• Title/Summary/Keyword: Specific vulnerability

Search Result 149, Processing Time 0.032 seconds

Development of integrated disaster mapping method (II) : disaster mapping with risk analysis (통합 재해지도 작성 기법 개발(II) : 리스크 분석을 적용한 재해지도 작성)

  • Park, Jun Hyung;Kim, Byunghyun
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.1
    • /
    • pp.85-97
    • /
    • 2022
  • In this study, a method for an integrated flood risk mapping was proposed that simultaneously considers the flood inundation map indicating the degree of risk and the disaster vulnerability index. This method creates a new disaster map that can be used in actual situations by providing various and specific information on a single map. In order to consider the human, social and economic factors in the disaster map, the study area was divided into exposure, vulnerability, responsiveness, and recovery factors. Then, 7 indicators for each factor were extracted using the GIS tool. The data extracted by each indicator was classified into grades 1 to 5, and the data was selected as a disaster vulnerability index and used for integrated risk mapping by factor. The risk map for each factor, which overlaps the flood inundatoin map and the disaster vulnerability index factor, was used to establish an evacuation plan by considering regional conditions including population, assets, and buildings. In addition, an integrated risk analysis method that considers risks while converting to a single vulnerability through standardization of the disaster vulnerability index was proposed. This is expected to contribute to the establishment of preparedness, response and recovery plans for providing detailed and diverse information that simultaneously considers the flood risk including social, humanistic, and economic factors.

Design of the Specific IP Access Deny for the Database (데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계)

  • Jang, Seung-Ju;Kim, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.716-721
    • /
    • 2014
  • This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

A Study on Vulnerability Analysis Methodology for Composite Security Product Evaluation (합성형 정보보호제품 평가를 위한 취약성 분석 방법 개발에 관한 연구)

  • Kim, Seok-Soo;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.19-24
    • /
    • 2008
  • Common Criteria is a standard to estimate safety of information protection product such as network-level firewall system and intrusion detection system. Recently, CC version is changed from CC v.2.3 to CC v.3.1. CC v.3.1 estimation methodology requires a secured dictionary accomodation preparation for information protection product. In this research, progressed CC v3 base composition product test and research about vulnerability analysis method. Further, this paper presents specific plan sorting composition style information protection product examination methodology to existing principle and detailed methodology.

  • PDF

Seismic vulnerability of sliding isolation concrete rectangular liquid storage tanks

  • Cheng, Xuansheng;Yin, Siyuan;Chen, Wenjun;Jing, Wei
    • Structural Engineering and Mechanics
    • /
    • v.84 no.4
    • /
    • pp.503-515
    • /
    • 2022
  • Based on the sliding isolation concrete LSS (liquid-storage structure), the specific seismic vulnerability is analyzed according to the general failure mode. In this study, 12 seismic inputs with different characteristics are used, and their acceleration peak values are modulated. By inputting these waves to the sliding isolation concrete storage structure, the finite-element models of different concrete rectangular LSSs are obtained and analyzed, and the failure probabilities are obtained according to the IDA (incremental dynamic analysis) curves of the structure. The results show that when the seismic acceleration peak value gradually increases from 0.1 g to 1.0 g, the failure probability of LSS gradually increases with the increase in friction coefficient. However, the failure probability of a sliding isolation LSS is less than 100% and far less than the failure probability of a non-isolated rectangular LSS, which shows that an isolated liquid storage structure continues working under a big earthquake. Thus, the sliding isolation for the concrete LSS has a significant damping effect.

Cell Death Study in Embryonic Stem Cell-derived Neurons and Its Applications (배아줄기세포 유래 신경계세포에서의 세포사멸 연구와 그 응용)

  • Lee, Chul-Sang
    • Development and Reproduction
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • Specific protocols to increase the differentiation of neuronal cells from embryonic stem (ES) cells have been well established, such as retinoic acid induction and lineage selection of neuronal cells. For the neuropathological studies, ES-derived neurons (ES neurons) must show normal physiological characteristics related to cell death and survival and should be maintained in vitro for a sufficient time to show insults-specific cell death without spontaneous death. When mouse ES cells were plated onto astrocytes monolayer after retinoic acid induction, most ES cells differentiated into neuronal cells, which were confirmed by the presence of specific neuronal markers, and the cultures were viable for at least four weeks. When these cultures were examined for vulnerability to glutamate excitotoxicity, ES neurons were vulnerable to excitotoxic insults mediated by agonist-specific receptors. The vulnerability to excitotoxic death increased with developmental age of ES neurons in vitro. Specific receptors for Neurotrophin and GDNF family ligands were present in ES neurons. GDNF and NT-3 could modulate the survival and excitotoxic vulnerability of ES neurons. The vulnerability and resistance to toxic insults, which are essential requirements of model culture systems for neuropathological studies, make ES neurons to a useful model culture system. Especially ES cell are highly amenable to genetic modification unlikely to primary neuronal cells, which will give us a chance to answer more complicated neurophysiological questions. Recently there was an outstanding attempt to explore the cellular toxicity using human ES cells (Schrattenholz & Klemm, 2007) and it suggested that ES cells could be a new model system for neurophysiological studies soon and go further a large-scale screening system for pharmacological compounds in the future.

  • PDF

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

A study on the risk of taking out specific information by VoIP sniffing technique (VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구)

  • Lee, Donggeon;Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

Model Based Vulnerability Analysis for SOA (SOA를 위한 모델기반 취약점 분석)

  • Kim, Hyunha;Kim, Yukyong;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.8 no.2
    • /
    • pp.45-51
    • /
    • 2012
  • This paper is to identify and assess vulnerabilities of services considering the nature of service layers for analyzing vulnerability of SOA security. It is a model driven approach which provides the way to present security requirements of the business model and identify the vulnerabilities of the services to extract the secure service model. We validate the proposed method with the analytic evaluation because the predictive nature of our methodology poses some specific challenges for its validation.

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

A Comparative Study on the Awareness of Health Risks and the Risk Reduction Measures Related to Sodium Intake between Female and Male University Students in Busan and Gyeongnam: An Application of Protection Motivation Theory (보호동기이론을 적용한 나트륨 과다섭취에 따른 위험성 및 나트륨 섭취 감소 방안의 효과성에 대한 부산·경남 지역 남녀 대학생들의 인식 비교 연구)

  • Jang, Soo-Hyun;Yoon, Eunju
    • Korean journal of food and cookery science
    • /
    • v.32 no.1
    • /
    • pp.136-146
    • /
    • 2016
  • The purpose of this study was to investigate whether there was a gender difference in motivating university students to decrease their sodium intake and to identify effective motivating factors. Within the protection motivation theory (PMT) framework, a survey questionnaire was developed to measure participants' perceptions on the severity of and the vulnerability to risk of serious diseases due to the high sodium intake, as well as the effectiveness (response efficacy) and the ability to perform preventive measures (self-efficacy). Behavioral intentions on five specific practices (checking nutrition label, consuming more fruits and vegetables, consuming less soups, avoiding spicy and pungent food, purchasing less instant or restaurant foods) related to decreasing sodium intake were also included. A total of 294 usable response data were collected from university students (92 male, 202 female) in Busan and Gyeongnam in June 2015 and analyzed using IBM SPSS 22. Severity was the highest (4.04) PMT factor followed by response efficacy (3.72), self-efficacy (3.42), and vulnerability (3.26). Compared to male students, female students thought that the threat was more severe (t=6.035, p<0.001) and reducing sodium intake would be effective to prevent serious illnesses (t=4.724, p<0.001), but their vulnerability and self-efficacy perceptions were not different from male students. Among the five items measuring behavioral intention, female students were more likely to increase fruits and vegetables consumption (t=3.811, p<0.001), while male students were more likely to avoid spicy and pungent foods (t=2.336, p=0.020). Based on findings of this study, the recommended strategy to effectively motivate university students to lower their sodium consumption level is the development of campaign focused on increased vulnerability perception, response efficacy, and ease of practicing preventive measures instead of emphasizing the severity of the consequences.