• Title/Summary/Keyword: DB Vulnerability

Search Result 28, Processing Time 0.025 seconds

A Study on Analysis and Control by Vulnerability of Integrated Database (통합 DB의 취약점 분석 및 제어 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.403-406
    • /
    • 2011
  • 현재 DB 보안시스템에서 DB 서버의 주요정보 및 개인정보 등의 전체 오브젝트 정보를 파악하여 보안취약 오브젝트에 대한 인지 및 차단을 수행하고, 업무범위를 벗어난 접근 등에 대한 오남용을 방지하고, 보안취약점을 자체 점검해야 할 필요성이 있다. 본 논문에서는 현 기술로 제어 불가한 DB의 보안취약 오브젝트에 대한 추출과, 추출 정보의 저장 및 관리, 메모리에 적재 및 오브젝트 명과 정보의 치환 분석 등의 보안 적용방안을 연구한다. 또한 보안 대상 내 주요 오브젝트의 변경이력을 관리하고, 보안 취약 오브젝트의 스캔결과 및 정책의 기본관리, 예약수행관리, 관리자 통보 등의 관리방안을 연구한다. 보안 취약에 대한 사전 차단을 위한 제어가능 시스템과의 연동은 ESM 등 정보수집 모듈과의 연동 및 보안정책 적용결과에 대한 연동 및 정책 재적용 방안을 설계한다. 본 논문의 연구는 지능형 DB보안 기능구현을 가능케 할 자료로 사용될 것이다.

  • PDF

Design of the Specific IP Access Deny for the Database (데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계)

  • Jang, Seung-Ju;Kim, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.716-721
    • /
    • 2014
  • This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

An Analysis of the Damage Factor Vulnerability Using a Natural Disaster DB (자연재해 DB를 이용한 피해항목별 취약성 분석)

  • Park, Jong-Kil;Jung, Woo-Sik;Choi, Hyo-Jin
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.505-508
    • /
    • 2008
  • When it grasps a total property losses and relationship of damage factors, there is possibility of reducing the natural disaster damage which is a yearly repeated. Also, checking and supply to vulnerability should be presupposed. This study aims to find out a damage factor vulnerability using a natural disaster database by Park et al(2007). And added 2005 year data to database. Total 10 damage factors are deaths(person, including missing person) injury(person), victims(person), building(thousand), vessel(thousand), cultivated land(thousand), public facilities(thousand), others(thousand), total property losses(thousand). We analyzed of correlation analysis, ratio, population, area, regional character etc for damage factors.

  • PDF

Development of Web-Based Supporting Tool (VESTAP) for Climate Change Vulnerability Assesment in Lower and Municipal-Level Local Governments (기초 및 광역지자체 기후변화 취약성 평가를 위한 웹기반 지원 도구(VESTAP) 개발)

  • OH, Kwan-Young;LEE, Moung-Jin;HAN, Do-Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.1
    • /
    • pp.1-11
    • /
    • 2016
  • Climate change is the issue that attracts the most attention in the field of environment, as well as the most challenging task faced by the human race. There are various ways to resolve this issue. South Korea has established the primary and secondary national climate change adaptation plans at the national level, and is making it compulsory for each local government (lower and municipal-level) to establish climate change adaptation plans. Climate change vulnerability assessment plays an essential role in establishing climate change adaptation action plans. However, vulnerability assessment has a difficulty performing individual assessments since the results are produced through complex calculations of multiple impact factors. Accordingly, this study developed a web-based supporting tool(VESTAP) for climate change vulnerability assesment that can be used by lower and municipal-level local governments. The VESTAP consists of impact DB and vulnerability assessment and display tool. The index DB includes total 455 impacts of future climate data simulated with RCP (Representative Concentration Pathways) 4.5 and 8.5, atmospheric environment data, other humanities and social statistics, and metadata. The display tool has maximized convenience by providing various analytical functions such as spatial distribution, bias and schematization of each vulnerability assessment result. A pilot test of health vulnerability assessment by particulate matters in Sejong Metropolitan Autonomous City was performed using the VESTAP, and Bukang-myeon showed the highest vulnerability. By using the developed tool, each local government is expected to be able to establish climate change adaptation action plans more easily and conveniently based on scientific evidence.

A Study on Intelligent Vulnerability DB Security System apply to Smart Grid (지능적 취약점 DB 보안 시스템의 Smart Grid 적용 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.203-206
    • /
    • 2011
  • 차세대 전력망인 Smart Grid는 에너지 효율성을 높이기 위한 대안이다. 현재 Smart Grid는 빠른 진행 속도에 비해 보안상 취약점을 다수 내포하고 있다. 이에 Smart Grid의 보안 취약점들을 분석하고, 취약점들에 대한 대응책을 마련하기 위한 방법을 연구하며, 그에 따른 보안 정책을 개발하여, 이들을 저장하여 보안 DB를 구축하고, 보안 시스템을 개발하여 지능적 취약점 DB 보안 시스템을 작동 시킬 수 있는 방법을 연구하여 다가올 보안 위협에 대응 할 수 있도록 하여 Smart Grid 시대의 발전에 기여 할 것이다.

  • PDF

Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection (OLE 원격 접속 기능을 이용한 MS-SQL 패스워드 취약점 점검 기능 설계)

  • Jang, Seung Ju
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.97-104
    • /
    • 2015
  • This paper will feature designs for security vulnerability based on MS-SQL Database and OLE connectivity by checking the MS-SQL database password policy, the user account password access attempts, a user without password, and password does not be changed for a period of time. This paper uses the MS-SQL database and C++ linkage in order to use the OLE DB function. The design module should judge presence or absence of security vulnerability by checking database password policy, the user account password access attempts, a user without password, password does not be changed for a period of time. The MS-SQL database password associated with a feature, judging from the many features allows you to check for security vulnerability. This paper strengthen the security of the MS-SQL database by taking the advantage of the proposed ability.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Factors Influencing Medical Care Utilization according to Decline of Region: Urban Decline Index and Medical Vulnerability Index as Indicators (지역쇠퇴 유형별 의료이용행태 영향요인: 도시쇠퇴 지표와 의료취약지 지표를 활용하여)

  • Jeong, Ji Yun;Jeong, Jae Yeon;Yoon, In Hye;Choi, Hwa Young;Lee, Hae Jong
    • Health Policy and Management
    • /
    • v.32 no.2
    • /
    • pp.205-215
    • /
    • 2022
  • Background: The purpose of this study is to identify the factors infecting the medical care utilization from a new perspective by newly classifying the categories of administrative districts using the urban decline index and medical vulnerability index as indicators. Methods: This study targeted 150,940 people who used medical services using the 2015 cohort database (DB), 2010-2015 urban regeneration analysis index DB, and 2014-2015 public health and medical statistics DB. The decline of the region was classified using the urban decline index typed using k-means clustering and the medical vulnerability index typed using the quantile score calculation. Regression analysis was performed 3 times with medical expenditure, length of stay, and the number of outpatient visits as dependent variables. Results: There were 37 stable region (47.4%), 29 health vulnerable region (37.2%), and 12 decline region (15.4%). The health vulnerable region had lower medical expenditure, fewer outpatient visits, and a higher length of stay than the stable region. The decline region was all higher than the stable region but had no significant effect. Conclusion: The factors that cause the health disparity between regions are not only factors related to individual health behavior but also environmental factors of the local community. Therefore, there is a need for a systematic alternative that properly considers the resources within the community and reflects the characteristics of the population.

Construction of Road Information Database for Urban Disaster Management : Focused on Evacuation Vulnerability (방재관점의 도로 데이터베이스 구축 : 대피위험도를 중심으로)

  • Kim, Ji-Young;Kim, Jung-Ok;Kim, Yong-Il;Yu, Ki-Yun
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.212-216
    • /
    • 2007
  • 본 연구의 목적은 도시 지역에서 지진 발생시 중요한 대피로 역할을 하는 도로의 위험평가요소를 분석하고 데이터베이스(Database, DB)를 구축하는데 있다. 현재 우리나라는 도로의 체계적인 유지관리를 위해 도로관리통합시스템이 개발되어 있으나, 이는 도로대장전산화, 포장관리시스템, 교랑관리시스템, 도로절개면유지관리시스템 등에 한정되어 있다. 다시 말해서 재난 시 사람들이 신변의 안전을 확보할 수 있는 대피나 구급을 위한 통로로써의 도로에 대한 이해가 부족한 실정이다. 따라서 본 연구에서는 선행연구의 분석을 토대로 방재관점의 도로관리를 위한 항목들을 자연환경, 시회환경, 도로 및 시설물, 유발요인 등으로 제안하고, 서울대학교 부근을 대상지역으로 하여 이들 요인을 DB화하였다. 이는 도로와 주변 환경 등을 동시에 고려하여 재난 발생 시 대피와 구조 활동을 위한 방재계획은 물론, 지역별 위험도평가 및 재해위험도작성에 기초 자료로 이용될 것으로 기대된다. 그러나 본 연구에서는 기구축된 GIS 자료가 아닌 현장 조사를 바탕으로 구축된 DB로, 방재관점의 통합된 DB의 필요성을 제시하는데 그 의미가 있을 것이다.

  • PDF

Development of Flood Vulnerability Index Estimation System (이상홍수 취약성 평가 시스템의 개발)

  • Jang, Dae-Won;Kim, Byung-Sik;Kim, Bo-Kyung;Yang, Dong-Min;Seoh, Byung-Ha
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.410-413
    • /
    • 2008
  • We constructed the regional flood risk and damage magnitude using hazard and vulnerabilities which are climatic, hydrological, socio-economic, countermeasure, disaster probability components for DB construction on the GIS system. Also we developed the Excess Flood Vulnerability index estimation System(EFVS). By the construction of the System, we can perform the scientific flood management for the flood prevention and optional extreme flood defenses according to regional characteristics. In order to evaluate the performance of system, we applied EFVS to Anseong-chen in Korea, and the system's stabilization is appropriate to flood damage analysis.

  • PDF