• Title/Summary/Keyword: Vulnerability Risk

Search Result 468, Processing Time 0.029 seconds

Evaluation of Drought Risk in Gyeongsang-do Using EDI (EDI를 활용한 경상도 지역의 가뭄위험도 평가)

  • Park, Jong Yong;Yoo, Ji Young;Choi, Minha;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.3B
    • /
    • pp.243-252
    • /
    • 2011
  • The change of rainfall pattern due to recent climate change increases the occurrence probability of drought in Korea. Unlike other natural disasters, a drought has long duration, extensive area subject to damage, and greater socioeconomic damage than other disasters. In order to evaluate drought severity, meteorological drought indices are mainly used in practice. This study presents a more realistic method to evaluate drought severity considering drought climate factors as well as socioeconomic factors which are vulnerable to disaster. To perform a spatial evaluation of drought risk in Gyeongsang-do, drought risk was defined and analyzed through the hazard index and the vulnerability index. The drought hazard index was spatially assessed using the drought index and GIS. The drought vulnerability index was also spatially assessed using the 5 socioeconomic factors. As a result, the drought risks were compared and used for evaluating regional drought risk considering regional characteristics of Gyeongsang-do.

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph

  • Dai, Fangfang;Zheng, Kangfeng;Wu, Bin;Luo, Shoushan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1920-1937
    • /
    • 2015
  • Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.

Disaster Risk Analysis of Domestic Public Institutions 2 - Focusing on Analysis of Risk Factors - (국내 공공기관의 재난위험성 현황 분석 2 - 위험요인 분석을 통하여 -)

  • Seo, Gwang-Duck;Kim, Dong-Heon;Choi, Yun-Cheul
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.356-364
    • /
    • 2015
  • As the modern society becoms industry acceleration and urbanization. Disaster is noticed that loss of life and a huge property loss. In sprit of continuous experience misfortune that reality have nonhigh national consciousness. But government is on the brink of various disaster. Various disaster are becoming larger and larger through industrialization and abnormal climate. The researchers of the study suggest as followers: the selection of a key risk factors throuh vulnerability analysis and risk assessment of disaster. As well suggest as policy direction throuh plan of personalized safety management.

Estimating Real-time Inundation Vulnerability Index at Point-unit Farmland Scale using Fuzzy set (Fuzzy set을 이용한 실시간 지점단위 농경지 침수위험 지수 산정)

  • Eun, Sangkyu;Kim, Taegon;Lee, Jimin;Jang, Min-Won;Suh, Kyo
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • Smartphones change the picture of data and information sharing and make it possible to share various real-time flooding data and information. The vulnerability indicators of farmland inundation is needed to calculate the risk of farmland flood based on changeable hydro-meteorological data over time with morphologic characteristics of flood-damaged areas. To find related variables show the vulnerability of farmland inundation using the binary-logit model and correlation analysis and to provide vulnerability indicators were estimated by fuzzy set method. The outputs of vulnerability indicators were compared with the results of Monte Carlo simulation (MCS) for verification. From the result vulnerability indicators are applicable to mobile_based information system of farmland inundation.

Deformation-based vulnerability functions for RC bridges

  • Elnashai, A.S.;Borzi, B.;Vlachos, S.
    • Structural Engineering and Mechanics
    • /
    • v.17 no.2
    • /
    • pp.215-244
    • /
    • 2004
  • There is an ever-increasing demand for assessment of earthquake effects on transportation structures, emphasised by the crippling consequences of recent earthquakes hitting developed countries reliant on road transportation. In this work, vulnerability functions for RC bridges are derived analytically using advanced material characterisation, high quality earthquake records and adaptive inelastic dynamic analysis techniques. Four limit states are employed, all based on deformational quantities, in line with recent development of deformation-based seismic assessment. The analytically-derived vulnerability functions are then compared to a data set comprising observational damage data from the Northridge (California 1994) and Hyogo-ken Nanbu (Kobe 1995) earthquakes. The good agreement gives some confidence in the derived formulation that is recommended for use in seismic risk assessment. Furthermore, by varying the dimensions of the prototype bridge used in the study, and the span lengths supported by piers, three more bridges are obtained with different overstrength ratios (ratio of design-to-available base shear). The process of derivation of vulnerability functions is repeated and the ensuing relationships compared. The results point towards the feasibility of deriving scaling factors that may be used to obtain the set of vulnerability functions for a bridge with the knowledge of a 'generic' function and the overstrength ratio. It is demonstrated that this simple procedure gives satisfactory results for the case considered and may be used in the future to facilitate the process of deriving analytical vulnerability functions for classes of bridges once a generic relationship is established.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

A study of Assessment for Internal Inundation Vulnerability in Urban Area using SWMM (SWMM을 이용한 도시지역 내수침수 취약성 평가)

  • Shon, Tae-Seok;Kang, Dong-Ho;Jang, Jong-Kyung;Shin, Hyun-Suk
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.105-117
    • /
    • 2010
  • The topographical depressions in urban areas, the lack in drainage capability, sewage backward flow, road drainage, etc. cause internal inundation, and the increase in rainfall resulting from recent climate change, the rapid urbanization accompanied by economic development and population growth, and the increase in an impervious area in urban areas deteriorate the risk of internal inundation in the urban areas. In this study, the vulnerability of internal inundation in urban areas is analyzed and SWMM model is applied into Oncheoncheon watershed, which represents urban river of Busan, as a target basin. Based on the results, the representative storm sewers in individual sub-catchments is selected and the risk of vulnerability to internal inundation due to rainfall in urban streams is analyzed. In order to analyze the risk and vulnerability of internal inundation, capacity is applied as an index indicating the volume of a storm sewer in the SWMM model, and the risk of internal inundation is into 4 steps. For the analysis on the risk of internal inundation, simulation results by using a SMMM model are compared with the actual inundation areas resulting from localized heavy rain on July 7, 2009 at Busan and comparison results are analyzed to prove the validity of the designed model. Accordingly, probabilistic rainfall at Busan was input to the model for each frequency (10, 20, 50, 100 years) and duration (6, 12, 18, 24hr) at Busan. In this study, it suggests that the findings can be used to preliminarily alarm the possibility of internal inundation and selecting the vulnerable zones in urban areas.

Comparison of Disaster Vulnerability Analysis and Risk Evaluation of Heat Wave Disasters (폭염재해의 재해취약성분석 및 리스크 평가 비교)

  • Yu-Jeong SEOL;Ho-Yong KIM
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.1
    • /
    • pp.132-144
    • /
    • 2023
  • Recently, the frequency and intensity of heat waves due to the increase in climate change temperature are increasing. Therefore, this study tried to compare the evaluation process and evaluation results of the heat wave disaster evaluation, which is the government's analysis of the heat wave disaster vulnerability and the risk evaluation method recently emphasized by the IPCC. The analysis of climate change disaster vulnerability is evaluated based on manuals and guidelines prepared by the government. Risk evaluation can be evaluated as the product of the possibility of a disaster and its impact, and it is evaluated using the Markov chain Monte Carlo simulation based on Bayesian estimation method, which uses prior information to infer posterior probability. As a result of the analysis, the two evaluation results for Busan Metropolitan City differed slightly in the spatial distribution of areas vulnerable to heat waves. In order to properly evaluate disaster vulnerable areas due to climate change, the process and results of climate change disaster vulnerability analysis and risk assessment must be reviewed, and consider each methodology and countermeasures must be prepared.

IT Systems Risk Analysis Using Object Oriented Asset Classification Model (객체지향 자산분류모델을 이용한 위험분석에 관한연구)

  • Lee, Hyeak-Ro;Ahn, Seong-Jin
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.79-84
    • /
    • 2008
  • In these days, many organizations try to manage their assets in safe way due to fast change in information-communication environment. In Korea, risk analysis and vulnerability analysis for security improvement of critical asset is booming by enforcement of Act on security of information and communication infrastructure. It is obligate that each critical information infrastructure needs to get vulnerability analysis. In this paper, we proposed Object Oriented Asset Classification model for asset analysis and risk analysis.

  • PDF

The Research for Cyber Security Experts (소프트웨어 취약점의 보안성 강화를 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.347-350
    • /
    • 2016
  • Analysis of vulnerability of the software for risk. The weakness of the software material, the importance of strengthening security in accordance with financial damage occurred is emerging. There is a potential risk factor not only from the case, the manufacturing to use the software company that appropriate to use a software business and personal risk of loss to size.In this paper due to diagnose and vulnerabilities in software, diagnosis, the curriculum and to cultivate a diagnostic guide, and security vulnerabilities in software.Proposal system for increased.

  • PDF