• Title/Summary/Keyword: 위협평가

Search Result 696, Processing Time 0.03 seconds

The Development of Vulnerable Elements and Assessment of Vulnerability of Maeul-soop Ecosystem in Korea (한국 마을숲 생태계 취약요소 발굴 및 취약성 평가)

  • Lim, Jeong-Cheol;Ryu, Tae-Bok;Ahn, Kyeong-Hwan;Choi, Byoung-Ki
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.34 no.4
    • /
    • pp.57-65
    • /
    • 2016
  • Maeul-soop(Village forest) is a key element of Korean traditional village landscape historically and culturally. However, a number of Maeul-soops have been lost or declined due to various influences since the modern age. For this Maeul-soop that has a variety of conservation values including historical, cultural and ecological ones, attention and efforts for a systematic conservation and restoration of Maeul-soop are needed. The purpose of the present study is to provide information on ecological restoration and sustainable use and management of Maeul-soops based on component plant species, habitat and location characteristics of 499 Maeul-soops spread throughout Korea. Major six categories of threat factors to Maeul-soop ecosystem were identified and the influence of each factor was evaluated. For the evaluation of weight by threat factors for the influence on the vulnerability of Maeul-soop ecosystem, more three-dimensional analysis was conducted using Analytic Hierarchy Process (AHP) analysis method. In the results of evaluation using AHP analysis method, reduction of area, among six categories, was spotted as the biggest threat to existence of Maeul-soops. Next, changes in topography and soil environment were considered as a threat factor of qualitative changes in Maeul-soop ecosystem. Influence of vegetation structure and its qualitative changes on the loss or decline of Masul-soop was evaluated to be lower than that of changes in habitat. Based on weight of each factor, the figures were converted with 100 points being the highest score and the evaluation of vulnerability of Maeul-soop was conducted with the converted figures. In the result of evaluation of vulnerability of Maeul-soops, grade III showed the highest frequency and a normal distribution was formed from low grade to high grade. 38 Maeul-soops were evaluated as grade I which showed high naturality and 10 Maeul-soops were evaluated as grade V as their maintenance was threatened. Also in the results of evaluation of vulnerability of each Maeul-soop, restoration of Maeul-soop's own area was found as top priority to guarantee the sustainability of Maeul-soops. It was confirmed that there was a need to prepare a national level ecological response strategy for each vulnerability factor of Maeul-soop, which was important national ecological resources.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

A Study on Moving Target Defense Issue and Certification Requirements (Moving Target Defense 이슈 및 평가인증 요구사항에 대한 연구)

  • Moon, Seo Yeon;Kim, Jae Woong;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.158-161
    • /
    • 2018
  • 2011년 미국에서 최초로 소개된 후 기존 보안 기술과 다른 새로운 정보시스템 보호 기술로 Moving Target Defense(MTD)가 활발히 연구 되고 있다. MTD는 시스템의 구성 요소들을 뷸규칙적이고 동적으로 변화시켜 공격표면(Attack surface)을 줄임으로써 외부 공격에 대한 보안성을 높인다. 주로 시스템 정보를 수집 및 분석하여 공격하는 보안 위협들에 효과적이며 특히 지능형 지속 보안 위협(Advanced Persistent Threat), 킬 체인(Kill-Chain) 보안에 뛰어난 성능을 기대할 수 있다. 최근 MTD 시스템 구현 및 개발로 상용화가 시작되었으나 MTD 활용을 통해 어느 정도의 보안성 및 효율성을 가지는지에 대한 성능 평가인증, 시험지침 등이 표준화 되어있지 않아 기준이 모호한 실정이다. 본 논문에서는 이러한 최근 MTD 이슈에 대해 살펴보고 MTD와 연관 되어있는 각 분야에 어떤 평가인증 요구사항들이 있는지 분석한다. 이를 통해 MTD에 어떠한 평가인증 요구사항이 있는지 도출하여 앞으로 MTD 평가인증 표준화 참고 및 활용에 기여 할 수 있을 것으로 전망한다.

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

Distribution Status and Threatened Assessment of Endangered Species, Pungitius sinensis (Pisces: Gasterosteidae) in Korea (멸종위기어류 가시고기 Pungitius sinensis (Pisces: Gasterosteidae)의 분포현황 및 멸종위협 등급 평가)

  • Ko, Myeong-Hun
    • Korean Journal of Ichthyology
    • /
    • v.28 no.3
    • /
    • pp.186-191
    • /
    • 2016
  • Distribution status and threatened assessment of endangered species, Pungitius sinensis (Pisces: Gasterosteidae), were investigated from March to October 2015 in Gangwon-do and Gyeongsangbuk-do etc., Korea. During the study period, a total of 854 individual P. sinensis were collected from 21 of 71 sampling stations using skimming nets. P. sinensis appeared in 23 streams during the past 30 years. However, it was only collected in 12 streams. Therefore, its habitats and populations were drastically reduced. The preferred habitat of P. sinensis was pool of the lower stream with lots of aquatic plants. Given these evidences of small occupying areas ($84km^2$) and drastic reduction in its habitats and populations, P. sinensis is considered as an endangered (EN) [B2ab(ii,iii,iv,v)] species based on IUCN Red List categories and criteria.

Distribution Aspect and Extinction Threat Evaluation of the Endangered Species, Cottus hangiongensis (Pisces: Cottidae) in Korea (멸종위기어류 한둑중개 Cottus hangiongensis(Pisces: Cottidae)의 분포양상 및 멸종위협 평가)

  • Ko, Myeong-Hun;Han, Mee-Sook;Kwan, Sun-Man
    • Korean Journal of Ichthyology
    • /
    • v.30 no.3
    • /
    • pp.155-160
    • /
    • 2018
  • The distribution aspect and extinction threat evaluation of the endangered species, Cottus hangiongensis were investigated from 2011 to 2017 in Korea for this study. The distribution reports of C. hangiongensis were divided into 1954~1985, 1981~2003, 2004~2012, and 2011~2017. The number of habited streams decreased gradually to 30, 24, 10, and 19 streams, respectively. In this study (2011~2017), C. hangiongensis was newly found in two streams (Ayajincheon and Chuksancheon), but 15 streams that appeared in the past are not in this study. The main habitat of C. hangiongensis was the downstream riffle of clean water with fast velocity and cobble-boulder bottoms. Given this evidence as noted for more than a 30% reduction in population after 2003, due to construction wear, river work and the qualitative decline of the habitat, C. hangiongensis is now considered to be Vulnerable (VU A2ac) based on the IUCN Red List categories and criteria.

보안관리 및 위험분석을 위한 분류체계, 평가기준 및 평가스케일의 조사연구

  • 최상수;방영환;최성자;이강수
    • Review of KIISC
    • /
    • v.13 no.3
    • /
    • pp.38-49
    • /
    • 2003
  • 보안관리, 위험분석 및 PP의 개발 방법(또는 지침, 표준)을 개발하기 위해서는 공통적으로 자산, 위협 및 취약성의 분류체계, 평가기준 및 평가스케일을 정의해야한다. 본 논문에서는 이 분야의 각종 방법들로부터 분류체계, 평가기준 및 평가스케일을 조사 연구하였다. 본 결과는 새로운 방법을 개발할 때 활용될 수 있을 것이다.

The Study of Developing an Index for Evaluating (위험분석모델의 정보시스템 구축방법론 적용에 관한 연구)

  • 박동석;안성진;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.67-75
    • /
    • 2002
  • The purpose of this study is to reflect the risk analysis results acquired while building an information system of an organization by applying a risk analysis model capable of analyzing the confronted risk, on the information system build methodology. Risk analysis, a method of utilizing the functional relation between risk, vulnerability and countermeasure of information assets, is used to evaluate the overall information risk level by analyzing the influence range of vulnerability imposed in the information asset of an organization, and the applications of the countermeasures on the frequency and intensity of the corresponding risk.

  • PDF

A Study on Airport Security Performance Improvement based on Risk Management Concept (위험관리 개념에 근거한 항공보안업무 합리화 방안 연구)

  • Hwang, Kyung-Chul;Yoo, Kwang-Eui
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.2
    • /
    • pp.47-57
    • /
    • 2012
  • The strengthened aviation security measurements caused by increased terror threat all around the world have air passengers annoyed by uneasy treatment and some delayed process. The service level of air travel and competitiveness of airlines industry has been weakened also. The aviation security process is mainly conducted at an airport. The threat level of airport is not usually same airport to airport, and the quality of aviation security activity is neither same. However, ICAO requires every international airport to conduct similar process to ensure aviation security without considering situational difference of each airport. The paper has objectives to develop reasonable security measurements based on risk management concept. It studied the ways of achieving target level of security of an airport, considering the threat situation of the airport and its ability to conduct security procedures.

Analysis and Aspects of Space Warfare in the Russia-Ukraine War (Russian Invasion of Ukraine) and Considerations for Space Technology Development (러시아-우크라이나 전쟁(러시아의 우크라이나 침공)의 우주전 분석 및 양상 그리고 우주기술 개발시 고려사항)

  • Choi, Seonghwan
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.169-186
    • /
    • 2022
  • In this article, Russia's space threat assessment and space warfare in the Russia-Ukraine war (Russian invasion of Ukraine) were analyzed and summarized. Considering the probability that commercial satellites will also be potential targets of space warfare, it is suggested that not only military satellites but also commercial satellites develop and apply space technology that can be applied equally to space threats when developing space technology. Necessary space technologies is listed.