• Title/Summary/Keyword: 위험 식별

Search Result 373, Processing Time 0.026 seconds

A Study on Supply Chain Risk Management of Automotive (자동차 공급망 위험관리(A-SCRM) 방안 연구)

  • Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.793-805
    • /
    • 2015
  • Due to the rise of automotive security problems following automotive safety and the progress of the internet technology leading to a hyper-connected society, guaranteeing the safety of automotive requires security plans in the supply chain assurance and automotive software, and risk management plans for identifying, evaluating, and controlling the risks that may occur from the supply chain since the modern automotive is a Safety Critical system. In this paper, we propose a study on Automotive Supply Chain Risk Management (A-SCRM) procedures by person interested within the automotive Life-Cycle.

Risk Management of Launch Vehicle Propulsion System (우주 발사체 추진기관의 위험 관리)

  • Cho, Sang-Yeon;Shin, Myung-Ho;Ko, Jung-Hwan;Oh, Seung-Hyub;Park, Jeong-Joo
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2007.04a
    • /
    • pp.3-6
    • /
    • 2007
  • Korea Aerospce Research Institute(KARI) has been developing the first civilian rocket, Korea space launch vehicle (KSLV-I), which can put the small size satellite into designated orbit. Developing launch vehicles contains a lot of uncertainty due to large scale, complexity, and technical difficulty. The uncertainty may become risk in the areas of business and technology which causes schedule delay, cost increase, and design changes of subsystems and components. This study describes the technical risk identification methods using FTA and procedures of planning and implementation of risk assessment and reduction of launch vehicle propulsion system.

  • PDF

A Study for Process Improvement by State Analysis of Risk Items (위험요소의 상태분석에 의한 프로세스 개선에 관한 연구)

  • Lee, Eun-Ser
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.523-530
    • /
    • 2008
  • There are many defects that cause the process improvement of lifecycle problems during software development. This paper propose the management method of risk items that removes and manages the lifecycle problems as well. For the similar projects, we can estimate defects and prepare to solve them by using domain expert knowledge and the state analysis of defect items, which can greatly improve the software process. This research provides solution of management of risk items problem and detection of defect transition and its prevention and causes that happen on software development. Also, In this paper propose to making quantity of degree and transition phase.

Study on Minimum Security Requirement Using Risk Priority Number(SFRPN) for Secure Smart Factory (안전한 스마트공장 구축을 위한 위험우선순위(SFRPN) 기반 최소보안요구사항에 관한 연구)

  • Yi, Byung-gueon;Kim, Dong-won;Noh, Bong-nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1323-1333
    • /
    • 2016
  • According to spreading of smart devices and development of communication technology, the security issues come to the fore in the modern factory. Especially, the smart facpry should be considered the risk management plan how to identify and evaluate, control the risks. In this paper, we suggest the minimum security requirements applying SFRPN(Smart Factory Risk Priority Number) model to domestic smart factory on the basis of the results inspecting factories.

밀도 기반 공간 군집체계를 반영한 해양사고 위험 예측 모델 개발에 관한 연구

  • 양지민;최충정;백연지;임광현;노유나
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.146-147
    • /
    • 2023
  • 해양사고는 도로교통과 달리 지속적으로 증가하고 있으며, 인명피해가 주로 발생하는 주요 사고의 치사율은 도로교통의 11.7배 이상이다. 해양사고는 외부 환경에 따라 사고 위치가 변하고 즉각적인 조치가 어려워 타 교통에 비해 대형 사고로 이어질 가능성이 매우 크다. 그러나 여전히 사고가 발생하고 난 후 대응하는 등 사후적 관리 단계에 무르고 있어 사고의 주요 요인을 사전에 식별·관리하는 선제적 관리단계로의 전환 필요성이 대두되고 있다. 따라서 본 연구에서는 해양사고 발생 지점 밀도 기반의 가변 공간 군집체계를 반영한 해양사고 예측모델을 개발하였다. 반복적인 공간 가산분석을 통해 밀도가 높을수록 작은 규모의 격자 체계를 가질 수 있도록 상세한 공간 군집체계를 구성하였으며, 단순 사고 위험도 예측뿐만 아닌 사고 인과관계를 설명할 수 있는 BN(Bayesian Network) 기반의 모형을 사용하여 해양사고 위험예측 모델을 개발하였다. 또한, Cost-of-Omission을 통해 해양사고 예측확률의 변화와 각 변수들의 영향력을 확인하였으며, 월별 해양사고예측 결과를 GIS를 활용하여 2D/3D 기반으로 시각화하였다.

  • PDF

A Case Study of the Risk Identification in Construction Project (건설사업의 리스크 식별에 관한 사례연구)

  • Ahn, Sanghyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.1
    • /
    • pp.15-23
    • /
    • 2015
  • In the construction industry, risk management has gained constant attention as the factor not only to evaluate global competitiveness of the country but also to secure competitiveness of public institutions and private companies. For effective construction risk management, the specific work process improvement that can be employed in the field in terms of risk management of the entire corporation such as financial, insurance and safety management is necessary. To manage construction risks, what is important is the step to identifying inherent risks in the construction project. The identification of risks will be followed by the step to seeking ways to establish and manage strategies responding to the risks. This study suggests ways and processes to make a checkslit to identify risks through case studies. To that end, the focus will be placed on working process improvement of risk identification among stages to manage construction risks such as risk identification and analyses, planning to respond to risks, risk monitoring and management. The case study checklists show that setting up the system to classify risks by stage is helpful to figure out causes of risks to reduce or eliminate risk factors. The checklist making process that considers features of the project is expected to contribute to successful completion of the project by enabling effective risk identification and systematic risk management.

A Framework for Identifying and Analyzing IT Project Risk Factors (IT프로젝트 위험 요인 식별 및 분석 프레임워크 연구)

  • Jangho Choi;Chanhee Kwak;Heeseok Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.87-110
    • /
    • 2017
  • Analyzing and finding the risk factors in information technology (IT) projects have been discussed because risk management is an important issue in IT project management. This study obtained the risk factor checklists with priorities, analyzed the causal relationship of risk factors, and determined their influences on IT project management. However, only few studies systematically classified IT project risk factors in terms of risk exposure. These studies considered both the probability of occurrence and the degree of risk simultaneously. The present study determined 53 IT project risk factors on the basis of literature and expert group discussions. Additionally, this study presented clustering analysis based on the data of 140 project managers. The IT project risk factor classification framework was divided into four areas (HIHF, HILF, LIHF, and LILF). The present results can be used to help IT project managers establish effective risk management strategies and reduce IT project failures. This study also provides academic implication because it considers both the probability of occurrence and the degree of influence of risk factors.

Case Study for Functional Hazard Assessment of A-SMGCS (A-SMGCS 기능 위험 평가 사례 연구)

  • Lee, Hongseok;Jo, Sanghoon;Choi, Hyungseok
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.2
    • /
    • pp.148-154
    • /
    • 2016
  • Safety assessment is necessary to develop safety related CNS/ATM system. It includes functional hazard assessment (FHA), effects eliciting system safety requirement that mitigates system's hazardous event. This paper performs a case study for functional hazard assessment of A-SMGCS. To do this, related A-SMGCS studies from Eurocontrol and EMMA are surveyed, and assessment schemes of functional hazard from Eurocontrol and EMMA are combined. Not only FHA scope but also several assumptions for FHA are defined for Incheon airport. 29 hazards are identified and their severities are assessed. And exposures and safety objectives from hazards are analyzed using event tree analysis method. Differences between result of this study and result of EMMA are analysed, and assessment results in this study are also reviewed.

Differences Between Client's and Supplier's receptions of IT Outsourcing Risks (IT아웃소싱 위험에 대한 고객과 공급업체와의 인식 차이)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.237-242
    • /
    • 2018
  • Researchers have suggested successful risk management as a key factor in successful IT outsourcing projects implementation. The documented investigations, however, have mainly addressed risk management only from a single perspective of either clients or IT vendors. This study explored the potential perception inconsistency regarding the risks between the client and the vendor for IT outsourcing projects by using a quasi-Delphi approach. The analysis results indicated some inconsistencies in the risks perceived by the two parties: (1) the clients regarded (a) lack of vendor commitment to the project and (b) poor vendor selection criteria and process as top critical risks but the vendors didn't; and (2) on the other hand, the vendors perceived (a) unclear requirements and (b) lack of experience and expertise with project activities as significant risks but the clients didn't. Insights into how the client and the vendor perceive risks may help both parties determine how to partner and manage project risks collaboratively to succeed in outsourcing.

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.