upper 30 m, and characteristic site period based on the geospatial-grid. Third, the normalized correlations between rock-outcrop accelerations and the maximum accelerations of each grid were determined considering the site-specific seismic response characteristics. Fourth, the potential damage due to liquefaction was estimated by combining the geospatial-grid and accelerations correlation grid based on the simplified liquefaction potential index evaluation method.