• Title/Summary/Keyword: Vulnerability Risk

Search Result 468, Processing Time 0.029 seconds

Probabilistic earthquake risk consideration of existing precast industrial buildings through loss curves

  • Ali Yesilyurt;Seyhan O. Akcan;Oguzhan Cetindemir;A. Can Zulfikar
    • Geomechanics and Engineering
    • /
    • v.37 no.6
    • /
    • pp.565-576
    • /
    • 2024
  • In this study, the earthquake risk assessment of single-story RC precast buildings in Turkey was carried out using loss curves. In this regard, Kocaeli, a seismically active city in the Marmara region, and this building class, which is preferred intensively, were considered. Quality and period parameters were defined based on structural and geometric properties. Depending on these parameters, nine main sub-classes were defined to represent the building stock in the region. First, considering the mean fragility curves and four different central damage ratio models, vulnerability curves for each sub-class were computed as a function of spectral acceleration. Then, probabilistic seismic hazard analyses were performed for stiff and soft soil conditions for different earthquake probabilities of exceedance in 50 years. In the last step, 90 loss curves were derived based on vulnerability and hazard results. Within the scope of the study, the comparative parametric evaluations for three different earthquake intensity levels showed that the structural damage ratio values for nine sub-classes changed significantly. In addition, the quality parameter was found to be more effective on a structure's damage state than the period parameter. It is evident that since loss curves allow direct loss ratio calculation for any hazard level without needing seismic hazard and damage analysis, they are considered essential tools in rapid earthquake risk estimation and mitigation initiatives.

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

Monitoring regional inequalities in climate change risk - A Focus on Heatwave - (기후변화 리스크의 지역 불평등 모니터링 : 폭염을 중심으로)

  • Kim, Geun-Han
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.6
    • /
    • pp.97-107
    • /
    • 2021
  • Abnormal climate caused by climate change causes enormous social and economic damage. And such damage and its impact may vary depending on the location and regional characteristics of the region and the social and economic conditions of local residents. Therefore, it is necessary to continuously monitor whether there are indicators that are weaker than other regions among the detailed indicators that constitute the risk, exposure and vulnerability of climate change risk. In this study, the concept of climate change risk was used for heatwave to determine regional inequality of climate change risk. In other words, it was judged that inequality in climate change risk occurred in regions with high risk but high exposure and low vulnerability compared to other regions. As a result of the analysis, it was found that 13 local governments in Korea experienced regional inequality in climate change risk. In order to resolve regional inequality in climate change risks, the current status of regional inequality in climate change should be checked based on the analysis proposed in this study, there is a need for an evaluation and monitoring system that can provide appropriate feedback on areas where inequality has occurred. This continuous evaluation and monitoring-based feedback system is expected to be of great help in resolving regional inequality in climate change risks.

Attack Detection Technology through Log4J Vulnerability Analysis in Cloud Environments (클라우드 환경에서 Log4J 취약점 분석을 통한 공격 탐지 기술)

  • Byeon, Jungyeon;Lee, Sanghee;Yoo, Chaeyeon;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.557-559
    • /
    • 2022
  • The use of open source has the advantage that the development environment is convenient and maintenance is easier, but there is a limitation in that it is easy to be exposed to vulnerabilities from a security point of view. In this regard, the LOG4J vulnerability, which is an open source logging library widely used in Apache, was recently discovered. Currently, the risk of this vulnerability is at the 'highest' level, and developers are using it in many systems without being aware of such a problem, so there is a risk that hacking accidents due to the LOG4J vulnerability will continue to occur in the future. In this paper, we analyze the LOG4J vulnerability in detail and propose a SNORT detection policy technology that can detect vulnerabilities more quickly and accurately in the security control system. Through this, it is expected that in the future, security-related beginners, security officers, and companies will be able to efficiently monitor and respond quickly and proactively in preparation for the LOG4J vulnerability.

  • PDF

Vulnerability to human immunodeficiency virus infection and associated factors among married women in northwest Ethiopia: a cross-sectional study

  • Asiya Hussien;Abdissa Boka;Asnake Fantu
    • Women's Health Nursing
    • /
    • v.28 no.4
    • /
    • pp.307-316
    • /
    • 2022
  • Purpose: This study investigated the vulnerability to human immunodeficiency virus (HIV) infection and associated factors among married women in northwest Ethiopia. Methods: A community-based cross-sectional survey (n=657) was conducted from April 1 to 15, 2020, in Metema District, northwest Ethiopia, in four randomly selected kebele administrations (the lowest level of local government). The inclusion criteria were married women aged ≥18 years residing with their husbands. Logistic regression analysis was conducted to identify factors associated with married women's vulnerability to HIV infection. Results: Participants were on average 33.70±9.50 years and nearly one-fourth (n=148, 22.5%) were identified as vulnerable to HIV infection (i.e., experienced sexually transmitted disease symptoms or an extramarital affair of either spouse within the past 12 months). Only 18.9% reported sexual communication with their husband. Respondents who did not discuss the risk of HIV infection with their husbands had fivefold odds of vulnerability (adjusted odds ratio [AOR], 5.02; 95% confidence interval [CI], 1.43-17.5). Those who did not have premarital sex (AOR, 0.20; 95% CI, 0.05-0.77) had no worries about HIV infection (AOR, 0.27; 95% CI, 0.08-0.94), sufficient income (AOR, 0.56; 95% CI, 0.16-0.86), and less than four children (AOR, 0.69; 95% CI, 0.50-0.97) had decreased odds of being vulnerable to HIV than their counterparts. Conclusion: Not discussing risk of HIV infection with husband was a major factor of vulnerability to HIV infection as was premarital sex, worry about HIV, income, and number of children. Measures to strengthen couple's sexual communication and support economical stability is important for decreasing HIV vulnerability.

Human Responses as Landscape Indicators of the Place Vulnerability (장소 취약도에 대한 경관지표로서의 인간의 대응)

  • HAN, Joo-Yup;LEE, Min-Boo
    • Journal of The Geomorphological Association of Korea
    • /
    • v.19 no.1
    • /
    • pp.109-121
    • /
    • 2012
  • Human responses, such as construction of levees, are a spatial representation of the place vulnerability which is induced by a geomorphic hazard like flooding. Human responses include all forms of human activities to reduce the place vulnerability and they seem to be related with reducing vulnerability rather than reducing geomorphic hazards. Diverse human responses to the perceived environment bring about changes in the place vulnerability. People respond spatially to their vulnerability of the place in diverse ways from their experience and perceived risk. Human responses have quantitative possibilities in predicting and modeling the place vulnerability. Building the model of a dynamic place vulnerability to the diverse geomorphic hazards requires basic maps of geomorphic processes and human responses in the region.

Lake Vulnerability Assessment (호소의 취약성 평가)

  • Kim, Eung-Seok;Yoon, Ki-Yong;Lee, Seung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6877-6883
    • /
    • 2014
  • The continuous social development has led to increasing pollution in lakes. This study proposed the LVRI (Lake Vulnerability Resilience Indicator) based on the vulnerability assessment of climate change for an environmental risk assessment in lakes sufferign water pollution in an integrated aspect of the characteristics in lake watersheds. A total of 11 representative assessment factors were selected and constructed for 6 lake basins in the Geum River Watershed to calculate the exposure, sensitivity and adaptation indicators in a vulnerability assessment classification system. The weight coefficients for assessment factors of the LVRI were also calculated using the Entropy method. This study also compared the rank results of the lake environmental risk with/without the weight coefficients of assessment factors for the practical application of the proposed lake environmental risk assessment method. The lake environmental risk results estimated in this study can be used for long-term water quality analysis and management in lakes.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

Differences of Psychosocial Vulnerability Factors between Internet and Smartphone Addiction Groups Consisting of Children and Adolescents in a Small to Medium-Sized City (일 중소도시 소아청소년의 인터넷 및 스마트폰중독 수준에 따른 심리사회적 취약요인의 차이)

  • Jun, Young-Soon;Kim, Tae-Ho;Shin, Yong-Tae;Jo, Seongwoo
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.27 no.3
    • /
    • pp.188-195
    • /
    • 2016
  • Objectives: The aim of this study was to investigate the relationship between internet addiction, smartphone addiction, and psychosocial factors. This study was designed to examine the vulnerability factors for internet and smartphone addiction. Methods: The participants were 1041 children and adolescents in a small and medium-sized cities. All of the participants were evaluated in terms of their demographic characteristics and present use of the internet and smartphone, as well as using internet and smartphone addiction and other psychological scales. Statistical analyses were performed to compare the psychosocial factors between the high risk, potential risk, and general user groups of internet and smartphone addiction. Results: The participants were classified into three groups, the high risk (N=33), potential risk (N=203), and general user (N=805) groups with regard to their internet and smartphone addiction level. There were statistical significantly differences between the groups in terms of the economic status of the family, academic performance, parents, use of internet and smartphone, loneliness, family cohesion, family adaptability, perceived social support, and peer relationship. Conclusion: These results suggest that the internet and smartphone addiction of children and adolescents is related to various psychosocial vulnerability factors.

A study on the cyber security assessment modeling of critical infrastructure (핵심기반시설 사이버 보안 평가 모델링 기법 연구)

  • Euom, Ieck-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.105-113
    • /
    • 2019
  • The purpose of this study is to analyze cyber security risk modeling of critical infrastructure, draw out limitations and improvement measures. This paper analyzed cyber security risk modeling of national critical infrastructure like as electricity sector, nuclear power plant, SCADA. This paper analyzed the 26 precedent research cases of risk modeling in electricity sector, nuclear power plant, SCADA. The latest Critical Infrastructure is digitalized and has a windows operating system. Critical Infrastructure should be operated at all times, it is not possible to patch a vulnerability even though find vulnerability. This paper suggest the advanced cyber security modeling characteristic during the life cycle of the critical infrastructure and can be prevented.