• Title/Summary/Keyword: Account Vulnerability

Search Result 77, Processing Time 0.024 seconds

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

A mechanical model for the seismic vulnerability assessment of old masonry buildings

  • Pagnini, Luisa Carlotta;Vicente, Romeu;Lagomarsino, Sergio;Varum, Humberto
    • Earthquakes and Structures
    • /
    • v.2 no.1
    • /
    • pp.25-42
    • /
    • 2011
  • This paper discusses a mechanical model for the vulnerability assessment of old masonry building aggregates that takes into account the uncertainties inherent to the building parameters, to the seismic demand and to the model error. The structural capacity is represented as an analytical function of a selected number of geometrical and mechanical parameters. Applying a suitable procedure for the uncertainty propagation, the statistical moments of the capacity curve are obtained as a function of the statistical moments of the input parameters, showing the role of each one in the overall capacity definition. The seismic demand is represented by response spectra; vulnerability analysis is carried out with respect to a certain number of random limit states. Fragility curves are derived taking into account the uncertainties of each quantity involved.

Modifier parameters and quantifications for seismic vulnerability assessment of reinforced concrete buildings

  • Oumedour, Amira;Lazzali, Farah
    • Earthquakes and Structures
    • /
    • v.22 no.1
    • /
    • pp.83-94
    • /
    • 2022
  • In recent years, some studies have identified and quantified factors that can increase or decrease the seismic vulnerability of buildings. These modifier factors, related to the building characteristics and condition, are taken into account in the vulnerability assessment, by means of a numerical estimation resulting from the quantification of these modifiers through vulnerability indexes. However, views have differed on the definition and the quantification of modifiers. In this study, modifier parameters and scores of the Risk-UE Level 1 method are adjusted based on the Algerian seismic code recommendations and the reviews proposed in the literature. The adjusted modifiers and scores are applied to reinforced concrete (RC) buildings in Boumerdes city, in order to assess probable seismic damage. Comparison between estimated damage and observed damage caused by the 2003 Boumerdes earthquake is done, with the objective to (i) validate the model involving influence of the modifier parameters on the seismic vulnerability, and (ii) to define the relationship between modifiers and damage. This research may help planners in improving seismic regulations and reducing vulnerability of existing buildings.

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection (OLE 원격 접속 기능을 이용한 MS-SQL 패스워드 취약점 점검 기능 설계)

  • Jang, Seung Ju
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.97-104
    • /
    • 2015
  • This paper will feature designs for security vulnerability based on MS-SQL Database and OLE connectivity by checking the MS-SQL database password policy, the user account password access attempts, a user without password, and password does not be changed for a period of time. This paper uses the MS-SQL database and C++ linkage in order to use the OLE DB function. The design module should judge presence or absence of security vulnerability by checking database password policy, the user account password access attempts, a user without password, password does not be changed for a period of time. The MS-SQL database password associated with a feature, judging from the many features allows you to check for security vulnerability. This paper strengthen the security of the MS-SQL database by taking the advantage of the proposed ability.

Vulnerability Assessment of Idleness in Rural Areas from Multiple Perspectives (인구, 주택, 농지 측면에서의 농촌지역 유휴화 취약성 평가)

  • Lee, Jimin;Choi, Won
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.64 no.2
    • /
    • pp.15-25
    • /
    • 2022
  • Idleness in rural areas is a very important issue with regard to national land space management. Previous studies have been conducted separately in terms of population housing and farmland. So, an integrated analysis considering population housing and farmland is required for rural spatial management. In this study, vulnerability indices were developed and spatial distribution of the vulnerable areas was analyzed by evaluating regional vulnerability on population, housing, and farmland. In addition, plans for rural space management plan were proposed considering the population hollowing out and the idle farmland. The results of this study would be helpful in preparing policies that take into account the vulnerability of idleness in rural areas.

A Study on Database Access Control using Least-Privilege Account Separation Model (최소 권한 계정 분리 모델을 이용한 데이터베이스 엑세스 제어 연구)

  • Jang, Youngsu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.101-109
    • /
    • 2019
  • In addition to enabling access, database accounts play a protective role by defending the database from external attacks. However, because only a single account is used in the database, the account becomes the subject of vulnerability attacks. This common practice is due to the lack of database support, large numbers of users, and row-based database permissions. Therefore if the logic of the application is wrong or vulnerable, there is a risk of exposing the entire database. In this paper, we propose a Least-Privilege Account Separation Model (LPASM) that serves as an information guardian to protect the database from attacks. We separate database accounts depending on the role of application services. This model can protect the database from malicious attacks and prevent damage caused by privilege escalation by an attacker. We classify the account control policies into four categories and propose detailed roles and operating plans for each account.

A Study on the Relationship among Perceived Stress, Vulnerability Variables, and Somatization Tendency in University Entrants (대학교 신입생들에서 지각된 스트레스 및 취약성 변인과 신체화 경향의 관계에 관한 연구)

  • Kim, Hack-Ryul;Cho, Jun-Ho;Cho, Yong-Rae
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.5 no.1
    • /
    • pp.63-72
    • /
    • 1997
  • For the purpose of examining the relationship between perceived stress, vulnerability variables, and somatization tendency, the self-report questionnaires of perceived stress, styles of stress coping(passive and active copings), self-perception, gender, and somatization tendency were administered to university entrants(n=2,024). The results were as follows: 1) Perceived stress, styles of stress coping(passive and active copings), self-perception, and gender accounted for 15.56% of the total variance in somatization tendency. As a result of comparing the relative contributions of all predictor variables to somatization tendency, the highest was perceived stress, and the next in order were passive coping style, self-perception, and gender, whereas direct effect of active coping style was not significant. 2) The two-way and three-way interaction effects of perceived stress X vulnerability variables were not significant. 3) The two-way and three-way interaction effects of gender X psychosocial variables were not significant. To conclude, perceived stress and vulnerability variables independently contribute to somatization tendency in university entrants, and furthermore it is suggested that vulnerability variables as well as perceived stress must be considered to account for somatization tendency.

  • PDF

Evaluation of the Vulnerability of Bridge Foundations to Scour (세굴로 인한 교량기초의 위험도 평가)

  • Kwak, Ki-Seok;Park, Jae-Hyun;Lee, Ju-Hyung;Chung, Moon-Kyung;Kim, Jong-Cheon
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.03a
    • /
    • pp.713-718
    • /
    • 2005
  • A methodology is developed to evaluate the vulnerability of bridge piers to scour and to help establish effective disaster measures, taking into account the locality and scour characteristics in Korea. Based on the bearing capacity of bridge foundation-ground integrating system changed by scour, this methodology is able to prioritize bridge foundations reflecting on the geotechnical factors as well as hydraulic ones. The bridge foundation vulnerability to scour is categorized into 7 groups considering the concise information of the bridge foundation-ground integrating system. A case study of implementing this method which includes the analysis of the scour depth and evaluation, and categorizing the scour vulnerability of bridge foundation is presented.

  • PDF

Assessment of Vulnerable Area and Naval Ship's Vulnerability based on the Carleton Damage Function (칼튼 손상함수를 이용한 주요장비의 취약 면적 산정과 함정 취약성 평가 방법)

  • Lee, Jang Hyun;Choi, Won Jun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.3
    • /
    • pp.274-280
    • /
    • 2018
  • This paper deals with the calculation of vulnerable areas of critical components required for the assessment of naval ship's vulnerability. Taking into account the effectiveness of threatening weapons, the probability density function of damage was used to assess vulnerable areas or vulnerabilities of critical components. It is shown that the vulnerable area of critical component can be simply computed from the damage function. Considering the weapon effectiveness of fragmentation and explosion on the target, both Carleton Damage Function and Rectangular Cookie Cutter Function representing the probability of damage are applied to the vulnerable area assessment. Carleton damage function is utilized to describe the weapon-target interaction in the vulnerability analyses. A problem of blast effect against an assumed naval ship is chosen as a case study. Vulnerability is evaluated by applying the suggested method to the equipments arranged in the engine room of the virtual ship.