• Title/Summary/Keyword: Threat Modelling

Search Result 17, Processing Time 0.024 seconds

A Study on Security Requirements of Shipboard Combat System based on Threat Modelling (위협 모델링 기반 함정 전투체계 보안 요구사항에 관한 연구)

  • Seong-cheol Yun;Tae-shik Shon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.281-301
    • /
    • 2023
  • The shipboard combat system is a key system for naval combat that supports a command and control process cycle consisting of Detect - Control - Engage in real time to ensure ship viability and conduct combat missions. Modern combat systems were developed on the basis of Open Architecture(OA) to maximize acceptance of latest technology and interoperability between systems, and actively introduced the COTS(Commercial-of-the-shelf). However, as a result of that, vulnerabilities inherent in COTS SW and HW also occurred in the combat system. The importance of combat system cybersecurity is being emphasized but cybersecurity research reflecting the characteristics of the combat system is still lacking in Korea. Therefore, in this paper, we systematically identify combat system threats by applying Data Flow Diagram, Microsoft STRIDE threat modelling methodology. The threats were analyzed using the Attack Tree & Misuse case. Finally we derived the applicable security requirements which can be used at stages of planning and designing combat system and verified security requirements through NIST 800-53 security control items.

The Impact of Perceived IT Threat on Convergence Information System Performance (지각된 IT위협이 융합 정보시스템 성과에 미치는 영향)

  • Park, Hyeon-Ho;Nho, Hee-Ock;Kim, Yong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.65-71
    • /
    • 2015
  • Based on Technology Threat Avoidance Theory, this study explains the process that the users cope with IT Threat and accomplish IS outcome. To empirically test the proposed model, data were collected through a survey of respondents who have the experience of using IS, and analyzed by using structural equations modelling. The result shows IT Threat had negative effects on Problem-Focused Coping and IS Appropriation. Also Problem-Focused Coping had significant effects on IS Appropriation and IS Appropriation had positive relation on IS Performance. In conclusion the study proposed that IT users improve Convergence Information System Performance by Problem-Focused Coping when they perceive IT Threat.

Blast Damage Assessment to a Modern Steel Structures

  • Mestreau Eric;Baum Joseph D.;Charman Chuck;Lee Seung;Sohn Young
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.292-295
    • /
    • 2006
  • The terrorist attack of September $11^{th}$ 2001 has enforced a new examination of the response of modern steel structures, such as those found in large warehouses, auditoriums and airport terminals, to terrorist bomb attack. The effort described in this paper assesses the potential damage to such a newly designed structure form a medium-size car bomb. The structure is mostly composed of a lightweight complex beam structure with large windows and skylights piercing through a corrugated roof. The structural response to the terrorist attack requires the modelling of various physics phenomena including bomb detonation, blast wave propagation, reflections, and refractions and resulting blast impact on the structure. Hence, a fluid/structure coupled methodology is used to perform the assessment.

  • PDF

Japanese Political Interviews: The Integration of Conversation Analysis and Facial Expression Analysis

  • Kinoshita, Ken
    • Asian Journal for Public Opinion Research
    • /
    • v.8 no.3
    • /
    • pp.180-196
    • /
    • 2020
  • This paper considers Japanese political interviews to integrate conversation and facial expression analysis. The behaviors of political leaders will be disclosed by analyzing questions and responses by using the turn-taking system in conversation analysis. Additionally, audiences who cannot understand verbal expressions alone will understand the psychology of political leaders by analyzing their facial expressions. Integral analyses promote understanding of the types of facial and verbal expressions of politicians and their effect on public opinion. Politicians have unique techniques to convince people. If people do not know these techniques and ways of various expressions, they will become confused, and politics may fall into populism as a result. To avoid this, a complete understanding of verbal and non-verbal behaviors is needed. This paper presents two analyses. The first analysis is a qualitative analysis that deals with Prime Minister Shinzō Abe and shows that differences between words and happy facial expressions occur. That result indicates that Abe expresses disgusted facial expressions when faced with the same question from an interviewer. The second is a quantitative multiple regression analysis where the dependent variables are six facial expressions: happy, sad, angry, surprised, scared, and disgusted. The independent variable is when politicians have a threat to face. Political interviews that directly inform audiences are used as a tool by politicians. Those interviews play an important role in modelling public opinion. The audience watches political interviews, and these mold support to the party. Watching political interviews contributes to the decision to support the political party when they vote in a coming election.

Ambient Vibration measurements and finite element modelling for the Hong Kong Ting Kau Bridge

  • Au, F.T.K.;Tham, L.G.;Lee, P.K.K.;Su, C.;Han, D.J.;Yan, Q.S.;Wong, K.Y.
    • Structural Engineering and Mechanics
    • /
    • v.15 no.1
    • /
    • pp.115-134
    • /
    • 2003
  • The Ting Kau Bridge in Hong Kong is a cable-stayed bridge comprising two main spans and two side spans. The bridge deck is supported by three towers, an end pier and an abutment. Each of the three towers consists of a single reinforced concrete mast which reduces its section in steps, and it is strengthened by transverse cables and struts in the transverse vertical plane. The bridge deck is supported by four inclined planes of cables emanating from anchorages at the tower tops. In view of the threat from typhoons, the dynamic behaviour of long-span cable-supported bridges in the region is always an important consideration in their design. This paper is devoted to the ambient vibration measurements of the bridge for evaluation of dynamic characteristics including the natural frequencies and mode shapes. It also describes the modelling of the bridge. A few finite element models are developed and calibrated to match with the field data and the results of subsequent structural health monitoring of the bridge.

Feasibility Analysis on the Attack Graph Applicability in Selected Domains

  • Junho Jang;Saehee Jun;Huiju Lee;Jaegwan Yu;SungJin Park;Su-Youn Hong;Huy Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.57-66
    • /
    • 2023
  • In this paper, a research trend of attack graph studies for Cyber-Physical System (CPS) environments is surveyed, and we analyse the limitations of previous works and prospect the future directions. 35 among around 150 attack graph studies conducted within 5 years target CPS, and we inspect key features of CPS environment in the security aspect. Also, we categorize and analyze target studies in the aspect of modelling physical systems and considering air gaps, which are derived as key features of the security aspects of CPS. Half of 20 research that we surveyed do not reflect those two features, and other studies only consider one of the two features. In this circumstance, we examine challenges that attack graph studies on CPS environment face. Finally, we expect state-led studies or studies targeting open-spec commercial CPS will dominate.

Modelling the dynamic response and failure modes of reinforced concrete structures subjected to blast and impact loading

  • Ngo, Tuan;Mendis, Priyan
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.269-282
    • /
    • 2009
  • Responding to the threat of terrorist attacks around the world, numerous studies have been conducted to search for new methods of vulnerability assessment and protective technologies for critical infrastructure under extreme bomb blasts or high velocity impacts. In this paper, a two-dimensional behavioral rate dependent lattice model (RDLM) capable of analyzing reinforced concrete members subjected to blast and impact loading is presented. The model inherently takes into account several major influencing factors: the progressive cracking of concrete in tension, the inelastic response in compression, the yielding of reinforcing steel, and strain rate sensitivity of both concrete and steel. A computer code using the explicit algorithm was developed based on the proposed lattice model. The explicit code along with the proposed numerical model was validated using experimental test results from the Woomera blast trial.

Contaminant transport through porous media: An overview of experimental and numerical studies

  • Patil, S.B.;Chore, H.S.
    • Advances in environmental research
    • /
    • v.3 no.1
    • /
    • pp.45-69
    • /
    • 2014
  • The groundwater has been a major source of water supply throughout the ages. Around 50% of the rural as well as urban population in the developing countries like India depends on groundwater for drinking. The groundwater is also an important source in the agriculture and industrial sector. In many parts of the world, groundwater resources are under increasing threat from growing demands, wasteful use and contamination. A good planning and management practices are needed to face this challenge. A key to the management of groundwater is the ability to model the movement of fluids and contaminants in the subsurface environment. It is obvious that the contaminant source activities cannot be completely eliminated and perhaps our water bodies will continue to serve as receptors of vast quantities of waste. In such a scenario, the goal of water quality protection efforts must necessarily be the control and management of these sources to ensure that released pollutants will be sufficiently attenuated within the region of interest and the quality of water at points of withdrawal is not impaired. In order to understand the behaviour of contaminant transport through different types of media, several researchers are carrying out experimental investigations through laboratory and field studies. Many of them are working on the analytical and numerical studies to simulate the movement of contaminants in soil and groundwater of the contaminant transport. With the advent of high power computers especially, a numerical modelling has gained popularity and is indeed of particular relevance in this regard. This paper provides the state of the art of contaminant transport and reviews the allied research works carried out through experimental investigation or using the analytical solution and numerical method. The review involves the investigation in respect of both, saturated and unsaturated, porous media.

Spatio-Temporal Projection of Invasion Using Machine Learning Algorithm-MaxEnt

  • Singye Lhamo;Ugyen Thinley;Ugyen Dorji
    • Journal of Forest and Environmental Science
    • /
    • v.39 no.2
    • /
    • pp.105-117
    • /
    • 2023
  • Climate change and invasive alien plant species (IAPs) are having a significant impact on mountain ecosystems. The combination of climate change and socio-economic development is exacerbating the invasion of IAPs, which are a major threat to biodiversity loss and ecosystem functioning. Species distribution modelling has become an important tool in predicting the invasion or suitability probability under climate change based on occurrence data and environmental variables. MaxEnt modelling was applied to predict the current suitable distribution of most noxious weed A. adenophora (Spreng) R. King and H. Robinson and analysed the changes in distribution with the use of current (year 2000) environmental variables and future (year 2050) climatic scenarios consisting of 3 representative concentration pathways (RCP 2.6, RCP 4.5 and RCP 8.5) in Bhutan. Species occurrence data was collected from the region of interest along the road side using GPS handset. The model performance of both current and future climatic scenario was moderate in performance with mean temperature of wettest quarter being the most important variable that contributed in model fit. The study shows that current climatic condition favours the A. adenophora for its invasion and RCP 2.6 climatic scenario would promote aggression of invasion as compared to RCP 4.5 and RCP 8.5 climatic scenarios. This can lead to characterization of the species as preferring moderate change in climatic conditions to be invasive, while extreme conditions can inhibit its invasiveness. This study can serve as reference point for the conservation and management strategies in control of this species and further research.

Modelling protection behaviour towards micronutrient deficiencies: Case of iodine biofortified vegetable legumes as health intervention for school-going children

  • Mogendi, Joseph Birundu;De Steur, Hans;Gellynck, Xavier;Makokha, Anselimo
    • Nutrition Research and Practice
    • /
    • v.10 no.1
    • /
    • pp.56-66
    • /
    • 2016
  • BACKGROUND/OBJECTIVES: Despite successes recorded in combating iodine deficiency, more than 2 billion people are still at risk of iodine deficiency disorders. Rural landlocked and mountainous areas of developing countries are the hardest hit, hence the need to explore and advance novel strategies such as biofortification. SUBJECTS/METHODS: We evaluated adoption, purchase, and consumption of iodine biofortified vegetable legumes (IBVL) using the theory of protection motivations (PMT) integrated with an economic valuation technique. A total of 1,200 participants from three land-locked locations in East Africa were recruited via multi-stage cluster sampling, and data were collected using two, slightly distinct, questionnaires incorporating PMT constructs. The survey also elicited preferences for iodine biofortified foods when offered at a premium or discount. Determinants of protection motivations and preferences for iodine biofortified foods were assessed using path analysis modelling and two-limit Tobit regression, respectively. RESULTS: Knowledge of iodine, iodine-health link, salt iodization, and biofortification was very low, albeit lower at the household level. Iodine and biofortification were not recognized as nutrient and novel approaches, respectively. On the other hand, severity, fear, occupation, knowledge, iodine status, household composition, and self-efficacy predicted the intention to consume biofortified foods at the household level; only vulnerability, self-efficacy, and location were the most crucial elements at the school level. In addition, results demonstrated a positive willingness-to-pay a premium or acceptance of a lesser discount for biofortification. Furthermore, preference towards iodine biofortified foods was a function of protection motivations, severity, vulnerability, fear, response efficacy, response cost, knowledge, iodine status, gender, age. and household head. CONCLUSIONS: Results lend support for prevention of iodine deficiency in unprotected populations through biofortification; however 'threat' appraisal and socio-economic predictors are decisive in designing nutrition interventions and stimulating uptake of biofortification. In principle, the contribution is threefold: 1) Successful application of the integrated model to guide policy formulation; 2) Offer guidance to stakeholders to identify and tap niche markets; 3) stimulation of rural economic growth around school feeding programmes.