• Title/Summary/Keyword: 위협평가

Search Result 696, Processing Time 0.029 seconds

Distribution Aspect and Extinction Threat Evaluation of the Endangered Species, Rhodeus pseudosericeus (Pisces: Cyprinidae) in Korea (멸종위기어류 한강납줄개 Rhodeus pseudosericeus (Pisces: Cyprinidae)의 분포양상 및 멸종위협 평가)

  • Ko, Myeong-Hun;Han, Mee-Sook;Kwan, Sun-Man
    • Korean Journal of Ichthyology
    • /
    • v.30 no.2
    • /
    • pp.100-106
    • /
    • 2018
  • The distribution aspect and extinction threat evaluation of the endangered species, Rhodeus pseudosericeus were investigated from 2012 to 2017 in Korea for the subject of this study. The number of appearance sites in the past literature of available and identified R. pseudosericeus was 26. During the study period, the samples of R. pseudosericeus were collected in 44 sites (Hangang River 35 sites, Sapgyocheon Stream 4 sites, Daecheoncheon Stream 5 sites) among the noted 214 sampling stations investigated. Among these, the newly appearance streams were Ilricheon Stream, Samsancheon Stream, Bangyecheon Stream and Hanpocheon Stream in the Hangang River. In addition, the habitats and populations in the upper Seomgang River (Hoengseong Dam), lower Heukcheon Stream, Muhancheon Stream and Daecheoncheon Stream decreased due to dam construction, river work, water pollution, and the spread of the exotic species Micropterus salmoides. The main habitat of R. pseudosericeus was the middle-upper stream of clean water with slow water velocity, sand-pebble bottoms and lots of aquatic plants. Given this evidence as noted for the 30.2% reduction in occupancy within 10 years, due to the qualitative decline of habitat, the overfishing risk of ornamental fish and the spread of M. salmoides, in this case R. pseudosericeus is considered to be Vulnerable (VU A2cde) based on the IUCN Red List categories and criteria.

A Study on Strengthening Consequence Management System Against CBRN Threats (CBRN 위협에 대비한 사후관리체계 강화방안)

  • Kwon, Hyuckshin;Kwak, Minsu;Kim, Kwanheon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.4
    • /
    • pp.429-435
    • /
    • 2020
  • North Korea declared itself complete with nuclear force after its sixth nuclear test in 2017. Despite efforts at home and abroad to denuclearize the Korean Peninsula, the prospects for the denuclearization are not bright. Along with political and diplomatic efforts to deter NK's WMD threats, the government is required to strengthen its consequence management capabilities against 'catastrophic situations' expected in case of emergency. Accordingly, this study was conducted to present measures to strengthen follow-up management against CBRN threats. The research model was partially supplemented and utilized by the THIRA process adopted and utilized by the U.S. Department of Homeland Security among national-level disaster management plan development models. Korea's consequence management (CM) system encompasses risk and crisis management on disaster condition. The system has been carried out in the form of a civil, government and military integrated defense operations for the purpose of curbing the spread or use of CBRNs, responding to threats, and minimizing expected damages. The preventive stage call for the incorporation of CBRN concept and CM procedures into the national management system, supplementing the integrated alarm systems, preparation of evacuation facilities, and establishment of the integrated training systems. In the preparation phase, readjustment of relevant laws and manuals, maintenance of government organizations, developing performance procedures, establishing the on-site support systems, and regular training are essential. In the response phase, normal operations of the medical support system for first aid and relief, installation and operation of facilities for decontamination, and development of regional damage assessment and control guidelines are important. In the recovery phase, development of stabilization evaluation criteria and procedures, securing and operation of resources needed for damage recovery, and strengthening of regional damage recovery capabilities linked to local defense forces, reserve forces and civil defense committees are required.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Website Security Evaluation for Electronic Commerce (전자상거래를 위한 웹사이트 보안 평가에 관한 연구)

  • Kim, Hyeon-U;Lee, Geun-Su;Kim, Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.340-347
    • /
    • 2005
  • 최근 몇 년 동안 전자상거래는 새로운 비즈니스 환경으로 인식되어 급속하게 성장하고 있다. 온라인 상거래가 활성화 되면서 전자상거래를 위한 웹사이트도 많이 생겨나고 있지만, 사기, 개인 및 신용정보 노출, 개인의 사회적 신뢰도 저하 등 전자상거래 보안에 관련된 문제들이 전자상거래 시장의 활성화를 위협하고 있다. 따라서 본 논문에서는 웹 기반의 전자상거래 발전에 있어 보안 문제의 해결이 가장 중요함을 인식하고 전자상거래 웹사이트에 대한 보안 평가 모델을 제시하고자 한다. 이를 위해 전자상거래 보안과 관련한 다수의 보안 평가 항목을 선정하고, AHP(Analytic Hierarchy Process)를 사용하여 영역별 가중치를 산정한 모델을 설계한다. 본 논문에서 제시한 보안 평가 모델은 안전한 전자상거래 웹사이트 설계, 구축 및 운영에 필요한 보안 가이드라인으로 활용될 수 있다.

  • PDF

A Proposal of Classification System on Cyber Attack for Damage Assessment of Cyber Warfare (사이버전 피해 평가를 위한 사이버 공격의 분류 체계 제시)

  • Park, Jinho;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.235-238
    • /
    • 2017
  • 최근에는 랜섬웨어의 일종인 '워너크라이' 등의 바이러스로 인한 피해도 기하급수적으로 증가하고, 그 수법도 사용자가 파일에 접근하면 감염되던 형태에서 인터넷에 접속되기만 하면 감염되는 형태로 진화하면서 사이버전에 사용되어질 수 있는 사이버 공격에 대응하는 방어 및 회복 방책에 대한 관심이 한층 더 증폭되고 있다. 하지만 일반적으로 방어, 회복 등의 대응 과정은 공격의 피해를 평가하여 결과로 산출된 피해 정도를 전제 조건으로 가지기 때문에 먼저 해킹 공격의 피해를 평가하여야 한다. 본 논문에서는 사이버전에서 사용되어질 수 있는 해킹 공격 및 위협의 피해를 공격의 종류별로 평가하기 위해, 피해 정도를 수치화할 수 있는지의 여부 등을 기준으로 하여 총 3가지 Interruption, Modification, Interception로 구성된 해킹 공격의 분류 체계를 제시한다.

Fracture Resistance and Integrity of Structural Materials for Major Nuclear Reactor Components (원자력발전소 주요부품 구조재료의 파괴 저항성 및 건전성)

  • 홍준화
    • Journal of the KSME
    • /
    • v.35 no.6
    • /
    • pp.481-494
    • /
    • 1995
  • 원자로 압력용기 및 주 배관등 원자력발전소 주요부품 구조재료에서의 파괴저항성 및 건전성 문제를 일부 시험결과 및 평가결과와 함께 살펴보았다. 원자력환경하에서는 중성자 조사에 의한 조사취화 및 고온에서의 장기간 유지에 따른 열취ㅘ로 재료 고유의 파괴저항치가 가동에 따라 매우 감소하고, 이에 따라 부품의 건전성 및 수명이 매우 위협받고 있음을 확인하였다. 현재 가동중인 원자로 10기, 건설중인 8기, 합계 18기로 세계 9위의 원자력발전국이 되며, 대북 경수로 지원과 세계시장 진출을 계획하고 있는 우리나라에서는, 보다 안전한 원자력발전소가 건설되기 위해서, 재료의 균질성 및 파괴인성 개선연구, 조사특성 연구 등을 통해 파괴저항성이 우수한 국산소재를 제작\ulcorner공급하도록 하여야 한다. 또한, 수명기간 동안 고도의 건전성을 유지하면서 운전하고, 나아가 수명연장 운전을 위해서는, 용기 등 주요 부품의 상태(파괴인성치, 결함, 작용 응력)를 정확히 진단, 예측, 평가하여야 하고, 이들이 건전성에 미치는 영향평가와 건전성평가기술 확립을 통한 수명예측기술을 확보하여야 한다(이들은 대부분 파괴역학 시험 침 해석기술에 바 탕을 두고 있다). 국내 산\ulcorner학\ulcorner연 관련자들의 특별한 관심을 촉구하는 바이다.

  • PDF

산업 제어시스템 보안성 평가제도 동향

  • Kim, Woonyon;Park, Eung-Ki;Kim, Sin-Kyu;Jee, Yoon-Seok
    • Review of KIISC
    • /
    • v.29 no.2
    • /
    • pp.5-15
    • /
    • 2019
  • 산업 제어시스템 보안 취약점 발견의 증가, 사이버보안 사고로 인한 정전과 같은 물리적 피해 발생, 4차 산업혁명으로 확산되는 스마트공장 및 스마트시트의 산업 제어시스템 네트워크 연계 증가 등으로 인해 산업 제어시스템에 대한 보안위협이 급증하고 있으며, 이에 대한 보안대책이 요구되고 있다. 본 논문에서는 산업 제어시스템 구성요소에 대한 보안 내재화를 유도하고, 산업 제어시스템의 도입, 운영, 유지보수 과정에서 사이버보안을 고려할 것을 요구하는 산업 제어시스템 보안성 평가제도의 동향에 대해서 설명한다. 구체적으로는 미국, 일본, 프랑스 등의 국가기관, ISA, IEC, UL 등과 같은 국제 표준화 기구, $T{\ddot{U}}V$ $S{\ddot{U}}D$, exida와 같은 글로벌 시험기관, GE와 같은 제조사에서 실시하고 있는 산업 제어시스템 보안성 평가제도를 설명하고, 평가제도를 분류하여 특성을 파악할 수 있도록 제시하였다.

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

The Evaluation-based CBR Model for Security Risk Analysis (보안위험분석을 위한 평가기반 CBR모델)

  • Bang, Young-Hwan;Lee, Gang-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.282-287
    • /
    • 2007
  • Information society is dramatically developing in the various areas of finance, trade, medical service, energy, and education using information system. Evaluation for risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, Modeling it did the evaluation-base CBD function it will be able to establish the evaluation plan of optimum. Evaluation-based CBD(case-based reasoning) functions manages a security risk analysis evaluation at project unit. it evaluate the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and Result security risk analysis evaluation of optimum about under using planning.

The study on the military utilization of weather modification techniques and inducing their research priority (기상조절기술의 군사적 활용방안과 연구 우선순위 도출에 관한 연구)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.77-88
    • /
    • 2018
  • The purposes of this paper are to research the military utilization of weather modification techniques and to induce their research priority when considering the Korean Peninsular environment and technical level. To achieve these goals, the advantages and disadvantages of weather modification technologies have been discussed, and the evaluation index evaluation was derived through the Delphi method, and the weight of the evaluation index and the final research priority were induced through analytic hierarchical process. Analysis shows that the ionospheric modulation technology has the highest priority in terms of effectiveness as a weapon system and compatibility in the Korean Peninsula environment. It is expected that Korean ionosphere modification can disturb C4ISR function of the enemy and guarantee ours reliably when operating PGM, military satellite, surveillance & reconnaissance equipments, etc. Other weather modification technologies except for ionosphere modification should be developed gradually in that potential threat can be expanded to neighboring countries after the Unification of the Korea.

  • PDF