SlideShare a Scribd company logo
LECTURE 7
SYSTEMSAFETY
Instructor: Engr. Beenish Akbar Khan
Iqra National University (INU)
Occupational Health Safety and
Environment
Btech Civil/Elect.
Department
7th
Semester
Fall 2015
As society becomes more technically advanced, its tools become
more and more sophisticated. In some cases, the machine has
advanced further than the human capacity to control it. Jet
fighters are good examples.
Safety professionals need to be aware of the limits of human
performance.
2
The system life cycle consists of six phases:
1.Concept
2.Definition
3.Development
4.Production
5.Deployment and
6.Disposition
At the end of each phase, a safety review is conducted. A
decision is then made whether to continue the project or place it
on hold, pending further examination.
3
Historical data and technical forecasts are developed for a
system hazard analysis.
A Preliminary Hazard Analysis (PHA) is conducted during this
phase. Risk Analysis (RA) is performed to determine hazard
control and to develop system-safety criteria. Safety
management will be doing the initial work on the System Safety
Program Plan (SSPP).
Three basic questions must be answered by the time the concept
phase is completed:
‘‘Have the hazards associated with the design concept been
discovered and evaluated to establish hazard controls?
Have risk analyses been initiated to establish the means for
hazard control?
Are initial safety requirements established for the concept
phase?’’ (Roland and Moriarty, 1990, p. 23).
4
Definition phase is used to verify the preliminary design and
product engineering.
Reports presented at design review meetings discuss the
technological risks, costs, human engineering, operational and
maintenance suitability, and safety aspects.
In addition subsystems, assemblies, and subassemblies of the
system are defined at this time. The PHA is updated and a
Subsystem Hazard Analysis (SSHA) is initiated so it can later be
integrated into the System Hazard Analysis (SHA).
Safety analysis techniques are used during this phase to identify
safety equipment, specification of safety design requirements,
initial development of safety test plans and requirements, and
prototype testing to verify the type of design selected.
5
Environmental impact, integrated logistics support, producible
engineering, and operational use studies are done during the
development phase.
The SSHA and safety design criteria are also completed during
this phase.
Using the data collected, a go/no-go decision can be made
before production begins.
6
The production phase of the system life cycle involves close
monitoring by the safety department. In addition, the quality-
control department becomes important because of its focus on
inspection and testing of the new product.
Training begins during this phase.
Updating of the analyses started during the definition and
development phases continues.
Finally, all the information collected during this phase is
compiled into the System Safety Engineering Report (SSER).
The SSER identifies and documents the hazards of the final
product.
7
When the system becomes operational, it is in the deployment
phase. Data continues to be collected and training is conducted.
If any problems occur, individuals responsible for system safety
must be available to follow up and decide on possible solutions.
The system safety group in the organization also reviews any
design changes made on the system.
A sixth phase of the system life cycle, the disposition or
termination phase, is the time that a system is removed from
service. A good example is asbestos removal from a building.
Safety professionals monitor these situations so both the worker
and the public are protected.
8

More Related Content

What's hot

Critical Systems
Critical SystemsCritical Systems
Critical Systems
Usman Bin Saad
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
Editor IJCATR
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
Aryan Ajmer
 
Nonlinear observers: a system approach for the knowledge discovery.
Nonlinear observers: a system approach for the knowledge discovery.Nonlinear observers: a system approach for the knowledge discovery.
Nonlinear observers: a system approach for the knowledge discovery.
Massimo Talia
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
MORT ANALYSIS | with Example I Gaurav Singh Rajput
MORT ANALYSIS | with Example I Gaurav Singh Rajput MORT ANALYSIS | with Example I Gaurav Singh Rajput
MORT ANALYSIS | with Example I Gaurav Singh Rajput
Gaurav Singh Rajput
 
Industrial safety unit iv ppt
Industrial safety unit iv pptIndustrial safety unit iv ppt
Industrial safety unit iv ppt
kannagi varadarajan
 
Mycin 016
Mycin  016Mycin  016
Mycin 016
Nidhi Singh
 
Bayesian clinical trials: software and logistics
Bayesian clinical trials: software and logisticsBayesian clinical trials: software and logistics
Bayesian clinical trials: software and logistics
John Cook
 
Failure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archiveFailure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archive
Davin Abraham
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
Phil La Duke
 

What's hot (11)

Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 
Nonlinear observers: a system approach for the knowledge discovery.
Nonlinear observers: a system approach for the knowledge discovery.Nonlinear observers: a system approach for the knowledge discovery.
Nonlinear observers: a system approach for the knowledge discovery.
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
MORT ANALYSIS | with Example I Gaurav Singh Rajput
MORT ANALYSIS | with Example I Gaurav Singh Rajput MORT ANALYSIS | with Example I Gaurav Singh Rajput
MORT ANALYSIS | with Example I Gaurav Singh Rajput
 
Industrial safety unit iv ppt
Industrial safety unit iv pptIndustrial safety unit iv ppt
Industrial safety unit iv ppt
 
Mycin 016
Mycin  016Mycin  016
Mycin 016
 
Bayesian clinical trials: software and logistics
Bayesian clinical trials: software and logisticsBayesian clinical trials: software and logistics
Bayesian clinical trials: software and logistics
 
Failure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archiveFailure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archive
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 

Similar to Lecture 7

Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
Management information system
Management information systemManagement information system
Management information system
Roneet Kumar
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
aidul azmi
 
A hybrid reasoning system for the prevention of rail accidents
A hybrid reasoning system for the prevention of rail accidentsA hybrid reasoning system for the prevention of rail accidents
A hybrid reasoning system for the prevention of rail accidents
IJMERJOURNAL
 
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Editor IJCATR
 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
IJERDJOURNAL
 
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysisPreliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
IRJESJOURNAL
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Donald E. Hester
 
Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...
ijfcstjournal
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
Hayat khan
 
4-SIS in EPC Project Lifecycle, May 2016
4-SIS in EPC Project Lifecycle, May 20164-SIS in EPC Project Lifecycle, May 2016
4-SIS in EPC Project Lifecycle, May 2016
Shivendra Kapoor
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
ijseajournal
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
stuimrozsm
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
PMHaas
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
mydrynan
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
SARJERAO Sarju
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
baratta44
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptx
atwine1
 

Similar to Lecture 7 (20)

Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
 
Management information system
Management information systemManagement information system
Management information system
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 
A hybrid reasoning system for the prevention of rail accidents
A hybrid reasoning system for the prevention of rail accidentsA hybrid reasoning system for the prevention of rail accidents
A hybrid reasoning system for the prevention of rail accidents
 
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
 
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysisPreliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
4-SIS in EPC Project Lifecycle, May 2016
4-SIS in EPC Project Lifecycle, May 20164-SIS in EPC Project Lifecycle, May 2016
4-SIS in EPC Project Lifecycle, May 2016
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptx
 

Recently uploaded

Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 

Recently uploaded (20)

Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 

Lecture 7

  • 1. LECTURE 7 SYSTEMSAFETY Instructor: Engr. Beenish Akbar Khan Iqra National University (INU) Occupational Health Safety and Environment Btech Civil/Elect. Department 7th Semester Fall 2015
  • 2. As society becomes more technically advanced, its tools become more and more sophisticated. In some cases, the machine has advanced further than the human capacity to control it. Jet fighters are good examples. Safety professionals need to be aware of the limits of human performance. 2
  • 3. The system life cycle consists of six phases: 1.Concept 2.Definition 3.Development 4.Production 5.Deployment and 6.Disposition At the end of each phase, a safety review is conducted. A decision is then made whether to continue the project or place it on hold, pending further examination. 3
  • 4. Historical data and technical forecasts are developed for a system hazard analysis. A Preliminary Hazard Analysis (PHA) is conducted during this phase. Risk Analysis (RA) is performed to determine hazard control and to develop system-safety criteria. Safety management will be doing the initial work on the System Safety Program Plan (SSPP). Three basic questions must be answered by the time the concept phase is completed: ‘‘Have the hazards associated with the design concept been discovered and evaluated to establish hazard controls? Have risk analyses been initiated to establish the means for hazard control? Are initial safety requirements established for the concept phase?’’ (Roland and Moriarty, 1990, p. 23). 4
  • 5. Definition phase is used to verify the preliminary design and product engineering. Reports presented at design review meetings discuss the technological risks, costs, human engineering, operational and maintenance suitability, and safety aspects. In addition subsystems, assemblies, and subassemblies of the system are defined at this time. The PHA is updated and a Subsystem Hazard Analysis (SSHA) is initiated so it can later be integrated into the System Hazard Analysis (SHA). Safety analysis techniques are used during this phase to identify safety equipment, specification of safety design requirements, initial development of safety test plans and requirements, and prototype testing to verify the type of design selected. 5
  • 6. Environmental impact, integrated logistics support, producible engineering, and operational use studies are done during the development phase. The SSHA and safety design criteria are also completed during this phase. Using the data collected, a go/no-go decision can be made before production begins. 6
  • 7. The production phase of the system life cycle involves close monitoring by the safety department. In addition, the quality- control department becomes important because of its focus on inspection and testing of the new product. Training begins during this phase. Updating of the analyses started during the definition and development phases continues. Finally, all the information collected during this phase is compiled into the System Safety Engineering Report (SSER). The SSER identifies and documents the hazards of the final product. 7
  • 8. When the system becomes operational, it is in the deployment phase. Data continues to be collected and training is conducted. If any problems occur, individuals responsible for system safety must be available to follow up and decide on possible solutions. The system safety group in the organization also reviews any design changes made on the system. A sixth phase of the system life cycle, the disposition or termination phase, is the time that a system is removed from service. A good example is asbestos removal from a building. Safety professionals monitor these situations so both the worker and the public are protected. 8