SlideShare a Scribd company logo
1 of 49
Download to read offline
Security and Dependability
1
Security and Dependability
Topics covered
ī‚˛ Dependability properties
ī‚§ The system attributes that lead to dependability.
ī‚˛ Availability and reliability
ī‚§ Systems should be available to deliver service and perform as
expected.
ī‚˛ Safety
ī‚§ Systems should not behave in an unsafe way.
ī‚˛ Security
ī‚§ Systems should protect themselves and their data from external
interference.
2
Security and Dependability
System dependability
ī‚˛ For many computer-based systems, the most important
system property is the dependability of the system.
ī‚˛ The dependability of a system reflects the user’s degree of
trust in that system. It reflects the extent of the user’s
confidence that it will operate as users expect and that it will
not ‘fail’ in normal use.
ī‚˛ Dependability covers the related systems attributes of
reliability, availability and security. These are all inter-
dependent.
ī‚˛ For software-intensive systems, it’s essential that widely used
software is trustworthy
3
Security and Dependability
Importance of dependability
ī‚˛ System failures may have widespread effects with large
numbers of people affected by the failure.
ī‚˛ Systems that are not dependable and are unreliable, unsafe or
insecure may be rejected by their users.
ī‚˛ The costs of system failure may be enormous if the failure
leads to economic losses or physical damage.
ī‚˛ Undependable systems may cause information loss with a
high consequent recovery cost.
4
Security and Dependability
Causes of failure
ī‚˛ Hardware failure
ī‚§ Hardware fails because of design and manufacturing errors or because
components have reached the end of their natural life.
ī‚˛ Software failure
ī‚§ Software fails due to errors in its specification, design or
implementation.
ī‚˛ Operational failure
ī‚§ Human operators make mistakes. Now perhaps the largest single
cause of system failures in socio-technical systems.
5
Security and Dependability
Principal dependability properties
6
Security and Dependability
Principal properties
ī‚˛ Availability
ī‚§ The probability that the system will be up and running and able to
deliver useful services to users.
ī‚˛ Reliability
ī‚§ The probability that the system will correctly deliver services as
expected by users.
ī‚˛ Safety
ī‚§ A judgment of how likely it is that the system will cause damage to
people or its environment.
ī‚˛ Security
ī‚§ A judgment of how likely it is that the system can resist accidental or
deliberate intrusions.
7
Security and Dependability
Other dependability properties
ī‚˛ Repairability
ī‚§ Reflects the extent to which the system can be repaired in the event of
a failure
ī‚˛ Maintainability
ī‚§ Reflects the extent to which the system can be adapted to new
requirements;
ī‚˛ Survivability
ī‚§ Reflects the extent to which the system can deliver services whilst
under hostile attack; esp. for Internet-based systems
ī‚˛ Error tolerance
ī‚§ Reflects the extent to which user input errors can be avoided and
tolerated.
8
Security and Dependability
Repairability
ī‚˛ The disruption caused by system failure can be minimized if
the system can be repaired quickly.
ī‚˛ This requires problem diagnosis, access to the failed
component(s) and making changes to fix the problems.
ī‚˛ Repairability is a judgment of how easy it is to repair the
software to correct the faults that led to a system failure.
ī‚˛ Repairability is affected by the operating environment so is
hard to assess before system deployment.
Security and Dependability 9
Maintainability
ī‚˛ A system attribute that is concerned with the ease of
repairing the system after a failure has been discovered or
changing the system to include new features.
ī‚˛ Repairability – short-term perspective to get the system back
into service; Maintainability – long-term perspective.
ī‚˛ Very important for critical systems as faults are often
introduced into a system because of maintenance problems. If
a system is maintainable, there is a lower probability that
these faults will be introduced or undetected.
10
Security and Dependability
Survivability
ī‚˛ The ability of a system to continue to deliver its services to
users in the face of deliberate or accidental attack
ī‚˛ This is an increasingly important attribute for distributed
systems whose security can be compromised
ī‚˛ Survivability subsumes the notion of resilience - the ability of
a system to continue in operation in spite of component
failures
11
Security and Dependability
Error tolerance
ī‚˛ Part of a more general usability property and reflects the
extent to which user errors are avoided, detected or
tolerated.
ī‚˛ User errors should, as far as possible, be detected and
corrected automatically and should not be passed on to the
system and cause failures.
Security and Dependability 12
Dependability attribute
dependencies
ī‚˛ Safe system operation depends on the system being available
and operating reliably.
ī‚˛ A system may be unreliable because its data has been
corrupted by an external attack.
ī‚˛ Denial of service attacks on a system are intended to make it
unavailable.
ī‚˛ If a system is infected with a virus, you cannot be confident in
its reliability or safety.
Security and Dependability 13
Dependability achievement
To develop dependable systems should:
ī‚˛ Avoid the introduction of accidental errors when developing
the system.
ī‚˛ Design Verification & Validation processes that are effective in
discovering residual errors in the system.
ī‚˛ Design protection mechanisms that guard against external
attacks.
ī‚˛ Configure the system correctly for its operating environment.
ī‚˛ Include recovery mechanisms to help restore normal system
service after a failure.
Security and Dependability 14
Dependability costs
ī‚˛ Dependability costs tend to increase exponentially as
increasing levels of dependability are required.
ī‚˛ There are two reasons for this
ī‚§ The use of more expensive development techniques and
hardware that are required to achieve the higher levels of
dependability.
ī‚§ The increased testing and system validation that is required to
convince the system client and regulators that the required levels
of dependability have been achieved.
15
Security and Dependability
Cost/dependability curve
16
Security and Dependability
Dependability economics
ī‚˛ Because of very high costs of dependability
achievement, it may be more cost effective to accept
untrustworthy systems and pay for failure costs
ī‚˛ However, this depends on social and political factors. A
reputation for products that can’t be trusted may lose
future business
ī‚˛ Depends on system type - for business systems in
particular, modest levels of dependability may be
adequate
17
Security and Dependability
Availability and reliability
ī‚˛ Reliability
ī‚§ The probability of failure-free system operation over a specified time
in a given environment for a given purpose
ī‚˛ Availability
ī‚§ The probability that a system, at a point in time, will be operational
and able to deliver the requested services
ī‚˛ Both of these attributes can be expressed quantitatively e.g.
availability of 0.999 means that the system is up and running
for 99.9% of the time.
18
Security and Dependability
Availability and reliability
ī‚˛ It is sometimes possible to subsume system availability under
system reliability
ī‚§ Obviously if a system is unavailable it is not delivering the specified
system services.
ī‚˛ However, it is possible to have systems with low reliability that
must be available.
ī‚§ So long as system failures can be repaired quickly and does not damage
data, some system failures may not be a problem.
ī‚˛ Availability is therefore best considered as a separate attribute
reflecting whether or not the system can deliver its services.
ī‚˛ Availability takes repair time into account, if the system has to
be taken out of service to repair faults.
19
Security and Dependability
Perceptions of reliability
ī‚˛ The formal definition of reliability does not always reflect the
user’s perception of a system’s reliability
ī‚§ The assumptions that are made about the environment where a
system will be used may be incorrect
â€ĸ Usage of a system in an office environment is likely to be quite different
from usage of the same system in a university environment
ī‚§ The consequences of system failures affects the perception of
reliability
â€ĸ Unreliable windscreen wipers in a car may be irrelevant in a dry climate
â€ĸ Failures that have serious consequences (such as an engine breakdown in
a car) are given greater weight by users than failures that are inconvenient
20
Security and Dependability
Reliability and specifications
ī‚˛ Reliability can only be defined formally with respect to a
system specification i.e. a failure is a deviation from a
specification.
ī‚˛ However, many specifications are incomplete or incorrect –
hence, a system that conforms to its specification may ‘fail’
from the perspective of system users.
ī‚˛ Furthermore, users don’t read specifications so don’t know
how the system is supposed to behave.
ī‚˛ Therefore perceived reliability is more important in practice.
Security and Dependability 21
Availability perception
ī‚˛ Availability is usually expressed as a percentage of the time
that the system is available to deliver services e.g. 99.95%.
ī‚˛ However, this does not take into account two factors:
ī‚§ The number of users affected by the service outage. Loss of service in
the middle of the night is less important for many systems than loss of
service during peak usage periods.
ī‚§ The length of the outage. The longer the outage, the more the
disruption. Several short outages are less likely to be disruptive than 1
long outage. Long repair times are a particular problem.
Security and Dependability 22
Reliability terminology
Term Description
Human error or
mistake
Human behavior that results in the introduction of faults into a system. For
example, in the wilderness weather system, a programmer might decide that the
way to compute the time for the next transmission is to add 1 hour to the current
time. This works except when the transmission time is between 23.00 and
midnight (midnight is 00.00 in the 24-hour clock).
System fault A characteristic of a software system that can lead to a system error. The fault is
the inclusion of the code to add 1 hour to the time of the last transmission,
without a check if the time is greater than or equal to 23.00.
System error An erroneous system state that can lead to system behavior that is unexpected
by system users. The value of transmission time is set incorrectly (to 24.XX
rather than 00.XX) when the faulty code is executed.
System failure An event that occurs at some point in time when the system does not deliver a
service as expected by its users. No weather data is transmitted because the
time is invalid.
23
Security and Dependability
Faults and failures
ī‚˛ Failures are a usually a result of system errors that are derived
from faults in the system
ī‚˛ However, faults do not necessarily result in system errors
ī‚§ The erroneous system state resulting from the fault may be transient
and ‘corrected’ before an error arises.
ī‚§ The faulty code may never be executed.
ī‚˛ Errors do not necessarily lead to system failures
ī‚§ The error can be corrected by built-in error detection and recovery
ī‚§ The failure can be protected against by built-in protection facilities.
These may, for example, protect system resources from system errors
24
Security and Dependability
A system as an input/output mapping
25
Security and Dependability
Software usage patterns
26
Security and Dependability
Reliability in use
ī‚˛ Removing X% of the faults in a system will not necessarily
improve the reliability by X%. A study at IBM showed that
removing 60% of product defects resulted in a 3%
improvement in reliability.
ī‚˛ Program defects may be in rarely executed sections of the
code so may never be encountered by users. Removing these
does not affect the perceived reliability.
ī‚˛ Users adapt their behaviour to avoid system features that may
fail for them.
ī‚˛ A program with known faults may therefore still be perceived
as reliable by its users.
27
Security and Dependability
Reliability achievement
ī‚˛ Fault avoidance
ī‚§ Development technique are used that either minimise the possibility
of mistakes or trap mistakes before they result in the introduction of
system faults.
ī‚˛ Fault detection and removal
ī‚§ Verification and validation techniques that increase the probability of
detecting and correcting errors before the system goes into service are
used.
ī‚˛ Fault tolerance
ī‚§ Run-time techniques are used to ensure that system faults do not
result in system errors and/or that system errors do not lead to system
failures.
28
Security and Dependability
Safety
ī‚˛ Safety-critical systems are systems where it is essential that operation is
always safe.
ī‚§ That is, the system should never damage people or the system’s
environment even if the system fails.
ī‚˛ Safety is a property of a system that reflects the system’s ability to
operate, normally or abnormally, without danger of causing human injury
or death and without damage to the system’s environment.
ī‚˛ It is important to consider software safety as most devices whose failure is
critical now incorporate software-based control systems.
ī‚˛ Safety requirements are often exclusive requirements i.e. they exclude
undesirable situations rather than specify required system services. These
generate functional safety requirements.
29
Security and Dependability
Examples of safety-critical systems
ī‚˛ Safety-critical systems are those systems whose failure could
result in loss of life, significant property damage, or damage to
the environment.
ī‚˛ Examples:
ī‚§ Control and monitoring systems in aircraft
ī‚§ Process control systems in chemical and pharmaceutical plants
ī‚§ Automobile control systems
Security and Dependability 30
Categories of safety-critical software
ī‚˛ Primary safety-critical systems
ī‚§ Embedded software systems whose failure can cause the associated
hardware to fail and directly threaten people. Example is the insulin
pump control system.
ī‚˛ Secondary safety-critical systems
ī‚§ Computer-aided engineering design system malfunctioning may result
in a design fault in the object being designed. This fault might cause
injury to people if the object malfunctions.
ī‚§ Systems whose failure results in faults in other (socio-technical)
systems, which can then have safety consequences. For example, the
MHC-PMS is safety-critical as failure may lead to inappropriate
treatment being prescribed.
31
Security and Dependability
Safety and reliability
ī‚˛ Safety and reliability are related but distinct
ī‚§ In general, reliability and availability are necessary but not sufficient
conditions for system safety
ī‚˛ Reliability is concerned with conformance to a given
specification and delivery of service
ī‚˛ Safety is concerned with ensuring system cannot cause
damage irrespective of whether or not it conforms to its
specification
32
Security and Dependability
Unsafe reliable systems
ī‚˛ There may be dormant faults in a system that are undetected
for many years and only rarely arise.
ī‚˛ Specification errors
ī‚§ If the system specification is incorrect/(does not describe system
behaviour in critical situations) then the system can behave as specified
but still cause an accident.
ī‚˛ Hardware failures generating spurious inputs
ī‚§ Hard to anticipate in the specification.
ī‚˛ Context-sensitive commands i.e. issuing the right command at
the wrong time
ī‚§ Often the result of operator error.
33
Security and Dependability
Safety terminology
Term Definition
Accident (or mishap) An unplanned event or sequence of events which results in human death or injury,
damage to property, or to the environment. An overdose of insulin is an example of an
accident.
Hazard A condition with the potential for causing or contributing to an accident. A failure of the
sensor that measures blood glucose is an example of a hazard.
Damage A measure of the loss resulting from a mishap. Damage can range from many people
being killed as a result of an accident to minor injury or property damage. Damage
resulting from an overdose of insulin could be serious injury or the death of the user of
the insulin pump.
Hazard severity An assessment of the worst possible damage that could result from a particular hazard.
Hazard severity can range from catastrophic, where many people are killed, to minor,
where only minor damage results. When an individual death is a possibility, a
reasonable assessment of hazard severity is ‘very high’.
Hazard probability The probability of the events occurring which create a hazard. Probability values tend to
be arbitrary but range from ‘probable’ (say 1/100 chance of a hazard occurring) to
‘implausible’ (no conceivable situations are likely in which the hazard could occur). The
probability of a sensor failure in the insulin pump that results in an overdose is probably
low.
Risk This is a measure of the probability that the system will cause an accident. The risk is
assessed by considering the hazard probability, the hazard severity, and the probability
that the hazard will lead to an accident. The risk of an insulin overdose is probably
medium to low.
34
Security and Dependability
Safety achievement
ī‚˛ Hazard avoidance
ī‚§ The system is designed so that some classes of hazard simply cannot
arise.
â€ĸ E.g. a cutting system that requires an operator to use two hands to press
separate buttons simultaneously avoids the hazard of the operator’s hands
being in the blade pathway.
ī‚˛ Hazard detection and removal
ī‚§ The system is designed so that hazards are detected and removed before
they result in an accident.
ī‚˛ Damage limitation
ī‚§ The system includes protection features that minimise the damage that
may result from an accident.
35
Security and Dependability
Normalaccidents
ī‚˛ Accidents in complex systems rarely have a single cause as
these systems are designed to be resilient to a single point of
failure
ī‚§ Designing systems so that a single point of failure does not cause an
accident is a fundamental principle of safe systems design.
ī‚˛ Almost all accidents are a result of combinations of
malfunctions rather than single failures.
ī‚˛ It is probably the case that anticipating all problem
combinations, especially, in software controlled systems is
impossible so achieving complete safety is impossible.
Accidents are inevitable.
36
Security and Dependability
Software safety benefits
ī‚˛Although software failures can be safety-critical, the
use of software control systems contributes to
increased system safety
ī‚§ Software monitoring and control allows a wider range of
conditions to be monitored and controlled than is possible
using electro-mechanical safety systems.
ī‚§ Software control allows safety strategies to be adopted that
reduce the amount of time people spend in hazardous
environments.
ī‚§ Software can detect and correct safety-critical operator
errors.
Security and Dependability 37
Safety specification
ī‚˛ Failures in safety-critical systems may affect the environment
of the system and cause injury or death
ī‚˛ Principal concern in safety specification is to identify
requirements that will minimize the probability of failures
ī‚˛ Goal is to identify protection requirements that ensure that
system failures do not cause injury or death or environmental
damage.
Security and Dependability 38
Safety specification (Contâ€Ļ)
ī‚˛Risk identification = Hazard identification
ī‚˛Risk analysis = Hazard assessment
ī‚˛Risk decomposition = Hazard analysis
ī‚˛Risk reduction = safety requirements specification
Security and Dependability 39
Security
ī‚˛The security of a system is a system property that
reflects the system’s ability to protect itself from
accidental or deliberate external attack (s).
ī‚˛Security is essential as most systems are networked
so that external access to the system through the
Internet is possible.
ī‚˛Examples of external attacks: viruses; Trojan horses;
unauthorized use of system services or data
modification;
ī‚˛Security is an essential pre-requisite for availability,
reliability and safety.
40
Security and Dependability
Fundamental security
ī‚˛ If a system is a networked system and is insecure then
statements about its reliability and its safety are
unreliable.
ī‚˛ These statements depend on the executing system and
the developed system being the same. However,
intrusion can change the executing system and/or its
data.
ī‚˛ Therefore, the reliability and safety assurance is no
longer valid.
41
Security and Dependability
Security terminology
Term Definition
Asset Something of value which has to be protected. The asset may be the software
system itself or data used by that system.
Exposure Possible loss or harm to a computing system. This can be loss or damage to
data, or can be a loss of time and effort if recovery is necessary after a security
breach.
Vulnerability A weakness in a computer-based system that may be exploited to cause loss or
harm.
Attack An exploitation of a system’s vulnerability. Generally, this is from outside the
system and is a deliberate attempt to cause some damage.
Threats Circumstances that have potential to cause loss or harm. You can think of these
as a system vulnerability that is subjected to an attack.
Control A protective measure that reduces a system’s vulnerability. Encryption is an
example of a control that reduces a vulnerability of a weak access control
system
42
Security and Dependability
Examples of security terminology (MHC-PMS)
Term Example
Asset The records of each patient that is receiving or has received treatment.
Exposure Potential financial loss from future patients who do not seek treatment
because they do not trust the clinic to maintain their data. Financial loss
from legal action by the sports star. Loss of reputation.
Vulnerability A weak password system which makes it easy for users to set
guessable passwords. User ids that are the same as names.
Attack An impersonation of an authorized user.
Threat An unauthorized user will gain access to the system by guessing the
credentials (login name and password) of an authorized user.
Control A password checking system that disallows user passwords that are
proper names or words that are normally included in a dictionary.
43
Security and Dependability
Threat classes
In any networked system, there are three main threats:
ī‚˛ Threats to the confidentiality of the system and its data
ī‚§ Can disclose information to people or programs that are not authorized
to access that information.
ī‚˛ Threats to the integrity of the system and its data
ī‚§ Can damage or corrupt the software or its data.
ī‚˛ Threats to the availability of the system and its data
ī‚§ Can restrict access to the system or its data for authorized users.
Security and Dependability 44
Damage from insecurity
ī‚˛ Denial of service
ī‚§ The system is forced into a state where normal services are unavailable
or where service provision is significantly degraded
ī‚˛ Corruption of programs or data
ī‚§ The programs or data in the system may be modified in an unauthorised
way
ī‚˛ Disclosure of confidential information
ī‚§ Information that is managed by the system may be exposed to people
who are not authorised to read or use that information
45
Security and Dependability
Security assurance
ī‚˛ Vulnerability avoidance
ī‚§ The system is designed so that vulnerabilities do not occur. For
example, if there is no external network connection then external attack
is impossible
ī‚˛ Attack detection and elimination
ī‚§ The system is designed so that attacks on vulnerabilities are detected
and neutralised before they result in an exposure. For example, virus
checkers find and remove viruses before they infect a system
ī‚˛ Exposure limitation and recovery
ī‚§ The system is designed so that the adverse consequences of a
successful attack are minimised. For example, a backup policy allows
damaged information to be restored
46
Security and Dependability
Key points
ī‚˛ Reliability is related to the probability of an error occurring in
operational use. A system with known faults may be reliable.
ī‚˛ Safety is a system attribute that reflects the system’s ability to
operate without threatening people or the environment.
ī‚˛ Security is a system attribute that reflects the system’s ability
to protect itself from external attack.
ī‚˛ Dependability is compromised if a system is insecure as the
code or data may be corrupted.
47
Security and Dependability
Key points
ī‚˛ The dependability in a system reflects the user’s trust in that
system.
ī‚˛ Dependability is a term used to describe a set of related ‘non-
functional’ system attributes – availability, reliability, safety
and security.
ī‚˛ The availability of a system is the probability that it will be
available to deliver services when requested.
ī‚˛ The reliability of a system is the probability that system
services will be delivered as specified.
48
Security and Dependability
END
ī‚˛ Next we look at Distributed Software Engineering
Security and Dependability 49

More Related Content

Similar to 5 - Safety - Critical Systems.pdf

ch10.pptx
ch10.pptxch10.pptx
ch10.pptxgdfgdfgdf1
 
Ch10 - Dependable Systems
Ch10 - Dependable SystemsCh10 - Dependable Systems
Ch10 - Dependable SystemsHarsh Verdhan Raj
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3Siddharth Ayer
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013Ian Sommerville
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliabilitysommerville-videos
 
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...Cognizant
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes arvind pandey
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience EngineeringHarsh Verdhan Raj
 
Resiliency vs High Availability vs Fault Tolerance vs Reliability
Resiliency vs High Availability vs Fault Tolerance vs  ReliabilityResiliency vs High Availability vs Fault Tolerance vs  Reliability
Resiliency vs High Availability vs Fault Tolerance vs Reliabilityjeetendra mandal
 

Similar to 5 - Safety - Critical Systems.pdf (20)

ch10.pptx
ch10.pptxch10.pptx
ch10.pptx
 
Ch10 - Dependable Systems
Ch10 - Dependable SystemsCh10 - Dependable Systems
Ch10 - Dependable Systems
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
System dependability
System dependabilitySystem dependability
System dependability
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Ch13.pptx
Ch13.pptxCh13.pptx
Ch13.pptx
 
Ch10
Ch10Ch10
Ch10
 
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
 
Ch13
Ch13Ch13
Ch13
 
Reliability
ReliabilityReliability
Reliability
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 
Ch14
Ch14Ch14
Ch14
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience Engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Resiliency vs High Availability vs Fault Tolerance vs Reliability
Resiliency vs High Availability vs Fault Tolerance vs  ReliabilityResiliency vs High Availability vs Fault Tolerance vs  Reliability
Resiliency vs High Availability vs Fault Tolerance vs Reliability
 
Failure Free Cloud Computing Architectures
Failure Free Cloud Computing ArchitecturesFailure Free Cloud Computing Architectures
Failure Free Cloud Computing Architectures
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoÃŖo Esperancinha
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube ExchangerAnamika Sarkar
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡ī¸9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

5 - Safety - Critical Systems.pdf

  • 2. Topics covered ī‚˛ Dependability properties ī‚§ The system attributes that lead to dependability. ī‚˛ Availability and reliability ī‚§ Systems should be available to deliver service and perform as expected. ī‚˛ Safety ī‚§ Systems should not behave in an unsafe way. ī‚˛ Security ī‚§ Systems should protect themselves and their data from external interference. 2 Security and Dependability
  • 3. System dependability ī‚˛ For many computer-based systems, the most important system property is the dependability of the system. ī‚˛ The dependability of a system reflects the user’s degree of trust in that system. It reflects the extent of the user’s confidence that it will operate as users expect and that it will not ‘fail’ in normal use. ī‚˛ Dependability covers the related systems attributes of reliability, availability and security. These are all inter- dependent. ī‚˛ For software-intensive systems, it’s essential that widely used software is trustworthy 3 Security and Dependability
  • 4. Importance of dependability ī‚˛ System failures may have widespread effects with large numbers of people affected by the failure. ī‚˛ Systems that are not dependable and are unreliable, unsafe or insecure may be rejected by their users. ī‚˛ The costs of system failure may be enormous if the failure leads to economic losses or physical damage. ī‚˛ Undependable systems may cause information loss with a high consequent recovery cost. 4 Security and Dependability
  • 5. Causes of failure ī‚˛ Hardware failure ī‚§ Hardware fails because of design and manufacturing errors or because components have reached the end of their natural life. ī‚˛ Software failure ī‚§ Software fails due to errors in its specification, design or implementation. ī‚˛ Operational failure ī‚§ Human operators make mistakes. Now perhaps the largest single cause of system failures in socio-technical systems. 5 Security and Dependability
  • 7. Principal properties ī‚˛ Availability ī‚§ The probability that the system will be up and running and able to deliver useful services to users. ī‚˛ Reliability ī‚§ The probability that the system will correctly deliver services as expected by users. ī‚˛ Safety ī‚§ A judgment of how likely it is that the system will cause damage to people or its environment. ī‚˛ Security ī‚§ A judgment of how likely it is that the system can resist accidental or deliberate intrusions. 7 Security and Dependability
  • 8. Other dependability properties ī‚˛ Repairability ī‚§ Reflects the extent to which the system can be repaired in the event of a failure ī‚˛ Maintainability ī‚§ Reflects the extent to which the system can be adapted to new requirements; ī‚˛ Survivability ī‚§ Reflects the extent to which the system can deliver services whilst under hostile attack; esp. for Internet-based systems ī‚˛ Error tolerance ī‚§ Reflects the extent to which user input errors can be avoided and tolerated. 8 Security and Dependability
  • 9. Repairability ī‚˛ The disruption caused by system failure can be minimized if the system can be repaired quickly. ī‚˛ This requires problem diagnosis, access to the failed component(s) and making changes to fix the problems. ī‚˛ Repairability is a judgment of how easy it is to repair the software to correct the faults that led to a system failure. ī‚˛ Repairability is affected by the operating environment so is hard to assess before system deployment. Security and Dependability 9
  • 10. Maintainability ī‚˛ A system attribute that is concerned with the ease of repairing the system after a failure has been discovered or changing the system to include new features. ī‚˛ Repairability – short-term perspective to get the system back into service; Maintainability – long-term perspective. ī‚˛ Very important for critical systems as faults are often introduced into a system because of maintenance problems. If a system is maintainable, there is a lower probability that these faults will be introduced or undetected. 10 Security and Dependability
  • 11. Survivability ī‚˛ The ability of a system to continue to deliver its services to users in the face of deliberate or accidental attack ī‚˛ This is an increasingly important attribute for distributed systems whose security can be compromised ī‚˛ Survivability subsumes the notion of resilience - the ability of a system to continue in operation in spite of component failures 11 Security and Dependability
  • 12. Error tolerance ī‚˛ Part of a more general usability property and reflects the extent to which user errors are avoided, detected or tolerated. ī‚˛ User errors should, as far as possible, be detected and corrected automatically and should not be passed on to the system and cause failures. Security and Dependability 12
  • 13. Dependability attribute dependencies ī‚˛ Safe system operation depends on the system being available and operating reliably. ī‚˛ A system may be unreliable because its data has been corrupted by an external attack. ī‚˛ Denial of service attacks on a system are intended to make it unavailable. ī‚˛ If a system is infected with a virus, you cannot be confident in its reliability or safety. Security and Dependability 13
  • 14. Dependability achievement To develop dependable systems should: ī‚˛ Avoid the introduction of accidental errors when developing the system. ī‚˛ Design Verification & Validation processes that are effective in discovering residual errors in the system. ī‚˛ Design protection mechanisms that guard against external attacks. ī‚˛ Configure the system correctly for its operating environment. ī‚˛ Include recovery mechanisms to help restore normal system service after a failure. Security and Dependability 14
  • 15. Dependability costs ī‚˛ Dependability costs tend to increase exponentially as increasing levels of dependability are required. ī‚˛ There are two reasons for this ī‚§ The use of more expensive development techniques and hardware that are required to achieve the higher levels of dependability. ī‚§ The increased testing and system validation that is required to convince the system client and regulators that the required levels of dependability have been achieved. 15 Security and Dependability
  • 17. Dependability economics ī‚˛ Because of very high costs of dependability achievement, it may be more cost effective to accept untrustworthy systems and pay for failure costs ī‚˛ However, this depends on social and political factors. A reputation for products that can’t be trusted may lose future business ī‚˛ Depends on system type - for business systems in particular, modest levels of dependability may be adequate 17 Security and Dependability
  • 18. Availability and reliability ī‚˛ Reliability ī‚§ The probability of failure-free system operation over a specified time in a given environment for a given purpose ī‚˛ Availability ī‚§ The probability that a system, at a point in time, will be operational and able to deliver the requested services ī‚˛ Both of these attributes can be expressed quantitatively e.g. availability of 0.999 means that the system is up and running for 99.9% of the time. 18 Security and Dependability
  • 19. Availability and reliability ī‚˛ It is sometimes possible to subsume system availability under system reliability ī‚§ Obviously if a system is unavailable it is not delivering the specified system services. ī‚˛ However, it is possible to have systems with low reliability that must be available. ī‚§ So long as system failures can be repaired quickly and does not damage data, some system failures may not be a problem. ī‚˛ Availability is therefore best considered as a separate attribute reflecting whether or not the system can deliver its services. ī‚˛ Availability takes repair time into account, if the system has to be taken out of service to repair faults. 19 Security and Dependability
  • 20. Perceptions of reliability ī‚˛ The formal definition of reliability does not always reflect the user’s perception of a system’s reliability ī‚§ The assumptions that are made about the environment where a system will be used may be incorrect â€ĸ Usage of a system in an office environment is likely to be quite different from usage of the same system in a university environment ī‚§ The consequences of system failures affects the perception of reliability â€ĸ Unreliable windscreen wipers in a car may be irrelevant in a dry climate â€ĸ Failures that have serious consequences (such as an engine breakdown in a car) are given greater weight by users than failures that are inconvenient 20 Security and Dependability
  • 21. Reliability and specifications ī‚˛ Reliability can only be defined formally with respect to a system specification i.e. a failure is a deviation from a specification. ī‚˛ However, many specifications are incomplete or incorrect – hence, a system that conforms to its specification may ‘fail’ from the perspective of system users. ī‚˛ Furthermore, users don’t read specifications so don’t know how the system is supposed to behave. ī‚˛ Therefore perceived reliability is more important in practice. Security and Dependability 21
  • 22. Availability perception ī‚˛ Availability is usually expressed as a percentage of the time that the system is available to deliver services e.g. 99.95%. ī‚˛ However, this does not take into account two factors: ī‚§ The number of users affected by the service outage. Loss of service in the middle of the night is less important for many systems than loss of service during peak usage periods. ī‚§ The length of the outage. The longer the outage, the more the disruption. Several short outages are less likely to be disruptive than 1 long outage. Long repair times are a particular problem. Security and Dependability 22
  • 23. Reliability terminology Term Description Human error or mistake Human behavior that results in the introduction of faults into a system. For example, in the wilderness weather system, a programmer might decide that the way to compute the time for the next transmission is to add 1 hour to the current time. This works except when the transmission time is between 23.00 and midnight (midnight is 00.00 in the 24-hour clock). System fault A characteristic of a software system that can lead to a system error. The fault is the inclusion of the code to add 1 hour to the time of the last transmission, without a check if the time is greater than or equal to 23.00. System error An erroneous system state that can lead to system behavior that is unexpected by system users. The value of transmission time is set incorrectly (to 24.XX rather than 00.XX) when the faulty code is executed. System failure An event that occurs at some point in time when the system does not deliver a service as expected by its users. No weather data is transmitted because the time is invalid. 23 Security and Dependability
  • 24. Faults and failures ī‚˛ Failures are a usually a result of system errors that are derived from faults in the system ī‚˛ However, faults do not necessarily result in system errors ī‚§ The erroneous system state resulting from the fault may be transient and ‘corrected’ before an error arises. ī‚§ The faulty code may never be executed. ī‚˛ Errors do not necessarily lead to system failures ī‚§ The error can be corrected by built-in error detection and recovery ī‚§ The failure can be protected against by built-in protection facilities. These may, for example, protect system resources from system errors 24 Security and Dependability
  • 25. A system as an input/output mapping 25 Security and Dependability
  • 27. Reliability in use ī‚˛ Removing X% of the faults in a system will not necessarily improve the reliability by X%. A study at IBM showed that removing 60% of product defects resulted in a 3% improvement in reliability. ī‚˛ Program defects may be in rarely executed sections of the code so may never be encountered by users. Removing these does not affect the perceived reliability. ī‚˛ Users adapt their behaviour to avoid system features that may fail for them. ī‚˛ A program with known faults may therefore still be perceived as reliable by its users. 27 Security and Dependability
  • 28. Reliability achievement ī‚˛ Fault avoidance ī‚§ Development technique are used that either minimise the possibility of mistakes or trap mistakes before they result in the introduction of system faults. ī‚˛ Fault detection and removal ī‚§ Verification and validation techniques that increase the probability of detecting and correcting errors before the system goes into service are used. ī‚˛ Fault tolerance ī‚§ Run-time techniques are used to ensure that system faults do not result in system errors and/or that system errors do not lead to system failures. 28 Security and Dependability
  • 29. Safety ī‚˛ Safety-critical systems are systems where it is essential that operation is always safe. ī‚§ That is, the system should never damage people or the system’s environment even if the system fails. ī‚˛ Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death and without damage to the system’s environment. ī‚˛ It is important to consider software safety as most devices whose failure is critical now incorporate software-based control systems. ī‚˛ Safety requirements are often exclusive requirements i.e. they exclude undesirable situations rather than specify required system services. These generate functional safety requirements. 29 Security and Dependability
  • 30. Examples of safety-critical systems ī‚˛ Safety-critical systems are those systems whose failure could result in loss of life, significant property damage, or damage to the environment. ī‚˛ Examples: ī‚§ Control and monitoring systems in aircraft ī‚§ Process control systems in chemical and pharmaceutical plants ī‚§ Automobile control systems Security and Dependability 30
  • 31. Categories of safety-critical software ī‚˛ Primary safety-critical systems ī‚§ Embedded software systems whose failure can cause the associated hardware to fail and directly threaten people. Example is the insulin pump control system. ī‚˛ Secondary safety-critical systems ī‚§ Computer-aided engineering design system malfunctioning may result in a design fault in the object being designed. This fault might cause injury to people if the object malfunctions. ī‚§ Systems whose failure results in faults in other (socio-technical) systems, which can then have safety consequences. For example, the MHC-PMS is safety-critical as failure may lead to inappropriate treatment being prescribed. 31 Security and Dependability
  • 32. Safety and reliability ī‚˛ Safety and reliability are related but distinct ī‚§ In general, reliability and availability are necessary but not sufficient conditions for system safety ī‚˛ Reliability is concerned with conformance to a given specification and delivery of service ī‚˛ Safety is concerned with ensuring system cannot cause damage irrespective of whether or not it conforms to its specification 32 Security and Dependability
  • 33. Unsafe reliable systems ī‚˛ There may be dormant faults in a system that are undetected for many years and only rarely arise. ī‚˛ Specification errors ī‚§ If the system specification is incorrect/(does not describe system behaviour in critical situations) then the system can behave as specified but still cause an accident. ī‚˛ Hardware failures generating spurious inputs ī‚§ Hard to anticipate in the specification. ī‚˛ Context-sensitive commands i.e. issuing the right command at the wrong time ī‚§ Often the result of operator error. 33 Security and Dependability
  • 34. Safety terminology Term Definition Accident (or mishap) An unplanned event or sequence of events which results in human death or injury, damage to property, or to the environment. An overdose of insulin is an example of an accident. Hazard A condition with the potential for causing or contributing to an accident. A failure of the sensor that measures blood glucose is an example of a hazard. Damage A measure of the loss resulting from a mishap. Damage can range from many people being killed as a result of an accident to minor injury or property damage. Damage resulting from an overdose of insulin could be serious injury or the death of the user of the insulin pump. Hazard severity An assessment of the worst possible damage that could result from a particular hazard. Hazard severity can range from catastrophic, where many people are killed, to minor, where only minor damage results. When an individual death is a possibility, a reasonable assessment of hazard severity is ‘very high’. Hazard probability The probability of the events occurring which create a hazard. Probability values tend to be arbitrary but range from ‘probable’ (say 1/100 chance of a hazard occurring) to ‘implausible’ (no conceivable situations are likely in which the hazard could occur). The probability of a sensor failure in the insulin pump that results in an overdose is probably low. Risk This is a measure of the probability that the system will cause an accident. The risk is assessed by considering the hazard probability, the hazard severity, and the probability that the hazard will lead to an accident. The risk of an insulin overdose is probably medium to low. 34 Security and Dependability
  • 35. Safety achievement ī‚˛ Hazard avoidance ī‚§ The system is designed so that some classes of hazard simply cannot arise. â€ĸ E.g. a cutting system that requires an operator to use two hands to press separate buttons simultaneously avoids the hazard of the operator’s hands being in the blade pathway. ī‚˛ Hazard detection and removal ī‚§ The system is designed so that hazards are detected and removed before they result in an accident. ī‚˛ Damage limitation ī‚§ The system includes protection features that minimise the damage that may result from an accident. 35 Security and Dependability
  • 36. Normalaccidents ī‚˛ Accidents in complex systems rarely have a single cause as these systems are designed to be resilient to a single point of failure ī‚§ Designing systems so that a single point of failure does not cause an accident is a fundamental principle of safe systems design. ī‚˛ Almost all accidents are a result of combinations of malfunctions rather than single failures. ī‚˛ It is probably the case that anticipating all problem combinations, especially, in software controlled systems is impossible so achieving complete safety is impossible. Accidents are inevitable. 36 Security and Dependability
  • 37. Software safety benefits ī‚˛Although software failures can be safety-critical, the use of software control systems contributes to increased system safety ī‚§ Software monitoring and control allows a wider range of conditions to be monitored and controlled than is possible using electro-mechanical safety systems. ī‚§ Software control allows safety strategies to be adopted that reduce the amount of time people spend in hazardous environments. ī‚§ Software can detect and correct safety-critical operator errors. Security and Dependability 37
  • 38. Safety specification ī‚˛ Failures in safety-critical systems may affect the environment of the system and cause injury or death ī‚˛ Principal concern in safety specification is to identify requirements that will minimize the probability of failures ī‚˛ Goal is to identify protection requirements that ensure that system failures do not cause injury or death or environmental damage. Security and Dependability 38
  • 39. Safety specification (Contâ€Ļ) ī‚˛Risk identification = Hazard identification ī‚˛Risk analysis = Hazard assessment ī‚˛Risk decomposition = Hazard analysis ī‚˛Risk reduction = safety requirements specification Security and Dependability 39
  • 40. Security ī‚˛The security of a system is a system property that reflects the system’s ability to protect itself from accidental or deliberate external attack (s). ī‚˛Security is essential as most systems are networked so that external access to the system through the Internet is possible. ī‚˛Examples of external attacks: viruses; Trojan horses; unauthorized use of system services or data modification; ī‚˛Security is an essential pre-requisite for availability, reliability and safety. 40 Security and Dependability
  • 41. Fundamental security ī‚˛ If a system is a networked system and is insecure then statements about its reliability and its safety are unreliable. ī‚˛ These statements depend on the executing system and the developed system being the same. However, intrusion can change the executing system and/or its data. ī‚˛ Therefore, the reliability and safety assurance is no longer valid. 41 Security and Dependability
  • 42. Security terminology Term Definition Asset Something of value which has to be protected. The asset may be the software system itself or data used by that system. Exposure Possible loss or harm to a computing system. This can be loss or damage to data, or can be a loss of time and effort if recovery is necessary after a security breach. Vulnerability A weakness in a computer-based system that may be exploited to cause loss or harm. Attack An exploitation of a system’s vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. Threats Circumstances that have potential to cause loss or harm. You can think of these as a system vulnerability that is subjected to an attack. Control A protective measure that reduces a system’s vulnerability. Encryption is an example of a control that reduces a vulnerability of a weak access control system 42 Security and Dependability
  • 43. Examples of security terminology (MHC-PMS) Term Example Asset The records of each patient that is receiving or has received treatment. Exposure Potential financial loss from future patients who do not seek treatment because they do not trust the clinic to maintain their data. Financial loss from legal action by the sports star. Loss of reputation. Vulnerability A weak password system which makes it easy for users to set guessable passwords. User ids that are the same as names. Attack An impersonation of an authorized user. Threat An unauthorized user will gain access to the system by guessing the credentials (login name and password) of an authorized user. Control A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary. 43 Security and Dependability
  • 44. Threat classes In any networked system, there are three main threats: ī‚˛ Threats to the confidentiality of the system and its data ī‚§ Can disclose information to people or programs that are not authorized to access that information. ī‚˛ Threats to the integrity of the system and its data ī‚§ Can damage or corrupt the software or its data. ī‚˛ Threats to the availability of the system and its data ī‚§ Can restrict access to the system or its data for authorized users. Security and Dependability 44
  • 45. Damage from insecurity ī‚˛ Denial of service ī‚§ The system is forced into a state where normal services are unavailable or where service provision is significantly degraded ī‚˛ Corruption of programs or data ī‚§ The programs or data in the system may be modified in an unauthorised way ī‚˛ Disclosure of confidential information ī‚§ Information that is managed by the system may be exposed to people who are not authorised to read or use that information 45 Security and Dependability
  • 46. Security assurance ī‚˛ Vulnerability avoidance ī‚§ The system is designed so that vulnerabilities do not occur. For example, if there is no external network connection then external attack is impossible ī‚˛ Attack detection and elimination ī‚§ The system is designed so that attacks on vulnerabilities are detected and neutralised before they result in an exposure. For example, virus checkers find and remove viruses before they infect a system ī‚˛ Exposure limitation and recovery ī‚§ The system is designed so that the adverse consequences of a successful attack are minimised. For example, a backup policy allows damaged information to be restored 46 Security and Dependability
  • 47. Key points ī‚˛ Reliability is related to the probability of an error occurring in operational use. A system with known faults may be reliable. ī‚˛ Safety is a system attribute that reflects the system’s ability to operate without threatening people or the environment. ī‚˛ Security is a system attribute that reflects the system’s ability to protect itself from external attack. ī‚˛ Dependability is compromised if a system is insecure as the code or data may be corrupted. 47 Security and Dependability
  • 48. Key points ī‚˛ The dependability in a system reflects the user’s trust in that system. ī‚˛ Dependability is a term used to describe a set of related ‘non- functional’ system attributes – availability, reliability, safety and security. ī‚˛ The availability of a system is the probability that it will be available to deliver services when requested. ī‚˛ The reliability of a system is the probability that system services will be delivered as specified. 48 Security and Dependability
  • 49. END ī‚˛ Next we look at Distributed Software Engineering Security and Dependability 49