SlideShare a Scribd company logo
1 of 30
Dependability and Security Specification

                                                        Lecture 1




Dependability and Security Specification, CSE course, 2011          Slide 1
Topics covered

  •       Risk-driven specification
  •       Safety specification
  •       Security specification
  •       Software reliability specification




Dependability and Security Specification, CSE course, 2011   Slide 2
Dependability requirements

  •       Functional requirements to define error checking and
          recovery facilities and protection against system
          failures.
  •       Non-functional requirements defining the required
          reliability and availability of the system.
  •       Excluding requirements that define states and
          conditions that must not arise.




Dependability and Security Specification, CSE course, 2011   Slide 3
Risk-driven specification

                                                       •     Critical systems specification
                                                             should be risk-driven as risks
                                                             pose a threat to the system.
                                                       •     This approach has been widely
                                                             used in safety and security-
                                                             critical systems.
                                                       •     The aim of the specification
                                                             process should be to
                                                             understand the risks
                                                             (safety, security, etc.) faced by
                                                             the system and to define
                                                             requirements that reduce these
Dependability and Security Specification, CSE course, 2011                                Slide 4
                                                             risks.
Phased risk analysis

 •    Preliminary risk analysis
     –   Identifies risks from the systems environment. Aim is to
         develop an initial set of system security and dependability
         requirements.

 •    Life cycle risk analysis
     –   Identifies risks that emerge during design and development
         e.g. risks that are associated with the technologies used for
         system construction. Requirements are extended to protect
         against these risks.

 •    Operational risk analysis
     –          Risks associated with the system user interface and operator
                errors. Further protection requirements may be added to
                cope with these.
Dependability and Security Specification, CSE course, 2011             Slide 5
Risk-driven specification




Dependability and Security Specification, CSE course, 2011   Slide 6
Stages of risk-based analysis

   •       Risk identification
         –       Identify potential risks that may arise.

   •       Risk analysis and classification
         –       Assess the seriousness of each risk.

   •       Risk decomposition
         –       Decompose risks to discover their potential root causes.

   •       Risk reduction assessment
         –       Define how each risk must be taken into eliminated or
                 reduced when the system is designed.


Dependability and Security Specification, CSE course, 2011               Slide 7
Safety specification

  •       Identify protection requirements that ensure that
          system failures do not cause injury or death or
          environmental damage.
  •       Risk identification = Hazard identification
  •       Risk analysis = Hazard assessment
  •       Risk decomposition = Hazard analysis
  •       Risk reduction = safety requirements specification




Dependability and Security Specification, CSE course, 2011    Slide 8
Hazard identification

                                                             •   Identify the hazards that may
                                                                 threaten the system.
                                                             •   Hazard identification may be
                                                                 based on different types of
                                                                 hazard:
                                                                 –   Physical hazards
                                                                 –   Electrical hazards
                                                                 –   Biological hazards
                                                                 –   Service failure hazards
                                                                 –   Etc.


Dependability and Security Specification, CSE course, 2011                                     Slide 9
A software-controlled insulin pump
  •       Safety-critical embedded system. Failure can lead to
          injury or death of the system user.
  •       Used by diabetics to simulate the function of the
          pancreas which manufactures insulin, an essential
          hormone that metabolises blood glucose.
  •       Measures blood glucose (sugar) using a micro-
          sensor and computes the insulin dose required to
          metabolise the glucose.
  •       The system software, is embedded control software
          for the sensing and insulin delivery functions.

Dependability and Security Specification, CSE course, 2011   Slide 10
Dependability and Security Specification, CSE course, 2011   Slide 11
Insulin pump organisation

                                                         Insulin reservoir

                         Needle
                                                                 Pump                  Clock
                        assembly



                          Sensor                              Controller               Alarm




                                                Display1                    Display2


                                                             Power supply


Dependability and Security Specification, CSE course, 2011                                     Slide 12
Insulin pump data-flow

                                           Blood
Blood                                    parameters
                    Blood sugar                              Blood sugar   Blood sugar
                      sensor                                   analysis       level


                                                                                       Insulin
                                                                                    requirement
                                                                                    computation
                                          Pump control
  Insulin                                  commands                           Insulin
                                                               Insulin
                       Insulin                                 delivery    requirement
                        pump                                  controller




Dependability and Security Specification, CSE course, 2011                                   Slide 13
Dependability requirements

                                                             •   The system shall be available to
                                                                 deliver insulin when required to do
                                                                 so.
                                                             •   The system shall perform
                                                                 reliability and deliver the correct
                                                                 amount of insulin to counteract
                                                                 the current level of blood sugar.
                                                             •   The essential safety requirement
                                                                 is that excessive doses of insulin
                                                                 should never be delivered as this
                                                                 is potentially life threatening.



Dependability and Security Specification, CSE course, 2011                                      Slide 14
Insulin pump risks

  •       Insulin overdose (service failure).
  •       Insulin underdose (service failure).
  •       Power failure due to exhausted battery (electrical).
  •       Electrical interference with other medical equipment
          (electrical).
  •       Poor sensor and actuator contact (physical).
  •       Parts of machine break off in body (physical).
  •       Infection caused by introduction of machine
          (biological).
  •       Allergic reaction to materials or insulin (biological).
Dependability and Security Specification, CSE course, 2011     Slide 15
The risk triangle




Dependability and Security Specification, CSE course, 2011    Slide 16
Hazard assessment

  •       What is the the likelihood that a risk will arise and
          what are the potential consequences if an accident or
          incident should occur?
  •       Risks are categorised as:
        –       Intolerable Must never arise or result in an accident
        –       As low as reasonably practical (ALARP) Must minimise the
                possibility of risk given cost and schedule constraints
        –       Acceptable The consequences of the risk are acceptable
                and no extra costs should be incurred to reduce hazard
                probability




Dependability and Security Specification, CSE course, 2011              Slide 17
Social acceptability of safety-related
                         risks
                                                      •       In most societies, the
                                                              boundaries between the
                                                              regions are pushed upwards
                                                              with time i.e. society is less
                                                              willing to accept risk
                                                             – For example, the costs of
                                                                 cleaning up pollution may be
                                                                 less than the costs of
                                                                 preventing it but this may not
                                                                 be socially acceptable.
                                                      •       Risk assessment is subjective
                                                             – Risks are identified as
                                                                probable, unlikely, etc. This
Dependability and Security Specification, CSE course, 2011
                                                                depends on who is making18Slide
Hazard assessment

                                                   •         Estimate the hazard probability
                                                             and the hazard severity.
                                                   •         It is not normally possible to do
                                                             this precisely so relative values
                                                             are used such as
                                                             ‘unlikely’, ‘rare’, ‘very high’, etc.
                                                   •         The aim is to make sure that the
                                                             system can handle hazards that
                                                             are likely to arise or that have
                                                             high severity.


Dependability and Security Specification, CSE course, 2011                                    Slide 19
Risk classification for the insulin pump


Identified                 Hazard                      Accident   Estimated risk   Acceptability
hazard                     probability                 severity
1.Insulin                  Medium                      High       High             Intolerable
overdose
computation
2. Insulin                 Medium                      Low        Low              Acceptable
underdose
computation
3. Failure of              Medium                      Medium     Low              ALARP
hardware
monitoring
system
4. Power failure           High                        Low        Low              Acceptable



  Dependability and Security Specification, CSE course, 2011                                Slide 20
Risk classification for the insulin pump


Identified                 Hazard                      Accident   Estimated risk   Acceptability
hazard                     probability                 severity
5. Machine                 High                        High       High             Intolerable
incorrectly fitted
6. Machine        Low                                  High       Medium           ALARP
breaks in patient
7. Machine       Medium                                Medium     Medium           ALARP
causes infection
8. Electrical              Low                         High       Medium           ALARP
interference
9. Allergic                Low                         Low        Low              Acceptable
reaction




  Dependability and Security Specification, CSE course, 2011                                Slide 21
Hazard analysis

                                                •       Concerned with discovering the
                                                        root causes of risks in a particular
                                                        system.
                                                •       Techniques have been mostly
                                                        derived from safety-critical
                                                        systems and can be
                                                      –      Inductive, bottom-up techniques. Start
                                                             with a proposed system failure and
                                                             assess the hazards that could arise
                                                             from that failure;
                                                      –      Deductive, top-down techniques.
                                                             Start with a hazard and deduce what
                                                             the causes of this could be.

Dependability and Security Specification, CSE course, 2011                                   Slide 22
Fault-tree analysis
                                                               •   Put the risk or
                                                                   hazard at the root
                                                                   of the tree and
                                                                   identify the system
                                                                   states that could
                                                                   lead to that hazard.
                                                               •   Where
                                                                   appropriate, link
                                                                   these with ‘and’ or
                                                                   ‘or’ conditions.


                                  NO SINGLE POINT OF FAILURE

The key goal should be to minimise the number of single causes of system failure.
 Dependability and Security Specification, CSE course, 2011                    Slide 23
Dependability and Security Specification, CSE course, 2011   Slide 24
Fault tree analysis

  •       Three possible conditions that can lead to delivery of
          incorrect dose of insulin
        –       Incorrect measurement of blood sugar level
        –       Failure of delivery system
        –       Dose delivered at wrong time

  •       By analysis of the fault tree, root causes of these
          hazards related to software are:
        –       Algorithm error
        –       Arithmetic error



Dependability and Security Specification, CSE course, 2011      Slide 25
Risk reduction

                                                             •   The aim of this process is
                                                                 to identify dependability
                                                                 requirements that specify
                                                                 how the risks should be
                                                                 managed and ensure that
                                                                 accidents/incidents do
                                                                 not arise.
                                                             •   Risk reduction strategies
                                                                 –   Risk avoidance;
                                                                 –   Risk detection and removal;
                                                                 –   Damage limitation.

Dependability and Security Specification, CSE course, 2011                                Slide 26
Strategy use

                                                      •      Normally, in critical systems, a
                                                             mix of risk reduction strategies
                                                             are used.
                                                      •      In a chemical plant control
                                                             system, the system will include
                                                             sensors to detect and correct
                                                             excess pressure in the reactor.
                                                      •      However, it will also include an
                                                             independent protection system
                                                             that opens a relief valve if
                                                             dangerously high pressure is
                                                             detected.
Dependability and Security Specification, CSE course, 2011                               Slide 27
Insulin pump - software risks

                                                       •     Arithmetic error
                                                             –   A computation causes the value
                                                                 of a variable to overflow or
                                                                 underflow;
                                                             –   Maybe include an exception
                                                                 handler for each type of arithmetic
                                                                 error.

                                                       •     Algorithmic error
                                                             –   Compare dose to be delivered
                                                                 with previous dose or safe
                                                                 maximum doses. Reduce dose if
                                                                 too high.

Dependability and Security Specification, CSE course, 2011                                    Slide 28
Examples of safety requirements

SR1: The system shall not deliver a single dose of insulin that is greater
than a specified maximum dose for a system user.
SR2: The system shall not deliver a daily cumulative dose of insulin that is
greater than a specified maximum daily dose for a system user.
SR3: The system shall include a hardware diagnostic facility that shall be
executed at least four times per hour.
SR4: The system shall include an exception handler for all of the
exceptions that are identified in Table 3.
SR5: The audible alarm shall be sounded when any hardware or software
anomaly is discovered and a diagnostic message, as defined in Table
4, shall be displayed.
SR6: In the event of an alarm, insulin delivery shall be suspended until the
user has reset the system and cleared the alarm.


Dependability and Security Specification, CSE course, 2011               Slide 29
Key points

 •   Risk analysis is an important activity in the
     specification of security and dependability
     requirements. It involves identifying risks that can
     result in accidents or incidents.
 •   A hazard-driven approach may be used to
     understand the safety requirements for a system. You
     identify potential hazards and decompose these
     (using methods such as fault tree analysis) to
     discover their root causes.
 •       Safety requirements should be included to ensure
         that hazards and accidents do not arise or, if this is
         impossible, to limit the damage caused by system
Dependability and Security Specification, CSE course, 2011   Slide 30
         failure.

More Related Content

What's hot

Software testing and quality assurance
Software testing and quality assuranceSoftware testing and quality assurance
Software testing and quality assuranceTOPS Technologies
 
Ch25-Software Engineering 9
Ch25-Software Engineering 9Ch25-Software Engineering 9
Ch25-Software Engineering 9Ian Sommerville
 
Staff training and certification
Staff training and certificationStaff training and certification
Staff training and certificationashamarsha
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperabilitygaurav jain
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement AnalysisSADEED AMEEN
 
Architectural structures and views
Architectural structures and viewsArchitectural structures and views
Architectural structures and viewsDr Reeja S R
 
Disease prediction and doctor recommendation system
Disease prediction and doctor recommendation systemDisease prediction and doctor recommendation system
Disease prediction and doctor recommendation systemsabafarheen
 
Uml Presentation
Uml PresentationUml Presentation
Uml Presentationmewaseem
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality AssuranceSaqib Raza
 
Software Engineering MCQs
Software Engineering MCQsSoftware Engineering MCQs
Software Engineering MCQsGurpreet singh
 
Multichannel User Interfaces
Multichannel User InterfacesMultichannel User Interfaces
Multichannel User InterfacesIcinetic
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business ModelsMourad ZEROUKHI
 
Object oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle pptObject oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle pptKunal Kishor Nirala
 
Component Based Software Engineering
Component Based Software EngineeringComponent Based Software Engineering
Component Based Software EngineeringSatishDabhi1
 

What's hot (20)

Software testing and quality assurance
Software testing and quality assuranceSoftware testing and quality assurance
Software testing and quality assurance
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Introduction to Software Quality & its' Challenges
Introduction to Software Quality & its' ChallengesIntroduction to Software Quality & its' Challenges
Introduction to Software Quality & its' Challenges
 
Ch25-Software Engineering 9
Ch25-Software Engineering 9Ch25-Software Engineering 9
Ch25-Software Engineering 9
 
Staff training and certification
Staff training and certificationStaff training and certification
Staff training and certification
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Architectural structures and views
Architectural structures and viewsArchitectural structures and views
Architectural structures and views
 
Disease prediction and doctor recommendation system
Disease prediction and doctor recommendation systemDisease prediction and doctor recommendation system
Disease prediction and doctor recommendation system
 
Uml Presentation
Uml PresentationUml Presentation
Uml Presentation
 
System dependability
System dependabilitySystem dependability
System dependability
 
Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 
Software quality management standards
Software quality management standardsSoftware quality management standards
Software quality management standards
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Software Engineering MCQs
Software Engineering MCQsSoftware Engineering MCQs
Software Engineering MCQs
 
Multichannel User Interfaces
Multichannel User InterfacesMultichannel User Interfaces
Multichannel User Interfaces
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
 
Object oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle pptObject oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle ppt
 
Component Based Software Engineering
Component Based Software EngineeringComponent Based Software Engineering
Component Based Software Engineering
 

Viewers also liked

Process Safety Life Cycle Management: Best Practices and Processes
Process Safety Life Cycle Management: Best Practices and ProcessesProcess Safety Life Cycle Management: Best Practices and Processes
Process Safety Life Cycle Management: Best Practices and ProcessesMd Rahaman
 
Reliability and security specification (CS 5032 2012)
Reliability and security specification (CS 5032 2012)Reliability and security specification (CS 5032 2012)
Reliability and security specification (CS 5032 2012)Ian Sommerville
 
DDS Security Specification (Adopted Beta1 June 2014)
DDS Security Specification (Adopted Beta1 June 2014)DDS Security Specification (Adopted Beta1 June 2014)
DDS Security Specification (Adopted Beta1 June 2014)Gerardo Pardo-Castellote
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013Ian Sommerville
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013Ian Sommerville
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17koolkampus
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating systemMidhun Sankar
 
Intro to Deadlocks
Intro to DeadlocksIntro to Deadlocks
Intro to Deadlockslionpeal
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating systemSara Ali
 

Viewers also liked (20)

Process Safety Life Cycle Management: Best Practices and Processes
Process Safety Life Cycle Management: Best Practices and ProcessesProcess Safety Life Cycle Management: Best Practices and Processes
Process Safety Life Cycle Management: Best Practices and Processes
 
Reliability and security specification (CS 5032 2012)
Reliability and security specification (CS 5032 2012)Reliability and security specification (CS 5032 2012)
Reliability and security specification (CS 5032 2012)
 
DDS Security Specification (Adopted Beta1 June 2014)
DDS Security Specification (Adopted Beta1 June 2014)DDS Security Specification (Adopted Beta1 June 2014)
DDS Security Specification (Adopted Beta1 June 2014)
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
Verification&Validation
Verification&ValidationVerification&Validation
Verification&Validation
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
OS - Deadlock
OS - DeadlockOS - Deadlock
OS - Deadlock
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating system
 
Intro to Deadlocks
Intro to DeadlocksIntro to Deadlocks
Intro to Deadlocks
 
Chapter 7 - Deadlocks
Chapter 7 - DeadlocksChapter 7 - Deadlocks
Chapter 7 - Deadlocks
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating system
 
Deadlock ppt
Deadlock ppt Deadlock ppt
Deadlock ppt
 
System security
System securitySystem security
System security
 

Similar to Safety specification (CS 5032 2012)

Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Ian Sommerville
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013Ian Sommerville
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specificationAryan Ajmer
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9Siddharth Ayer
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013Ian Sommerville
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoonNASAPMC
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentationdanphilpott
 
2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deckElaine Axum
 
Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails Ashley Finden
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Plan de Calidad para el SNS
 
Sil explained in valve actuators
Sil explained in valve actuatorsSil explained in valve actuators
Sil explained in valve actuatorsJohn Kingsley
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfAbdulrafiiMohammed
 
Swiss early warning system for natural hazards
Swiss early warning system for natural hazardsSwiss early warning system for natural hazards
Swiss early warning system for natural hazardsGlobal Risk Forum GRFDavos
 
Information Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docxInformation Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docxlanagore871
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
Sdl deployment in ics
Sdl deployment in icsSdl deployment in ics
Sdl deployment in icsMayur Mehta
 

Similar to Safety specification (CS 5032 2012) (20)

Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)
 
Ch9
Ch9Ch9
Ch9
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9
 
SIL.ppt
SIL.pptSIL.ppt
SIL.ppt
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck
 
Presentation
PresentationPresentation
Presentation
 
Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...
 
Sil explained in valve actuators
Sil explained in valve actuatorsSil explained in valve actuators
Sil explained in valve actuators
 
Iec61508 guide
Iec61508 guideIec61508 guide
Iec61508 guide
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdf
 
Swiss early warning system for natural hazards
Swiss early warning system for natural hazardsSwiss early warning system for natural hazards
Swiss early warning system for natural hazards
 
Information Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docxInformation Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docx
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
Sdl deployment in ics
Sdl deployment in icsSdl deployment in ics
Sdl deployment in ics
 

More from Ian Sommerville

Ultra Large Scale Systems
Ultra Large Scale SystemsUltra Large Scale Systems
Ultra Large Scale SystemsIan Sommerville
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
Conceptual systems design
Conceptual systems designConceptual systems design
Conceptual systems designIan Sommerville
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITSIan Sommerville
 
An introduction to LSCITS
An introduction to LSCITSAn introduction to LSCITS
An introduction to LSCITSIan Sommerville
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-studyIan Sommerville
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million usersIan Sommerville
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflowIan Sommerville
 
CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureIan Sommerville
 
CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterIan Sommerville
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1Ian Sommerville
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2Ian Sommerville
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureIan Sommerville
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachIan Sommerville
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsIan Sommerville
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 

More from Ian Sommerville (20)

Ultra Large Scale Systems
Ultra Large Scale SystemsUltra Large Scale Systems
Ultra Large Scale Systems
 
Resp modellingintro
Resp modellingintroResp modellingintro
Resp modellingintro
 
Resilience and recovery
Resilience and recoveryResilience and recovery
Resilience and recovery
 
LSCITS-engineering
LSCITS-engineeringLSCITS-engineering
LSCITS-engineering
 
Requirements reality
Requirements realityRequirements reality
Requirements reality
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Conceptual systems design
Conceptual systems designConceptual systems design
Conceptual systems design
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITS
 
An introduction to LSCITS
An introduction to LSCITSAn introduction to LSCITS
An introduction to LSCITS
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million users
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
 
CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failure
 
CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disaster
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructure
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systems
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Safety specification (CS 5032 2012)

  • 1. Dependability and Security Specification Lecture 1 Dependability and Security Specification, CSE course, 2011 Slide 1
  • 2. Topics covered • Risk-driven specification • Safety specification • Security specification • Software reliability specification Dependability and Security Specification, CSE course, 2011 Slide 2
  • 3. Dependability requirements • Functional requirements to define error checking and recovery facilities and protection against system failures. • Non-functional requirements defining the required reliability and availability of the system. • Excluding requirements that define states and conditions that must not arise. Dependability and Security Specification, CSE course, 2011 Slide 3
  • 4. Risk-driven specification • Critical systems specification should be risk-driven as risks pose a threat to the system. • This approach has been widely used in safety and security- critical systems. • The aim of the specification process should be to understand the risks (safety, security, etc.) faced by the system and to define requirements that reduce these Dependability and Security Specification, CSE course, 2011 Slide 4 risks.
  • 5. Phased risk analysis • Preliminary risk analysis – Identifies risks from the systems environment. Aim is to develop an initial set of system security and dependability requirements. • Life cycle risk analysis – Identifies risks that emerge during design and development e.g. risks that are associated with the technologies used for system construction. Requirements are extended to protect against these risks. • Operational risk analysis – Risks associated with the system user interface and operator errors. Further protection requirements may be added to cope with these. Dependability and Security Specification, CSE course, 2011 Slide 5
  • 6. Risk-driven specification Dependability and Security Specification, CSE course, 2011 Slide 6
  • 7. Stages of risk-based analysis • Risk identification – Identify potential risks that may arise. • Risk analysis and classification – Assess the seriousness of each risk. • Risk decomposition – Decompose risks to discover their potential root causes. • Risk reduction assessment – Define how each risk must be taken into eliminated or reduced when the system is designed. Dependability and Security Specification, CSE course, 2011 Slide 7
  • 8. Safety specification • Identify protection requirements that ensure that system failures do not cause injury or death or environmental damage. • Risk identification = Hazard identification • Risk analysis = Hazard assessment • Risk decomposition = Hazard analysis • Risk reduction = safety requirements specification Dependability and Security Specification, CSE course, 2011 Slide 8
  • 9. Hazard identification • Identify the hazards that may threaten the system. • Hazard identification may be based on different types of hazard: – Physical hazards – Electrical hazards – Biological hazards – Service failure hazards – Etc. Dependability and Security Specification, CSE course, 2011 Slide 9
  • 10. A software-controlled insulin pump • Safety-critical embedded system. Failure can lead to injury or death of the system user. • Used by diabetics to simulate the function of the pancreas which manufactures insulin, an essential hormone that metabolises blood glucose. • Measures blood glucose (sugar) using a micro- sensor and computes the insulin dose required to metabolise the glucose. • The system software, is embedded control software for the sensing and insulin delivery functions. Dependability and Security Specification, CSE course, 2011 Slide 10
  • 11. Dependability and Security Specification, CSE course, 2011 Slide 11
  • 12. Insulin pump organisation Insulin reservoir Needle Pump Clock assembly Sensor Controller Alarm Display1 Display2 Power supply Dependability and Security Specification, CSE course, 2011 Slide 12
  • 13. Insulin pump data-flow Blood Blood parameters Blood sugar Blood sugar Blood sugar sensor analysis level Insulin requirement computation Pump control Insulin commands Insulin Insulin Insulin delivery requirement pump controller Dependability and Security Specification, CSE course, 2011 Slide 13
  • 14. Dependability requirements • The system shall be available to deliver insulin when required to do so. • The system shall perform reliability and deliver the correct amount of insulin to counteract the current level of blood sugar. • The essential safety requirement is that excessive doses of insulin should never be delivered as this is potentially life threatening. Dependability and Security Specification, CSE course, 2011 Slide 14
  • 15. Insulin pump risks • Insulin overdose (service failure). • Insulin underdose (service failure). • Power failure due to exhausted battery (electrical). • Electrical interference with other medical equipment (electrical). • Poor sensor and actuator contact (physical). • Parts of machine break off in body (physical). • Infection caused by introduction of machine (biological). • Allergic reaction to materials or insulin (biological). Dependability and Security Specification, CSE course, 2011 Slide 15
  • 16. The risk triangle Dependability and Security Specification, CSE course, 2011 Slide 16
  • 17. Hazard assessment • What is the the likelihood that a risk will arise and what are the potential consequences if an accident or incident should occur? • Risks are categorised as: – Intolerable Must never arise or result in an accident – As low as reasonably practical (ALARP) Must minimise the possibility of risk given cost and schedule constraints – Acceptable The consequences of the risk are acceptable and no extra costs should be incurred to reduce hazard probability Dependability and Security Specification, CSE course, 2011 Slide 17
  • 18. Social acceptability of safety-related risks • In most societies, the boundaries between the regions are pushed upwards with time i.e. society is less willing to accept risk – For example, the costs of cleaning up pollution may be less than the costs of preventing it but this may not be socially acceptable. • Risk assessment is subjective – Risks are identified as probable, unlikely, etc. This Dependability and Security Specification, CSE course, 2011 depends on who is making18Slide
  • 19. Hazard assessment • Estimate the hazard probability and the hazard severity. • It is not normally possible to do this precisely so relative values are used such as ‘unlikely’, ‘rare’, ‘very high’, etc. • The aim is to make sure that the system can handle hazards that are likely to arise or that have high severity. Dependability and Security Specification, CSE course, 2011 Slide 19
  • 20. Risk classification for the insulin pump Identified Hazard Accident Estimated risk Acceptability hazard probability severity 1.Insulin Medium High High Intolerable overdose computation 2. Insulin Medium Low Low Acceptable underdose computation 3. Failure of Medium Medium Low ALARP hardware monitoring system 4. Power failure High Low Low Acceptable Dependability and Security Specification, CSE course, 2011 Slide 20
  • 21. Risk classification for the insulin pump Identified Hazard Accident Estimated risk Acceptability hazard probability severity 5. Machine High High High Intolerable incorrectly fitted 6. Machine Low High Medium ALARP breaks in patient 7. Machine Medium Medium Medium ALARP causes infection 8. Electrical Low High Medium ALARP interference 9. Allergic Low Low Low Acceptable reaction Dependability and Security Specification, CSE course, 2011 Slide 21
  • 22. Hazard analysis • Concerned with discovering the root causes of risks in a particular system. • Techniques have been mostly derived from safety-critical systems and can be – Inductive, bottom-up techniques. Start with a proposed system failure and assess the hazards that could arise from that failure; – Deductive, top-down techniques. Start with a hazard and deduce what the causes of this could be. Dependability and Security Specification, CSE course, 2011 Slide 22
  • 23. Fault-tree analysis • Put the risk or hazard at the root of the tree and identify the system states that could lead to that hazard. • Where appropriate, link these with ‘and’ or ‘or’ conditions. NO SINGLE POINT OF FAILURE The key goal should be to minimise the number of single causes of system failure. Dependability and Security Specification, CSE course, 2011 Slide 23
  • 24. Dependability and Security Specification, CSE course, 2011 Slide 24
  • 25. Fault tree analysis • Three possible conditions that can lead to delivery of incorrect dose of insulin – Incorrect measurement of blood sugar level – Failure of delivery system – Dose delivered at wrong time • By analysis of the fault tree, root causes of these hazards related to software are: – Algorithm error – Arithmetic error Dependability and Security Specification, CSE course, 2011 Slide 25
  • 26. Risk reduction • The aim of this process is to identify dependability requirements that specify how the risks should be managed and ensure that accidents/incidents do not arise. • Risk reduction strategies – Risk avoidance; – Risk detection and removal; – Damage limitation. Dependability and Security Specification, CSE course, 2011 Slide 26
  • 27. Strategy use • Normally, in critical systems, a mix of risk reduction strategies are used. • In a chemical plant control system, the system will include sensors to detect and correct excess pressure in the reactor. • However, it will also include an independent protection system that opens a relief valve if dangerously high pressure is detected. Dependability and Security Specification, CSE course, 2011 Slide 27
  • 28. Insulin pump - software risks • Arithmetic error – A computation causes the value of a variable to overflow or underflow; – Maybe include an exception handler for each type of arithmetic error. • Algorithmic error – Compare dose to be delivered with previous dose or safe maximum doses. Reduce dose if too high. Dependability and Security Specification, CSE course, 2011 Slide 28
  • 29. Examples of safety requirements SR1: The system shall not deliver a single dose of insulin that is greater than a specified maximum dose for a system user. SR2: The system shall not deliver a daily cumulative dose of insulin that is greater than a specified maximum daily dose for a system user. SR3: The system shall include a hardware diagnostic facility that shall be executed at least four times per hour. SR4: The system shall include an exception handler for all of the exceptions that are identified in Table 3. SR5: The audible alarm shall be sounded when any hardware or software anomaly is discovered and a diagnostic message, as defined in Table 4, shall be displayed. SR6: In the event of an alarm, insulin delivery shall be suspended until the user has reset the system and cleared the alarm. Dependability and Security Specification, CSE course, 2011 Slide 29
  • 30. Key points • Risk analysis is an important activity in the specification of security and dependability requirements. It involves identifying risks that can result in accidents or incidents. • A hazard-driven approach may be used to understand the safety requirements for a system. You identify potential hazards and decompose these (using methods such as fault tree analysis) to discover their root causes. • Safety requirements should be included to ensure that hazards and accidents do not arise or, if this is impossible, to limit the damage caused by system Dependability and Security Specification, CSE course, 2011 Slide 30 failure.