SlideShare a Scribd company logo
Critical Systems
Topics covered
A simple safety-critical system
System dependability
Availability and reliability
Safety
Security
Critical Systems
Safety-critical systems
• Failure results in loss of life, injury or damage to the
environment;
• Chemical plant protection system;
Mission-critical systems
• Failure results in failure of some goal-directed activity;
• Spacecraft navigation system;
Business-critical systems
• Failure results in high economic losses;
• Customer accounting system in a bank;
System dependability
For critical systems, it is usually the case that the
most important system property is the
dependability of the system.
The dependability of a system reflects the user’s
degree of trust in that system. It reflects the
extent of the user’s confidence that it will operate
as users expect and that it will not ‘fail’ in normal
use.
Importance of dependability
Systems that are not dependable and are
unreliable, unsafe or insecure may be rejected by
their users.
The costs of system failure may be very high.
Undependable systems may cause information
loss with a high consequent recovery cost.
Socio-technical critical systems
Hardware failure
• Hardware fails because of design and manufacturing
errors or because components have reached the end
of their natural life.
Software failure
• Software fails due to errors in its specification, design
or implementation.
Operational failure
• Human operators make mistakes. Now perhaps the
largest single cause of system failures.
A software-controlled insulin pump
Used by diabetics to simulate the function of the
pancreas which manufactures insulin, an
essential hormone that metabolizes blood
glucose.
Measures blood glucose (sugar) using a micro-
sensor and computes the insulin dose required to
metabolize the glucose.
Insulin pump organisation
Needle
assembly
Sensor
Display1 Display2
Alarm
Pump Clock
Controller
Power supply
Insulin reservoir
Insulin pump data-flow
Insulin
requirement
computation
Blood sugar
analysis
Blood sugar
sensor
Insulin
delivery
controller
Insulin
pump
Blood
Blood
parameters
Blood sugar
level
Insulin
Pump control
commands Insulin
requirement
Dependability requirements
The system shall be available to deliver insulin
when required to do so.
The system shall perform reliably and deliver the
correct amount of insulin to counteract the current
level of blood sugar.
The essential safety requirement is that
excessive doses of insulin should never be
delivered as this is potentially life threatening.
Dependability
The dependability of a system equates to its
trustworthiness.
A dependable system is a system that is trusted
by its users.
Principal dimensions of dependability are:
• Availability;
• Reliability;
• Safety;
• Security
Dimensions of dependability
Dependability
Availability Reliability Security
The ability of the system
to deliver services when
requested
The ability of the system
to deliver services as
specified
The ability of the system
to operate without
catastrophic failure
The ability of the system
to protect itelf against
accidental or deliberate
intrusion
Safety
Other dependability properties
Repairability
• Reflects the extent to which the system can be repaired in the
event of a failure
Maintainability
• Reflects the extent to which the system can be adapted to new
requirements;
Survivability
• Reflects the extent to which the system can deliver services
whilst under hostile attack;
Error tolerance
• Reflects the extent to which user input errors can be avoided
and tolerated.
Maintainability
A system attribute that is concerned with the ease
of repairing the system after a failure has been
discovered or changing the system to include
new features
Very important for critical systems as faults are
often introduced into a system because of
maintenance problems
Survivability
The ability of a system to continue to deliver its
services to users in the face of deliberate or
accidental attack
This is an increasingly important attribute for
distributed systems whose security can be
compromised
Survivability subsumes the notion of resilience -
the ability of a system to continue in operation in
spite of component failures
Dependability vs performance
Untrustworthy systems may be rejected by their users
System failure costs may be very high
It is very difficult to tune systems to make them more
dependable
It may be possible to compensate for poor performance
Untrustworthy systems may cause loss of valuable
information
Dependability costs
Dependability costs tend to increase exponentially as
increasing levels of dependability are required
There are two reasons for this
• The use of more expensive development techniques and
hardware that are required to achieve the higher levels of
dependability
• The increased testing and system validation that is required to
convince the system client that the required levels of
dependability have been achieved
Costs of increasing dependability
Low Medium High Very
high
Ultra-high
Dependability
Availability and reliability
Reliability
• The probability of failure-free system operation over a
specified time in a given environment for a given
purpose
Availability
• The probability that a system, at a point in time, will
be operational and able to deliver the requested
services
Availability and reliability
It is sometimes possible to subsume system
availability under system reliability
• Obviously if a system is unavailable it is not delivering
the specified system services
However, it is possible to have systems with low
reliability that must be available. So long as
system failures can be repaired quickly and do
not damage data, low reliability may not be a
problem
Availability takes repair time into account
Reliability terminology
Term Description
System failure An event that occurs at some point in time when
the system does not deliver a service as expected
by its users
System error An erroneous system state that can lead to system
behaviour that is unexpected by system users.
System fault A characteristic of a software system that can
lead to a system error. For example, failure to
initialise a variable could lead to that variable
having the wrong value when it is used.
Human error or
mistake
Human behaviour that results in the introduction
of faults into a system.
Faults and failures
Failures are a usually a result of system errors that are
derived from faults in the system
However, faults do not necessarily result in system errors
• The faulty system state may be transient and ‘corrected’ before
an error arises
Errors do not necessarily lead to system failures
• The error can be corrected by built-in error detection and
recovery
• The failure can be protected against by built-in protection
facilities. These may, for example, protect system resources
from system errors
Reliability achievement
Fault avoidance
• Development technique are used that either minimise the
possibility of mistakes or trap mistakes before they result in the
introduction of system faults
Fault detection and removal
• Verification and validation techniques that increase the
probability of detecting and correcting errors before the system
goes into service are used
Fault tolerance
• Run-time techniques are used to ensure that system faults do
not result in system errors and/or that system errors do not lead
to system failures
Reliability modelling
You can model a system as an input-output
mapping where some inputs will result in
erroneous outputs
The reliability of the system is the probability that
a particular input will lie in the set of inputs that
cause erroneous outputs
Different people will use the system in different
ways so this probability is not a static system
attribute but depends on the system’s
environment
Input/output mapping
IeInput set
OeOutput set
Program
Inputs causing
erroneous outputs
Erroneous
outputs
Reliability perception
Possible
inputs
User
1
User
3
User
2
Erroneous
inputs
Reliability improvement
Removing X% of the faults in a system will not necessarily
improve the reliability by X%. A study at IBM showed that
removing 60% of product defects resulted in a 3%
improvement in reliability
Program defects may be in rarely executed sections of
the code so may never be encountered by users.
Removing these does not affect the perceived reliability
A program with known faults may therefore still be seen
as reliable by its users
Safety
Safety is a property of a system that reflects the
system’s ability to operate, normally or
abnormally, without danger of causing human
injury or death and without damage to the
system’s environment
It is increasingly important to consider software
safety as more and more devices incorporate
software-based control systems
Primary safety-critical systems
• Embedded software systems whose failure can
cause the associated hardware to fail and directly
threaten people.
Secondary safety-critical systems
• Systems whose failure results in faults in other
systems which can threaten people
Discussion here focuses on primary safety-critical
systems.
Safety criticality
Safety and reliability are related but distinct
Reliability is concerned with conformance to a
given specification and delivery of service
Safety is concerned with ensuring system cannot
cause damage irrespective of whether
or not it conforms to its specification
Safety and reliability
Safety terminology
Term Definition
Accident (or
mishap)
An unplanned event or sequence of events which results in human death or injury,
damage to property or to the environment. A computer-controlled machine injuring its
operator is an example of an accident.
Hazard A condition with the potential for causing or contributing to an accident. A failure of
the sensor that detects an obstacle in front of a machine is an example of a hazard.
Damage A measure of the loss resulting from a mishap. Damage can range from many people
killed as a result of an accident to minor injury or property damage.
Hazard
severity
An assessment of the worst possible damage that could result from a particular
hazard. Hazard severity can range from catastrophic where many people are killed to
minor where only minor damage results.
Hazard
probability
The probability of the events occurring which create a hazard. Probability values tend
to be arbitrary but range from probable (say 1/100 chance of a hazard occurring) to
implausible (no conceivable situations are likely where the hazard could occur).
Risk This is a measure of the probability that the system will cause an accident. The risk is
assessed by considering the hazard probability, the hazard severity and the probability
that a hazard will result in an accident.
Safety achievement
Hazard avoidance
• The system is designed so that some classes of hazard simply
cannot arise.
Hazard detection and removal
• The system is designed so that hazards are detected and
removed before they result in an accident
Damage limitation
• The system includes protection features that minimise the
damage that may result from an accident
Security
The security of a system is a system property that
reflects the system’s ability to protect itself from
accidental or deliberate external attack
Security is becoming increasingly important as
systems are networked so that external access to
the system through the Internet is possible
Security is an essential pre-requisite for
availability, reliability and safety
Fundamental security
If a system is a networked system and is insecure
then statements about its reliability and its safety
are unreliable
These statements depend on the executing
system and the developed system being the
same. However, intrusion can change the
executing system and/or its data
Security terminology
Term Definition
Exposure Possible loss or harm in a computing system. This can be loss or
damage to data or can be a loss of time and effort if recovery is
necessary after a security breach.
Vulnerability A weakness in a computer-based system that may be exploited to
cause loss or harm.
Attack An exploitation of a system vulnerability. Generally, this is from
outside the system and is a deliberate attempt to cause some damage.
Threats Circumstances that have potential to cause loss or harm. You can
think of these as a system vulnerability that is subjected to an attack.
Control A protective measure that reduces a system vulnerability. Encryption
would be an example of a control that reduced a vulnerability of a
weak access control system.
Damage from insecurity
Denial of service
• The system is forced into a state where normal services are
unavailable or where service provision is significantly degraded
Corruption of programs or data
• The programs or data in the system may be modified in an
unauthorised way
Disclosure of confidential information
• Information that is managed by the system may be exposed to
people who are not authorised to read or use that information
Security assurance
Vulnerability avoidance
• The system is designed so that vulnerabilities do not occur. For
example, if there is no external network connection then
external attack is impossible
Attack detection and elimination
• The system is designed so that attacks on vulnerabilities are
detected and neutralised before they result in an exposure. For
example, virus checkers find and remove viruses before they
infect a system
Exposure limitation
• The system is designed so that the adverse consequences of a
successful attack are minimised. For example, a backup policy
allows damaged information to be restored

More Related Content

What's hot

Defect prevention
Defect preventionDefect prevention
Defect prevention
Vamsipothuri
 
Testing Centre Of Excellence From AppLabs
Testing Centre Of Excellence From AppLabsTesting Centre Of Excellence From AppLabs
Testing Centre Of Excellence From AppLabs
VIJAYA BHASKARA VARMA YARAKARAJU
 
Software quality
Software qualitySoftware quality
Software quality
jagadeesan
 
Unit I Software Testing and Quality Assurance
Unit I Software Testing and Quality AssuranceUnit I Software Testing and Quality Assurance
Unit I Software Testing and Quality Assurance
VinothkumaR Ramu
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!
TechWell
 
Non Functional Testing
Non Functional TestingNon Functional Testing
Non Functional Testing
Nishant Worah
 
Software testability slide share
Software testability slide shareSoftware testability slide share
Software testability slide share
BeBo Technology
 
verification and validation
verification and validationverification and validation
verification and validation
Dinesh Pasi
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliability
Vaibhav Khanna
 
Testing capability ppt
Testing capability pptTesting capability ppt
Testing capability ppt
anilreddyqa
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
dhawal mehta
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
Aryan Ajmer
 
Ch21 real time software engineering
Ch21 real time software engineeringCh21 real time software engineering
Ch21 real time software engineering
software-engineering-book
 
Software quality models
Software quality modelsSoftware quality models
Software quality models
ONKAR PANDE
 
Software reliability growth model
Software reliability growth modelSoftware reliability growth model
Software reliability growth model
Himanshu
 
Software Testing Strategies
Software Testing StrategiesSoftware Testing Strategies
Software Testing Strategies
Adeel Rasheed
 
Software design principles
Software design principlesSoftware design principles
Software design principles
Ritesh Singh
 
Software Process Improvement
Software Process ImprovementSoftware Process Improvement
Software Process Improvement
Bilal Shah
 
Software re engineering
Software re engineeringSoftware re engineering
Software re engineering
deshpandeamrut
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
University of Sargodha
 

What's hot (20)

Defect prevention
Defect preventionDefect prevention
Defect prevention
 
Testing Centre Of Excellence From AppLabs
Testing Centre Of Excellence From AppLabsTesting Centre Of Excellence From AppLabs
Testing Centre Of Excellence From AppLabs
 
Software quality
Software qualitySoftware quality
Software quality
 
Unit I Software Testing and Quality Assurance
Unit I Software Testing and Quality AssuranceUnit I Software Testing and Quality Assurance
Unit I Software Testing and Quality Assurance
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!
 
Non Functional Testing
Non Functional TestingNon Functional Testing
Non Functional Testing
 
Software testability slide share
Software testability slide shareSoftware testability slide share
Software testability slide share
 
verification and validation
verification and validationverification and validation
verification and validation
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliability
 
Testing capability ppt
Testing capability pptTesting capability ppt
Testing capability ppt
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 
Ch21 real time software engineering
Ch21 real time software engineeringCh21 real time software engineering
Ch21 real time software engineering
 
Software quality models
Software quality modelsSoftware quality models
Software quality models
 
Software reliability growth model
Software reliability growth modelSoftware reliability growth model
Software reliability growth model
 
Software Testing Strategies
Software Testing StrategiesSoftware Testing Strategies
Software Testing Strategies
 
Software design principles
Software design principlesSoftware design principles
Software design principles
 
Software Process Improvement
Software Process ImprovementSoftware Process Improvement
Software Process Improvement
 
Software re engineering
Software re engineeringSoftware re engineering
Software re engineering
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 

Viewers also liked

ILS Allmänt
ILS AllmäntILS Allmänt
ILS Allmänt
Tomas Ternstrom
 
C -users-mmusa-desktop-exams-exam1 2
C -users-mmusa-desktop-exams-exam1 2C -users-mmusa-desktop-exams-exam1 2
C -users-mmusa-desktop-exams-exam1 2
Saad Darras
 
IncQuery gets Sirius: faster and better diagrams
IncQuery gets Sirius: faster and better diagramsIncQuery gets Sirius: faster and better diagrams
IncQuery gets Sirius: faster and better diagrams
Ákos Horváth
 
Software Development for Safety Critical Systems
Software Development for Safety Critical SystemsSoftware Development for Safety Critical Systems
Software Development for Safety Critical Systems
Ákos Horváth
 
Safety Critical Research
Safety Critical ResearchSafety Critical Research
Safety Critical Research
Jennifer (Hui) Li
 
Safety for life: Bringing new Life to Process Safety
Safety for life:  Bringing new Life to Process SafetySafety for life:  Bringing new Life to Process Safety
Safety for life: Bringing new Life to Process Safety
Schneider Electric
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto Itinerary
Salie Lim
 
System safety
System safetySystem safety
System safety
sommerville-videos
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
sommerville-videos
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
software-engineering-book
 
Insulin pump overview
Insulin pump overviewInsulin pump overview
Insulin pump overview
software-engineering-book
 
Ch9 evolution
Ch9 evolutionCh9 evolution
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
Dr. Loganathan R
 
Chapter 01 -Introduction of OSHA
Chapter 01 -Introduction of OSHAChapter 01 -Introduction of OSHA
Chapter 01 -Introduction of OSHA
Politeknik Kuching Sarawak
 
Safety Integrity Levels
Safety Integrity LevelsSafety Integrity Levels
Safety Integrity Levels
Sandeep Patalay
 
Dialysis various modalities and indices used
Dialysis various modalities and indices usedDialysis various modalities and indices used
Dialysis various modalities and indices used
Abhay Mange
 
Importance of industrial safety
Importance of industrial safetyImportance of industrial safety
Importance of industrial safety
Sure Safety (I) Pvt Ltd
 
Air Traffic Control
Air Traffic ControlAir Traffic Control
Air Traffic Control
Sharda University
 
Hazard Control Safety Training
Hazard Control Safety TrainingHazard Control Safety Training
Hazard Control Safety Training
safety113
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safety
Anita Sharma
 

Viewers also liked (20)

ILS Allmänt
ILS AllmäntILS Allmänt
ILS Allmänt
 
C -users-mmusa-desktop-exams-exam1 2
C -users-mmusa-desktop-exams-exam1 2C -users-mmusa-desktop-exams-exam1 2
C -users-mmusa-desktop-exams-exam1 2
 
IncQuery gets Sirius: faster and better diagrams
IncQuery gets Sirius: faster and better diagramsIncQuery gets Sirius: faster and better diagrams
IncQuery gets Sirius: faster and better diagrams
 
Software Development for Safety Critical Systems
Software Development for Safety Critical SystemsSoftware Development for Safety Critical Systems
Software Development for Safety Critical Systems
 
Safety Critical Research
Safety Critical ResearchSafety Critical Research
Safety Critical Research
 
Safety for life: Bringing new Life to Process Safety
Safety for life:  Bringing new Life to Process SafetySafety for life:  Bringing new Life to Process Safety
Safety for life: Bringing new Life to Process Safety
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto Itinerary
 
System safety
System safetySystem safety
System safety
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
Insulin pump overview
Insulin pump overviewInsulin pump overview
Insulin pump overview
 
Ch9 evolution
Ch9 evolutionCh9 evolution
Ch9 evolution
 
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
 
Chapter 01 -Introduction of OSHA
Chapter 01 -Introduction of OSHAChapter 01 -Introduction of OSHA
Chapter 01 -Introduction of OSHA
 
Safety Integrity Levels
Safety Integrity LevelsSafety Integrity Levels
Safety Integrity Levels
 
Dialysis various modalities and indices used
Dialysis various modalities and indices usedDialysis various modalities and indices used
Dialysis various modalities and indices used
 
Importance of industrial safety
Importance of industrial safetyImportance of industrial safety
Importance of industrial safety
 
Air Traffic Control
Air Traffic ControlAir Traffic Control
Air Traffic Control
 
Hazard Control Safety Training
Hazard Control Safety TrainingHazard Control Safety Training
Hazard Control Safety Training
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safety
 

Similar to Critical Systems

Ch3
Ch3Ch3
Ch3
Ch3Ch3
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
koolkampus
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
VaishaliBagewadikar
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf
FelixKipyego1
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
arvind pandey
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
aizazhussain234
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
Ch11
Ch11Ch11
Reliability Engineering
Reliability EngineeringReliability Engineering
Reliability Engineering
Priyanshu Mishra
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
Ian Sommerville
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
Siddharth Ayer
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
Ehsan Ilahi
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability Engineering
Harsh Verdhan Raj
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
Nur Islam
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
software-engineering-book
 
Ch24
Ch24Ch24
Ch24
phanleson
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
Gaurav Rawat
 
Software Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxSoftware Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptx
VishalPadme2
 
Ch9
Ch9Ch9

Similar to Critical Systems (20)

Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Ch11
Ch11Ch11
Ch11
 
Reliability Engineering
Reliability EngineeringReliability Engineering
Reliability Engineering
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability Engineering
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Ch24
Ch24Ch24
Ch24
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Software Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxSoftware Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptx
 
Ch9
Ch9Ch9
Ch9
 

More from Usman Bin Saad

financial statement analysis
financial statement analysisfinancial statement analysis
financial statement analysis
Usman Bin Saad
 
Unit costing
Unit costing Unit costing
Unit costing
Usman Bin Saad
 
Stack and its usage in assembly language
Stack and its usage in assembly language Stack and its usage in assembly language
Stack and its usage in assembly language
Usman Bin Saad
 
Biochem
BiochemBiochem
Calculas
CalculasCalculas
Calculas
Usman Bin Saad
 
Hybrid Cars , Autonomous Cars and future trends and Technologies
Hybrid Cars , Autonomous Cars and future trends and Technologies Hybrid Cars , Autonomous Cars and future trends and Technologies
Hybrid Cars , Autonomous Cars and future trends and Technologies
Usman Bin Saad
 
Software Processes
Software Processes Software Processes
Software Processes
Usman Bin Saad
 
Project management
Project managementProject management
Project management
Usman Bin Saad
 
Hybrid Cars
Hybrid Cars Hybrid Cars
Hybrid Cars
Usman Bin Saad
 
Presentation of se
Presentation of sePresentation of se
Presentation of se
Usman Bin Saad
 
Environment
EnvironmentEnvironment
Environment
Usman Bin Saad
 
Top 10 Innovations of 2015
Top 10 Innovations of 2015Top 10 Innovations of 2015
Top 10 Innovations of 2015
Usman Bin Saad
 

More from Usman Bin Saad (12)

financial statement analysis
financial statement analysisfinancial statement analysis
financial statement analysis
 
Unit costing
Unit costing Unit costing
Unit costing
 
Stack and its usage in assembly language
Stack and its usage in assembly language Stack and its usage in assembly language
Stack and its usage in assembly language
 
Biochem
BiochemBiochem
Biochem
 
Calculas
CalculasCalculas
Calculas
 
Hybrid Cars , Autonomous Cars and future trends and Technologies
Hybrid Cars , Autonomous Cars and future trends and Technologies Hybrid Cars , Autonomous Cars and future trends and Technologies
Hybrid Cars , Autonomous Cars and future trends and Technologies
 
Software Processes
Software Processes Software Processes
Software Processes
 
Project management
Project managementProject management
Project management
 
Hybrid Cars
Hybrid Cars Hybrid Cars
Hybrid Cars
 
Presentation of se
Presentation of sePresentation of se
Presentation of se
 
Environment
EnvironmentEnvironment
Environment
 
Top 10 Innovations of 2015
Top 10 Innovations of 2015Top 10 Innovations of 2015
Top 10 Innovations of 2015
 

Recently uploaded

YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
NishanthaBulumulla1
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 

Recently uploaded (20)

YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 

Critical Systems

  • 2. Topics covered A simple safety-critical system System dependability Availability and reliability Safety Security
  • 3. Critical Systems Safety-critical systems • Failure results in loss of life, injury or damage to the environment; • Chemical plant protection system; Mission-critical systems • Failure results in failure of some goal-directed activity; • Spacecraft navigation system; Business-critical systems • Failure results in high economic losses; • Customer accounting system in a bank;
  • 4. System dependability For critical systems, it is usually the case that the most important system property is the dependability of the system. The dependability of a system reflects the user’s degree of trust in that system. It reflects the extent of the user’s confidence that it will operate as users expect and that it will not ‘fail’ in normal use.
  • 5. Importance of dependability Systems that are not dependable and are unreliable, unsafe or insecure may be rejected by their users. The costs of system failure may be very high. Undependable systems may cause information loss with a high consequent recovery cost.
  • 6. Socio-technical critical systems Hardware failure • Hardware fails because of design and manufacturing errors or because components have reached the end of their natural life. Software failure • Software fails due to errors in its specification, design or implementation. Operational failure • Human operators make mistakes. Now perhaps the largest single cause of system failures.
  • 7. A software-controlled insulin pump Used by diabetics to simulate the function of the pancreas which manufactures insulin, an essential hormone that metabolizes blood glucose. Measures blood glucose (sugar) using a micro- sensor and computes the insulin dose required to metabolize the glucose.
  • 8. Insulin pump organisation Needle assembly Sensor Display1 Display2 Alarm Pump Clock Controller Power supply Insulin reservoir
  • 9. Insulin pump data-flow Insulin requirement computation Blood sugar analysis Blood sugar sensor Insulin delivery controller Insulin pump Blood Blood parameters Blood sugar level Insulin Pump control commands Insulin requirement
  • 10. Dependability requirements The system shall be available to deliver insulin when required to do so. The system shall perform reliably and deliver the correct amount of insulin to counteract the current level of blood sugar. The essential safety requirement is that excessive doses of insulin should never be delivered as this is potentially life threatening.
  • 11. Dependability The dependability of a system equates to its trustworthiness. A dependable system is a system that is trusted by its users. Principal dimensions of dependability are: • Availability; • Reliability; • Safety; • Security
  • 12. Dimensions of dependability Dependability Availability Reliability Security The ability of the system to deliver services when requested The ability of the system to deliver services as specified The ability of the system to operate without catastrophic failure The ability of the system to protect itelf against accidental or deliberate intrusion Safety
  • 13. Other dependability properties Repairability • Reflects the extent to which the system can be repaired in the event of a failure Maintainability • Reflects the extent to which the system can be adapted to new requirements; Survivability • Reflects the extent to which the system can deliver services whilst under hostile attack; Error tolerance • Reflects the extent to which user input errors can be avoided and tolerated.
  • 14. Maintainability A system attribute that is concerned with the ease of repairing the system after a failure has been discovered or changing the system to include new features Very important for critical systems as faults are often introduced into a system because of maintenance problems
  • 15. Survivability The ability of a system to continue to deliver its services to users in the face of deliberate or accidental attack This is an increasingly important attribute for distributed systems whose security can be compromised Survivability subsumes the notion of resilience - the ability of a system to continue in operation in spite of component failures
  • 16. Dependability vs performance Untrustworthy systems may be rejected by their users System failure costs may be very high It is very difficult to tune systems to make them more dependable It may be possible to compensate for poor performance Untrustworthy systems may cause loss of valuable information
  • 17. Dependability costs Dependability costs tend to increase exponentially as increasing levels of dependability are required There are two reasons for this • The use of more expensive development techniques and hardware that are required to achieve the higher levels of dependability • The increased testing and system validation that is required to convince the system client that the required levels of dependability have been achieved
  • 18. Costs of increasing dependability Low Medium High Very high Ultra-high Dependability
  • 19. Availability and reliability Reliability • The probability of failure-free system operation over a specified time in a given environment for a given purpose Availability • The probability that a system, at a point in time, will be operational and able to deliver the requested services
  • 20. Availability and reliability It is sometimes possible to subsume system availability under system reliability • Obviously if a system is unavailable it is not delivering the specified system services However, it is possible to have systems with low reliability that must be available. So long as system failures can be repaired quickly and do not damage data, low reliability may not be a problem Availability takes repair time into account
  • 21. Reliability terminology Term Description System failure An event that occurs at some point in time when the system does not deliver a service as expected by its users System error An erroneous system state that can lead to system behaviour that is unexpected by system users. System fault A characteristic of a software system that can lead to a system error. For example, failure to initialise a variable could lead to that variable having the wrong value when it is used. Human error or mistake Human behaviour that results in the introduction of faults into a system.
  • 22. Faults and failures Failures are a usually a result of system errors that are derived from faults in the system However, faults do not necessarily result in system errors • The faulty system state may be transient and ‘corrected’ before an error arises Errors do not necessarily lead to system failures • The error can be corrected by built-in error detection and recovery • The failure can be protected against by built-in protection facilities. These may, for example, protect system resources from system errors
  • 23. Reliability achievement Fault avoidance • Development technique are used that either minimise the possibility of mistakes or trap mistakes before they result in the introduction of system faults Fault detection and removal • Verification and validation techniques that increase the probability of detecting and correcting errors before the system goes into service are used Fault tolerance • Run-time techniques are used to ensure that system faults do not result in system errors and/or that system errors do not lead to system failures
  • 24. Reliability modelling You can model a system as an input-output mapping where some inputs will result in erroneous outputs The reliability of the system is the probability that a particular input will lie in the set of inputs that cause erroneous outputs Different people will use the system in different ways so this probability is not a static system attribute but depends on the system’s environment
  • 25. Input/output mapping IeInput set OeOutput set Program Inputs causing erroneous outputs Erroneous outputs
  • 27. Reliability improvement Removing X% of the faults in a system will not necessarily improve the reliability by X%. A study at IBM showed that removing 60% of product defects resulted in a 3% improvement in reliability Program defects may be in rarely executed sections of the code so may never be encountered by users. Removing these does not affect the perceived reliability A program with known faults may therefore still be seen as reliable by its users
  • 28. Safety Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death and without damage to the system’s environment It is increasingly important to consider software safety as more and more devices incorporate software-based control systems
  • 29. Primary safety-critical systems • Embedded software systems whose failure can cause the associated hardware to fail and directly threaten people. Secondary safety-critical systems • Systems whose failure results in faults in other systems which can threaten people Discussion here focuses on primary safety-critical systems. Safety criticality
  • 30. Safety and reliability are related but distinct Reliability is concerned with conformance to a given specification and delivery of service Safety is concerned with ensuring system cannot cause damage irrespective of whether or not it conforms to its specification Safety and reliability
  • 31. Safety terminology Term Definition Accident (or mishap) An unplanned event or sequence of events which results in human death or injury, damage to property or to the environment. A computer-controlled machine injuring its operator is an example of an accident. Hazard A condition with the potential for causing or contributing to an accident. A failure of the sensor that detects an obstacle in front of a machine is an example of a hazard. Damage A measure of the loss resulting from a mishap. Damage can range from many people killed as a result of an accident to minor injury or property damage. Hazard severity An assessment of the worst possible damage that could result from a particular hazard. Hazard severity can range from catastrophic where many people are killed to minor where only minor damage results. Hazard probability The probability of the events occurring which create a hazard. Probability values tend to be arbitrary but range from probable (say 1/100 chance of a hazard occurring) to implausible (no conceivable situations are likely where the hazard could occur). Risk This is a measure of the probability that the system will cause an accident. The risk is assessed by considering the hazard probability, the hazard severity and the probability that a hazard will result in an accident.
  • 32. Safety achievement Hazard avoidance • The system is designed so that some classes of hazard simply cannot arise. Hazard detection and removal • The system is designed so that hazards are detected and removed before they result in an accident Damage limitation • The system includes protection features that minimise the damage that may result from an accident
  • 33. Security The security of a system is a system property that reflects the system’s ability to protect itself from accidental or deliberate external attack Security is becoming increasingly important as systems are networked so that external access to the system through the Internet is possible Security is an essential pre-requisite for availability, reliability and safety
  • 34. Fundamental security If a system is a networked system and is insecure then statements about its reliability and its safety are unreliable These statements depend on the executing system and the developed system being the same. However, intrusion can change the executing system and/or its data
  • 35. Security terminology Term Definition Exposure Possible loss or harm in a computing system. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. Vulnerability A weakness in a computer-based system that may be exploited to cause loss or harm. Attack An exploitation of a system vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. Threats Circumstances that have potential to cause loss or harm. You can think of these as a system vulnerability that is subjected to an attack. Control A protective measure that reduces a system vulnerability. Encryption would be an example of a control that reduced a vulnerability of a weak access control system.
  • 36. Damage from insecurity Denial of service • The system is forced into a state where normal services are unavailable or where service provision is significantly degraded Corruption of programs or data • The programs or data in the system may be modified in an unauthorised way Disclosure of confidential information • Information that is managed by the system may be exposed to people who are not authorised to read or use that information
  • 37. Security assurance Vulnerability avoidance • The system is designed so that vulnerabilities do not occur. For example, if there is no external network connection then external attack is impossible Attack detection and elimination • The system is designed so that attacks on vulnerabilities are detected and neutralised before they result in an exposure. For example, virus checkers find and remove viruses before they infect a system Exposure limitation • The system is designed so that the adverse consequences of a successful attack are minimised. For example, a backup policy allows damaged information to be restored