• Title/Summary/Keyword: vulnerabilities

Search Result 1,060, Processing Time 0.028 seconds

Enactment of Anti-terrorism law In the Third World And The Instruction for Us (제3세계 국가의 테러방지법제정과 우리나라에 있어서 시사점)

  • Cho, Sung-Je;Soung, Jea-Hyen
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.274-283
    • /
    • 2009
  • To effectively and quickly respond to new forms of terrorism, a more organically integrated and coordinated system will be needed. As establishing the grounds of such a system based on laws would be most in congruence with legalism, it would be desirable to fundamentally establish an antiterrorism act. However, enactment of such counter-terrorism laws must be accomplished by means with which human rights violations against citizens may be minimized, contrary to what has been the case with third world nations. The act will need to include clauses that may relieve organizations, such as national human rights committees or citizen groups, of concerns over potential human rights violations. To address vulnerabilities of investigative rights issues which relate to cases relevant to acts of terrorism being delegated to the National Intelligence Service, the investigative jurisdiction shall be assigned to the public prosecutors and law enforcement officials as with other criminal proceedings. As for public concern that establishing the Anti-Terrorism Center under the National Intelligence Service, a secret service agency, may infringe upon human rights, functional and organizational dualism of the Anti -terrorism Center would be worth taking into account.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

Mapping Technique for Flood Vulnerable Area Using Surface Runoff Mechanism (지표유출메커니즘을 활용한 홍수취약지구 표출 기법)

  • LEE, Jae-Yeong;HAN, Kun-Yeun;KIM, Hyun-Il
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.181-196
    • /
    • 2019
  • Floods can be caused by a variety of factors, and the main cause of floods is the exceeding of urban drainage system or river capacity. In addition, rainfall frequently occurs that causes large watershed runoff. Since the existing methodology of preparing for flood risk map is based on hydraulic and hydrological modeling, it is difficult to analyse for a large area because it takes a long time due to the extensive data collection and complex analysis process. In order to overcome this problem, this study proposes a methodology of mapping for flood vulnerable area that considered the surface runoff mechanism. This makes it possible to reduce the time and effort required to estimate flood vulnerabilities and enable detailed analysis of large areas. The target area is Seoul, and it was confirmed that flood damage is likely to occur near selected vulnerable areas by verifying using 2×2 confusion matrix and ROC curve. By selecting and prioritizing flood vulnerable areas through the surface runoff mechanism proposed in this study, the establishment of systematic disaster prevention measures and efficient budget allocation will be possible.

Implementation, Security, and Usability Analysis of Accredited Certificate-based Internet Banking (공인인증서 기반 인터넷 뱅킹의 구현, 보안성, 그리고 편의성 분석)

  • Park, Hye-Seung;Lee, Jae-Hyup;Park, Seung-Chul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • We expect that the accredited certificate-based open banking, which is actively deployed in recent times, will solve the Galapagosization problem of the existing accredited certificate-based closed banking by supporting standard communication protocol and web compatibility. However, it is questionable how much the open banking will answer the security and usability problems of the existing closed banking. This paper is focused on analyzing the differences between the existing closed banking and the open banking, and then evaluates how much the security and usability problems of the existing closed banking are resolved by the open banking. The study firstly analyzes the security vulnerabilities raised in the process of providing closed banking services for the past 15 years or more, the countermeasures applied to enhance security, and the convenience impact of countermeasures. And then, the security and convenience of the open banking is inferred by analyzing the implementation difference between the closed banking and the open banking. The paper also briefly discusses how to improve the open banking to resolve the remaining problems of the open banking.

Study for improving attack Complexity against RSA Collision Analysis (RSA 충돌 분석 공격 복잡도 향상을 위한 연구)

  • Sim, Bo-Youn;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.261-270
    • /
    • 2015
  • In information security devices, such as Smart Cards, vulnerabilities of the RSA algorithm which is used to protect the data were found in the Side Channel Analysis. The RSA is especially vulnerable to Power Analysis which uses power consumption when the algorithm is working. Typically Power Analysis is divided into SPA(Simple Power Analysis) and DPA(Differential Power Analysis). On top of this, there is a CA(Collision Analysis) which is a very powerful attack. CA makes it possible to attack using a single waveform, even if the algorithm is designed to secure against SPA and DPA. So Message blinding, which applies the window method, was considered as a countermeasure. But, this method does not provide sufficient safety when the window size is small. Therefore, in this paper, we propose a new countermeasure that provides higher safety against CA. Our countermeasure is a combination of message and exponent blinding which is applied to the window method. In addition, through experiments, we have shown that our countermeasure provides approximately 124% higher attack complexity when the window size is small. Thus it can provide higher safety against CA.

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems (정보시스템에 대한 보안위험분석을 위한 모델링 기법 연구)

  • Kim Injung;Lee Younggyo;Chung Yoonjung;Won Dongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.989-998
    • /
    • 2005
  • Information systems are today becoming larger and mostly broadband-networked. This exposes them at a higher risk of intrusions and hacking than ever before. Of the technologies developed to meet information system security needs, risk analysis is currently one of the most actively researched areas. Meanwhile, due to the extreme diversity of assets and complexity of network structure, there is a limit to the level of accuracy which can be achieved by an analysis tool in the assessment of risk run by an information system. Also, the results of a risk assessment are most oftennot up-to-date due to the changing nature of security threats. By the time an evaluation and associated set of solutions are ready, the nature and level of vulnerabilities and threats have evolved and increased, making them obsolete. Accordingly, what is needed is a risk analysis tool capable of assessing threats and propagation of damage, at the same time as security solutions are being identified. To do that, the information system must be simplified, and intrusion data must be diagrammed using a modeling technique this paper, we propose a modeling technique information systems to enable security risk analysis, using SPICE and Petri-net, and conduct simulations of risk analysis on a number of case studies.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

Vulnerability Assessment of the Air Pollution Using Entropy Weights : Focused on Ozone (엔트로피 가중치를 활용한 대기오염 취약성 평가 - 오존을 중심으로 -)

  • Lee, Sang-hyeok;Kang, Jung Eun;Bae, Hyun Joo;Yoon, Dong Keun
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.4
    • /
    • pp.751-763
    • /
    • 2015
  • Both the selection of indicators and weights for them are critical issues in the vulnerability assessment. This study is to assess the air pollution vulnerability focused on ozone for 249 local jurisdictions using weights calculated by the entropy methodology and then examine the applicability of the methodology. We selected indicators for air pollution vulnerability assessment and standardized them. Subsequently, we calculated weights of each indicator using the entropy method and then integrated them into the vulnerability index. The exposure indicators consider meteorological and air pollution factors and the sensitivity of the local jurisdiction include variables on vulnerable areas and environments. The adaptive capacity contains socio-economic characteristics, health care capacities and air pollution managemental factors. The results show that Hwaseong-si, Gwangjin-gu, Gimpo-si, Gwangju-si, Gunpo-si are among the highest vulnerabilities based on the simple aggregation of indicators. And vulnerability-resilience (VRI) aggregation results indicates the similar spatial pattern with the simple aggregation outcomes. This article extends current climate change vulnerability assessment studies by adopting the entropy method to evaluate relative usefulness of data. In addition, the results can be used for developing customized adaptation policies for each jurisdiction reflecting vulnerable aspects.

  • PDF

Analysis of Disaster Vulnerable Districts using Heavy Rainfall Vulnerability Index (폭우 취약성 지표를 활용한 재해취약지구 분석)

  • PARK, Jong-Young;LEE, Jung-Sik;LEE, Jin-Deok;LEE, Won-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.1
    • /
    • pp.12-22
    • /
    • 2018
  • In order to improve the vulnerability of current cities due to climate change, the disaster vulnerability analysis manual for various disasters is provided. Depending on the spatial units, the disaster vulnerability levels, and the conditions of the climatic factors, the results of the disaster vulnerability analysis will have a significant impact. In this study, relative assessments are conducted by adding the eup, myeon and dong unit in addition to census output area unit to analyze the impact on the spatial unit, and relative changes are analyzed according to the classification stages by expanding the natural classification, which is standardized at level four stage, to level two, four and six stage. The maximum rainfalls(10min, 60min, 24hr) are added for the two limited rainfall characteristics to determine the relativity of disaster vulnerable districts by index. The relative assessment results of heavy rainfall vulnerability index showed that the area ratio of disaster areas by spatial unit was different and the correlation analysis showed that the space analysis between the eup, myeon and dong unit in addition to census output area unit was not consistent. And it can be seen that the proportion of disaster vulnerable districts is relatively different a lot due to indexes of rainfall characteristics, spatial unit analysis and disaster vulnerability level stage. Based on the above results, it can be seen that the ratios of disaster vulnerable districts differ relatively significantly due to the level of the disaster vulnerability class, and the indexes of rainfall characteristics. This suggests that the impact of the disaster vulnerable districts depending on indexes is relatively large, and more detailed indexes should be selected when setting up the disaster vulnerabilities analysis index.

A Study on the Vulnerability Assessment of Forest Vegetation using Regional Climate Model (지역기후모형을 이용한 산림식생의 취약성 평가에 관한 연구)

  • Kim, Jae-Uk;Lee, Dong-Kun
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.9 no.5
    • /
    • pp.32-40
    • /
    • 2006
  • This study's objects are to suggest effective forest community-level management measures by identifying the vulnerable forest vegetation communities types to climate change through a comparative analysis with present forest communities identified and delineated in the Actual Vegetation Map. The methods of this study are to classify the climatic life zones based on the correlative climate-vegetation relationship for each forest vegetation community, the Holdridge Bio-Climate Model was employed. This study confirms relationship between forest vegetation and environmental factors using Pearson's correlation coefficient analysis. Then, the future distribution of forest vegetation are predicted derived factors and present distribution of vegetation by utilizing the multinomial logit model. The vulnerability of forest to climate change was evaluated by identifying the forest community shifts slower than the average velocity of forest moving (VFM) for woody plants, which is assumed to be 0.25 kilometers per year. The major findings in this study are as follows : First, the result of correlative analysis shows that summer precipitation, mean temperature of the coldest month, elevation, soil organic matter contents, and soil acidity (pH) are highly influencing factors to the distribution of forest vegetation. Secondly, the result of the vulnerability assessment employing the assumed velocity of forest moving for woody plants (0.25kmjyear) shows that 54.82% of the forest turned out to be vulnerable to climate change. The sub-alpine vegetations in regions around Mount Jiri and Mount Seorak are predicted to shift the dominance toward Quercus mongolica and Pinus densiflora communities. In the identified vulnerable areas centering the southern and eastern coastal regions, about 8.27% of the Pinus densiflora communities is likely to shift to sub-tropical forest communities, and 3.38% of the Quercus mongolica communities is likely to shift toward Quercus acutissima communities. In the vulnerable areas scattered throughout the country, about 8.84% of the Quercus mongolica communities is likely to shift toward Pinus densiflora communities due to the effects of climate change. The study findings concluded that challenges associated with predicting the future climate using RCM and the assessment of the future vulnerabilities of forest vegetations to climate change are significant.