• Title/Summary/Keyword: Vulnerability Risk

Search Result 468, Processing Time 0.032 seconds

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

A Study on Paradigm Shift of Supply Chain Risk Management for SMEs (중소기업에서의 공급사슬 위험관리를 위한 패러다임 전환에 관한 연구)

  • Yoon, Seung-Ok;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.71-77
    • /
    • 2012
  • It is very important the collaboration and risk management of supply chain between the parent company and its partners in the supply chain risk management(SCRM). It was known that the SCRM approach is very different between a large enterprise and a small and medium-sized enterprise. This paper deals with the suggestion about SCRM structure for a small and medium-sized enterprise. This SCRM structure consist of risk identification, risk assessment, and risk mitigation. We expect that this SCRM structure promote the collaboration between a parent company and its partners to alleviate the supply chain risk.

Impact spectrum of flood hazard on seismic vulnerability of bridges

  • Yilmaz, Taner;Banerjee, Swagata
    • Structural Engineering and Mechanics
    • /
    • v.66 no.4
    • /
    • pp.515-529
    • /
    • 2018
  • Multiple hazards (multihazard) conditions may cause significant risk to structures that are originally designed for individual hazard scenarios. Such a multihazard condition arises when an earthquake strikes to a bridge pre-exposed to scour at foundations due to flood events. This study estimates the impact spectrum of flood-induced scour on seismic vulnerability of bridges. Characteristic river-crossing highway bridges are formed based on the information obtained from bridge inventories. These bridges are analyzed under earthquake-only and the abovementioned multihazard conditions, and bridge fragility curves are developed at component and system levels. Research outcome shows that bridges having pile shafts as foundation elements are protected from any additional seismic vulnerability due to the presence of scour. However, occurrence of floods can increase seismic fragility of bridges at lower damage states due to the adverse impact of scour on bridge components at superstructure level. These findings facilitate bridge design under the stated multihazard condition.

Development of Flood Vulnerability Index Estimation System (이상홍수 취약성 평가 시스템의 개발)

  • Jang, Dae-Won;Kim, Byung-Sik;Kim, Bo-Kyung;Yang, Dong-Min;Seoh, Byung-Ha
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.410-413
    • /
    • 2008
  • We constructed the regional flood risk and damage magnitude using hazard and vulnerabilities which are climatic, hydrological, socio-economic, countermeasure, disaster probability components for DB construction on the GIS system. Also we developed the Excess Flood Vulnerability index estimation System(EFVS). By the construction of the System, we can perform the scientific flood management for the flood prevention and optional extreme flood defenses according to regional characteristics. In order to evaluate the performance of system, we applied EFVS to Anseong-chen in Korea, and the system's stabilization is appropriate to flood damage analysis.

  • PDF

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

Analyses of Privacy and Vulnerability with Light-weight RFID System (저용량 RFID 시스템에서의 보안 및 취약성 분석)

  • Ahn, Byung-Jun;Park, Young-Bum;Nam, Jun-Woo;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.773-775
    • /
    • 2011
  • We analysed privacy, attack model and vulnerability with light-weight RFID System. A specific system's vulnerability depends on its implementation and the applied countermeasures. We can build an RFID system with a satisfactory security level even in a high-risk application area. To do so, however, we must pay attention to the implementation of proportional security measures.

  • PDF

A Study on Implements for Security Risk Management System (보안위험관리시스템 개발에 관한 연구)

  • Kim, In-Jung;Jung, Yoon-Jung;Park, Jung-Gil;Won, Bong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1953-1956
    • /
    • 2003
  • 현재 기관들은 정보통신기반시설에 대한 위험을 여러 가지 다른 방식으로 분석하고 있다. 또한, 각종 위험관리방법론, 지침 및 절차, 수준 측정 등에서 사용되는 기준들 사이에는 일관성이 없거나 서로 비교할 수가 없는 경우가 많다. 해당 기관의 보안 목표와는 상관없이 보안시스템이 설치 운영되고 있으며 그나마 없는 경우도 많다. 또한 당국에 보고하는 위험 분석 결과와 실제 기관 내에 위험 통제를 하기 위해 사용하는 위험 분석 결과도 서로 다른 경우가 흔하다. 기관 전체 차원에서의 일관성 있는 보안위험관리 방법의 부재로 말미암아 경제적으로 효율적인 위험 관리가 불가능하다고 할 수 있다. 본 논문에서는 이러한 문제점을 해결하기 위하여 정보통신기반시설에 대한 보안위험관리시스템을 제안하고 이에 대한 구현 방안을 제시한다.

  • PDF

A Basic Study on the Safety Management and Quantification of Vulnerability Factors in Small-size Old Buildings (소규모 노후 건축물 안전관리 및 취약성 요소 정량화 기본연구)

  • Goh, Wolsan;Oh, Gyuho;Ahn, Sungjin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.11a
    • /
    • pp.249-250
    • /
    • 2023
  • The vulnerability factor analysis and risk quantification model for aging buildings presented in this study can be utilized by governmental agencies such as the Facility Safety Foundation, the Ministry of Land, Infrastructure and Transport, and various local governments. Policymakers can use this to supplement inadequacies in existing checklists, and it is expected that they can proactively prevent risks by evaluating dangers based on specific aging characteristics of buildings.

  • PDF

Risk Factors for Sudden Infant Death Syndrome and Sleeping Practices in Korea

  • Ahn, Young Mee;Yang, Kyung-moo;Ha, Hong Il;Cho, Jung Ae
    • Child Health Nursing Research
    • /
    • v.26 no.1
    • /
    • pp.82-89
    • /
    • 2020
  • Sudden infant death syndrome (SIDS) in Korea remains a poorly-understood subject for both professionals and the public. Recent reports have emphasized ethnic differences in SIDS rates, suggesting that making adjustments in child-rearing practices may contribute substantially to SIDS reduction. Two of the three major risk factors for SIDS-vulnerability of the infant and exogenous factors-need to be understood in particular depth due to their broad scope and sociocultural grounding. This paper presents substantial issues regarding preterm birth and male gender on infants' vulnerability to SIDS in Korea. Practices of caring for healthy infants are addressed in the context of sleeping practices, including sleeping position, bedding arrangements, sleeping on the floor, the back-to-sleep position, high indoor temperatures and ondol floor heating, and swaddling. Professional and social awareness about how to reduce SIDS should be raised by promoting a better understanding of risk factors in the context of ethnic and cultural variations in child-rearing practices.

A Study on the Reliability Analysis for Water Supply on Reservoir System (저수지 물공급을 위한 신뢰도 분석에 관한 연구)

  • Sim, Myeong-Pil;Lee, Bong-Hui;Kim, Gyeong-Tak
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.5
    • /
    • pp.527-537
    • /
    • 1997
  • Reliability, resiliency and vulnerability for the risk analysis are mathematically defined as the evaluation standard of risk level to characterize the risk which influences water resources management and optimal reservoir operations. Monthly inflows are synthetically generated by stochastic generation model for a long-term reservoir water budget analysis, and this method is applied to the Dae-Cheong Multipurpose Dam. As a result of study, reliability based on occurrence, time and quantity are derived respectively. Also resiliency, vulnerability and resiliency inc\dices are estimated to evaluate the performance of water supply on reservoir system, and their relationships are evaluated.

  • PDF