• Title/Summary/Keyword: Threat mitigation

Search Result 46, Processing Time 0.027 seconds

A Validated Solution for the Threat of Ionosphere Spatial Anomalies to Ground Based Augmentation System Users

  • Pullen, Sam;Lee, Ji-Yun;Datta-Barua, Seebany;Park, Young-Shin;Zhang, Godwin;Enge, Per
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.9-14
    • /
    • 2006
  • This paper develops a complete methodology for the mitigation of ionosphere spatial anomalies by GBAS systems fielded in the Conterminous U.S. (CONUS). It defines an ionosphere anomaly threat model based on validated observations of unusual ionosphere events in CONUS impacting GBAS sites in the form of a linear ‘wave front’ of constant slope and velocity. It then develops a simulation-based methodology for selecting the worst-case ionosphere wave front impact impacting two satellites simultaneously for a given GBAS site and satellite geometry, taking into account the mitigating effects of code-carrier divergence monitoring within the GBAS ground station. The resulting maximum ionosphere error in vertical position (MIEV) is calculated and compared to a unique vertical alert limit, or $VAL_{H2,I}$, that applies to the special situation of worst-case ionosphere gradients. If MIEV exceeds $VAL_{H2,I}$ for one or more otherwise-usable subset geometries (i.e., geometries for which the 'normal' vertical protection level, or $VPL_{H0}$, is less than the 'normal' VAL), the broadcast ${\sigma}_{pr_{-}gnd}$ and/or ${\sigma}_{vig}$ must be increased such that all such potentially-threatening geometries have VPL$_{H0}$ > VAL and thus become unavailable. In addition to surveying all aspects of the methods used to generate the required ${\sigma}_{pr_{-}gnd}$ and ${\sigma}_{vig}$ inflation factors for CONUS GBAS sites, related methods for deriving similar results for GBAS sites outside CONUS are suggested.

  • PDF

Availability Analysis of SRAM-Based FPGAs under the protection of SEM Controller (SEM Controller에 의해 보호되는 SRAM 기반 FPGA의 가용성 분석)

  • Ryu, Sang-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.601-606
    • /
    • 2017
  • SRAM-based FPGAs mainly used to develop and implement high-performance circuits have SRAM-type configuration memory. Soft errors in memory devices are the main threat from a reliability point of view. Soft errors occurring in the configuration memory of FPGAs cause FPGAs to malfunction. SEM(Soft Error Mitigation) Controllers offered by Xilinx can mitigate the influence of soft errors in configuration memory. SEM Controllers use ECC(Error Correction Code) and CRC(Cyclic Redundancy Code) which are placed around the configuration memory to detect and correct the errors. The correction is done through a partial reconfiguration process. This paper presents the availability analysis of SRAM-based FPGAs against soft errors under the protection of SEM Controllers. Availability functions were derived and compared according to the correction capability of SEM Controllers of several different families of FPGAs. The result may help select an SRAM-based FPGA part and estimate the availability of FPGAs running in an environment where soft errors occur.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Climate Change and Psychological Adaptation: Psychological Response, Adaptation, and Prevention (기후변화와 심리적 적응: 심리적 반응, 적응, 예방)

  • Moon, Sung-Won
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.32 no.3
    • /
    • pp.237-247
    • /
    • 2016
  • Global climate change is becoming one of the greatest challenges facing humanity. This article proposes a psychological perspective of climate change adaptation. Climate change-related severe adverse weather events may trigger mental health problems, including increased post-traumatic stress disorder (PTSD), depression, anxiety, violence, and even suicide. Forced migration could be considered a coping method for dealing with weather events, but it may also pose a psychological threat. People respond to severe weather events in different ways based on their individual characteristics. Psychological risks from adverse weather events are mediated and moderated by these factors, which are influenced by personal cognition, affect, and motivation. Examinations from a psychological perspective, which have been neglected in the science of climate change thus far, may provide keys to successful adaptation and the prevention of serious psychological problems resulting from the experience of severe weather events. A new prevention strategy has been suggested for coping with climate threats through encouraging attitude change, establishing proactive support systems for vulnerable groups, establishing a PTSD network, and implementing a stress inoculation program.

Mitigating Antibiotic Resistance at the Livestock-Environment Interface: A Review

  • Ma, Zhengxin;Lee, Shinyoung;Jeong, K. Casey
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.11
    • /
    • pp.1683-1692
    • /
    • 2019
  • The rise of antimicrobial resistance (AR) is a major threat to global health. The food animal industry contributes to the increasing occurrence of AR. Multiple factors can affect the occurrence and dissemination of AR in the animal industry, including antibiotic use and farm management. Many studies have focused on how the use of antibiotics in food-producing animals has led to the development of AR. However, a few effective mitigating strategies for AR have been developed in food-producing animals, especially those exposed to the environment. The aim of this review is to summarize potential strategies applicable for mitigating AR at the environment-livestock interface.

OVERVIEW OF CONTAINMENT FILTERED VENT UNDER SEVERE ACCIDENT CONDITIONS AT WOLSONG NPP UNIT 1

  • Song, Y.M.;Jeong, H.S.;Park, S.Y.;Kim, D.H.;Song, J.H.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.597-604
    • /
    • 2013
  • Containment Filtered Vent Systems (CFVSs) have been mainly equipped in nuclear power plants in Europe and Canada for the controlled depressurization of the containment atmosphere under severe accident conditions. This is to keep the containment integrity against overpressure during the course of a severe accident, in which the radioactive gas-steam mixture from the containment is discharged into a system designed to remove the radionuclides. In Korea, a CFVS was first introduced in the Wolsong unit-1 nuclear power plant as a mitigation measure to deal with the threat of over pressurization, following post-Fukushima action items. In this paper, the overall features of a CFVS installation such as risk assessments, an evaluation of the performance requirements, and a determination of the optimal operating strategies are analyzed for the Wolsong unit 1 nuclear power plant using a severe accident analysis computer code, ISAAC.

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

Assessment of riparian buffers for reducing pollution according to land-cover pattern using RS and GIS

  • Ha, Sung-Ryong;Lee, Seung-Chul;Ko, Chang-Hwan;Jo, Yun-Won
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.5
    • /
    • pp.445-449
    • /
    • 2006
  • Diffuse pollution has been considering as a major source of the quality deterioration of water resources. The establishment of riparian vegetation strips or buffers along those areas of water bodies is used to reduce the threat of diffuse pollution. Remote sensing offers a means by which critical areas could be identified, so that subsequent action toward the establishment of riparian zones can be taken. On the behalf of KOMPSAT-2 satellite imagery as a high resolution spatial data, Landsat TM satellite data are used to aquire the land cover for the riparian buffers studied. This investigation aims to assess the riparian buffers established on the upper Geum river as a pollution mitigation. Through comparing the delineation of riparian buffer zones developed with the existing zones established by the government, we can find the critical distortion points of the existing riparian buffer zone.

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

  • Abdullahi Aminu, Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.4
    • /
    • pp.14-39
    • /
    • 2023
  • Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often elusive endeavor. However, tracing the source of sensitive data in online cyberspace is critically challenging, and detecting cyber-criminals on the other hand remains a time-consuming process, especially in social networks. Cyber-criminals target individuals for financial gain or to cause harm to their assets, resulting in the loss or theft of millions of user data over the past few decades. Forensic professionals play a vital role in conducting successful investigations and acquiring legally acceptable evidence admissible in court proceedings using modern techniques. This study aims to provide an overview of forensic investigation methods for extracting digital evidence from computer systems and mobile devices to combat persistent cybercrime. It also discusses current cybercrime issues and mitigation procedures.