• Title/Summary/Keyword: 취약성 지도

Search Result 1,849, Processing Time 0.037 seconds

Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality (CHSH 부등식을 이용하여 양자 키 분배와 양자 인증의 안전성을 개선한 프로토콜)

  • Heo, Jin-O;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2008
  • We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.

Seismic Vulnerability Assessment of RC Frame Structures Using 3D Analytical Models (3차원 해석 모델을 이용한 RC 프레임 구조물의 지진 취약도 평가)

  • Moon, Do-Soo;Lee, Young-Joo;Lee, Sangmok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.724-731
    • /
    • 2016
  • As the structural damage caused by earthquakes has been gradually increasing, estimating the seismic fragility of structures has become essential for earthquake preparation. Seismic fragility curves are widely used as a probabilistic indicator of structural safety against earthquakes, and many researchers have made efforts to develop them in a more accurate and effective manner. However, most of the previous research studies used simplified 2D analytical models when deriving fragility curves, mainly to reduce the numerical simulation time; however, in many cases 2D models are inadequate to accurately evaluate the seismic behavior of a structure and its seismic vulnerability. Thus, this study provides a way to derive more accurate, but still effective, seismic fragility curves by using 3D analytical models. In this method, the reliability analysis software, FERUM, is integrated with the structural analysis software, ZEUS-NL, enabling the automatic exchange of data between these two software packages, and the first order reliability method (FORM), which is not a sampling-based method, is utilized to calculate the structural failure probabilities. These tools make it possible to conduct structural reliability analyses effectively even with 3D models. By using the proposed method, this study conducted a seismic vulnerability assessment of RC frame structures with their 3D analytical models.

Guidelines for the Construction of Vulnerability Map of Fire in Seoul (서울시 화재위험지도 구축방안에 관한 연구)

  • Kang, Youg-Ok;Park, Mi-Ra
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2005.05a
    • /
    • pp.195-200
    • /
    • 2005
  • 도시의 안전을 위해서 재해 발생시 대응 및 복구와 같은 사후처리도 중요하지만 재해에 취약한 지역을 사전에 파악하고, 예방적 차원에서 이러한 지역들을 체계적으로 관리하는 것이 점차 중요해지고 있다. 본 연구는 대도시 관리차원에서 필요한 방재지도의 유형 중 하나로 화재를 상정하여, 화재위험지역을 선정하는 기준을 설정하고 이 기준에 맞춰 서울시 종로구 창신동을 사례지역으로 하여 화재위험지도를 시범적으로 구축하는 것을 주요 내용으로 한다 화재위험지도성은 방재업무에 있어 지역성에 기초하여 취약지구를 사전에 파악하고 체계적으로 관리하는데 활용될 수 있으며, 나아가 지구단위계획 등의 도시계획업무에서 방재를 고려한 토지이용계획 수립 및 도시계획시설 배치 등에 활용될 수 있을 것으로 판단된다.

  • PDF

Seismic Vulnerability Analysis of River Levee by Earthquake Return Period (지진 재현주기에 따른 하천 제방의 지진취약성 분석)

  • Kim, Kyung-Oh;Han, Heui-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.679-686
    • /
    • 2020
  • In this study, the seismic vulnerability of public river levees was analyzed quantitatively. Input seismic waves were generated in Pohang seismic waves in return periods of 200, 500, 1000, and 2400 years. The behavior of the levee was analyzed by seismic vulnerability analysis according to the return period. The displacement that occurs during an earthquake showed the same tendency as the input seismic wave and was largest in the return period of 2400 years. An analysis of the sliding stability revealed a 31.5% and 26.7% decrease in the sliding safety factor for the return period of 2400 for the landside and waterside, respectively. An examination of liquefaction by the q/p' ratio showed that the seepage line inside the embankment rises due to earthquakes. As a result, in the case of a return period of 2400 years, most embankments generate liquefaction, making them vulnerable to earthquakes. Through this research, it will be necessary to re-establish domestic seismic-design standards and establish clear standards for the results through a dynamics method.

Flood fragility analysis of bridge piers in consideration of debris impacts (부유물 충돌을 고려한 교각의 홍수 취약도 해석 기법)

  • Kim, Hyunjun;Sim, Sung-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.325-331
    • /
    • 2016
  • This research developed a flood fragility curve of bridges considering the debris impacts. Damage and failures of civil infrastructure due to natural disasters can cause casualties as well as social and economic losses. Fragility analysis is an effective tool to help better understand the vulnerability of a structure to possible extreme events, such as earthquakes and floods. In particular, flood-induced failures of bridges are relatively common in Korea, because of the mountainous regions and summer concentrated rainfall. The main failure reasons during floods are reported to be debris impact and scour; however, research regarding debris impacts is considered challenging due to various uncertainties that affect the failure probability. This study introduces a fragility analysis methodology for evaluating the structural vulnerability due to debris impacts during floods. The proposed method describes how the essential components in fragility analysis are considered, including limit-state function, intensity measure of the debris impact, and finite element model. A numerical example of the proposed fragility analysis is presented using a bridge pier system under a debris impact.

A Study on the Development and Application of Efficient Evaluation Criteria for Performance Testing of Commercial Open Source Vulnerability Scanning Tools (상용 오픈소스 취약점 스캐닝 도구의 성능 시험을 위한 효율적 평가 기준 개발 및 적용)

  • Shin, Kangsik;Jung, Dong-Jae;Choe, Min-Ji;Cho, Ho-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.709-722
    • /
    • 2022
  • The recent "Log4j Security Vulnerability Incident" has occurred, and the information system that uses the open source "Log4J" has been exposed to vulnerabilities. The incident brought great vulnerabilities in the information systems of South Korea's major government agencies or companies and global information systems, causing problems with open source vulnerabilities. Despite the advantages of many advantages, the current development paradigm, which is developed using open source, can easily spread software security vulnerabilities, ensuring open source safety and reliability. You need to check the open source. However, open source vulnerability scan tools have various languages and functions. Therefore, the existing software evaluation criteria are ambiguous and it is difficult to evaluate advantages and weaknesses, so this paper has developed a new evaluation criteria for the vulnerability analysis tools of open source

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Subtypes based on the psychological characteristics of perpetrators of school violence (학교폭력 가해 학생의 심리적 특성에 따른 유형)

  • Lee, Mi-Young;Chang, Eun-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.459-469
    • /
    • 2016
  • The purpose of this study is to classify the subtypes of perpetrators of school violence based on their psychological characteristics. In order to classify the students, questionnaires/interviews which consist of 6 factors (Cognitive Impulsivity, Unplanned Impulsivity, Depression, Anxiety, Peer Conformity, and Self assertion) and 19 questions were administered to 86 perpetrators of school violence. Then, a two-step cluster analysis was performed with the survey results of 74 perpetrators. As a result, three clusters were identified and named as follows: 1) Impulsive Vulnerability, 2) Emotional Vulnerability, and 3) Social Vulnerability. Scrutinizing the detailed characteristics of each cluster, the first cluster, Impulsive Vulnerability, showed higher scores on Cognitive Impulsivity and Unplanned Impulsivity, compared to the other two clusters, while Depression and Anxiety scores were lower. The second cluster, Emotional Vulnerability, showed higher scores on Depression and Anxiety, while Cognitive Impulsivity and Unplanned Impulsivity scores were lower. The third cluster, Social Vulnerability, showed the highest score on Peer Conformity among the three clusters. However, Self assertion scores were the lowest in this cluster, and Cognitive Impulsivity, Unplanned Impulsivity, depression, and anxiety scores were lower than in the others. This study will provide a useful insight for facilitating teachers and parents' understanding of the psychological characteristics of school violence perpetrators and thereby contributing to effective intervention.

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

Urban Regeneration Considerated on Safety Vulnerability of Port Hinterland Residential Area - Focused on Dong-Gu and Nam-Gu of Busan Metropolitan City - (항만배후 주거지역의 안전 취약성을 고려한 도시재생 - 부산광역시 동구와 남구를 대상으로 -)

  • Park, Kang Ah;Kim, Jong Gu;Park, Min Ah
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.5
    • /
    • pp.761-769
    • /
    • 2018
  • Urban safety has not been substantially considered in urban regeneration projects, although there is increasing interest in safety issues lately. However, there is limited research on the safety of port hinterland residential areas. Therefore, this study 1)selects appropriate safety indicators, and 2)identifies the most vulnerable sites in Dong-gu and Nam-gu in Busan using ArcGIS. 3)Lastly, our study asks residents of the selected sites to examine their awareness of the urban regeneration projects occurring in the vicinity. The respondents are fairly well aware of the ongoing urban regeneration projects, the effect of which on the improvement of safety are thought to be negative. The weakest point they indicated was accidents regarding aged buildings, and they also care more about life safety than natural hazard. These findings must be taken into account in the next urban regeneration projects in the Dong-gu and Nam-gu area.