• Title/Summary/Keyword: Vulnerability Life Cycle

Search Result 30, Processing Time 0.019 seconds

A study on the cyber security assessment modeling of critical infrastructure (핵심기반시설 사이버 보안 평가 모델링 기법 연구)

  • Euom, Ieck-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.105-113
    • /
    • 2019
  • The purpose of this study is to analyze cyber security risk modeling of critical infrastructure, draw out limitations and improvement measures. This paper analyzed cyber security risk modeling of national critical infrastructure like as electricity sector, nuclear power plant, SCADA. This paper analyzed the 26 precedent research cases of risk modeling in electricity sector, nuclear power plant, SCADA. The latest Critical Infrastructure is digitalized and has a windows operating system. Critical Infrastructure should be operated at all times, it is not possible to patch a vulnerability even though find vulnerability. This paper suggest the advanced cyber security modeling characteristic during the life cycle of the critical infrastructure and can be prevented.

A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System (상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구)

  • Euom, Ieck-Chae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.35-44
    • /
    • 2019
  • The purpose of this study is to find out quantitative vulnerability assessment about COTS(Commercial Off The Shelf) O/S based I&C System. This paper analyzed vulnerability's lifecycle and it's impact. this paper is to develop a quantitative assessment of overall cyber security risks and vulnerabilities I&C System by studying the vulnerability analysis and prediction method. The probabilistic vulnerability assessment method proposed in this study suggests a modeling method that enables setting priority of patches, threshold setting of vulnerable size, and attack path in a commercial OS-based measurement control system that is difficult to patch an immediate vulnerability.

Time-dependent seismic risk analysis of high-speed railway bridges considering material durability effects

  • Yan Liang;Ying-Ying Wei;Ming-Na Tong;Yu-Kun Cui
    • Earthquakes and Structures
    • /
    • v.24 no.4
    • /
    • pp.275-288
    • /
    • 2023
  • Based on the crucial role of high-speed railway bridges (HSRBs) in the safety of high-speed railway operations, it is an important approach to mitigate earthquake hazards by proceeding with seismic risk assessments in their whole life. Bridge seismic risk assessment, which usually evaluates the seismic performance of bridges from a probabilistic perspective, provides technical support for bridge risk management. The seismic performance of bridges is greatly affected by the degradation of material properties, therefore, material damage plays a nonnegligible role in the seismic risk assessment of the bridge. The effect of material damage is not considered in most current studies on seismic risk analysis of bridges, nevertheless. To fill the gap in this area, in this paper, a nonlinear dynamic time-history analysis has been carried out by establishing OpenSees finite element model, and a seismic vulnerability analysis is carried out based on the incremental dynamic analysis (IDA) method. On this basis, combined with the site risk analysis, the time-dependent seismic risk analysis of an offshore three-span HSRB in the whole life cycle has been conducted. The results showed that the seismic risk probabilities of both components and system of the bridge increase with the service time, and their seismic risk probabilities increase significantly in the last service period due to the degradation of the material strength, which demonstrates that the impact of durability damage should be considered when evaluating the seismic performance of bridges in the design and service period.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

Analyse of Trade-off for Implementing RFID Tag to Enhance Security (보안성 향상을 위한 RFID 태그 구현시의 Trade off 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.754-756
    • /
    • 2011
  • Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis is process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and then mitigate the risks.

  • PDF

A Study on Enhancing Cybersecurity of Weapon Systems for Life-Cycle (무기체계 수명주기 간 사이버보안 적용 개선방안)

  • Jung, Yong-Tae;Jung, Hyun-Sik;Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.67-75
    • /
    • 2019
  • Recently, the Ministry of National Defense has included embedded software for weapon systems as targets for the Defense cyber security. The Concept has been extended and evolved from the cyber security area that was previously limited to the information domain. The software is becoming increasingly important in weapon systems, and it is clear that they are subject to cyber threats. Therefore, We would like to suggest a improvement direction by diagnosing problems in terms of cyber security of the weapon systems for the life cycle. In order to improve cyber security of weapon systems, comprehensive policy including the weapon embedded software management should be established and the involved stakeholder should be participated in the activities.

Quantitative Scoring Criteria on the Importance of Software Weaknesses (소프트웨어 보안약점의 중요도에 대한 정량 평가 기준 연구)

  • Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1407-1417
    • /
    • 2012
  • In order to protect a software system from security attacks, it is important to remove the software security weaknesses through the entire life cycle of software development. To remove the software weaknesses more effectively, software weaknesses are prioritized and sorted continuously. In this paper, we introduce the existing scoring systems for software weakness and software vulnerability, and propose a new quantitative standard for the scoring system, which helps evaluate the importance of software weakness objectively. We also demonstrate the practicability of the proposed standard by scoring 2011 CWE/SANS Top 25 list with the proposed standard and comparing it to the original score of MITRE.

Application of probabilistic VE/LCC Analysis Models for Quay Wall Structures (안벽구조물의 확률론적 VE/LCC 분석모델 적용방안)

  • Ahn, Jong-Pil;Lee, Cheung-Bin;Park, Ju-Won;Yu, Deog-Chan
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.5
    • /
    • pp.71-79
    • /
    • 2007
  • It is common that the analysis of VE/LCC is performed in design phase of quay wall structures. The analysis is mainly executed based on experience and engineering sense of expert considering the selection of construction method, construction and maintenance cost. Recently there are increasing demands on the analysis that includes uncertainty and vulnerability of input parameters, for this purpose, fuzzy reliability based probabilistic VE/LCC analysis model for quay wall structures is suggested. In VE/LCC analysis for quay wall structures, the application of probabilistic analysis method give very similar results compare with those of deterministic analysis method. It is anticipated that the methodology proposed in this paper can also be utilized in the design and maintenance phase of other facilities where decision making is made for the probabilistic life cycle cost and value analysis.

Lifetime seismic performance assessment of high-rise steel-concrete composite frame with buckling-restrained braces under wind-induced fatigue

  • Liu, Yang;Li, Hong-Nan;Li, Chao;Dong, Tian-Ze
    • Structural Engineering and Mechanics
    • /
    • v.77 no.2
    • /
    • pp.197-215
    • /
    • 2021
  • Under a severe environment of multiple hazards such as earthquakes and winds, the life-cycle performance of engineering structures may inevitably be deteriorated due to the fatigue effect caused by long-term exposure to wind loads, which would further increase the structural vulnerability to earthquakes. This paper presents a framework for evaluating the lifetime structural seismic performance under the effect of wind-induced fatigue considering different sources of uncertainties. The seismic behavior of a high-rise steel-concrete composite frame with buckling-restrained braces (FBRB) during its service life is systematically investigated using the proposed approach. Recorded field data for the wind hazard of Fuzhou, Fujian Province of China from Jan. 1, 1980 to Mar. 31, 2019 is collected, based on which the distribution of wind velocity is constructed by the Gumbel model after comparisons. The OpenSees platform is employed to establish the numerical model of the FBRB and conduct subsequent numerical computations. Allowed for the uncertainties caused by the wind generation and structural modeling, the final annual fatigue damage takes the average of 50 groups of simulations. The lifetime structural performance assessments, including static pushover analyses, nonlinear dynamic time history analyses and fragility analyses, are conducted on the time-dependent finite element (FE) models which are modified in lines with the material deterioration models. The results indicate that the structural performance tends to degrade over time under the effect of fatigue, while the influencing degree of fatigue varies with the duration time of fatigue process and seismic intensity. The impact of wind-induced fatigue on structural responses and fragilities are explicitly quantified and discussed in details.

Framework of Weapon Effects Calculator for Hardened Targets (견고표적 무기효과 산출 알고리즘에 관한 연구)

  • Park, Jong Yil
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.340-347
    • /
    • 2013
  • Weapon effect is a key issue throughout the life cycle of weapon systems. Only when weapon effect is considered properly, Effects Based Operation(EBO), Effects Based Acquisition(EBA), and Effects Based Development(EBD) could be possible. Because the transfer of weapon effect technologies is restricted in most foreign counties, independent development is necessary. In this paper, framework of weapon effects calculator for hardened targets is proposed to meet the own development needs. It is designed focusing on running time, validation and expandibility by adoption of modular architecture. Required technologies for each module are identified, and unclassified ones are summarized.