• Title/Summary/Keyword: vulnerability analysis

Search Result 1,293, Processing Time 0.026 seconds

Utilization and Excavation Practices of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 활용 및 적용사례 발굴)

  • Choi, Gap Yong;Chang, Eun Mi;Kim, Seong Gon;Cho, Kwang-Hyun
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.79-87
    • /
    • 2014
  • In order to foster rapid disaster response and public life protection, National Emergency Management Agency has been trying to spread 'Emergency Rescue Standard System' on a national scale since 2006. The agency has also intensified management of firefighter's safety on disaster site by implementing danger predication training, specialized training and education and safety procedure check as a part of safety management officer duties. Nevertheless, there are limitations for effective fire fighting steps, such as damage spreading and life damage due to unawareness of illegal converted structure, structure transformation by high temperature and nearby hazardous material storage as well as extemporary situation handling endangered firefighter's life. In order to eliminate these limitations there is a need for an effort and technology application to minimize human errors such as inaccurate situational awareness, wrong decision built on experience and judgment of field commander and firefighters. The purpose of this study is to propose a new disaster response model which is applied with geospatial information. we executed spatial contextual awareness map analysis using fire-fighting vulnerable zone model to propose the new disaster response model and also examined a case study for Dalseo-gu in Daegu Metropolitan City. Finally, we also suggested operational concept of new proposed model on a national scale.

Security-Enhanced Key Establishment Scheme for Key Infection (Key Infection의 보안성 향상을 위한 개선된 키 설정 방법)

  • Hwang Young-Sik;Han Seung-Wan;Nam Taek-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.24-31
    • /
    • 2006
  • Traditional security mechanisms do not work well in the sensor network area due to the sensor's resource constraints. Therefore security issues are challenging problems on realization of the sensor network. Among them, the key establishment is one of the most important and challenging security primitives which establish initial associations between two nodes for secure communications. Recently, R. Anderson et al. proposed one of the promising key establishment schemes for commodity sensor network called Key Infection. However, key infection has an intrinsic vulnerability that there are some areas where adversaries can eavesdrop on the transferred key information at initial key establishment time. Therefore, in this paper, we propose a security-enhanced key establishment scheme for key infection by suggesting a mechanism which effectively reduces the vulnerable areas. The proposed security mechanism uses other neighbor nodes' additional key information to establish pair-wise key at the initial key establishment time. By using the additional key information, we can establish security-enhanced key establishment, since the vulnerable area is decreased than the key infection's. We also evaluate our scheme by comparing it with key infection using logical and mathematical analysis.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.

Effects of Heat Wave on Body Temperature and Blood Pressure in the Poor and Elderly

  • Kim, Young-Min;Kim, So-Yeon;Cheong, Hae-Kwan;Ahn, Byun-Gok;Choi, Kyu-Sik
    • Environmental Analysis Health and Toxicology
    • /
    • v.27
    • /
    • pp.13.1-13.10
    • /
    • 2012
  • Objectives: We aimed to investigate the acute effects of heat stress on body temperature and blood pressure of elderly individuals living in poor housing conditions. Methods: Repeated measurements of the indoor temperature, relative humidity, body temperature, and blood pressure were conducted for 20 elderly individuals living in low-cost dosshouses in Seoul during hot summer days in 2010. Changes in the body temperature, systolic blood pressure (SBP) and diastolic blood pressure (DBP) according to variations in the indoor and outdoor temperature and humidity were analyzed using a repeated-measures ANOVA controlling for age, sex, alcohol, and smoking. Results: Average indoor and outdoor temperatures were $31.47^{\circ}C$ (standard deviation [SD], $0.97^{\circ}C$) and $28.15^{\circ}C$ (SD, $2.03^{\circ}C$), respectively. Body temperature increased by $0.21^{\circ}C$ (95% confidence interval [CI], 0.16 to $0.26^{\circ}C$) and $0.07^{\circ}C$ (95% CI, 0.04 to $0.10^{\circ}C$) with an increase in the indoor and outdoor temperature of $1^{\circ}C$. DBP decreased by 2.05 mmHg (95% CI, 0.05 to 4.05 mmHg), showing a statistical significance, as the indoor temperature increased by $1^{\circ}C$, while it increased by 0.20 mmHg (95% CI, -0.83 to 1.22 mmHg) as outdoor temperature increased by $1^{\circ}C$. SBP decreased by 1.75 mmHg (95% CI, -1.11 to 4.61 mmHg) and 0.35 mmHg (95% CI, -1.04 to 1.73 mmHg), as the indoor and outdoor temperature increased by $1^{\circ}C$, respectively. The effects of relative humidity on SBP and DBP were not statistically significant for both indoor and outdoor. Conclusions: The poor and elderly are directly exposed to heat waves, while their vital signs respond sensitively to increase in temperature. Careful adaptation strategies to climate change considering socioeconomic status are therefore necessary.

Analysis on the Impact of Climate Change on the Survey of Rural Water District and Agricultural Production Infrastructure (농어촌용수 및 농업생산기반시설의 실태조사에 따른 기후변화 영향 분석)

  • Kim, Soo-Jin;Bae, Seung-Jong;Choi, Jin-Yong;Kim, Seong-Pil;Eun, Sang-Kyu;Yoo, Seung-Hwan;Jang, Tae-Il;Goh, Nam-Young;Hwang, Sye-Woon;Kim, Seong-Joon;Park, Tae-Seon;Jeong, Kyung-Hun;Song, Suk-Ho
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.60 no.5
    • /
    • pp.1-15
    • /
    • 2018
  • This study aims to effective survey on actual condition for impact and vulnerability assessment on climate change in agriculture and rural community (limited to rural water and agricultural infrastructure, Paragraph 3, Article 2 of the Rearrangement of Agricultural and Fishing Villages Act) entrusted to Korea Rural Community Corporation based on the Law (Paragraph 2, Article 47 of the Framework Act on Agriculture, Rural community and Food industry). The results are summarized as follows. The rural water was divided into three categories (abnormal climate, water use, and flood control), and 31 indicators were selected. The reservoirs were divided into four categories, and 20 indicators were selected. The pumping stations were divided into two categories, 7 indicators, and the drainage pump stations were divided into two categories, 5 indicators were chosen. A survey on actual condition of each indicator was conducted and the result of the impact assessment was calculated. The 65 rural water showed values ranged from 0.855 to 1.308. The reservoir ranged from 0.966 to 23.338 as a result of the impact assessment on the 16 indicators. The pumping station was able to calculate the results of the safety inspection and the thorough safety inspection, and the drainage pump station was able to calculate only the result of the safety inspection. It is judged that it will be necessary to secure and analyze data on indicators with no data in the future. The results of this research can be utilized as baseline data that can deal with climate change preemptively.

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Dehydration Risk from Age, BMI, and Disease Exposure (연령, BMI, 질병노출로 인한 탈수 위험)

  • Kim, Sun-Hee;Chun, Sung-Soo;Choi, Myung-Sup;Yun, Mi-Eun
    • Korean Public Health Research
    • /
    • v.44 no.4
    • /
    • pp.35-49
    • /
    • 2018
  • Objective : The purpose of this study was to investigate the risk factors of dehydration from the subjects who underwent anthropometric and blood parameters testing during a comprehensive health screening. Methods : For the study analysis, 5,391 samples with valid data of the levels of Sodium($Na^+$), BUN (Blood Urea Nitrogen) and FBS(Fasting Blood Sugar) were selected to calculate a dehydration indicator of plasma osmolality. The study data was collected from the health screening examinees who visited Sahmyook Medical Center Seoul Adventist Hospital Comprehensive Health Check-up Center from 2014.01.01 to 2015.12.31. The relationship between dehydration and age group, BMI, disease exposures(hypertension, diabetes mellitus, dyslipidemia, kidney disorder) were analyzed by gender. Results : The odds ratio of dehydration showed statistical significance from age ${\geq}50$ in both male and female, respectively. The female obese group was vulnerable to dehydration while the male study group showed no statistical significance in the BMI difference. The disease exposed groups(hypertension, diabetes mellitus, dyslipidemia, kidney disorder) were vulnerable to dehydration. Also, the more types of disease carried by the exposed patients, the higher odds ratio and susceptibility to dehydration. Conclusions : Aging, increasing BMI, and exposed to diseases were found to be the risk factors for vulnerability to dehydration. To prevent dehydration, special caution to be taken for those in the ${\geq}50s$ group, along with controlling BMI and chronic diseases. Further studies are suggested to investigate the risk factors of dehydration that may affect increasing plasma osmolality as a potential stimulus mechanism in disease outbreaks.

Elicitation of drought alternatives based on Water Policy Council and the role of Shared Vision Model (협의체 기반 가뭄 대응 대안 도출과 비전공유모형의 역할)

  • Kim, Gi Joo;Seo, Seung Beom;Kim, Young-Oh
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.6
    • /
    • pp.429-440
    • /
    • 2019
  • The numbers of multi-year droughts due to climate change are increasing worldwide. Boryeong Dam, located in Chungcheongnam-do, South Korea, was also affected by a 4-year drought from 2014 to 2017. Since traditional unilateral decision making processes to alleviate drought damage have, until now, resulted in conflicts between many of the involved groups, the need for active participation from both stakeholders and policymakers is greater than before. This study introduced Shared Vision Planning, a collaborative decision making process that involves participation from various groups of stakeholders, by organizing Water Policy Council for Climate Change Adaptation in Chungcheongnam-do. A Shared Vision Planning Model was then developed with a system dynamics software by working together with relevant stakeholders to actively reflect their requests through three council meetings. Multiple simulations that included various future climate change scenarios were conducted, and future drought vulnerability analysis results of Boryeong Dam and districts, in terms of frequency, length, and magnitude, were arrived at. It was concluded that Boryeong Dam was more vulnerable to future droughts than the eight districts. While the total water deficit in the eight districts was not so significant, their water deficit in terms of spatial discordance was proved to be more problematic. In the future, possible alternatives to the model will be implemented so that stakeholders can use it to agree on a policy for possible conflict resolutions.