• Title/Summary/Keyword: Vulnerability Classification

Search Result 66, Processing Time 0.021 seconds

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Development for rainfall classification based on local flood vulnerability using entropy weight in Seoul metropolitan area (엔트로피 가중치를 활용한 지역별 홍수취약도 기반의 서울지역 강우기준 산정기법)

  • Lee, Seonmi;Choi, Youngje;Lee, Eunkyung;Ji, Jungwon;Yi, Jaeeung
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.4
    • /
    • pp.267-278
    • /
    • 2022
  • Recently Flood damage volume has increased as heavy rain has frequently occurred. Especially urban areas are a vulnerability to flooding damage because of densely concentrated population and property. A local government is preparing to mitigate flood damage through the heavy rain warning issued by Korea Meteorological Administration. This warning classification is identical for a national scale. However, Seoul has 25 administrative districts with different regional characteristics such as climate, topography, disaster prevention state, and flood damage severity. This study considered the regional characteristics of 25 administrative districts to analyze the flood vulnerability using entropy weight and Euclidean distance. The rainfall classification was derived based on probability rainfall and flood damage rainfall that occurred in the past. The result shows the step 2 and step 4 of rainfall classification was not significantly different from the heavy rain classification of the Korea Meteorological Administration. The flood vulnerability is high with high climate exposure and low adaptability to climate change, and the rainfall classification is low in the northern region of Seoul. It is possible to preemptively respond to floods in the northern region of Seoul based on relatively low rainfall classification. In the future, we plan to review the applicability of rainfall forecast data using the rainfall classification of results from this study. These results will contribute to research for preemptive flood response measures.

Vulnerability Analysis using the Web Vulnerability Scanner (Web Vulnerability Scanner를 이용한 취약성 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.71-76
    • /
    • 2012
  • As the use of Mashups, web3.0, JavaScript and AJAX(Asynchronous JavaScript XML) widely increases, the new security threats for web vulnerability also increases when the web application services are provided. In order to previously diagnose the vulnerability and prepare the threats, in this paper, the classification of security threats and requirements are presented, and the web vulnerability is analyzed for the domestic web sites using WVS(Web Vulnerability Scanner) automatic evaluation tool. From the results of vulnerability such as XSS(Cross Site Scripting) and SQL Injection, the total alerts are distributed from 0 to 31,177, mean of 411, and standard deviation of 2,563. The results also show that the web sites of 22.5% for total web sites has web vulnerability, and the previous defenses for the security threats are required.

Evaluation of damage probability matrices from observational seismic damage data

  • Eleftheriadou, Anastasia K.;Karabinis, Athanasios I.
    • Earthquakes and Structures
    • /
    • v.4 no.3
    • /
    • pp.299-324
    • /
    • 2013
  • The current research focuses on the seismic vulnerability assessment of typical Southern Europe buildings, based on processing of a large set of observational damage data. The presented study constitutes a sequel of a previous research. The damage statistics have been enriched and a wider damage database (178578 buildings) is created compared to the one of the first presented paper (73468 buildings) with Damage Probability Matrices (DPMs) after the elaboration of the results from post-earthquake surveys carried out in the area struck by the 7-9-1999 near field Athens earthquake. The dataset comprises buildings which developed damage in several degree, type and extent. Two different parameters are estimated for the description of the seismic demand. After the classification of damaged buildings into structural types they are further categorized according to the level of damage and macroseismic intensity. The relative and the cumulative frequencies of the different damage states, for each structural type and each intensity level, are computed and presented, in terms of damage ratio. Damage Probability Matrices (DPMs) are obtained for typical structural types and they are compared to existing matrices derived from regions with similar building stock and soil conditions. A procedure is presented for the classification of those buildings which initially could not be discriminated into structural types due to restricted information and hence they had been disregarded. New proportional DPMs are developed and a correlation analysis is fulfilled with the existing vulnerability relations.

A Study on Potential Flood Damage Classification and characteristic analysis (시군별 홍수위험잠재능 유형화 및 특성분석)

  • Kim, Soo-Jin;Eun, Sang-Kyu;Kim, Seong-Pil;Bae, Seung-Jong
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.3
    • /
    • pp.21-36
    • /
    • 2017
  • Climate change is intensifying storms and floods around the world. Where nature has been destroyed by development, communities are at risk from these intensified climate patterns. This study was to suggest a methodology for estimating flood vulnerability using Potential Flood Damage(PFD) concept and classify city/county about Potential Flood Damage(PFD) using various typology techniques. To evaluate the PFD at a spatial resolutions of city/county units, the 20 representative evaluation indexing factors were carefully selected for the three categories such as damage target(FDT), damage potential(FDP) and prevention ability(FPA). The three flood vulnerability indices of FDT, FDP and FPA were applied for the 167 cities and counties in Korea for the pattern classification of potential flood damage. Potential Flood Damage(PFD) was classified by using grouping analysis, decision tree analysis, and cluster analysis, and characteristics of each type were analyzed. It is expected that the suggested PFD can be utilized as the useful flood vulnerability index for more rational and practical risk management plans against flood damage.

A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step (분석단계에서 취약점 관리의 보안 요건 정의에 관한 연구)

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.75-80
    • /
    • 2015
  • Vulnerability management is in compliance with security policies, and then, this is to ensure the continuity and availability of the business. In this paper, the application vulnerability management and IT infrastructure of the system is that it must be identified. And a viable vulnerability management plan should be drawn from the development phase. There are many that are not defined vulnerability in the area of identification and authentication, encryption, access control in identification and classification of vulnerabilities. They define the area without missing much in technical, managerial, and operational point of view. Determining whether the response of the identified vulnerability, and to select a countermeasure for eliminating the vulnerability.

Analysis of Disaster Vulnerable Districts using Heavy Rainfall Vulnerability Index (폭우 취약성 지표를 활용한 재해취약지구 분석)

  • PARK, Jong-Young;LEE, Jung-Sik;LEE, Jin-Deok;LEE, Won-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.1
    • /
    • pp.12-22
    • /
    • 2018
  • In order to improve the vulnerability of current cities due to climate change, the disaster vulnerability analysis manual for various disasters is provided. Depending on the spatial units, the disaster vulnerability levels, and the conditions of the climatic factors, the results of the disaster vulnerability analysis will have a significant impact. In this study, relative assessments are conducted by adding the eup, myeon and dong unit in addition to census output area unit to analyze the impact on the spatial unit, and relative changes are analyzed according to the classification stages by expanding the natural classification, which is standardized at level four stage, to level two, four and six stage. The maximum rainfalls(10min, 60min, 24hr) are added for the two limited rainfall characteristics to determine the relativity of disaster vulnerable districts by index. The relative assessment results of heavy rainfall vulnerability index showed that the area ratio of disaster areas by spatial unit was different and the correlation analysis showed that the space analysis between the eup, myeon and dong unit in addition to census output area unit was not consistent. And it can be seen that the proportion of disaster vulnerable districts is relatively different a lot due to indexes of rainfall characteristics, spatial unit analysis and disaster vulnerability level stage. Based on the above results, it can be seen that the ratios of disaster vulnerable districts differ relatively significantly due to the level of the disaster vulnerability class, and the indexes of rainfall characteristics. This suggests that the impact of the disaster vulnerable districts depending on indexes is relatively large, and more detailed indexes should be selected when setting up the disaster vulnerabilities analysis index.

A Study on the Human Vulnerability Classification System for People-Centric Security (인간중심보안을 위한 인적취약점 분류체계에 관한 연구)

  • Jungjun Park;Seongjin Ahn
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.561-575
    • /
    • 2023
  • The information security industry has seen a wide variety of growth over the past few decades. In particular, various solutions have been proposed in terms of technology, management, and institutional aspects. Nevertheless, it should be notedthat security accidents continue to occur every year. This proves that there are limitations to various business changes in the digital era as existing security is being promoted with technology-oriented and prevention-oriented policies. Thus, people-centric security (PCS) has recently become a hot topic in order to escape the limitations of traditional securityapproaches. Through the concept of information security violations, PCS strategic principles, and expert interviews, this studyaims to present a fundamental security incident response plan by classifying human-caused vulnerabilities into 5 categories and classifying them into 21 detailed components.

IT Systems Risk Analysis Using Object Oriented Asset Classification Model (객체지향 자산분류모델을 이용한 위험분석에 관한연구)

  • Lee, Hyeak-Ro;Ahn, Seong-Jin
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.79-84
    • /
    • 2008
  • In these days, many organizations try to manage their assets in safe way due to fast change in information-communication environment. In Korea, risk analysis and vulnerability analysis for security improvement of critical asset is booming by enforcement of Act on security of information and communication infrastructure. It is obligate that each critical information infrastructure needs to get vulnerability analysis. In this paper, we proposed Object Oriented Asset Classification model for asset analysis and risk analysis.

  • PDF

Evaluation of Meymeh Aquifer vulnerability to nitrate pollution by GIS and statistical methods

  • Tabatabaei, Javad;Gorji, Leila
    • Membrane and Water Treatment
    • /
    • v.10 no.4
    • /
    • pp.313-320
    • /
    • 2019
  • Increasing the concentration of nitrate ions in the soil solution and then leaching it to underground aquifers increases the concentration of nitrate in the water, and can cause many health and ecological problems. This study was conducted to evaluate the vulnerability of Meymeh aquifer to nitrate pollution. In this research, sampling of 10 wells was performed according to standard sampling principles and analyzed in the laboratory by spectrophotometric method, then; the nitrate concentration zonation map was drawn by using intermediate models. In the drastic model, the effective parameters for assessing the vulnerability of groundwater aquifers, including the depth of ground water, pure feeding, aquifer environment, soil type, topography slope, non-saturated area and hydraulic conductivity. Which were prepared in the form of seven layers in the ARC GIS software, and by weighting and ranking and integrating these seven layers, the final map of groundwater vulnerability to contamination was prepared. Drastic index estimated for the region between 75-128. For verification of the model, nitrate concentration data in groundwater of the region were used, which showed a relative correlation between the concentration of nitrate and the prepared version of the model. A combination of two vulnerability map and nitrate concentration zonation was provided a qualitative aquifer classification map. According to this map, most of the study areas are within safe and low risk, and only a small portion of the Meymeh Aquifer, which has a nitrate concentration of more than 50 mg / L in groundwater, is classified in a hazardous area.