• Title/Summary/Keyword: 침입 시나리오

Search Result 65, Processing Time 0.023 seconds

A Conservative Safety Study on Low-Level Radioactive Waste Repository Using Radionuclide Release Source Term Model (선원항 모델을 사용한 저준위 방사성폐기물 처분장의 보수적인 안전성고찰)

  • Kim, Chang-Lak;Lee, Myung-Chan;Cho, Chan-Hee
    • Nuclear Engineering and Technology
    • /
    • v.25 no.1
    • /
    • pp.63-70
    • /
    • 1993
  • A simplified safety assessment is carried out on rock-cavern type disposal of LLW using the analytical repository source term (REPS) model. For reliable prediction of the leach rates for various radionuclides, degradation of concrete structures, corrosion rate of waste container, degree of corrosion on the container surface, and the characteristics of radionuclides are considered in the REPS model. The results of preliminary assessment show that Cs-137, Ni-63, and Sr-90 are dominant. For the parametric uncertainty and sensitivity analysis, Latin hypercube sampling technique and rank correlation technique are applied. The results of the potential public health impacts show that radiological dose to intruder in the worst case scenario will be negligible and that more attention should be given to near-field performance.

  • PDF

Vulnerability Evaluation Methodology for firewall Certification (침입차단시스템 제품 인증을 위한 취약성 평가 방법)

  • 김점구
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.27-37
    • /
    • 2000
  • Although an insurance criterion for reliance is unified, the difference in evaluation mechanism in every country is already ambiguity. In other words, the aspect of objectivity would be a little because it is true that the vulnerability evaluation include evaluator, scenario and tools (TSVES) applying in test, depth and scope of evaluation. But evaluation results can be difference in accordance with each evaluation elements. By using TSVES to evaluating network security vulnerability, first, we expected the evaluation results is impartiality, objectivity, repeatability, reproducibility, appropriateness and soundness of results. Second, it could be transferred manual ways into automation ways, and then expected easiness and safety of extension and modification in a quality of products as well as a dramatical reduction of waste of time and energy.

  • PDF

Analysis of flood and drought disaster risks in the Mekong Delta (메콩 삼각주의 홍수 및 가뭄 재해 위험 분석)

  • Ko, Ick Hwan;Choi, Byung Man;Kim, Jeongkon;Kim, Eugene
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.55-55
    • /
    • 2019
  • 메콩강 유역에서 가장 하류에 위치하고 있는 메콩 삼각주는 상류에 일어나는 많은 활동으로 인하여 높은 수준의 취약성을 지니고 있다. 기후 변화와 미래개발의 맥락에서 재해 위험을 평가하는 것은 기후현상/극한날씨, 취약성, 노출, 현재 위험 관리 및 적응을 충분히 고려할 필요가 있다. 홍수, 가뭄, 염수침입은 IQQQM과 IS 모델을 사용하여 분석하였다. 베트남 정부가 승인한 최신 기후변화 시나리오는 이 지역의 향후 토지이용, 물이용 및 상류에서의 수력발전 계획과 함께 모델링에 사용되었다. 홍수, 가뭄 및 염수치입 정도를 시뮬레이션 결과에 기초하여 평가하였고, 최종적으로 GIS 도구를 사용한 위험도 분석을 실시하였다. 리스크 분석 결과 저위험구역의 2모작 및 3모작 논의 면적은 6,381 ha로 떨어지고 중위험지역과 고위험구역의 2모작과 양식장 면적은 각각 약 7만 ha와 9,000 ha로 늘어나는 것으로 나타났다. 가뭄과 염도에 대한 위험 분석은 기후 변화와 해수면 상승으로 인한 위험의 심각성이 증가하는 것을 나타낸다. 분석 결과 메콩 삼각주에서는 전반적으로 향후 기후변화와 상류발전에 따른 부정적 영향으로 홍수 및 가뭄재해의 위험이 증가할 것으로 나타났다. 홍수 및 가뭄에 대한 보다 능동적이고 협력적인 관리가 향후 재난에 대비하여 지역사회의 탄력성을 유지하기 위해 필요한 것으로 나타났다.

  • PDF

STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme (STRIDE 및 HARM 기반 클라우드 네트워크 취약점 탐지 기법)

  • Jo, Jeong-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.599-612
    • /
    • 2019
  • Cloud networks are used to provide various services. As services are increasingly deployed using cloud networks, there are a number of resources in the cloud that leverage a variety of environments and protocols. However, there is a security intrusion on these resources, and research on cloud network vulnerability detection is required as threats to cloud resources emerge. In this paper, we propose a vulnerability detection scheme using STRIDE and HARM for vulnerability detection of resources utilizing various environments and protocols, and present cloud network vulnerability detection scheme through vulnerability detection scenario composition.

An Anti-Virus Vaccine Selection Model Based on Stackelberg Game (슈타켈버그 게임 기반 Anti-virus 백신 선택 모형)

  • Sung, Si-Il;Choi, In-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.135-144
    • /
    • 2009
  • This paper deals with an information security problem that involves the strategies of both an attacker and an administrator of a web-based system. A game-theoretic model for the problem, based on an Stackelberg game environment, is presented. In the model, the administrator selects a set of anti-virus vaccines to cope with potential system attackers and the intruder chooses attacking modes that are most effective against the administrator's chosen set of vaccines. Moreover, the model considers a number of practical constraints, such as a budget limit on the vaccine purchase and a limit on the system performance. In addition, two different scenario analyses are provided, based on the results of the proposed model applied to a simulated pseudo-real-world data.

Estimation of potential distribution of sweet potato weevil (Cylas formicarius) and climate change impact using MaxEnt (MaxEnt를 활용한 개미바구미(Cylas formicarius)의 잠재 분포와 기후변화 영향 모의)

  • Jinsol Hong;Heewon Hong;Sumin Pi;Soohyun Lee;Jae Ha Shin;Yongeun Kim;Kijong Cho
    • Korean Journal of Environmental Biology
    • /
    • v.41 no.4
    • /
    • pp.505-518
    • /
    • 2023
  • The key to invasive pest management lies in preemptive action. However, most current research using species distribution models is conducted after an invasion has occurred. This study modeled the potential distribution of the globally notorious sweet potato pest, the sweet potato weevil(Cylas formicarius), that has not yet invaded Korea using MaxEnt. Using global occurrence data, bioclimatic variables, and topsoil characteristics, MaxEnt showed high explanatory power as both the training and test areas under the curve exceeded 0.9. Among the environmental variables used in this study, minimum temperature in the coldest month (BIO06), precipitation in the driest month (BIO14), mean diurnal range (BIO02), and bulk density (BDOD) were identified as key variables. The predicted global distribution showed high values in most countries where the species is currently present, with a significant potential invasion risk in most South American countries where C. formicarius is not yet present. In Korea, Jeju Island and the southwestern coasts of Jeollanam-do showed very high probabilities. The impact of climate change under shared socioeconomic pathway (SSP) scenarios indicated an expansion along coasts as climate change progresses. By applying the 10th percentile minimum training presence rule, the potential area of occurrence was estimated at 1,439 km2 under current climate conditions and could expand up to 9,485 km2 under the SSP585 scenario. However, the model predicted that an inland invasion would not be serious. The results of this study suggest a need to focus on the risk of invasion in islands and coastal areas.

Predicting Habitat Suitability of Carnivorous Alert Alien Freshwater Fish (포식성 유입주의 어류에 대한 서식처 적합도 평가)

  • Taeyong, Shim;Zhonghyun, Kim;Jinho, Jung
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.1
    • /
    • pp.11-19
    • /
    • 2023
  • Alien species are known to threaten regional biodiversity globally, which has increased global interest regarding introduction of alien species. The Ministry of Environment of Korea designated species that have not yet been introduced into the country with potential threat as alert alien species to prevent damage to the ecosystem. In this study, potential habitats of Esox lucius and Maccullochella peelii, which are predatory and designated as alert alien fish, were predicted on a national basis. Habitat suitability was evaluated using EHSM (Ecological Habitat Suitability Model), and water temperature data were input to calculate Physiological Habitat Suitability (PHS). The prediction results have shown that PHS of the two fishes were mainly controlled by heat or cold stress, which resulted in biased habitat distribution. E. lucius was predicted to prefer the basins at high latitudes (Han and Geum River), while M. peelii preferred metropolitan areas. Through these differences, it was expected that the invasion pattern of each alien fish can be different due to thermal preference. Further studies are required to enhance the model's predictive power, and future predictions under climate change scenarios are required to aid establishing sustainable management plans.

Numerical simulation of groundwater flow in LILW Repository site:II. Input parameters for Safety Assessment (중.저준위 방사성폐기물 처분 부지의 지하수 유동에 대한 수치 모사: 2. 처분 안전성 평가 인자)

  • Park, Kyung-Woo;Ji, Sung-Hoon;Koh, Yong-Kwon;Kim, Geon-Young;Kim, Jin-Kook
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.4
    • /
    • pp.283-296
    • /
    • 2008
  • The numerical simulations for groundwater flow were carried out to support the input parameters for safety assessment in LILW repository site. As the input parameters for safety assessment, the groundwater flux into the underground facilities during construction, flow rate through the disposal silo after closure of disposal silo and flow pathway from the disposal silo to discharge area were analyzed using the 10 cases groundwater flow simulations. From the total 10 numerical simulation results, the statistics of estimated output were similar to among 10 cases. In some cases, the analyzed input parameters were strongly governed by locally existed high permeable fracture zone at radioactive waste disposed depth. Indeed, numerical simulation for well scenario as a human intrusion scenario was carried out using the hydraulically severe case model. Using the results of well scenario, the input parameters for safety assessment were also obtained through the numerical simulation.

  • PDF

Safety Risk Management Policy of United States small unmanned aerial system (미 소형 무인비행체계의 안전성 위험관리 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.35-42
    • /
    • 2021
  • The purpose of this paper is to review the small unmanned aerial system (sUAS) safety policy promoted by the United States(US) government. Therefore, in this paper, along with sUAS risk factors, the risk factors of sUAS that the US government is interested in are described. In addition, the risk factors were classified into physical and non-physical factors, and provisions mentioned in the Federal Aviation Administration(FAA) Relicensing Act were reviewed. Other risk scenarios were analyzed focusing on target scenario items that the FAA is interested in, such as flight operation disruption, infrastructure damage, and facility trespassing. Of course, we looked at the risk management principles promoted by the US FAA. In this paper, as a research method, the direction and contents of the FAA's sUAS policy were studied and reviewed from the analysis of major foreign journals and policy. In the research result of this paper, by analyzing the FAA sUAS safety risk management policy, the integrated operation and safety policy, physical risk management policy, operation and safety regulation, and sUAS policy and technology direction necessary for establishing the sUAS safety risk management guide in Korea are presented. The contribution of this study is to identify the leading US sUAS safety policy direction, and it can be used as basic data for deriving future domestic policy directions from this. Based on the research results presented in the future, policy studies are needed to derive detailed implementation plans.

Safety Assessment on the Human Intrusion Scenarios of Near Surface Disposal Facility for Low and Very Low Level Radioactive Waste (저준위 및 극저준위 방사성폐기물 표층처분시설의 인간침입 시나리오 안전평가에 대한 고찰)

  • Hong, Sung-Wook;Park, Sangho;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.14 no.1
    • /
    • pp.79-90
    • /
    • 2016
  • The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.