SlideShare une entreprise Scribd logo
1  sur  21
System safety

System safety, 2013

Slide 1
Safety
• Safety is a property of a system that
reflects the system’s ability to
operate, normally or abnormally, without
danger of causing human injury or death
and without damage to the system’s
environment.
System safety, 2013

Slide 2
Principal dependability
properties

System safety, 2013

Slide 3
Safety criticality
• Primary safety-critical systems
– Embedded software systems whose
failure can cause the associated
hardware to fail and directly threaten
people.

System safety 2013

Slide 4
System safety 2013

Slide 5
• Secondary safety-critical systems
– Systems whose failure results in faults in other
(socio-technical) systems, which can then have
safety consequences.
– For example, a medical records system is safetycritical as failure may lead to inappropriate
treatment being prescribed.
System safety 2013

Slide 6
System safety 2013

Slide 7
Safety and reliability
• Safety and reliability are related but
distinct
• For a system to be safe, it must
generally be reliable
• However, this is not enough. It must
also be safe in the event of system
failure
System safety 2013

Slide 8
• Reliability is concerned with
conformance to a given specification
and delivery of service
• Safety is concerned with ensuring
system cannot cause damage
irrespective of whether or not it
conforms to its specification
System safety 2013

Slide 9
• A reliable system can be unsafe if the
requirements are incorrect or
incomplete

System safety 2013

Slide 10
Unsafe reliable systems

The software on this plane operated ‘reliably’ yet the plane
crashed- covered in a separate video
System safety 2013

Slide 11
Unsafe reliable systems
• There may be dormant faults in a system
that are undetected for many years and
only rarely arise.
• Specification errors
– If the system specification is incorrect then
the system can behave as specified but still
cause an accident.
System safety 2013

Slide 12
• Hardware failures generating spurious inputs
– Hard to anticipate in the specification.

• Context-sensitive commands i.e. issuing the
right command at the wrong time
– Often the result of operator error.

System safety 2013

Slide 13
Accident
• An unplanned event or sequence of events
which results in human death or
injury, damage to property, or to the
environment.
• An overdose of insulin by a softwarecontrolled insulin injection system is an
example of an accident.
System safety 2013

Slide 14
Hazard
• A condition with the potential for causing or
contributing to an accident. A failure of the
sensor that measures blood glucose is an
example of a hazard.

System safety 2013

Slide 15
Damage
•

A measure of the loss resulting from a mishap.
Damage can range from many people being killed as
a result of an accident to minor injury or property
damage.

•

Damage resulting from an overdose of insulin could
be serious injury or the death of the user of the insulin
pump.

System safety 2013

Slide 16
Safety critical systems
development
• Hazard avoidance
– The system is designed so that some
classes of hazard simply cannot arise.

System safety 2013

Slide 17
• Hazard detection and removal
– The system is designed so that hazards are
detected and removed before they result in
an accident.

System safety 2013

Slide 18
• Damage limitation
– The system includes protection features
that minimise the damage that may result
from an accident.

System safety 2013

Slide 19
Summary
• Safety is a property of a system that reflects
the system’s ability to operate, normally or
abnormally, without danger of causing human
injury or death.
• Safety and reliability are related but reliable
systems may be unsafe.
System safety 2013

Slide 20
Summary
• Hazards are conditions that may (but need
not) lead to an accident
• Safety is achieved through
– Hazard avoidance

– Hazard detection and removal
– Damage limitation
System safety 2013

Slide 21

Contenu connexe

Tendances

EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfBimal Chandra Das
 
Introduction to FMEA/FMECA
Introduction to FMEA/FMECAIntroduction to FMEA/FMECA
Introduction to FMEA/FMECAMichael Herman
 
Ch13 Reliability
Ch13  ReliabilityCh13  Reliability
Ch13 Reliabilityzacksazu
 
Sil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsSil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsJohn Kingsley
 
health and safety work.pptx
health and safety work.pptxhealth and safety work.pptx
health and safety work.pptxfatimagull32
 
An overview on Safety Audit | Consultivo
An overview on Safety Audit | ConsultivoAn overview on Safety Audit | Consultivo
An overview on Safety Audit | ConsultivoConsultivo
 
Hazard identification assessment and control techniques
Hazard identification assessment and control techniquesHazard identification assessment and control techniques
Hazard identification assessment and control techniquesDeep parmar
 
Occupational Health & Safety Management System 01
Occupational Health & Safety Management System 01Occupational Health & Safety Management System 01
Occupational Health & Safety Management System 01Yaowaluk Yuangsoi
 
Mechanical hazards
Mechanical hazardsMechanical hazards
Mechanical hazardsArif Afandy
 
Machine maintenance presentation
Machine maintenance presentationMachine maintenance presentation
Machine maintenance presentationhimu_kamrul
 
Introduction to maintenance and safety management
Introduction to maintenance and safety managementIntroduction to maintenance and safety management
Introduction to maintenance and safety managementNafis Ahmad
 

Tendances (20)

Machine guarding
Machine guardingMachine guarding
Machine guarding
 
Importance of industrial safety
Importance of industrial safetyImportance of industrial safety
Importance of industrial safety
 
HSE Management System
HSE Management SystemHSE Management System
HSE Management System
 
Human factors training
Human factors trainingHuman factors training
Human factors training
 
EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdf
 
Effective safety committee operations
Effective safety committee operationsEffective safety committee operations
Effective safety committee operations
 
Introduction to FMEA/FMECA
Introduction to FMEA/FMECAIntroduction to FMEA/FMECA
Introduction to FMEA/FMECA
 
Safety & health in ramadan by ammar
Safety & health in ramadan by ammarSafety & health in ramadan by ammar
Safety & health in ramadan by ammar
 
Ch13 Reliability
Ch13  ReliabilityCh13  Reliability
Ch13 Reliability
 
Introduction to Safety
Introduction to SafetyIntroduction to Safety
Introduction to Safety
 
Sil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsSil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluids
 
Safety Management Systems (SMS) Fundamentals: Promotion
Safety Management Systems (SMS) Fundamentals: PromotionSafety Management Systems (SMS) Fundamentals: Promotion
Safety Management Systems (SMS) Fundamentals: Promotion
 
health and safety work.pptx
health and safety work.pptxhealth and safety work.pptx
health and safety work.pptx
 
An overview on Safety Audit | Consultivo
An overview on Safety Audit | ConsultivoAn overview on Safety Audit | Consultivo
An overview on Safety Audit | Consultivo
 
Hazard identification assessment and control techniques
Hazard identification assessment and control techniquesHazard identification assessment and control techniques
Hazard identification assessment and control techniques
 
Occupational Health & Safety Management System 01
Occupational Health & Safety Management System 01Occupational Health & Safety Management System 01
Occupational Health & Safety Management System 01
 
Mechanical hazards
Mechanical hazardsMechanical hazards
Mechanical hazards
 
Safety system
Safety systemSafety system
Safety system
 
Machine maintenance presentation
Machine maintenance presentationMachine maintenance presentation
Machine maintenance presentation
 
Introduction to maintenance and safety management
Introduction to maintenance and safety managementIntroduction to maintenance and safety management
Introduction to maintenance and safety management
 

En vedette

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safetydalesanders
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItinerarySalie Lim
 
Smart material presentation
Smart material presentationSmart material presentation
Smart material presentationyogesh meenA
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systemssommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 

En vedette (20)

System dependability
System dependabilitySystem dependability
System dependability
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
System security
System securitySystem security
System security
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safety
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto Itinerary
 
Smart material presentation
Smart material presentationSmart material presentation
Smart material presentation
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Risk Mitigation for Highway and Railway Bridges
Risk Mitigation for Highway and Railway BridgesRisk Mitigation for Highway and Railway Bridges
Risk Mitigation for Highway and Railway Bridges
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 

Similaire à System safety

Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3Siddharth Ayer
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9Siddharth Ayer
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Micro
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdfFelixKipyego1
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16koolkampus
 
Vijeo citect quick start tutorial - part 1 ver d
Vijeo citect   quick start tutorial - part 1 ver dVijeo citect   quick start tutorial - part 1 ver d
Vijeo citect quick start tutorial - part 1 ver dAbdul Budiman
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecuritysommerville-videos
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience EngineeringHarsh Verdhan Raj
 

Similaire à System safety (20)

Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Ch12 - Safety Engineering
Ch12 - Safety EngineeringCh12 - Safety Engineering
Ch12 - Safety Engineering
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
 
Vijeo citect quick start tutorial - part 1 ver d
Vijeo citect   quick start tutorial - part 1 ver dVijeo citect   quick start tutorial - part 1 ver d
Vijeo citect quick start tutorial - part 1 ver d
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Ch12
Ch12Ch12
Ch12
 
Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience Engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 

Plus de sommerville-videos

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processessommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challengessommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 

Plus de sommerville-videos (20)

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

System safety

  • 2. Safety • Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death and without damage to the system’s environment. System safety, 2013 Slide 2
  • 4. Safety criticality • Primary safety-critical systems – Embedded software systems whose failure can cause the associated hardware to fail and directly threaten people. System safety 2013 Slide 4
  • 6. • Secondary safety-critical systems – Systems whose failure results in faults in other (socio-technical) systems, which can then have safety consequences. – For example, a medical records system is safetycritical as failure may lead to inappropriate treatment being prescribed. System safety 2013 Slide 6
  • 8. Safety and reliability • Safety and reliability are related but distinct • For a system to be safe, it must generally be reliable • However, this is not enough. It must also be safe in the event of system failure System safety 2013 Slide 8
  • 9. • Reliability is concerned with conformance to a given specification and delivery of service • Safety is concerned with ensuring system cannot cause damage irrespective of whether or not it conforms to its specification System safety 2013 Slide 9
  • 10. • A reliable system can be unsafe if the requirements are incorrect or incomplete System safety 2013 Slide 10
  • 11. Unsafe reliable systems The software on this plane operated ‘reliably’ yet the plane crashed- covered in a separate video System safety 2013 Slide 11
  • 12. Unsafe reliable systems • There may be dormant faults in a system that are undetected for many years and only rarely arise. • Specification errors – If the system specification is incorrect then the system can behave as specified but still cause an accident. System safety 2013 Slide 12
  • 13. • Hardware failures generating spurious inputs – Hard to anticipate in the specification. • Context-sensitive commands i.e. issuing the right command at the wrong time – Often the result of operator error. System safety 2013 Slide 13
  • 14. Accident • An unplanned event or sequence of events which results in human death or injury, damage to property, or to the environment. • An overdose of insulin by a softwarecontrolled insulin injection system is an example of an accident. System safety 2013 Slide 14
  • 15. Hazard • A condition with the potential for causing or contributing to an accident. A failure of the sensor that measures blood glucose is an example of a hazard. System safety 2013 Slide 15
  • 16. Damage • A measure of the loss resulting from a mishap. Damage can range from many people being killed as a result of an accident to minor injury or property damage. • Damage resulting from an overdose of insulin could be serious injury or the death of the user of the insulin pump. System safety 2013 Slide 16
  • 17. Safety critical systems development • Hazard avoidance – The system is designed so that some classes of hazard simply cannot arise. System safety 2013 Slide 17
  • 18. • Hazard detection and removal – The system is designed so that hazards are detected and removed before they result in an accident. System safety 2013 Slide 18
  • 19. • Damage limitation – The system includes protection features that minimise the damage that may result from an accident. System safety 2013 Slide 19
  • 20. Summary • Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death. • Safety and reliability are related but reliable systems may be unsafe. System safety 2013 Slide 20
  • 21. Summary • Hazards are conditions that may (but need not) lead to an accident • Safety is achieved through – Hazard avoidance – Hazard detection and removal – Damage limitation System safety 2013 Slide 21