• Title, Summary, Keyword: vulnerability assessment

Search Result 436, Processing Time 0.037 seconds

The Impact of Environmental Health Factors on Extreme-heat Vulnerability Assessment in a Metropolitan City (환경보건적 요소가 도시 내 폭염 취약성 평가 결과에 미치는 영향 분석)

  • Lee, Won-Jung;Kang, Jae-Eun;Kim, Yoo-Keun
    • Journal of Environmental Health Sciences
    • /
    • v.39 no.6
    • /
    • pp.492-504
    • /
    • 2013
  • Objectives: This analysis seeks to evaluate the impact of environmental health factors (EHF; e.g. hospital beds per capita, employees of medical institutions) on extreme-heat vulnerability assessment in Busan Metropolitan City during 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), extreme-heat vulnerability is comprised of the categories of Exposure, Sensitivity, and Adaptive Capacity (including EHF). The indexes of the Exposure and Sensitivity categories indicate positive effects, while the Adaptive capacity index indicates a negative effect on extreme-heat vulnerability. Variables of each category were standardized by the re-scaling method, and then each regional relative vulnerability was computed with the vulnerability index calculation formula. Results: The extreme-heat vulnerability index (EVI) excepting EHF was much higher in urban areas than in suburban areas within the metropolitan area. When EHF was considered, the difference in the EVI between the two areas was reduced due to the increase of the Adaptive capacity index in urban areas. The low EVI in suburban areas was induced by a dominant effect of natural environmental factors (e.g. green area) within the Adaptive capacity category. Conclusions: To reduce the vulnerability to extreme heat in urban areas, which were more frequently exposed to extreme heat than others areas, public health and natural environments need to be improved in sensitive areas.

A Study on Layered Weight Based Vulnerability Impact Assessment Scoring System (계층적 가중 기반의 취약점 영향성 평가 스코어링 시스템에 대한 연구)

  • Kim, Youngjong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.7
    • /
    • pp.177-180
    • /
    • 2019
  • A typical vulnerability scoring system is Common Vulnerability Scoring System(CVSS). However, since CVSS does not differentiate among the individual vulnerability impact of the asset and give higher priority for the more important assets, it is impossible to respond effectively and quickly to high-risk vulnerabilities on large systems. We propose a Layered weight based Vulnerability impact assessment Scoring System which can hierarchically group the importance of assets and weight the number of layers and the number of assets to effectively manage the impact of vulnerabilities on a per asset basis.

Assessing Vulnerability and Risk of Sensor Networks under Node Compromise (Node Compromise에 대한 무선 센서 네트워크의 취약성 및 위험 평가)

  • Park, Jong-Sou;Suh, Yoon-Kyung;Lee, Seul-Ki;Lee, Jang-Se;Kim, Dong-Seong
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.51-60
    • /
    • 2007
  • It is important to assess vulnerability of network and information system to countermeasure against a variety of attack in effective and efficient way. But vulnerability and risk assessment methodology for network and information systems could not be directly applied to sensor networks because sensor networks have different properties compared to traditional network and information system. This paper proposes a vulnerability assessment framework for cluster based sensor networks. The vulnerability assessment for sensor networks is presented. Finally, the case study in cluster based sensor networks is described to show possibility of the framework.

  • PDF

Study of a Flood Vulnerability Assessment for Climate Change and Utilizing the Vulnerability-based Disaster Response in Jeju-do (기후변화에 따른 제주도의 홍수 취약성 평가 및 취약성 기반 소방 대응 활용 연구)

  • Lim, Chae-Hyun;Park, Yong-Yi
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.64-70
    • /
    • 2016
  • This study assessed the flood vulnerability of Jeju-do depending on climate change using VESTAP. The results showed that the flood vulnerability of Jeju-do in the future (2020s, 2030s and 2040s) will increase continuously compared to the present time (2010s). In particular, the flood vulnerability of Jeju-si is expected to be higher than Seogwipo-si prior to 2030s. Conversely, the flood vulnerability of Seogwipo-si is expected to be higher than Jeju-si after 2030. These analysis results confirmed the characteristics of flood vulnerability between Seogwipo-si and Jeju-si and the growth of flood vulnerability entirely within Jeju-do.

Development of Web-Based Supporting Tool (VESTAP) for Climate Change Vulnerability Assesment in Lower and Municipal-Level Local Governments (기초 및 광역지자체 기후변화 취약성 평가를 위한 웹기반 지원 도구(VESTAP) 개발)

  • OH, Kwan-Young;LEE, Moung-Jin;HAN, Do-Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.1
    • /
    • pp.1-11
    • /
    • 2016
  • Climate change is the issue that attracts the most attention in the field of environment, as well as the most challenging task faced by the human race. There are various ways to resolve this issue. South Korea has established the primary and secondary national climate change adaptation plans at the national level, and is making it compulsory for each local government (lower and municipal-level) to establish climate change adaptation plans. Climate change vulnerability assessment plays an essential role in establishing climate change adaptation action plans. However, vulnerability assessment has a difficulty performing individual assessments since the results are produced through complex calculations of multiple impact factors. Accordingly, this study developed a web-based supporting tool(VESTAP) for climate change vulnerability assesment that can be used by lower and municipal-level local governments. The VESTAP consists of impact DB and vulnerability assessment and display tool. The index DB includes total 455 impacts of future climate data simulated with RCP (Representative Concentration Pathways) 4.5 and 8.5, atmospheric environment data, other humanities and social statistics, and metadata. The display tool has maximized convenience by providing various analytical functions such as spatial distribution, bias and schematization of each vulnerability assessment result. A pilot test of health vulnerability assessment by particulate matters in Sejong Metropolitan Autonomous City was performed using the VESTAP, and Bukang-myeon showed the highest vulnerability. By using the developed tool, each local government is expected to be able to establish climate change adaptation action plans more easily and conveniently based on scientific evidence.

Improvement of Vulnerability Assessment to Climate Change using LCCGIS (LCCGIS를 활용한 취약성 평가방법의 개선)

  • Kim, Young Soo;Lee, Seung Hoon
    • Journal of Climate Change Research
    • /
    • v.5 no.2
    • /
    • pp.165-178
    • /
    • 2014
  • National and local governmental adaptation plan for climate change will become mandatory in 2015. In order to establish the plan, assessment of vulnerability to climate change needs to be preceded. LCCGIS, a toolkit for vulnerability assessment, has been widely used by many local governments. However, assessment results by LCCGIS are not yet reliable because most of the vulnerability indices applied to LCCGIS have the same value for almost all administrative units in Korea. In this study, proxy variables for hard-collectable indices were introduced, and the results were compared with those without any proxy variables. Vulnerability assessment could be conducted subjectively due to uncertainty. Thus, determination of objective indices, understanding the available data, and changes of indices in local conditions were organized. Results from this study are expected to make vulnerability assessment reliable and contribute to assessing vulnerability to climate change reflecting on local governmental characteristics.

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)

  • Jang, Sung-Soon;Kwan, Sung-Woo;Yoo, Ho-Sik;Kim, Jung-Soo;Yoon, Wan-Ki
    • Nuclear Engineering and Technology
    • /
    • v.41 no.5
    • /
    • pp.747-752
    • /
    • 2009
  • A vulnerability assessment is essential for the efficient operation of a physical protection system (PPS). Previous assessment codes have used a simple model called an adversary sequence diagram. In this study, the use of a two-dimensional (2D) map of a facility as a model for a PPS is suggested as an alternative approach. The analysis of a 2D model, however, consumes a lot of time. Accordingly, a generalized heuristic algorithm has been applied to address this issue. The proposed assessment method was implemented to a computer code; Systematic Analysis of physical Protection Effectiveness (SAPE). This code was applied to a variety of facilities and evaluated for feasibility by applying it to various facilities. To help upgrade a PPS, a sensitivity analysis of all protection elements along a chosen path is proposed. SAPE will help to accurately and intuitively assess a PPS.

A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA (사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구)

  • Jang, Youngcheon;Kang, Kyongran;Choi, Bongwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

A mechanical model for the seismic vulnerability assessment of old masonry buildings

  • Pagnini, Luisa Carlotta;Vicente, Romeu;Lagomarsino, Sergio;Varum, Humberto
    • Earthquakes and Structures
    • /
    • v.2 no.1
    • /
    • pp.25-42
    • /
    • 2011
  • This paper discusses a mechanical model for the vulnerability assessment of old masonry building aggregates that takes into account the uncertainties inherent to the building parameters, to the seismic demand and to the model error. The structural capacity is represented as an analytical function of a selected number of geometrical and mechanical parameters. Applying a suitable procedure for the uncertainty propagation, the statistical moments of the capacity curve are obtained as a function of the statistical moments of the input parameters, showing the role of each one in the overall capacity definition. The seismic demand is represented by response spectra; vulnerability analysis is carried out with respect to a certain number of random limit states. Fragility curves are derived taking into account the uncertainties of each quantity involved.

Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis (시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법)

  • Kim, Ji Hong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1079-1090
    • /
    • 2012
  • As the number of information asset and their vulnerabilities are increasing, it becomes more difficult for network security administrators to assess security vulnerability of their system and network. There are several researches for vulnerability analysis based on quantitative approach. However, most of them are based on experts' subjective evaluation or they require a lot of manual input for deriving quantitative assessment results. In this paper, we propose HRMS(Hacking and Response Measurement System) for enumerating attack path using automated vulnerability measurement automatically. HRMS can estimate exploitability of systems or applications based on their known vulnerability assessment metric, and enumerate attack path even though system, network and application's information are not fully given for vulnerability assessment. With this proposed method, system administrators can do proactive security vulnerability assessment.