• Title/Summary/Keyword: Security risk

Search Result 1,315, Processing Time 0.031 seconds

A Study on the Enhancement of Maritime Security in Korea Maritime Jurisdiction

  • Lee Eun-Bang;Yun Jong-Hwui
    • Journal of Navigation and Port Research
    • /
    • v.29 no.7
    • /
    • pp.619-625
    • /
    • 2005
  • The security vulnerabilities in Korea maritime domain were mentioned and analysed with the static data of crimes relating to maritime security. The counterterrorism and initiatives to reduce the security risk and to minimize the damage are introduced and evaluated. The maritime security strategy and the near term initiatives to enhance the non-military security at Korean sea and ports are proposed in order to response maritime security threats economically, efficiently and safely.

The effect of job insecurity, employment type and monthly income on depressive symptom: analysis of Korean Longitudinal Study on Aging data

  • Myeong-Hun Lim;Jong-Uk Won;Won-Tae Lee;Min-Seok Kim;Seong-Uk Baek;Jin-Ha Yoon
    • Annals of Occupational and Environmental Medicine
    • /
    • v.34
    • /
    • pp.24.1-24.13
    • /
    • 2022
  • Background: In modern society, depression is serious issue that causes socioeconomic and family burden. To decrease the incidence of depression, risk factors should be identified and managed. Among many risk factors for depression, this study examined socioeconomic risk factors for depression. Methods: We utilized first (2006), second (2008), and third (2010)-wave data from the Korean Longitudinal Study of Aging (KLoSA). Depressive symptom was measured with the 10-item Center for Epidemiological Studies Depression Scale, Short Form (CES-D-10) in the survey in 2008 and 2010. Three risk factors including job security, employment type and monthly income were measured in the survey in 2006. The association between risk factors and depressive symptom was analyzed by Cox proportional-hazard model. Results: We analyzed data from 1,105 workers and hazard ratios (HRs) for 3 risk factors were significant entirely. In addition, regular worker with high income group is the most vulnerable group of poor job insecurity on depression among male workers (HR: 1.73; 95% confidence interval [CI]: 1.07-2.81). Finally, HRs for 7 groups who had at least 1 risk factor had higher HRs compared to groups who had no risk factors after stratifying 3 risk factors. In the analysis, significantly vulnerable groups were total 5 groups and the group who had highest HR was temporary/daily workers with poor job security (HR: 2.51; 95% CI: 1.36-4.64). The results concerning women, regardless of job type, were non-significant. Conclusions: This study presented one or more risk factors among poor job security, low income, temporary/daily employment type increase hazard for depressive symptom in 2 or 4 years after the exposure. These results inform policy to screen for and protect against the risk of depression in vulnerable groups.

Risk Rating Process of Cyber Security Threats in NPP I&C (원전 계측제어시스템 사이버보안 위험도 산정 프로세스)

  • Lee, Woomyo;Chung, Manhyun;Min, Byung-Gil;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.639-648
    • /
    • 2015
  • SInce 2000, Instrumentation and Control(I&C) systems of Nuclear Power Plant(NPP) based on analog technology began to be applied to the digital technology. NPPs under construction in the country with domestic APR1400 I&C system, most devices were digitalized. Cyber security of NPP I&C systems has emerged as an important issue because digital devices compared to the existing analog equipment are vulnerable to cyber attacks. In this paper, We proposed the risk rating process of cyber security threats in NPP I&C system and applied the proposed process to the Reactor Protection System(RPS) developed through Korea Nuclear Instrumentation & Control System(KINCS) project for evaluating the risk of cyber security threats.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

A Study on Risk Management for Export Control on Strategic Trade in Supply Chain Management

  • Roh, Tae-Hyun;Park, Jin-Hee
    • Journal of Navigation and Port Research
    • /
    • v.37 no.6
    • /
    • pp.709-718
    • /
    • 2013
  • In this study, AHP analysis was conducted through a survey that was organized by 9 job categories. The results show that sustainable operation risks have the highest priority level among all criteria with management interest having the highest priority level within sustainable operation risks related attributes. The most important risk attributes among stakeholder risks appeared to be asset security and cargo and conveyance security, with education and training being the most important among regulatory risks. Effective management and response to the risks from export controls on strategic trade require an understanding of supply chain security and compliance programs, effective training programs, investments for development of security systems that meet international standards. In addition, the government needs to focus on developing professionals and providing support for companies with compliance programs, working closely with businesses.

The Research for Cyber Security Experts (소프트웨어 취약점의 보안성 강화를 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.347-350
    • /
    • 2016
  • Analysis of vulnerability of the software for risk. The weakness of the software material, the importance of strengthening security in accordance with financial damage occurred is emerging. There is a potential risk factor not only from the case, the manufacturing to use the software company that appropriate to use a software business and personal risk of loss to size.In this paper due to diagnose and vulnerabilities in software, diagnosis, the curriculum and to cultivate a diagnostic guide, and security vulnerabilities in software.Proposal system for increased.

  • PDF

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

A Determining Contingency Ranking Using the Weather Effects of the Power System (날씨효과를 고려한 전력계통의 상정사고 순위 결정)

  • 김경영;이승혁;김진오;김태균;전동훈;차승태
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.9
    • /
    • pp.487-493
    • /
    • 2004
  • The electric power industry throughout the world is undergoing considerable changes from the vertically integrated utility structure to the deregulated market. However, the deregulated electricity market is operated with respect to theory of economical efficiency, and therefore, the system operator requires data with fast contingency ranking for security of the bulk power system. This paper compares the weather dependant probabilistic risk index(PRI) with the system performance index for power flow in the IEEE-RTS. The system performance index for power flow presents the power system stability. This paper presents fast calculation method for determining contingency ranking using the weather dependant probabilistic risk index(PRI). The probabilistic risk index can be classified into the case of normal and adverse weather. This paper proposes calculation method using the probabilistic risk index in determining contingency ranking required for security under the deregulated electricity market.

A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis (봉쇄와 보안장비 수준 기반 정보보호 위험관리 수준 측정 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1261-1266
    • /
    • 2021
  • Existing information security risk assessment methods focus on evaluating the vulnerability of information assets. However, when the form of information assets changes and new types of information assets emerge, there is a limitation in that the evaluation standards for them are also added or deleted. Existing methods have insufficient research on the path through which cyber threats are introduced. In particular, there is very little research on blocking the inflow path for web-based information systems with public IPs. Therefore, this paper introduces the main research contents of the BDLA (Blockade and Defense Level Analysis)-based information security risk assessment model. In addition, by applying the BDLA-based information security risk assessment model, the information security risk level was studied by measuring the blockade level and security equipment level of 17 public institutions.