SlideShare a Scribd company logo
1 of 25
Critical Systems Engineering

                                     Prof Ian Sommerville
                                      Dr John Rooksby




Critical systems engineering, 2012                          Slide 1
Course aims
  •       When you have completed this course, you should:
        –       understand what is meant by a critical system and have
                learned about different types of critical systems.
        –       understand the fundamental concepts of system
                dependability and security and know about the key technical
                activities – specification, development and assurance - in
                critical systems engineering.
        –       understand that critical systems are usually not simply
                technical systems but are socio-technical systems that
                include people and processes and are profoundly affected by
                organisational politics and policies.



Critical systems engineering, 2012                                       Slide 2
Presentation
 •    3 hour slot, one afternoon per week (normally
      Thursdays) from 13.30 to 16.30. Short breaks at
      14.25 and 15.35.
 •    Benefits of this approach
     –    Gives time for coverage of a topic so that you don’t forget
          material between lectures
     –    Provides an opportunity to integrate work on case studies
          with the lecture material
     –    Allows time for class exercises where required

 •    Problems
     –           More tiring for students (and lecturer) than separate lecture
                 slots
Critical systems engineering, 2012                                         Slide 3
Course topics
  •       Introduction to critical systems (IS), System failure
          (JR)
  •       Requirements engineering, dependability concepts
          (IS)
  •       Human error and reliability (JR)
  •       Dependability specification (IS)
  •       Learning from failure (JR)
  •       Dependability engineering, fault tolerant system
          architectures (IS)

Critical systems engineering, 2012                            Slide 4
Course topics
  •       Organisations and organisational failure (JR)
  •       Security engineering (IS)
  •       Methods of dependability assurance, dependability
          cases (IS)
  •       Critical infrastructure and the internet (JR)




Critical systems engineering, 2012                        Slide 5
Assessment
  •       Examination (40%)
        –       Covering all topics in the course

  •       Coursework (60%)
        –       Two pieces of coursework – 1 on the technical and 1 on the
                socio-technical aspect of the course. Each will be of equal
                weight (30%)




Critical systems engineering, 2012                                     Slide 6
Web site


  http://www.cs.st-
  andrews.ac.uk/~ifs/Teaching/MScCritSysEng2012/index.
  html


  Copies of slides are on Slideshare (as well as studres)
  and will be linked from the course web site.
  Twitter: @StACS5032CritSy

Critical systems engineering, 2012                     Slide 7
Critical systems




Critical systems engineering, 2012                      Slide 8
Critical system essentials
                          Safety
                          The system should not harm people or
                          the system’s environment



    Reliability                                         Availability
    The system must operate without                   The system must be available to
    serious failures                                  deliver services when requested
                                                 to
                                                      do so
                            Security
                            The system must be able to protect itself
                            and its data from malicious use



Critical systems engineering, 2012                                               Slide 9
Classes of critical system
  •       Safety-critical systems
        –       Failure results in loss of life, injury or damage to the environment
                e.g. chemical plant protection system;

  •       Mission-critical systems
        –       Failure results in failure of some goal-directed activity e.g.
                spacecraft navigation system;

  •       Business-critical systems
        –       Failure results in high economic losses e.g. customer accounting
                system in a bank;

  •       Infrastructure systems
        –       Failure results in a loss of infrastructure capability e.g. power
                distribution control system, broadband communications, etc.

Critical systems engineering, 2012                                                  Slide 10
Critical systems stack

                          Critical system  External systems
                                 X
                           Operating system and middleware

                                       System hardware

                                     Infrastructure systems

                                     Physical infrastructure



Critical systems engineering, 2012                             Slide 11
System dependencies
  •       Independent critical systems
        –       Infrastructure/hardware is part of the system
        –       System operation is not dependent on external systems
        –       Embedded control systems such as those in medical devices

  •       Critical software systems
        –       Usually rely on commodity hardware/OS
        –       System operation is dependent on external infrastructure
                provision
        –       Hospital appointments system



Critical systems engineering, 2012                                      Slide 12
Systems of systems
  •       A critical system is rarely a single system but is a
          network of several software-intensive systems as well
          as infrastructure systems
  •       Systems that support organisational needs (e.g. an
          inter-bank payments system) have to be designed to
          be robust so that they can cope with failures and
          unavailability in the other systems on which they
          depend




Critical systems engineering, 2012                        Slide 13
Systems of systems
  •       Systems of systems (SoS) are complex socio-
          technical systems with
        –       Different owners and management policies
        –       Distributed operation
        –       Heterogeneous hardware and software

  •       Individual systems may be part of several SoS so
        –       Conflicting requirements from different uses of the system
        –       Complex negotations may be required when system changes
                are to be made



Critical systems engineering, 2012                                      Slide 14
Socio-technical systems
                                     •   Socio-technical systems
                                         include IT systems and the
                                         social and organisational
                                         environment in which these
                                         systems are used
                                     •   Key influences are human
                                         behaviour, organisational
                                         processes and
                                         policies, regulations, cultur
                                         e


Critical systems engineering, 2012                              Slide 15
Socio-technical systems

                                       Social and political environment


                                     Laws, regulations, custom & practice


System                                                                      Business
users                                     Software-intensive system         processes



                                      Organisational policies and culture


                                     Organisational strategies and goals

Critical systems engineering, 2012                                               Slide 16
Regulation
  •       Regulators are government-appointed bodies whose
          job is to ensure that companies and other bodies
          conform to national and international laws.
  •       This normally involves interpreting the law and
          government policy and establishing standards and
          regulations that must be followed by industry.
  •       Examples of regulators
        –       Data protection authority
        –       Civil Aviation authority
        –       Bank of England / Financial Services Authority
        –       Ofgen – electricity and gas regulator
Critical systems engineering, 2012                               Slide 17
Regulators and critical systems
  •       Some critical systems may have to be certified by
          regulators before they are put into use. This is
          particularly true for safety-critical systems.
  •       This means that the regulators check that the system
          is conformant to current regulations and standards.
        –       This normally involves the system developers producing
                evidence (a safety case or a dependability case e.g.) that
                demonstrates that the system is dependable.

  •       Examples of certifiers
        –       Civil Aviation Authority – aircraft systems
        –       Medical Devices Directorate – medical devices and
                instruments
Critical systems engineering, 2012                                      Slide 18
System criticality
  •       Primary critical systems
        –       Systems where system failure leads directly to an incident
                that has an associated loss of some kind
        –       Typically, these are control systems or systems that are
                closely associated with a control system
        –       Example – failure of engine management system in a car
                causes engine to cut out while driving

  •       Secondary critical systems
        –       Systems whose failure may (but need not) lead to failure in
                an associated system that then leads to loss of some kind
        –       Example – medical information system that maintains
                incorrect information about treatment
Critical systems engineering, 2012                                         Slide 19
Critical systems engineering
  •       Focus is on the use of techniques and methods to
          develop dependable and secure systems.
  •       The costs of critical system failure are so high that
          development methods may be used that are not cost-
          effective for other types of system.
  •       An important aim for many critical systems is
          certification and the development process has to be
          geared to achieving such certification.
  •       Certification costs can exceed development costs.


Critical systems engineering, 2012                        Slide 20
Software engineering for critical systems
   •       Formal methods for systems specification and
           analysis.
   •       Use of specialized tools such as model checkers and
           static analyzers.
   •       Risk-driven approach to system specification and
           management.
   •       Argumentation systems to support the development
           of dependability cases.
   •       Disciplined configuration management of all software
           and hardware.
   •       Detailed process record keeping.
 Critical systems engineering, 2012                           Slide 21
Denver airport baggage system
                                     •   System to control baggage
                                         transfer at the (then new)
                                         Denver airport in the USA.
                                     •   Example system illustrating
                                         some of the issues and
                                         problems that arise with
                                         complex socio-technical critical
                                         systems.
                                     •   This is a business critical system
                                         – the effective functioning of the
                                         airport relies on its baggage
                                         handling system.
Critical systems engineering, 2012                                    Slide 22
System overview

                                          •   New baggage handling
                                              system, which was software
                                              controlled, based on
                                              individual baggage carts
                                              rather than conveyor belts.

       •       Intention was automated handling so that there was no
               manual handling of bags from plane to passenger.
       •       Very complex hardware/software system procured from
               several different companies.
       •       Encountered complex organisational, hardware and software
               problems.
Critical systems engineering, 2012                                     Slide 23
“Denver airport saw the future:
               It didn’t work”
        –       Baggage system did not recognise blockages and simply
                continued to unload bags
        –       Bags fell off the carts due to timing problems
        –       System loaded bags onto carts that were already full

  •       At the time of the airport opening, only a very limited
          version of the system was available.
        –       This system had a 10% error rate (i.e. 10% of bags were
                delivered to the wrong place)

  •       Airport 18 months late opening
  •       System abandoned in 2005
Critical systems engineering, 2012                                     Slide 24
Key points
  •       Economic and human activities are increasingly
          dependent on software-intensive systems. These can
          be thought of as critical systems.
  •       For critical systems, the costs of failure are likely to
          significantly exceed the costs of system development
          and operation.
  •       Consequently, the dependability and security of the
          system are the most important development
          considerations.
  •       Critical systems are often subject to external
          regulation.
Critical systems engineering, 2012                           Slide 25

More Related Content

What's hot

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMuhammad Asim
 
Software engineering socio-technical systems
Software engineering   socio-technical systemsSoftware engineering   socio-technical systems
Software engineering socio-technical systemsDr. Loganathan R
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million usersIan Sommerville
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 
Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Nicole Valerio
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Tripwire
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 

What's hot (20)

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Software engineering socio-technical systems
Software engineering   socio-technical systemsSoftware engineering   socio-technical systems
Software engineering socio-technical systems
 
Infrastructure resilience
Infrastructure resilienceInfrastructure resilience
Infrastructure resilience
 
System dependability
System dependabilitySystem dependability
System dependability
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million users
 
System engineering
System engineeringSystem engineering
System engineering
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 

Similar to Introduction to Critical Systems Engineering (CS 5032 2012)

CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013Ian Sommerville
 
Socio technical systems (LSCITS EngD)
Socio technical systems (LSCITS EngD)Socio technical systems (LSCITS EngD)
Socio technical systems (LSCITS EngD)Ian Sommerville
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013Ian Sommerville
 
Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Ian Sommerville
 
CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013Ian Sommerville
 
Cis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verCis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verAhmad Ammari
 
information system analysis and design
information system analysis and designinformation system analysis and design
information system analysis and designEndalkachewYazie1
 
Lecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdfLecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdfAkilaGamage2
 
Foundations Fundamentals
Foundations FundamentalsFoundations Fundamentals
Foundations Fundamentalsishtiaq47
 
Cyber physical systems and robotics
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and roboticstrinhanhtuan247
 
Systematic Architecture Design
Systematic Architecture DesignSystematic Architecture Design
Systematic Architecture DesignGESSI UPC
 
Systems Practice in Engineering (SPiE)
Systems Practice in Engineering (SPiE)Systems Practice in Engineering (SPiE)
Systems Practice in Engineering (SPiE)mikeyearworth
 
Software Evolution_Se lect3 btech
Software Evolution_Se lect3 btechSoftware Evolution_Se lect3 btech
Software Evolution_Se lect3 btechIIITA
 
Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...UBMCanon
 
Sociotechnical systems resilience
Sociotechnical systems resilienceSociotechnical systems resilience
Sociotechnical systems resilienceJean-René RUAULT
 
Software architecture simplified
Software architecture simplifiedSoftware architecture simplified
Software architecture simplifiedPrasad Chitta
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITSIan Sommerville
 

Similar to Introduction to Critical Systems Engineering (CS 5032 2012) (20)

CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013
 
Socio technical systems (LSCITS EngD)
Socio technical systems (LSCITS EngD)Socio technical systems (LSCITS EngD)
Socio technical systems (LSCITS EngD)
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)
 
Socio technical system
Socio technical systemSocio technical system
Socio technical system
 
CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013
 
Cis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verCis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student ver
 
information system analysis and design
information system analysis and designinformation system analysis and design
information system analysis and design
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Lecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdfLecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdf
 
Foundations Fundamentals
Foundations FundamentalsFoundations Fundamentals
Foundations Fundamentals
 
Cyber physical systems and robotics
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and robotics
 
Systematic Architecture Design
Systematic Architecture DesignSystematic Architecture Design
Systematic Architecture Design
 
Systems Practice in Engineering (SPiE)
Systems Practice in Engineering (SPiE)Systems Practice in Engineering (SPiE)
Systems Practice in Engineering (SPiE)
 
Software Evolution_Se lect3 btech
Software Evolution_Se lect3 btechSoftware Evolution_Se lect3 btech
Software Evolution_Se lect3 btech
 
Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...
 
Sociotechnical systems resilience
Sociotechnical systems resilienceSociotechnical systems resilience
Sociotechnical systems resilience
 
Software architecture simplified
Software architecture simplifiedSoftware architecture simplified
Software architecture simplified
 
Ooad
OoadOoad
Ooad
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITS
 

More from Ian Sommerville

Ultra Large Scale Systems
Ultra Large Scale SystemsUltra Large Scale Systems
Ultra Large Scale SystemsIan Sommerville
 
Conceptual systems design
Conceptual systems designConceptual systems design
Conceptual systems designIan Sommerville
 
An introduction to LSCITS
An introduction to LSCITSAn introduction to LSCITS
An introduction to LSCITSIan Sommerville
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-studyIan Sommerville
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflowIan Sommerville
 
CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureIan Sommerville
 
CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterIan Sommerville
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1Ian Sommerville
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2Ian Sommerville
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureIan Sommerville
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachIan Sommerville
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsIan Sommerville
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013Ian Sommerville
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013Ian Sommerville
 

More from Ian Sommerville (20)

Ultra Large Scale Systems
Ultra Large Scale SystemsUltra Large Scale Systems
Ultra Large Scale Systems
 
Resp modellingintro
Resp modellingintroResp modellingintro
Resp modellingintro
 
Resilience and recovery
Resilience and recoveryResilience and recovery
Resilience and recovery
 
LSCITS-engineering
LSCITS-engineeringLSCITS-engineering
LSCITS-engineering
 
Requirements reality
Requirements realityRequirements reality
Requirements reality
 
Conceptual systems design
Conceptual systems designConceptual systems design
Conceptual systems design
 
An introduction to LSCITS
An introduction to LSCITSAn introduction to LSCITS
An introduction to LSCITS
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
 
CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failure
 
CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disaster
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructure
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systems
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Introduction to Critical Systems Engineering (CS 5032 2012)

  • 1. Critical Systems Engineering Prof Ian Sommerville Dr John Rooksby Critical systems engineering, 2012 Slide 1
  • 2. Course aims • When you have completed this course, you should: – understand what is meant by a critical system and have learned about different types of critical systems. – understand the fundamental concepts of system dependability and security and know about the key technical activities – specification, development and assurance - in critical systems engineering. – understand that critical systems are usually not simply technical systems but are socio-technical systems that include people and processes and are profoundly affected by organisational politics and policies. Critical systems engineering, 2012 Slide 2
  • 3. Presentation • 3 hour slot, one afternoon per week (normally Thursdays) from 13.30 to 16.30. Short breaks at 14.25 and 15.35. • Benefits of this approach – Gives time for coverage of a topic so that you don’t forget material between lectures – Provides an opportunity to integrate work on case studies with the lecture material – Allows time for class exercises where required • Problems – More tiring for students (and lecturer) than separate lecture slots Critical systems engineering, 2012 Slide 3
  • 4. Course topics • Introduction to critical systems (IS), System failure (JR) • Requirements engineering, dependability concepts (IS) • Human error and reliability (JR) • Dependability specification (IS) • Learning from failure (JR) • Dependability engineering, fault tolerant system architectures (IS) Critical systems engineering, 2012 Slide 4
  • 5. Course topics • Organisations and organisational failure (JR) • Security engineering (IS) • Methods of dependability assurance, dependability cases (IS) • Critical infrastructure and the internet (JR) Critical systems engineering, 2012 Slide 5
  • 6. Assessment • Examination (40%) – Covering all topics in the course • Coursework (60%) – Two pieces of coursework – 1 on the technical and 1 on the socio-technical aspect of the course. Each will be of equal weight (30%) Critical systems engineering, 2012 Slide 6
  • 7. Web site http://www.cs.st- andrews.ac.uk/~ifs/Teaching/MScCritSysEng2012/index. html Copies of slides are on Slideshare (as well as studres) and will be linked from the course web site. Twitter: @StACS5032CritSy Critical systems engineering, 2012 Slide 7
  • 8. Critical systems Critical systems engineering, 2012 Slide 8
  • 9. Critical system essentials Safety The system should not harm people or the system’s environment Reliability Availability The system must operate without The system must be available to serious failures deliver services when requested to do so Security The system must be able to protect itself and its data from malicious use Critical systems engineering, 2012 Slide 9
  • 10. Classes of critical system • Safety-critical systems – Failure results in loss of life, injury or damage to the environment e.g. chemical plant protection system; • Mission-critical systems – Failure results in failure of some goal-directed activity e.g. spacecraft navigation system; • Business-critical systems – Failure results in high economic losses e.g. customer accounting system in a bank; • Infrastructure systems – Failure results in a loss of infrastructure capability e.g. power distribution control system, broadband communications, etc. Critical systems engineering, 2012 Slide 10
  • 11. Critical systems stack Critical system External systems X Operating system and middleware System hardware Infrastructure systems Physical infrastructure Critical systems engineering, 2012 Slide 11
  • 12. System dependencies • Independent critical systems – Infrastructure/hardware is part of the system – System operation is not dependent on external systems – Embedded control systems such as those in medical devices • Critical software systems – Usually rely on commodity hardware/OS – System operation is dependent on external infrastructure provision – Hospital appointments system Critical systems engineering, 2012 Slide 12
  • 13. Systems of systems • A critical system is rarely a single system but is a network of several software-intensive systems as well as infrastructure systems • Systems that support organisational needs (e.g. an inter-bank payments system) have to be designed to be robust so that they can cope with failures and unavailability in the other systems on which they depend Critical systems engineering, 2012 Slide 13
  • 14. Systems of systems • Systems of systems (SoS) are complex socio- technical systems with – Different owners and management policies – Distributed operation – Heterogeneous hardware and software • Individual systems may be part of several SoS so – Conflicting requirements from different uses of the system – Complex negotations may be required when system changes are to be made Critical systems engineering, 2012 Slide 14
  • 15. Socio-technical systems • Socio-technical systems include IT systems and the social and organisational environment in which these systems are used • Key influences are human behaviour, organisational processes and policies, regulations, cultur e Critical systems engineering, 2012 Slide 15
  • 16. Socio-technical systems Social and political environment Laws, regulations, custom & practice System Business users Software-intensive system processes Organisational policies and culture Organisational strategies and goals Critical systems engineering, 2012 Slide 16
  • 17. Regulation • Regulators are government-appointed bodies whose job is to ensure that companies and other bodies conform to national and international laws. • This normally involves interpreting the law and government policy and establishing standards and regulations that must be followed by industry. • Examples of regulators – Data protection authority – Civil Aviation authority – Bank of England / Financial Services Authority – Ofgen – electricity and gas regulator Critical systems engineering, 2012 Slide 17
  • 18. Regulators and critical systems • Some critical systems may have to be certified by regulators before they are put into use. This is particularly true for safety-critical systems. • This means that the regulators check that the system is conformant to current regulations and standards. – This normally involves the system developers producing evidence (a safety case or a dependability case e.g.) that demonstrates that the system is dependable. • Examples of certifiers – Civil Aviation Authority – aircraft systems – Medical Devices Directorate – medical devices and instruments Critical systems engineering, 2012 Slide 18
  • 19. System criticality • Primary critical systems – Systems where system failure leads directly to an incident that has an associated loss of some kind – Typically, these are control systems or systems that are closely associated with a control system – Example – failure of engine management system in a car causes engine to cut out while driving • Secondary critical systems – Systems whose failure may (but need not) lead to failure in an associated system that then leads to loss of some kind – Example – medical information system that maintains incorrect information about treatment Critical systems engineering, 2012 Slide 19
  • 20. Critical systems engineering • Focus is on the use of techniques and methods to develop dependable and secure systems. • The costs of critical system failure are so high that development methods may be used that are not cost- effective for other types of system. • An important aim for many critical systems is certification and the development process has to be geared to achieving such certification. • Certification costs can exceed development costs. Critical systems engineering, 2012 Slide 20
  • 21. Software engineering for critical systems • Formal methods for systems specification and analysis. • Use of specialized tools such as model checkers and static analyzers. • Risk-driven approach to system specification and management. • Argumentation systems to support the development of dependability cases. • Disciplined configuration management of all software and hardware. • Detailed process record keeping. Critical systems engineering, 2012 Slide 21
  • 22. Denver airport baggage system • System to control baggage transfer at the (then new) Denver airport in the USA. • Example system illustrating some of the issues and problems that arise with complex socio-technical critical systems. • This is a business critical system – the effective functioning of the airport relies on its baggage handling system. Critical systems engineering, 2012 Slide 22
  • 23. System overview • New baggage handling system, which was software controlled, based on individual baggage carts rather than conveyor belts. • Intention was automated handling so that there was no manual handling of bags from plane to passenger. • Very complex hardware/software system procured from several different companies. • Encountered complex organisational, hardware and software problems. Critical systems engineering, 2012 Slide 23
  • 24. “Denver airport saw the future: It didn’t work” – Baggage system did not recognise blockages and simply continued to unload bags – Bags fell off the carts due to timing problems – System loaded bags onto carts that were already full • At the time of the airport opening, only a very limited version of the system was available. – This system had a 10% error rate (i.e. 10% of bags were delivered to the wrong place) • Airport 18 months late opening • System abandoned in 2005 Critical systems engineering, 2012 Slide 24
  • 25. Key points • Economic and human activities are increasingly dependent on software-intensive systems. These can be thought of as critical systems. • For critical systems, the costs of failure are likely to significantly exceed the costs of system development and operation. • Consequently, the dependability and security of the system are the most important development considerations. • Critical systems are often subject to external regulation. Critical systems engineering, 2012 Slide 25

Editor's Notes

  1. The effective functioning of our personal lives, society and economy is now dependent on software-intensive systemsMany of these systems are critical systems – systems where failure or lack of availability has a serious human, environmental or economic effect.Examples of critical systemsControl systems for complex equipment, such as an aircraft flight control systemInfrastructure systems that manage national infrastructure (power, water, telecommunications, railways, etc.)Healthcare systems that manage patient informationAlso give examples of non-critical systems e.g. games, PC applications,