• Title/Summary/Keyword: Intrinsic vulnerability

Search Result 12, Processing Time 0.031 seconds

Analysis of an Intrinsic Vulnerability on Keyboard Security (키보드 보안의 근본적인 취약점 분석)

  • Yim, Kang-Bin;Bae, Kwang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.89-95
    • /
    • 2008
  • This paper analyzes the intrinsic vulnerability problems of the authentication system for Internet commerce based on the ID and password strings gathered from the computer keyboard. Through the found vulnerability, it is easy to sniff user passwords as well as any other keyboard inputs even when each of the existing keyboard protection softwares is running. We propose several countermeasures against the possible attacks to the vulnerability at both points of the hardware and the software concerns. The more secure environment for Internet commerce is highly required by implementing the proposed countermeasures.

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

Consideration of Trends and Applications of Groundwater Vulnerability Assessment Methods in South Korea (지하수 오염취약성 평가 기법 동향과 국내 적용성 고찰)

  • Kim, Gyoo-Bum
    • Journal of Soil and Groundwater Environment
    • /
    • v.13 no.6
    • /
    • pp.1-16
    • /
    • 2008
  • There are generally two types of groundwater vulnerability assessments. Intrinsic vulnerability is based on the assessment of natural climatic, geological and hydrogeological attributes and specific vulnerability relates to a specific contaminant, contaminant class, or human activity. Several methods to assess groundwater vulnerability, which are based on hydrogeologic setting and socio-economical environment, have been developed in USA and Europe. A Modified-DRASTIC model including a lineament factor has been developed in South Korea, but it still has some limitations. To develop a solid and applicable method in this country, many data of quality, hydraulic features, GIS data, and pollution source, produced from a Basic Survey based on Article 5 of the Groundwater Act and other research projects, need to be collected, analyzed and verified introducing the previous methods.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

A Comparative Study of Groundwater Vulnerability Assessment Methods: Application in Gumma, Korea (지하수 오염 취약성 기법의 비교 적용 연구: 충남 홍성군 금마면 일대에의 적용)

  • Ki, Min-Gyu;Yoon, Heesung;Koh, Dong-Chan;Hamm, Se-Yeong;Lee, Chung-Mo;Kim, Hyun-Su
    • Journal of Soil and Groundwater Environment
    • /
    • v.18 no.3
    • /
    • pp.119-133
    • /
    • 2013
  • In the present study, several groundwater vulnerability assessment methods were applied to an agricultural area of Gumma in Korea. For the groundwater intrinsic vulnerability assessment, the performance of DRASTIC, SINTACS and GOD models was compared and an ensemble approach was suggested. M-DRASTIC and multi-linear regression (MLR) models were applied for the groundwater specific vulnerability assessment to nitrate of the study site. The correlation coefficient between the nitrate concentration and M-DRASTIC index was as low as 0.24. The result of the MLR model showed that the correlation coefficient is 0.62 and the areal extents of livestock farming and upland field are most influential factors for the nitrate contamination of groundwater in the study site.

Countermeasures to the Vulnerability of the Keyboard Hardware (키보드컨트롤러의 하드웨어 취약점에 대한 대응 방안)

  • Jeong, Tae-Young;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.187-194
    • /
    • 2008
  • This paper proposes an effective countermeasure to an intrinsic hardware vulnerability of the keyboard controller that causes sniffing problem on the password authentication system based on the keyboard input string. Through the vulnerability, some possible attacker is able to snoop whole the password string input from the keyboard even when any of the existing keyboard protection software is running. However, it will be impossible for attackers to gather the exact password strings if the proposed policy is applied to the authentication system though they can sniff the keyboard hardware protocol. It is expected that people can use secure Internet commerce after implementing and applying the proposed policy to the real environment.

A New Evaluation Model for Natural Attenuation Capacity of a Vadose Zone Against Petroleum Contaminants (유류 오염물질에 대한 불포화대 자연 저감능 등급화 기법 개발)

  • Woo, Heesoo;An, Seongnam;Kim, Kibeum;Park, Saerom;Oh, Sungjik;Kim, Sang Hyun;Chung, Jaeshik;Lee, Seunghak
    • Journal of Soil and Groundwater Environment
    • /
    • v.27 no.spc
    • /
    • pp.92-98
    • /
    • 2022
  • Although various methods have been proposed to assess groundwater vulnerability, most of the models merely consider the mobility of contaminants (i.e., intrinsic vulnerability), and the attenuation capacity of vadose zone is often neglected. This study proposed an evaluation model for the attenuation capacity of vadose zone to supplement the limitations of the existing index method models for assessing groundwater vulnerability. The evaluation equation for quantifying the attenuation capacity was developed from the combined linear regression and weighted scaling methods based on the lab-scale experiments using various vadose zone soils having different physical and biogeochemical properties. The proposed semi-quantifying model is expected to effectively assess the attenuation capacity of vadose zone by identifying the main influencing factors as input parameters together with proper weights derived from the coefficients of the regression results. The subsequent scoring and grading system has great versatility while securing the objectivity by effectively incorporating the experimental results.

Fatigue Life Evaluation of Fiber Reinforced Composite Rotor Blades Considering Impact Damages (충격손상을 고려한 섬유강화 복합재 로터 블레이드의 피로수명 평가)

  • Kee, Young-Jung;Park, Jae-Hun;Kim, Sung-Man;Kim, Gi-Hun
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.spc
    • /
    • pp.22-30
    • /
    • 2020
  • Composite rotor blades for rotorcraft have an intrinsic vulnerability to foreign object impact from its inherent structural characteristics of insufficient strength in the thickness direction, which may easily lead to internal structure damage. Therefore, defects and strength reducing effects caused by foreign object impact should be considered in fatigue evaluation of composite blades. For this purpose, the flaw tolerant safe-life and fail-safe concepts were adopted in fatigue evaluation since 1980s, and recently those concepts have been replaced by the damage tolerance concept. In this paper, the relevant standards for fatigue evaluation are analyzed focusing on fiber reinforced composite rotor blades used in rotorcraft. In addition, fatigue evaluation procedure of composite blades considering impact damages is proposed by reviewing the practices implemented through domestic development projects.

Aging of Immune System (면역 반응체계의 노화)

  • Chung, Kyung Tae
    • Journal of Life Science
    • /
    • v.29 no.7
    • /
    • pp.817-823
    • /
    • 2019
  • Immune system provides defense integrity of body against external invaders. In order to accomplish the important defending role immune system is composed of many different components which are regenerated continuously during lifespan. The key components are professional killing cells such as macrophage, neutrophil, natural killer cell, and cytotoxic T cell and professional blocking molecule, antibody, which is produced by plasma cell, the terminal differentiated B cell. Immune response is orchestrated harmoniously by all these components mediated through antigen presenting cells such as dendritic cells. Immune responses can be divided into two ways: innate immune response and adaptive immune response depending on induction mechanism. Aging is a broad spectrum of physiological changes. Likewise other physiological changes, the immune components and responses are wane as aging is progressing. Immune responses become decline and dysregulating, which is called immunosenescense. Immune components of both innate and adaptive immune response are affected as aging progresses leading to increased vulnerability to infectious diseases. Numbers of immune cells and amounts of soluble immune factors were decreased in aged animal models and human and also functional and structural alterations in immune system were reduced and declined. Cellular intrinsic changes were discovered as well. Recent researches focusing on aging have been enormously growing. Many advanced tools were developed to bisect aging process in multi-directions including immune system area. This review will provide a broad overview of aging-associated changes of key components of immunity.

A study on Programs for Enhancing Remarried Family Functioning (재혼가정의 가족기능향상프로그램 개발을 위한 시론적 연구)

  • Kim, Yoon-Ok
    • Korean Journal of Social Welfare
    • /
    • v.56 no.2
    • /
    • pp.215-235
    • /
    • 2004
  • A little understood but rapidly growing phenomenon in our society is remarriage. By 2002, 21% of marriage involved the remarriage of one or both partners. Furthermore, the ratio of remarriage of women has outnumbered the ratio of remarriage of men, which is remarkable change compared to the traditional culture putting a taboo on women's remarriage in Korea. The purpose of this study is to construct the perspective and the direction of programs for enhancing the remarriage family functioning. For the purpose, we explore the intrinsic vulnerability to family dissolution of remarriage and ill preparation for remarriage of people. There are unrealistic myths around, lack of informations on, absence of guideline for remarriage family life. Also, we discuss the process of remarriage family development, which leads us to the conclusion that the remarriage shows totally different family structure and family interaction from first marriage nuclear family. Based on discussion mentioned above, several suggestions are provided for developing programs for remarriage family functioning. Above all, the family developmental perspective on remarriage is more useful paradigm rather than deficit-comparison perspective for remarriage family. Also, the programs for remarriage family functioning should challenge the unrealistic myths around remarriage such as the instant love between step-parents and step-children, the re-created nuclear family, etc. Also, several points such as the remarried family developmental stage, the disparity in expectation of man and woman on remarriage, and the tendency to scapegoat a stepmother should be considered in programs for enhancing remarriage family functioning.

  • PDF