• Title/Summary/Keyword: ACCIDENT VULNERABILITY

Search Result 49, Processing Time 0.025 seconds

A Study on Fire Risk of Apartment House with Pilotis Structure - Focused on the Fire case of Uijeongbu-si Urban Livig Homes - (필로티 구조의 공동주택 화재 위험성 연구 - 의정부 대봉그린 도시형아파트 화재 사례를 중심으로 -)

  • Choi, Seung-Bok;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.30 no.3
    • /
    • pp.48-54
    • /
    • 2016
  • Pilotis are support columns that lift a building above the ground. Thus, they can elevate the lowest floor to the secondfloor level and, in Korea, are used to leav a parking area below multifamily housing. However, if there is a fire in the piloti area, the cars and main entrance door are wrapped in flames. Due to the inflammability of the materials, the combustion of the cars and insulation at the ceiling of the pilotis, having a high heat release rate, can quickly destroy the front entrance of the building and spread heat, flames and a poisonous gas to the stairs and elevator pit. Therefore, the fire can quickly spread to the whole building, putting the lives of the residents in danger. This study was an in-depth accidental case study of the "Uijeongbu Fire Accident" that killed 5 residents and injured 139 others. The study identified the relationships between the fire at the piloti structure of multifamily housing and the vulnerability of this structure and its inherent weaknesses.

Development of Disaster Management Capacity Analysis Program for Local Government (지방자치단체 재난안전관리 자체 역량분석 프로그램 개발)

  • Yoo, Byungtae;Oh, Keumho
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.266-275
    • /
    • 2013
  • New paradigm to the advancement of disaster management is required for building resilient and safe society. In these circumstances, the importance of local government disaster management capacity has been emphasized through experiencing a series of accidents including 2012 september Gumi fluorosilicic acid diffusion accident. The increase of people's disaster awareness has emerged the public demands on disaster management information of local area. In this study, the disaster management capacity analysis program is developed for self-assessment of local government. The program is designed for disaster managers to database the categorized index of disaster management capacity and recognize the capacity level. For the public announcement of disaster management capacity, the analysis results are shown for citizens in the understandable format. It is expected that the enhancement of emergency management capacity of local society can be achieved by the efforts of local government analyzing and improving the vulnerability as well as the participation of local society.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.

Development of Lane and Vehicle Headway Direction Recognition System for Military Heavy Equipment's Safe Transport - Based on Kalman Filter and Neural Network - (안전한 군용 중장비 수송을 위한 차선 및 차량 진행 방향 인식 시스템 개발 - 칼만 필터와 신경망을 기반으로 -)

  • Choi, Yeong-Yoon;Choi, Kwang-Mo;Moon, Ho-Seok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.3
    • /
    • pp.139-147
    • /
    • 2007
  • In military transportation, the use of wide trailer for transporting the large and heavy weight equipments such as tank, armoured vehicle, and mobile gunnery is quite common. So, the vulnerability of causing traffic accidents for these wide military trailer to bump or collide with another car in adjacent lane is very high due to its broad width in excess of its own lane's width. Also, the possibility of these strayed accidents can be increased especially by the careless driver. In this paper, the recognition system of lane and vehicle headway direction is developed to detect the possible collision and warn the driver to prevent the fatal accident. In the system development, Kalman filtering is used first to extract the border of driving lane from the video images supplied by the CCD camera attached to the vehicle and the driving lane detection is completed with regression analysis. Next, the vehicle headway direction is recognized by using neural network scheme with the extracted parameters of the detected driving lane feature. The practical experiments for the developed system are also carried out in the real traffic road of Seoul city area and the results show us the more than 90% accuracy in recognizing the driving lane and vehicle headway direction.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.

A Study on adopting cloud computing in the military (국방 클라우드 컴퓨팅 도입에 관한 보안체계 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.645-654
    • /
    • 2012
  • The South Korean Defense Ministry is planning and pushing forward to conduct a cloud computing pilot project in 2012. Taking into consideration the high-level security necessary in the military as well as wartime duties, if not designed properly, this project may anticipate severe damage to national security and interest. In particular, despite the fact that vulnerability due to inter-Korean confrontation and regular security-related incidents have been triggered, unconditionally conducting a cloud computing pilot project without reviewing not only violates security regulations but also causes various security-related side effects in and outside South Korea. Therefore, this thesis found conditions for conduct of this project by suggesting duties that can apply cloud computing as well as security technology, administration, post-accident matters and conditions for legally solving cloud computing in the military.

A Study on the Protective Countermeasures through the Assassination Accident Analysis of Israeli Premier Yitzhak Rabin (라빈수상 위해사건 분석을 통한 경호적 대응방안)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.221-242
    • /
    • 2008
  • Protection is to maximize the protectee's physical security by minimizing the threats and minimizing the damages caused by the threats. From this point of view, the assassination case of Israel's former Premier Yitzhak Rabin who devoted himself to proceed peace process in Middle East, on November 4, 1995, gives us a lot of lessons on protection. At that time, Israeli society was chaotic with anti-Rabin and anti-government demonstrations which is against Rabin's peace process, and they openly threatened to assassinate Premier Rabin. However, Shin Bet, Israeli Protective Agency, didn't reacted against the assassination threats effectively. Also they have to try to secure friendly public to widen the width of selection in case of crisis and to secure the credibility of the organization. They have to prevent harmful activities in advance by securing wide intelligence networks to collect and analyze various protective intelligences and preparing proper protective countermeasures. Intelligence is a basic element in protection and any protective measures not supported by intelligence activities are not useful and effective. Potential attackers study their target thoroughly and make an elaborate plan before their attack. Advance team is required to conduct security measures on a basis of analysis of vulnerability and threat factors, and close protection team should be prepared for the changing situations with crisis-consciousness. Is security, 100% perfection is not possible. However, Shin Bet failed to analyze and approach to the existing threats. They forgot the fact that security environment reflects social situations. Protection agents should be conscious of the fact that today is different from yesterday. So we have to expect what is not expected when not expected.

  • PDF

A Study on the Development of Assessment Index for Catastrophic Incident Warning Sign at Refinery and Pertrochemical Plants (정유 및 석유화학플랜트 중대사고 전조신호 평가지표 개발에 관한 연구)

  • Yun, Yong Jin;Park, Dal Jae
    • Korean Chemical Engineering Research
    • /
    • v.57 no.5
    • /
    • pp.637-651
    • /
    • 2019
  • In the event of a major accident such as an explosion in a refinery or a petrochemical plant, it has caused a serious loss of life and property and has had a great impact on the insurance market. In the case of catastrophic incidents occurring in process industries such as refinery and petrochemical plants, only the proximate causes of loss have been drawn and studied from inspectors or claims adjustors responsible for claims of property insurers, incident cause investigators, and national forensic service workers. However, it has not been done well for conducting root cause analysis (RCA) and identifying the factors that contributed to the failure and establishing preventive measures before leading to chemical plant's catastrophic incidents. In this study, the criteria of warning signs on CCPS catastrophic incident waning sign self-assessment tool which was derived through the RCA method and the contribution factor analysis method using the swiss cheese model principle has been reviewed first. Secondly, in order to determine the major incident warning signs in an actual chemical plant, 614 recommendations which have been issued during last the 17 years by loss control engineers of global reinsurers were analyzed. Finally, in order to facilitate the assessment index for catastrophic incident warning signs, the criteria for the catastrophic incident warning sign index at chemical plants were grouped by type and classified into upper category and lower category. Then, a catastrophic incident warning sign index for a chemical plant was developed using the weighted values of each category derived by applying the analytic hierarchy process (pairwise comparison method) through a questionnaire answered by relevant experts of the chemical plant. It is expected that the final 'assessment index for catastrophic incident warning signs' can be utilized by the refinery and petrochemical plant's internal as well as external auditors to assess vulnerability levels related to incident warning signs, and identify the elements of incident warning signs that need to be tracked and managed to prevent the occurrence of serious incidents in the future.