• Title/Summary/Keyword: Vulnerability Risk

Search Result 468, Processing Time 0.024 seconds

Evaluation of Meymeh Aquifer vulnerability to nitrate pollution by GIS and statistical methods

  • Tabatabaei, Javad;Gorji, Leila
    • Membrane and Water Treatment
    • /
    • v.10 no.4
    • /
    • pp.313-320
    • /
    • 2019
  • Increasing the concentration of nitrate ions in the soil solution and then leaching it to underground aquifers increases the concentration of nitrate in the water, and can cause many health and ecological problems. This study was conducted to evaluate the vulnerability of Meymeh aquifer to nitrate pollution. In this research, sampling of 10 wells was performed according to standard sampling principles and analyzed in the laboratory by spectrophotometric method, then; the nitrate concentration zonation map was drawn by using intermediate models. In the drastic model, the effective parameters for assessing the vulnerability of groundwater aquifers, including the depth of ground water, pure feeding, aquifer environment, soil type, topography slope, non-saturated area and hydraulic conductivity. Which were prepared in the form of seven layers in the ARC GIS software, and by weighting and ranking and integrating these seven layers, the final map of groundwater vulnerability to contamination was prepared. Drastic index estimated for the region between 75-128. For verification of the model, nitrate concentration data in groundwater of the region were used, which showed a relative correlation between the concentration of nitrate and the prepared version of the model. A combination of two vulnerability map and nitrate concentration zonation was provided a qualitative aquifer classification map. According to this map, most of the study areas are within safe and low risk, and only a small portion of the Meymeh Aquifer, which has a nitrate concentration of more than 50 mg / L in groundwater, is classified in a hazardous area.

A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System (상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구)

  • Euom, Ieck-Chae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.35-44
    • /
    • 2019
  • The purpose of this study is to find out quantitative vulnerability assessment about COTS(Commercial Off The Shelf) O/S based I&C System. This paper analyzed vulnerability's lifecycle and it's impact. this paper is to develop a quantitative assessment of overall cyber security risks and vulnerabilities I&C System by studying the vulnerability analysis and prediction method. The probabilistic vulnerability assessment method proposed in this study suggests a modeling method that enables setting priority of patches, threshold setting of vulnerable size, and attack path in a commercial OS-based measurement control system that is difficult to patch an immediate vulnerability.

A Study on Changes in Consumption Behavior due to the Risk of the COVID-19 Pandemic (COVID-19 팬데믹 위험으로 인한 소비행동의 변화 연구)

  • Oh, Jong-chul;Lee, Yu-sun;Kim, Jae-hong
    • Journal of Venture Innovation
    • /
    • v.5 no.2
    • /
    • pp.49-66
    • /
    • 2022
  • This study intends to examine how the perception of covid-19 risk affects consumers' consumption behavior based on previous studies in a situation where the spread of covid-19 is prolonged. This study demonstrates how consumers' perception of covid-19 risk affects online and offline consumption behavior through the perceived severity, perceived vulnerability, coping effectiveness, and self-efficacy of the revised protective motivation theory (Rogers, 1983). We want to test it through analysis. In order to achieve the purpose of this study, consumers living in Seoul and Gyeonggi Province who have purchased within the past 3 months were selected as a sample. In addition, variable data such as risk perception of covid-19, perceived severity, perceived vulnerability, coping effectiveness, self-efficacy, online purchase attitude and purchase intention, offline purchase attitude and purchase intention were collected through the questionnaire.A total of 363 copies of valid responses were tested to test the hypothesis of the relationship between variables through the covariance structure model. The analysis results of this study were first, that covid-19 risk perception had a significant positive (+) effect on perceived severity, perceived vulnerability, and coping effectiveness. Second, perceived severity and perceived vulnerability were found to have a significant positive (+) effect on offline purchasing attitude. Third, perceived severity, perceived vulnerability, coping plan effectiveness, and self-efficacy were all found to have significant positive (+) effects on online purchase attitude. Finally, it was found that offline purchase attitude and online purchase attitude had a significant positive (+) effect on offline purchase intention and online purchase intention, respectively. Also, it was found that online purchase attitude had a negative (-) effect on offline purchase intention. The results of this analysis will provide meaningful implications for the establishment of strategies for distribution channels according to the social risk of infectious diseases.

Analyzing the Disaster Vulnerability of Mt. Baekdusan Area Using Terrain Factors (지형 요소를 고려한 백두산 지역의 위험도 분석)

  • Choi, Eun-Kyeong;Kim, Sung-Wook;Lee, Young-Cheol;Lee, Kyu-Hwan;Kim, In-Soo
    • Journal of the Korean earth science society
    • /
    • v.34 no.7
    • /
    • pp.605-614
    • /
    • 2013
  • Most steep slope failures tend to take place in geographically unstable areas. Mt. Baekdusan is known as a potentially active volcano in a typical mountainous terrain. This study prepared a digital elevation model of Mt. Baekdusan area and created a hazard map based on topographical factors and structural lineament analysis. Factors used in vulnerability analysis included geographical data involving aspect and slope distribution, as well as contributory area of upslope, tangential gradient curvature, profile gradient curvature, and the distribution of wetness index among the elements that comprise topography. In addition, the stability analysis was conducted based on the lineament intensity map. Concerning the disaster vulnerability of Mt. Baekdusan region, the south and south west area of Mt. Baekdusan has a highest risk of disaster (grade 4-5) while the risk level decreases in the north eastern region.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

The Unequal Burden of Self-Reported Musculoskeletal Pains Among South Korean and European Employees Based on Age, Gender, and Employment Status

  • Bahk, Jinwook;Khang, Young-Ho;Lim, Sinye
    • Safety and Health at Work
    • /
    • v.12 no.1
    • /
    • pp.57-65
    • /
    • 2021
  • Background: The objective of this study was to elucidate the relationships musculoskeletal pains with combined vulnerability in terms of age, gender, and employment status Methods: The fifth European Working Conditions Survey (EWCS) in 2010 (43,816 participants aged 15 years and over) analyzed for European employees and the third Korean Working Conditions Survey (KWCS) in 2011 (50,032 participants aged 15 years and older) analyzed for Korean employees. In this study, three well known vulnerable factors to musculoskeletal pains (older age, female gender, and precarious employment status) were combined and defined as combined vulnerability. Associations of musculoskeletal pains with combined vulnerability were assessed with prevalence ratios (PRs) and 95% confidence intervals (CIs) estimated by Poisson regression models with robust estimates of variance. Results: The prevalences of musculoskeletal pains were lower but the absolute and relative differences between combined vulnerabilities were higher among Korean employees compared with the European employees. Furthermore, the increased risk of having musculoskeletal pains according to combined vulnerability was modestly explained by socioeconomic factors and exposure to ergonomic risk factors, especially in Republic of Korea. Conclusions: The results of this study showed that the labor market may be more unfavorable for female and elderly workers in Republic of Korea. Any prevention strategies to ward off musculoskeletal pains, therefore, should be found and implemented to mitigate or buffer against the most vulnerable work population, older, female, and precarious employment status, in Republic of Korea.

Seismic vulnerability of old confined masonry buildings in Osijek, Croatia

  • Hadzima-Nyarko, Marijana;Pavica, Gordana;Lesic, Marija
    • Earthquakes and Structures
    • /
    • v.11 no.4
    • /
    • pp.629-648
    • /
    • 2016
  • This paper deals with 111 buildings built between 1962 and 1987, from various parts of the city of Osijek, for which, through the collection of documentation, a database is created. The aim of this paper is to provide the first steps in assessing seismic risk in Osijek applying method based on vulnerability index. This index uses collected information of parameters of the building: the structural system, the construction year, plan, the height, i.e., the number of stories, the type of foundation, the structural and non-structural elements, the type and the quality of main construction material, the position in the block and built-up area. According to this method defining five damage states, the action is expressed in terms of the macroseismic intensity and the seismic quality of the buildings by means of a vulnerability index. The value of the vulnerability index can be changed depending on the structural systems, quality of construction, etc., by introducing behavior and regional modifiers based on expert judgments. Since there is no available data of damaged buildings under earthquake loading in our country, we will propose behavior modifiers based on values suggested by earlier works and on judgment based on available project documentation of the considered buildings. Depending on the proposed modifiers, the seismic vulnerability of existing buildings in the city of Osijek will be assessed. The resulting vulnerability of the considered residential buildings provides necessary insight for emergency planning and for identification of critical objects vulnerable to seismic loading.

Vulnerability Analysis and Threat Mitigation for Secure Web Application Development (안전한 웹 애플리케이션 개발을 위한 취약점 분석 및 위협 완화)

  • Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.127-137
    • /
    • 2012
  • Recently, as modern Internet uses mashups, Web 3.0, JavaScript/AJAX widely, the rate at which new vulnerabilities are being discovered is increasing rapidly. It can subsequently introduce big security threats. In order to efficiently mitigate these web application vulnerabilities and security threats, it is needed to rank vulnerabilities based on severity and consider the severe vulnerabilities during a specific phase of software development lifecycle (SDLC) for web applications. In this paper, we have first verified whether the risk rating methodology of OWASP Top 10 vulnerabilities is a reasonable one or not by analyzing the vulnerability data of web applications in the US National Vulnerability Database (NVD). Then, by inspecting the vulnerability information of web applications based on OWASP Top-10 2010 list and CWE (Common Weakness Enumeration) directory, we have mapped the web-related entries of CWE onto the entries of OWASP Top-10 2010 and prioritized them. We have also presented which phase of SDLC is associated with each vulnerability entry. Using this approach, we can prevent or mitigate web application vulnerabilities and security threats efficiently.

Case Study on the Analysis of Disaster Vulnerabilities (Focused on the Fire & Explosion in the N-Industrial Complex) (재난 취약성 분석에 관한 사례연구(N공단의 화재·폭발을 중심으로))

  • Ha, Kag Cheon
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.94-100
    • /
    • 2021
  • In general, the industrial complex is a place where factories of various industries are concentrated. It is only as efficient as it is designed. However, the risks vary as there are various industries. These features are also associated with various types of disasters. The dangers of natural disasters such as a typhoon, flood, and earthquake, as well as fire and explosions, are also latent. Many of these risks can make stable production and business activities difficult, resulting in massive direct and indirect damage. In particular, decades after its establishment, the vulnerabilities increase even more as aging and small businesses are considered. In this sense, it is significant to assess the vulnerability of the industrial complex. Thus analysing fire and explosion hazards as stage 1 of the vulnerability evaluation for the major potential disasters for the industrial complex. First, fire vulnerabilities were analyzed quantitatively. It is displayed in blocks for each company. The assessment block status and the fire vulnerability rating status were conducted by applying the five-step criteria. Level A is the highest potential risk step and E is the lowest step. Level A was 11.8% in 20 blocks, level B was 22.5% in 38 blocks, level C was 25.4% in 43 blocks, level D was 26.0% in 44 blocks, and level E was 14.2% in 24 blocks. Levels A and B with high fire vulnerabilities were analyzed at 34.3%. Secondly, the vulnerability for an explosion was quantitatively analyzed. Explosive vulnerabilities were analyzed at 4.7% for level A with 8 blocks, 3.0% for level B with 5, 1.8% for level C with 3, 4.7% for level D with 8, and 85.8% for level E with 145. Levels A and B, which are highly vulnerable to explosions, were 7.7 %. Thirdly, the overall vulnerability can be assessed by adding disaster vulnerabilities to make future assessments. Moreover, it can also assist in efficient safety and disaster management by visually mapping quantified data. This will also be used for the integrated control center of the N-Industrial Complex, which is currently being installed.

Analysis of Building Vulnerabilities to Typhoon Disaster Based on Damage Loss Data (태풍 재해에 대한 건물 취약성의 피해손실 데이터 기반 분석)

  • Ahn, Sung-Jin;Kim, Tae-Hui;Son, Ki-Young;Kim, Ji-Myong
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.6
    • /
    • pp.529-538
    • /
    • 2019
  • Typhoons can cause significant financial damage worldwide. For this reason, states, local governments and insurance companies attempt to quantify and mitigate the financial risks related to these natural disasters by developing a typhoon risk assessment model. As such, the importance of typhoon risk assessment models is increasing, and it is also important to reflect local vulnerabilities to enable sophisticated assessments. Although a practical study of economic losses associated with natural disasters has identified essential risk indicators, comprehensive studies covering the correlation between vulnerability and economic loss are still needed. The purpose of this study is to identify typhoon damage indicators and to develop evaluation indicators for typhoon damage prediction functions, utilizing the loses from Typhoon Maemi as data. This study analyzes actual loss records of Typhoon Maemi provided by local insurance companies to prepare for a scenario of maximum losses. To create a vulnerability function, the authors used the wind speed and distance from the coast and the total value of property, construction type, floors, and underground floor indicators. The results and metrics of this study provide practical guidelines for government agencies and insurance companies in developing vulnerability functions that reflect the actual financial losses and regional vulnerabilities of buildings.