• Title/Summary/Keyword: Security vulnerability

Search Result 1,104, Processing Time 0.025 seconds

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

Spatial and temporal trends in food security during the COVID-19 pandemic in Asia Pacific countries: India, Indonesia, Myanmar, and Vietnam

  • Yunhee Kang;Indira Prihartono;Sanghyo Kim;Subin Kim;Soomin Lee;Randall Spadoni;John McCormack;Erica Wetzler
    • Nutrition Research and Practice
    • /
    • v.18 no.1
    • /
    • pp.149-164
    • /
    • 2024
  • BACKGROUND/OBJECTIVES: The economic recession caused by the coronavirus disease 2019 pandemic disproportionately affected poor and vulnerable populations globally. Better uunderstanding of vulnerability to shocks in food supply and demand in the Asia Pacific region is needed. SUBJECTS/METHODS: Using secondary data from rapid assessment surveys during the pandemic response (n = 10,420 in mid-2020; n = 6,004 in mid-2021) in India, Indonesia, Myanmar, and Vietnam, this study examined the risk factors for reported income reduction or job loss in mid-2021 and the temporal trend in food security status (household food availability, and market availability and affordability of essential items) from mid-2020 to mid-2021. RESULTS: The proportion of job loss/reduced household income was highest in India (60.4%) and lowest in Indonesia (39.0%). Urban residence (odds ratio [OR] range, 2.20-4.11; countries with significant results only), female respondents (OR range, 1.40-1.69), engagement in daily waged labor (OR range, 1.54-1.68), and running a small trade/business (OR range, 1.66-2.71) were significantly associated with income reduction or job loss in three out of 4 countries (all P < 0.05). Food stock availability increased significantly in 2021 compared to 2020 in all four countries (OR range, 1.91-4.45) (all P < 0.05). Availability of all essential items at markets increased in India (OR range, 1.45-3.99) but decreased for basic foods, hygiene items, and medicine in Vietnam (OR range, 0.81-0.86) in 2021 compared to 2020 (all P < 0.05). In 2021, the affordability of all essential items significantly improved in India (OR range, 1.18-3.49) while the affordability of rent, health care, and loans deteriorated in Indonesia (OR range, 0.23-0.71) when compared to 2020 (all P < 0.05). CONCLUSIONS: Long-term social protection programs need to be carefully designed and implemented to address food insecurity among vulnerable groups, considering each country's market conditions, consumer food purchasing behaviors, and financial support capacity.

A Study on Improvement Plans for Local Safety Assessment in Korea (국내 지역안전도 평가의 개선방안 연구)

  • Kim, Yong-Moon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.69-80
    • /
    • 2021
  • This study tried to suggest improvement measures by discovering problems or matters requiring improvement among the annual regional safety evaluation systems. Briefly introducing the structure and contents of the study, which is the introduction, describes the regional safety evaluation method newly applied by the Ministry of Public Administration and Security in 2020. Utilization plans were also introduced according to the local safety level that was finally evaluated by the local government. In this paper, various views of previous researchers related to regional safety are summarized and described. In addition, problems were drawn in the composition of the index of local safety, the method of calculating the index, and the application of the current index. Next, the problems of specific regional safety evaluation indicators were analyzed and solutions were presented. First, "Number of semi-basement households" is replaced with "Number of households receiving basic livelihood" of 「Social Vulnerability Index」 in the field of disaster risk factors is replaced with "the number of households receiving basic livelihood". In addition, the "Vinyl House Area" is evaluated by replacing "the number of households living in a Vinyl House, the number of container households, and the number of households in Jjok-bang villages" with data. Second, in the management and evaluation of habitual drought disaster areas, local governments with a water supply rate of 95% or higher in Counties, Cities, and Districts are treated as "missing". This is because drought disasters rarely occur in the metropolitan area and local governments that have undergone urbanization. Third, the activities of safety sheriffs, safety monitor volunteers, and disaster safety silver monitoring groups along with the local autonomous prevention foundation are added to the evaluation of the evaluation index of 「Regional Autonomous Prevention Foundation Activation」 in the field of response to disaster prevention measures. However, since the name of the local autonomous disaster prevention organization may be different for each local government, if it is an autonomous disaster prevention organization organized and active for disaster prevention, it would be appropriate to evaluate the results by summing up all of its activities. Fourth, among the Scorecard evaluation items, which is a safe city evaluation tool used by the United Nations Office for Disaster Risk Reduction(UNDRR), the item "preservation of natural buffers to strengthen the protection functions provided by natural ecosystems" is borrowed, which is closely related to natural disasters. The Scorecard evaluation is an assessment index that focuses on improving the disaster resilience of local governments while carrying out the campaign "Creating cities resilient to climate crises and disasters" emphasized by UNDRR. Finally, the names of "regional safety level" and "local safety index" are similar, so the term of local safety level is changed to "natural disaster safety level" or "natural calamity safety level". This is because only the general public can distinguish the local safety level from the local safety index.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Reframing Sustainability in Consideration of Climate Change and Natural Hazards: Focusing on the U.S. Natural Hazards Mitigation Trend and Case Analysis (기후변화시대 자연재해를 고려한 지속가능개발 개념의 재정립: 미국 방재동향 및 사례 분석을 중심으로)

  • Kwon, Tae Jung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.2
    • /
    • pp.801-810
    • /
    • 2013
  • The main purpose of this study is to reframe sustainability or sustainable development concept in the field of planning in consideration of climate change and natural hazards. The new concept is expected to provide a theoretical foundation for upcoming hazard mitigation measures addressing climate change. The first and main argument of the new concept is that environmental protection should be inclusive enough to address urban (or community) security from current natural hazards. The second is that the balance between structural and nonstructural mitigation measures is critical to cope more effectively with extreme natural hazards in the era of climate change and also with conflicts driven by three goals of sustainability--environmental protection, economic development, and social justice. The following studies, based on this new concept of sustainablity, are expected (1) to address new participation methods for the conflict resolution, (2) to explore detailed and substantive planning strategies and creative technical and institutional solutions for environmental protection, natural hazard mitigation, and conflict resolution. Two of APFM(the Associated Programme on Flood Management)'s three natural hazard risk criteria, Exposure and Vulnerability, may guide the exploration.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

Design of an RFID Authentication Protocol Using Nonlinear Tent-Map (비선형 Tent-Map을 이용한 RFID 인증 프로토콜 설계)

  • Han, Kyu-Kwang;Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.10
    • /
    • pp.1145-1152
    • /
    • 2014
  • The RFID (Radio-Frequency Identification) system is a technology to discern things by radio and an epoch-making new method to improve product management such as distribution, transport, mobilization, inventory control. However, RFID, which uses radio, is at risk for information leakage and falsification due to the vulnerability of security of the communication section. We designed the new authentication protocol by applying the tent map, which is the representative complex systems, to the RFID communication system. A more solid and simple authentication system was designed by applying the initial value sensitivity and irregularity, which are the representative characteristics of the complex system, to the reader and tag of RFID. The purpose of this paper is to verify the usability of the RFID authentication protocol design that uses the nonlinear system shown in this thesis by the new system differentiated from the authentication system that depends on the existing hash function or random numbers.

Study on Exposed Piping with High Risk of Fire (화재 위험성이 높은 노출배관 사용에 관한 연구)

  • Kim, Yeob-Rae;Baek, Dong-Hyun
    • Fire Science and Engineering
    • /
    • v.29 no.4
    • /
    • pp.61-66
    • /
    • 2015
  • PVC pipe has excellent corrosion resistance and chemical resistance and is broadly used. However there are no regulations regarding exposed piping material in buildings. There is growing concern about the vulnerability of piping to fires and generating toxic gas. Exposed piping should be made of incombustible materials to prevent spreading of toxic gas and to minimize damage to life and property in case of fire. Many big structures are being built, and concerns regarding damage by fire are continuously growing. In these circumstances, we should reinforce fire safety standards for buildings and heighten safety consciousness to become a well-developed country. For these reasons, we investigated the materials used for exposed piping and the standards of well-developed countries to enhance safety. We tried to figure out the alternatives by examining the actual conditions of each region's buildings. Based on the use of incombustible materials for exposed piping in each region, we tried to enhance the effectiveness for safety by suggesting revisions for related laws and regulations.