• Title/Summary/Keyword: vulnerability analysis

Search Result 1,293, Processing Time 0.028 seconds

The Impact of Environmental Health Factors on Extreme-heat Vulnerability Assessment in a Metropolitan City (환경보건적 요소가 도시 내 폭염 취약성 평가 결과에 미치는 영향 분석)

  • Lee, Won-Jung;Kang, Jae-Eun;Kim, Yoo-Keun
    • Journal of Environmental Health Sciences
    • /
    • v.39 no.6
    • /
    • pp.492-504
    • /
    • 2013
  • Objectives: This analysis seeks to evaluate the impact of environmental health factors (EHF; e.g. hospital beds per capita, employees of medical institutions) on extreme-heat vulnerability assessment in Busan Metropolitan City during 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), extreme-heat vulnerability is comprised of the categories of Exposure, Sensitivity, and Adaptive Capacity (including EHF). The indexes of the Exposure and Sensitivity categories indicate positive effects, while the Adaptive capacity index indicates a negative effect on extreme-heat vulnerability. Variables of each category were standardized by the re-scaling method, and then each regional relative vulnerability was computed with the vulnerability index calculation formula. Results: The extreme-heat vulnerability index (EVI) excepting EHF was much higher in urban areas than in suburban areas within the metropolitan area. When EHF was considered, the difference in the EVI between the two areas was reduced due to the increase of the Adaptive capacity index in urban areas. The low EVI in suburban areas was induced by a dominant effect of natural environmental factors (e.g. green area) within the Adaptive capacity category. Conclusions: To reduce the vulnerability to extreme heat in urban areas, which were more frequently exposed to extreme heat than others areas, public health and natural environments need to be improved in sensitive areas.

Comparative Analysis of Network-based Vulnerability Scanner for application in Nuclear Power Plants (원전 적용을 위한 네트워크 기반 취약점 스캐너의 비교 분석)

  • Lim, Su-chang;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1392-1397
    • /
    • 2018
  • Nuclear power plants(NPPs) are protected as core facilities managed by major countries. Applying general IT technology to facilities of NPPs, the proportion of utilizing the digitized resources for the rest of the assets except for the existing installed analog type operating resources is increasing. Using the network to control the IT assets of NPPs can provide significant benefits, but the potential vulnerability of existing IT resources can lead to significant cyber security breaches that threaten the entire NPPs. In this paper, we analyze the nuclear cyber security vulnerability regulatory requirements, characteristics of existing vulnerability scanners and their requirements and investigate commercial and free vulnerability scanners. Based on the proposed application method, we can improve the efficiency of checking the network security vulnerability of NPPs when applying vulnerability scanner to NPPs.

Failure Mode Effective Analysis for selection of Single Point Vulnerability in New type Nuclear Power Plant (신규노형 원전의 발전정지유발기기 선정을 위한 고장모드영향분석)

  • Hyun, Jin Woo;Yeam, Dong Un
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.10 no.1
    • /
    • pp.31-36
    • /
    • 2014
  • For decreasing an unexpected shutdown of Nuclear Power Plants, Korea Hydro & Nuclear Power co.(KHNP) has developed Single Point Vulnerability(SPV) of NPPs since 2008. SPV is the equipment that cause reactor shutdown & turbine trip or more than 50% power rundown due to its malfunction. New type Nuclear Power Plants need to develop the SPV list, so performed the SPV selection for about 1 year. To develop this, Failure Mode Effect Analysis(FMEA) methods are used. As results of FMEA analysis, about 700 equipment are selected as SPV. Thereafter those are going to be applied to new type Nuclear Power Plants to enhance equipment reliability.

A Study On The Cloud Hypervisor ESXi Security Vulnerability Analysis Standard (클라우드 하이퍼바이저 ESXi 보안 취약점 진단 기준에 관한 연구)

  • Kim, Sun-Jib;Heo, Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.31-37
    • /
    • 2020
  • The cloud computing industry is regarded as a key element of the ICT industry and an important industry that will be a watershed for the future development of ICT industry. Korea has established the 1st~2nd cloud computing development basic plan to induce the growth of the cloud industry. However, the domestic information security guide provides technical vulnerability analysis criteria for Unix and Windows servers, DBMS, network equipment, and security equipment, but fails to provide vulnerability analysis criteria for hypervisors that are key elements of cloud computing. Organizations that have deployed cloud systems will be able to assist in vulnerability analysis using the criteria presented in this paper.

Development of User Oriented Vulnerability Analysis Application on Smart Phone (사용자 중심의 스마트폰 보안 취약성 분석 어플리케이션 개발)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.2
    • /
    • pp.7-12
    • /
    • 2012
  • An advanced and proactive response mechanism against diverse attacks should be proposed for enhance its security and reliability on android based commercial smart work device. In this study, we propose a user-oriented vulnerability analysis and response system on commercial smart work device based on android when diverse attacks are activated. Proposed mechanism uses simplified and optimized memory for monitoring and detecting the abnormal behavior on commercial smart work device, with which we can find and determine the attacker's attempts. Additionally, proposed mechanism provides advanced vulnerability analysis and monitoring/control module.

A Study on Potential Flood Damage Classification and characteristic analysis (시군별 홍수위험잠재능 유형화 및 특성분석)

  • Kim, Soo-Jin;Eun, Sang-Kyu;Kim, Seong-Pil;Bae, Seung-Jong
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.3
    • /
    • pp.21-36
    • /
    • 2017
  • Climate change is intensifying storms and floods around the world. Where nature has been destroyed by development, communities are at risk from these intensified climate patterns. This study was to suggest a methodology for estimating flood vulnerability using Potential Flood Damage(PFD) concept and classify city/county about Potential Flood Damage(PFD) using various typology techniques. To evaluate the PFD at a spatial resolutions of city/county units, the 20 representative evaluation indexing factors were carefully selected for the three categories such as damage target(FDT), damage potential(FDP) and prevention ability(FPA). The three flood vulnerability indices of FDT, FDP and FPA were applied for the 167 cities and counties in Korea for the pattern classification of potential flood damage. Potential Flood Damage(PFD) was classified by using grouping analysis, decision tree analysis, and cluster analysis, and characteristics of each type were analyzed. It is expected that the suggested PFD can be utilized as the useful flood vulnerability index for more rational and practical risk management plans against flood damage.

Evaluation for conjunctive operation of multi-regional water supply system through risk analysis (위기대응 취약성 분석을 통한 광역상수도 연계운영 평가)

  • Hwang, Jinsoo;Choi, Taeho;Hong, Gonghyun;Lee, Doojin;Koo, Jayong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.4
    • /
    • pp.269-279
    • /
    • 2019
  • This study would present a risk analysis method to evaluate stable tap water supply in a multi-regional water supply system and propose a measure for the evaluation of the effect of the conjunctive operation of the multi-regional water supply system using this. Judging from the vulnerability for the crisis response of the entire N. multi-regional water supply system, as compared to the result of Scenario 1 in which no conjunctive pipes were operated, it was found that in Scenario 2, in which conjunctive pipes were partially operated, the vulnerability of crisis response decreased by about 30.6%, and as compared to Scenario 3, the vulnerability of crisis response decreased by 86.2%. In setting a plan for stable tap water supply in N multi-regional water supply system, using the estimated value and the method for the evaluation of the vulnerability of crisis response by pipe, by interval and by line, it is judged that this can be utilized as a basis for the judgment of the evaluation of the operation or the additional installation of conjunctive pipes.

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.479-482
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.

  • PDF

The relationship between the stress in college life, vulnerability to depression, and smartphone overuse among undergraduate students majoring in public health (보건계열 학부생의 대학생활 스트레스, 우울 취약성 및 스마트폰 과다사용의 관련성)

  • Kwon, Hay-Ran;Park, Si-Eun;Park, Dae-Sung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.17 no.3
    • /
    • pp.87-100
    • /
    • 2013
  • purpose: This study aims to understand the relationship between stress in college life, vulnerability to depression, and smartphone overuse among undergraduate students majoring in public health. Methods: The subjects of the study were 320 students who were selected through convenience sampling from the department of emergency medical technology, physical therapy, and public health and administration attending G University in Gwangju. The study was carried out from October 22 to 26, 2012. For final analysis, 266 copies were used. Statistical analysis was done using SPSS WIN 12.0. Results: Excessive use of smartphones had a negative effect on stress in college life and vulnerability to depression. The stress of college life had an effect on students' sense of value, their friends of the same sex, and job. Depressive vulnerability had an effect on a students' dependency. Conclusion: For the prevention of smartphone overuse, programs to prevent college life stress and vulnerability to depression should be developed. Counselling programs for the groups should be made available to the students.

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1217-1222
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.