SlideShare una empresa de Scribd logo
1 de 55
Chapter 12 – Dependability and Security
Specification
Lecture 1
1Chapter 12 Dependability and Security Specification
Topics covered
 Risk-driven specification
 Safety specification
 Security specification
 Software reliability specification
2Chapter 12 Dependability and Security Specification
Dependability requirements
 Functional requirements to define error checking and
recovery facilities and protection against system failures.
 Non-functional requirements defining the required
reliability and availability of the system.
 Excluding requirements that define states and conditions
that must not arise.
3Chapter 12 Dependability and Security Specification
Risk-driven specification
 Critical systems specification should be risk-driven.
 This approach has been widely used in safety and
security-critical systems.
 The aim of the specification process should be to
understand the risks (safety, security, etc.) faced by the
system and to define requirements that reduce these
risks.
4Chapter 12 Dependability and Security Specification
Stages of risk-based analysis
 Risk identification
 Identify potential risks that may arise.
 Risk analysis and classification
 Assess the seriousness of each risk.
 Risk decomposition
 Decompose risks to discover their potential root causes.
 Risk reduction assessment
 Define how each risk must be taken into eliminated or reduced
when the system is designed.
5Chapter 12 Dependability and Security Specification
Risk-driven specification
6Chapter 12 Dependability and Security Specification
Phased risk analysis
 Preliminary risk analysis
 Identifies risks from the systems environment. Aim is to develop
an initial set of system security and dependability requirements.
 Life cycle risk analysis
 Identifies risks that emerge during design and development e.g.
risks that are associated with the technologies used for system
construction. Requirements are extended to protect against
these risks.
 Operational risk analysis
 Risks associated with the system user interface and operator
errors. Further protection requirements may be added to cope
with these.
7Chapter 12 Dependability and Security Specification
Safety specification
 Goal is to identify protection requirements that ensure
that system failures do not cause injury or death or
environmental damage.
 Risk identification = Hazard identification
 Risk analysis = Hazard assessment
 Risk decomposition = Hazard analysis
 Risk reduction = safety requirements specification
8Chapter 12 Dependability and Security Specification
Hazard identification
 Identify the hazards that may threaten the system.
 Hazard identification may be based on different types of
hazard:
 Physical hazards
 Electrical hazards
 Biological hazards
 Service failure hazards
 Etc.
9Chapter 12 Dependability and Security Specification
Insulin pump risks
 Insulin overdose (service failure).
 Insulin underdose (service failure).
 Power failure due to exhausted battery (electrical).
 Electrical interference with other medical equipment
(electrical).
 Poor sensor and actuator contact (physical).
 Parts of machine break off in body (physical).
 Infection caused by introduction of machine (biological).
 Allergic reaction to materials or insulin (biological).
10Chapter 12 Dependability and Security Specification
Hazard assessment
 The process is concerned with understanding the
likelihood that a risk will arise and the potential
consequences if an accident or incident should occur.
 Risks may be categorised as:
 Intolerable. Must never arise or result in an accident
 As low as reasonably practical(ALARP). Must minimise the
possibility of risk given cost and schedule constraints
 Acceptable. The consequences of the risk are acceptable and no
extra costs should be incurred to reduce hazard probability
11Chapter 12 Dependability and Security Specification
The risk triangle
12Chapter 12 Dependability and Security Specification
Social acceptability of risk
 The acceptability of a risk is determined by human,
social and political considerations.
 In most societies, the boundaries between the regions
are pushed upwards with time i.e. society is less willing
to accept risk
 For example, the costs of cleaning up pollution may be less than
the costs of preventing it but this may not be socially acceptable.
 Risk assessment is subjective
 Risks are identified as probable, unlikely, etc. This depends on
who is making the assessment.
13Chapter 12 Dependability and Security Specification
Hazard assessment
 Estimate the risk probability and the risk severity.
 It is not normally possible to do this precisely so relative
values are used such as ‘unlikely’, ‘rare’, ‘very high’, etc.
 The aim must be to exclude risks that are likely to arise
or that have high severity.
14Chapter 12 Dependability and Security Specification
Risk classification for the insulin pump
Identified hazard Hazard probability Accident severity Estimated risk Acceptability
1.Insulin overdose
computation
Medium High High Intolerable
2. Insulin underdose
computation
Medium Low Low Acceptable
3. Failure of
hardware monitoring
system
Medium Medium Low ALARP
4. Power failure High Low Low Acceptable
5. Machine
incorrectly fitted
High High High Intolerable
6. Machine breaks in
patient
Low High Medium ALARP
7. Machine causes
infection
Medium Medium Medium ALARP
8. Electrical
interference
Low High Medium ALARP
9. Allergic reaction Low Low Low Acceptable
15Chapter 12 Dependability and Security Specification
Hazard analysis
 Concerned with discovering the root causes of risks in a
particular system.
 Techniques have been mostly derived from safety-critical
systems and can be
 Inductive, bottom-up techniques. Start with a proposed system
failure and assess the hazards that could arise from that failure;
 Deductive, top-down techniques. Start with a hazard and deduce
what the causes of this could be.
16Chapter 12 Dependability and Security Specification
Fault-tree analysis
 A deductive top-down technique.
 Put the risk or hazard at the root of the tree and identify
the system states that could lead to that hazard.
 Where appropriate, link these with ‘and’ or ‘or’
conditions.
 A goal should be to minimise the number of single
causes of system failure.
17Chapter 12 Dependability and Security Specification
An example of a software fault tree
18Chapter 12 Dependability and Security Specification
Fault tree analysis
 Three possible conditions that can lead to delivery of
incorrect dose of insulin
 Incorrect measurement of blood sugar level
 Failure of delivery system
 Dose delivered at wrong time
 By analysis of the fault tree, root causes of these
hazards related to software are:
 Algorithm error
 Arithmetic error
19Chapter 12 Dependability and Security Specification
Risk reduction
 The aim of this process is to identify dependability
requirements that specify how the risks should be
managed and ensure that accidents/incidents do not
arise.
 Risk reduction strategies
 Risk avoidance;
 Risk detection and removal;
 Damage limitation.
20Chapter 12 Dependability and Security Specification
Strategy use
 Normally, in critical systems, a mix of risk reduction
strategies are used.
 In a chemical plant control system, the system will
include sensors to detect and correct excess pressure in
the reactor.
 However, it will also include an independent protection
system that opens a relief valve if dangerously high
pressure is detected.
21Chapter 12 Dependability and Security Specification
Insulin pump - software risks
 Arithmetic error
 A computation causes the value of a variable to overflow or
underflow;
 Maybe include an exception handler for each type of arithmetic
error.
 Algorithmic error
 Compare dose to be delivered with previous dose or safe
maximum doses. Reduce dose if too high.
22Chapter 12 Dependability and Security Specification
Examples of safety requirements
SR1: The system shall not deliver a single dose of insulin that is greater than a
specified maximum dose for a system user.
SR2: The system shall not deliver a daily cumulative dose of insulin that is greater
than a specified maximum daily dose for a system user.
SR3: The system shall include a hardware diagnostic facility that shall be
executed at least four times per hour.
SR4: The system shall include an exception handler for all of the exceptions that
are identified in Table 3.
SR5: The audible alarm shall be sounded when any hardware or software
anomaly is discovered and a diagnostic message, as defined in Table 4, shall be
displayed.
SR6: In the event of an alarm, insulin delivery shall be suspended until the user
has reset the system and cleared the alarm.
23Chapter 12 Dependability and Security Specification
Key points
 Risk analysis is an important activity in the specification
of security and dependability requirements. It involves
identifying risks that can result in accidents or incidents.
 A hazard-driven approach may be used to understand
the safety requirements for a system. You identify
potential hazards and decompose these (using methods
such as fault tree analysis) to discover their root causes.
 Safety requirements should be included to ensure that
hazards and accidents do not arise or, if this is
impossible, to limit the damage caused by system
failure.
24Chapter 12 Dependability and Security Specification
Chapter 12 – Dependability and Security
Specification
Lecture 2
25Chapter 12 Dependability and Security Specification
System reliability specification
 Reliability is a measurable system attribute so non-
functional reliability requirements may be specified
quantitatively. These define the number of failures that
are acceptable during normal use of the system or the
time in which the system must be available.
 Functional reliability requirements define system and
software functions that avoid, detect or tolerate faults in
the software and so ensure that these faults do not lead
to system failure.
 Software reliability requirements may also be included to
cope with hardware failure or operator error.
26Chapter 12 Dependability and Security Specification
Reliability specification process
 Risk identification
 Identify the types of system failure that may lead to economic
losses.
 Risk analysis
 Estimate the costs and consequences of the different types of
software failure.
 Risk decomposition
 Identify the root causes of system failure.
 Risk reduction
 Generate reliability specifications, including quantitative
requirements defining the acceptable levels of failure.
27Chapter 12 Dependability and Security Specification
Types of system failure
Failure type Description
Loss of service The system is unavailable and cannot deliver its services to
users. You may separate this into loss of critical services and
loss of non-critical services, where the consequences of a
failure in non-critical services are less than the consequences of
critical service failure.
Incorrect service delivery The system does not deliver a service correctly to users. Again,
this may be specified in terms of minor and major errors or
errors in the delivery of critical and non-critical services.
System/data corruption The failure of the system causes damage to the system itself or
its data. This will usually but not necessarily be in conjunction
with other types of failures.
28Chapter 12 Dependability and Security Specification
Reliability metrics
 Reliability metrics are units of measurement of system
reliability.
 System reliability is measured by counting the number of
operational failures and, where appropriate, relating
these to the demands made on the system and the time
that the system has been operational.
 A long-term measurement programme is required to
assess the reliability of critical systems.
 Metrics
 Probability of failure on demand
 Rate of occurrence of failures/Mean time to failure
 Availability
29Chapter 12 Dependability and Security Specification
Probability of failure on demand (POFOD)
 This is the probability that the system will fail when a
service request is made. Useful when demands for
service are intermittent and relatively infrequent.
 Appropriate for protection systems where services are
demanded occasionally and where there are serious
consequence if the service is not delivered.
 Relevant for many safety-critical systems with exception
management components
 Emergency shutdown system in a chemical plant.
30Chapter 12 Dependability and Security Specification
Rate of fault occurrence (ROCOF)
 Reflects the rate of occurrence of failure in the system.
 ROCOF of 0.002 means 2 failures are likely in each
1000 operational time units e.g. 2 failures per 1000
hours of operation.
 Relevant for systems where the system has to process a
large number of similar requests in a short time
 Credit card processing system, airline booking system.
 Reciprocal of ROCOF is Mean time to Failure (MTTF)
 Relevant for systems with long transactions i.e. where system
processing takes a long time (e.g. CAD systems). MTTF should be
longer than expected transaction length.
31Chapter 12 Dependability and Security Specification
Availability
 Measure of the fraction of the time that the system is
available for use.
 Takes repair and restart time into account
 Availability of 0.998 means software is available for 998
out of 1000 time units.
 Relevant for non-stop, continuously running systems
 telephone switching systems, railway signalling systems.
32Chapter 12 Dependability and Security Specification
Availability specification
Availability Explanation
0.9 The system is available for 90% of the time. This means that, in a
24-hour period (1,440 minutes), the system will be unavailable for
144 minutes.
0.99 In a 24-hour period, the system is unavailable for 14.4 minutes.
0.999 The system is unavailable for 84 seconds in a 24-hour period.
0.9999 The system is unavailable for 8.4 seconds in a 24-hour period.
Roughly, one minute per week.
33Chapter 12 Dependability and Security Specification
Failure consequences
 When specifying reliability, it is not just the number of
system failures that matter but the consequences of
these failures.
 Failures that have serious consequences are clearly
more damaging than those where repair and recovery is
straightforward.
 In some cases, therefore, different reliability
specifications for different types of failure may be
defined.
34Chapter 12 Dependability and Security Specification
Over-specification of reliability
 Over-specification of reliability is a situation where a
high-level of reliability is specified but it is not cost-
effective to achieve this.
 In many cases, it is cheaper to accept and deal with
failures rather than avoid them occurring.
 To avoid over-specification
 Specify reliability requirements for different types of failure. Minor
failures may be acceptable.
 Specify requirements for different services separately. Critical
services should have the highest reliability requirements.
 Decide whether or not high reliability is really required or if
dependability goals can be achieved in some other way.
35Chapter 12 Dependability and Security Specification
Steps to a reliability specification
 For each sub-system, analyse the consequences of
possible system failures.
 From the system failure analysis, partition failures into
appropriate classes.
 For each failure class identified, set out the reliability
using an appropriate metric. Different metrics may be
used for different reliability requirements.
 Identify functional reliability requirements to reduce the
chances of critical failures.
36Chapter 12 Dependability and Security Specification
Insulin pump specification
 Probability of failure (POFOD) is the most appropriate
metric.
 Transient failures that can be repaired by user actions
such as recalibration of the machine. A relatively low
value of POFOD is acceptable (say 0.002) – one failure
may occur in every 500 demands.
 Permanent failures require the software to be re-installed
by the manufacturer. This should occur no more than
once per year. POFOD for this situation should be less
than 0.00002.
37Chapter 12 Dependability and Security Specification
Functional reliability requirements
 Checking requirements that identify checks to ensure
that incorrect data is detected before it leads to a failure.
 Recovery requirements that are geared to help the
system recover after a failure has occurred.
 Redundancy requirements that specify redundant
features of the system to be included.
 Process requirements for reliability which specify the
development process to be used may also be included.
38Chapter 12 Dependability and Security Specification
Examples of functional reliability requirements
for MHC-PMS
RR1: A pre-defined range for all operator inputs shall be defined and the
system shall check that all operator inputs fall within this pre-defined range.
(Checking)
RR2:Copies of the patient database shall be maintained on two separate servers
that are not housed in the same building. (Recovery, redundancy)
RR3:N-version programming shall be used to implement the braking control
system. (Redundancy)
RR4:The system must be implemented in a safe subset of Ada and checked using
static analysis. (Process)
39Chapter 12 Dependability and Security Specification
Security specification
 Security specification has something in common with safety
requirements specification – in both cases, your concern is to avoid
something bad happening.
 Four major differences
 Safety problems are accidental – the software is not operating in a
hostile environment. In security, you must assume that attackers have
knowledge of system weaknesses
 When safety failures occur, you can look for the root cause or weakness
that led to the failure. When failure results from a deliberate attack, the
attacker may conceal the cause of the failure.
 Shutting down a system can avoid a safety-related failure. Causing a
shut down may be the aim of an attack.
 Safety-related events are not generated from an intelligent adversary.
An attacker can probe defenses over time to discover weaknesses.
40Chapter 12 Dependability and Security Specification
Types of security requirement
 Identification requirements.
 Authentication requirements.
 Authorisation requirements.
 Immunity requirements.
 Integrity requirements.
 Intrusion detection requirements.
 Non-repudiation requirements.
 Privacy requirements.
 Security auditing requirements.
 System maintenance security requirements.
41Chapter 12 Dependability and Security Specification
The preliminary risk assessment process for
security requirements
42Chapter 12 Dependability and Security Specification
Security risk assessment
 Asset identification
 Identify the key system assets (or services) that have to be
protected.
 Asset value assessment
 Estimate the value of the identified assets.
 Exposure assessment
 Assess the potential losses associated with each asset.
 Threat identification
 Identify the most probable threats to the system assets
43Chapter 12 Dependability and Security Specification
Security risk assessment
 Attack assessment
 Decompose threats into possible attacks on the system and the
ways that these may occur.
 Control identification
 Propose the controls that may be put in place to protect an
asset.
 Feasibility assessment
 Assess the technical feasibility and cost of the controls.
 Security requirements definition
 Define system security requirements. These can be
infrastructure or application system requirements.
44Chapter 12 Dependability and Security Specification
Asset analysis in a preliminary risk assessment
report for the MHC-PMS
Asset Value Exposure
The information system High. Required to support all
clinical consultations. Potentially
safety-critical.
High. Financial loss as clinics
may have to be canceled. Costs
of restoring system. Possible
patient harm if treatment cannot
be prescribed.
The patient database High. Required to support all
clinical consultations. Potentially
safety-critical.
High. Financial loss as clinics
may have to be canceled. Costs
of restoring system. Possible
patient harm if treatment cannot
be prescribed.
An individual patient record Normally low although may be
high for specific high-profile
patients.
Low direct losses but possible
loss of reputation.
45Chapter 12 Dependability and Security Specification
Threat and control analysis in a preliminary risk
assessment report
Threat Probability Control Feasibility
Unauthorized user
gains access as
system manager and
makes system
unavailable
Low Only allow system
management from
specific locations that are
physically secure.
Low cost of implementation but
care must be taken with key
distribution and to ensure that
keys are available in the event
of an emergency.
Unauthorized user
gains access as
system user and
accesses confidential
information
High Require all users to
authenticate themselves
using a biometric
mechanism.
Log all changes to
patient information to
track system usage.
Technically feasible but high-
cost solution. Possible user
resistance.
Simple and transparent to
implement and also supports
recovery.
46Chapter 12 Dependability and Security Specification
Security policy
 An organizational security policy applies to all systems
and sets out what should and should not be allowed.
 For example, a military policy might be:
 Readers may only examine documents whose classification is
the same as or below the readers vetting level.
 A security policy sets out the conditions that must be
maintained by a security system and so helps identify
system security requirements.
47Chapter 12 Dependability and Security Specification
Security requirements for the MHC-PMS
 Patient information shall be downloaded at the start of a
clinic session to a secure area on the system client that
is used by clinical staff.
 All patient information on the system client shall be
encrypted.
 Patient information shall be uploaded to the database
after a clinic session has finished and deleted from the
client computer.
 A log on a separate computer from the database server
must be maintained of all changes made to the system
database.
48Chapter 12 Dependability and Security Specification
Formal specification
 Formal specification is part of a more general collection
of techniques that are known as ‘formal methods’.
 These are all based on mathematical representation and
analysis of software.
 Formal methods include
 Formal specification;
 Specification analysis and proof;
 Transformational development;
 Program verification.
49Chapter 12 Dependability and Security Specification
Use of formal methods
 The principal benefits of formal methods are in reducing
the number of faults in systems.
 Consequently, their main area of applicability is in critical
systems engineering. There have been several
successful projects where formal methods have been
used in this area.
 In this area, the use of formal methods is most likely to
be cost-effective because high system failure costs must
be avoided.
50Chapter 12 Dependability and Security Specification
Specification in the software process
 Specification and design are inextricably
intermingled.
 Architectural design is essential to structure a
specification and the specification process.
 Formal specifications are expressed in a
mathematical notation with precisely defined
vocabulary, syntax and semantics.
51Chapter 12 Dependability and Security Specification
Formal specification in a plan-based software
process
52Chapter 12 Dependability and Security Specification
Benefits of formal specification
 Developing a formal specification requires the system
requirements to be analyzed in detail. This helps to detect
problems, inconsistencies and incompleteness in the
requirements.
 As the specification is expressed in a formal language, it can
be automatically analyzed to discover inconsistencies and
incompleteness.
 If you use a formal method such as the B method, you can
transform the formal specification into a ‘correct’ program.
 Program testing costs may be reduced if the program is
formally verified against its specification.
53Chapter 12 Dependability and Security Specification
Acceptance of formal methods
 Formal methods have had limited impact on practical
software development:
 Problem owners cannot understand a formal specification and so
cannot assess if it is an accurate representation of their
requirements.
 It is easy to assess the costs of developing a formal specification
but harder to assess the benefits. Managers may therefore be
unwilling to invest in formal methods.
 Software engineers are unfamiliar with this approach and are
therefore reluctant to propose the use of FM.
 Formal methods are still hard to scale up to large systems.
 Formal specification is not really compatible with agile
development methods.
54Chapter 12 Dependability and Security Specification
Key points
 Reliability requirements can be defined quantitatively. They include
probability of failure on demand (POFOD), rate of occurrence of
failure (ROCOF) and availability (AVAIL).
 Security requirements are more difficult to identify than safety
requirements because a system attacker can use knowledge of
system vulnerabilities to plan a system attack, and can learn about
vulnerabilities from unsuccessful attacks.
 To specify security requirements, you should identify the assets that
are to be protected and define how security techniques and
technology should be used to protect these assets.
 Formal methods of software development rely on a system
specification that is expressed as a mathematical model. The use of
formal methods avoids ambiguity in a critical systems specification.
55Chapter 12 Dependability and Security Specification

Más contenido relacionado

La actualidad más candente

Software Failure Air Traffic Control System
Software Failure Air Traffic Control SystemSoftware Failure Air Traffic Control System
Software Failure Air Traffic Control SystemShakeel Ahmed
 
Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...Shakas Technologies
 
White paper - Actionable Alarming - Wonderware-Schneider Electric
White paper - Actionable Alarming - Wonderware-Schneider ElectricWhite paper - Actionable Alarming - Wonderware-Schneider Electric
White paper - Actionable Alarming - Wonderware-Schneider ElectricSuman Singh
 
State-of-the-Art: Industry Challenges in ERM
State-of-the-Art: Industry Challenges in ERMState-of-the-Art: Industry Challenges in ERM
State-of-the-Art: Industry Challenges in ERMs0P5a41b
 
Challenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciencesChallenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciencesPEPGRA Healthcare
 
LOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh RajputLOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh RajputGaurav Singh Rajput
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DevicePriyanka Aash
 
Master Data, From Inspection to Analytics to Business Decision
Master Data, From Inspection to Analytics to Business DecisionMaster Data, From Inspection to Analytics to Business Decision
Master Data, From Inspection to Analytics to Business DecisionPreston Johnson
 
Automated Framework for Vision based Driver Fatigue Detection by using Multi-...
Automated Framework for Vision based Driver Fatigue Detection by using Multi-...Automated Framework for Vision based Driver Fatigue Detection by using Multi-...
Automated Framework for Vision based Driver Fatigue Detection by using Multi-...IRJET Journal
 
Wireless infusion pumps and patient safety
Wireless infusion pumps and patient safetyWireless infusion pumps and patient safety
Wireless infusion pumps and patient safetyDr. Samir Sawli
 
Anomaly Detection for Preventive Maintenance
Anomaly Detection for Preventive MaintenanceAnomaly Detection for Preventive Maintenance
Anomaly Detection for Preventive MaintenanceOrzota
 

La actualidad más candente (15)

Software Failure Air Traffic Control System
Software Failure Air Traffic Control SystemSoftware Failure Air Traffic Control System
Software Failure Air Traffic Control System
 
THERP
THERPTHERP
THERP
 
Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...
 
Safety Integrity Levels
Safety Integrity LevelsSafety Integrity Levels
Safety Integrity Levels
 
White paper - Actionable Alarming - Wonderware-Schneider Electric
White paper - Actionable Alarming - Wonderware-Schneider ElectricWhite paper - Actionable Alarming - Wonderware-Schneider Electric
White paper - Actionable Alarming - Wonderware-Schneider Electric
 
State-of-the-Art: Industry Challenges in ERM
State-of-the-Art: Industry Challenges in ERMState-of-the-Art: Industry Challenges in ERM
State-of-the-Art: Industry Challenges in ERM
 
Challenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciencesChallenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciences
 
LOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh RajputLOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
 
Master Data, From Inspection to Analytics to Business Decision
Master Data, From Inspection to Analytics to Business DecisionMaster Data, From Inspection to Analytics to Business Decision
Master Data, From Inspection to Analytics to Business Decision
 
Automated Framework for Vision based Driver Fatigue Detection by using Multi-...
Automated Framework for Vision based Driver Fatigue Detection by using Multi-...Automated Framework for Vision based Driver Fatigue Detection by using Multi-...
Automated Framework for Vision based Driver Fatigue Detection by using Multi-...
 
Wireless infusion pumps and patient safety
Wireless infusion pumps and patient safetyWireless infusion pumps and patient safety
Wireless infusion pumps and patient safety
 
Anomaly Detection for Preventive Maintenance
Anomaly Detection for Preventive MaintenanceAnomaly Detection for Preventive Maintenance
Anomaly Detection for Preventive Maintenance
 
brochure-print
brochure-printbrochure-print
brochure-print
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 

Destacado

Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...
Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...
Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...SmartNet
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networkingOlorunyomi Segun
 
Data analytics in computer networking
Data analytics in computer networkingData analytics in computer networking
Data analytics in computer networkingStenio Fernandes
 
Beit 381 se lec 20 - 31 - 12 apr25 - case tools and ascent1-55
Beit 381 se lec 20  - 31 - 12 apr25 - case tools and ascent1-55Beit 381 se lec 20  - 31 - 12 apr25 - case tools and ascent1-55
Beit 381 se lec 20 - 31 - 12 apr25 - case tools and ascent1-55babak danyal
 
Ian Sommerville, Software Engineering, 9th Edition Ch 23
Ian Sommerville,  Software Engineering, 9th Edition Ch 23Ian Sommerville,  Software Engineering, 9th Edition Ch 23
Ian Sommerville, Software Engineering, 9th Edition Ch 23Mohammed Romi
 
Ch 4 software engineering
Ch 4 software engineeringCh 4 software engineering
Ch 4 software engineeringMohammed Romi
 
The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networkingStenio Fernandes
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9Ian Sommerville
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1Mohammed Romi
 
Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)Mohammed Romi
 
Ian Sommerville, Software Engineering, 9th EditionCh 8
Ian Sommerville,  Software Engineering, 9th EditionCh 8Ian Sommerville,  Software Engineering, 9th EditionCh 8
Ian Sommerville, Software Engineering, 9th EditionCh 8Mohammed Romi
 
Ch24-Software Engineering 9
Ch24-Software Engineering 9Ch24-Software Engineering 9
Ch24-Software Engineering 9Ian Sommerville
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9Ian Sommerville
 
CASE tools and their effects on software quality
CASE tools and their effects on software qualityCASE tools and their effects on software quality
CASE tools and their effects on software qualityUtkarsh Agarwal
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9Ian Sommerville
 

Destacado (20)

Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...
Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...
Networking with Purpose - the Lincoln Hub: Dr Andrew West Vice Chancellor, Li...
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
Data analytics in computer networking
Data analytics in computer networkingData analytics in computer networking
Data analytics in computer networking
 
Beit 381 se lec 20 - 31 - 12 apr25 - case tools and ascent1-55
Beit 381 se lec 20  - 31 - 12 apr25 - case tools and ascent1-55Beit 381 se lec 20  - 31 - 12 apr25 - case tools and ascent1-55
Beit 381 se lec 20 - 31 - 12 apr25 - case tools and ascent1-55
 
Ian Sommerville, Software Engineering, 9th Edition Ch 23
Ian Sommerville,  Software Engineering, 9th Edition Ch 23Ian Sommerville,  Software Engineering, 9th Edition Ch 23
Ian Sommerville, Software Engineering, 9th Edition Ch 23
 
Ch 4 software engineering
Ch 4 software engineeringCh 4 software engineering
Ch 4 software engineering
 
Ch2020
Ch2020Ch2020
Ch2020
 
Ch7
Ch7Ch7
Ch7
 
The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networking
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 
Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)
 
Ian Sommerville, Software Engineering, 9th EditionCh 8
Ian Sommerville,  Software Engineering, 9th EditionCh 8Ian Sommerville,  Software Engineering, 9th EditionCh 8
Ian Sommerville, Software Engineering, 9th EditionCh 8
 
Chap4 RE validation
Chap4 RE validationChap4 RE validation
Chap4 RE validation
 
Ch24-Software Engineering 9
Ch24-Software Engineering 9Ch24-Software Engineering 9
Ch24-Software Engineering 9
 
Ch 6
Ch 6Ch 6
Ch 6
 
Swiching
SwichingSwiching
Swiching
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9
 
CASE tools and their effects on software quality
CASE tools and their effects on software qualityCASE tools and their effects on software quality
CASE tools and their effects on software quality
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 

Similar a Ch12

Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9Ian Sommerville
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9Siddharth Ayer
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specificationAryan Ajmer
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systemsSaiful Chowdhury
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
cupdf.com_it-security-management-and-risk-assessment.pdf
cupdf.com_it-security-management-and-risk-assessment.pdfcupdf.com_it-security-management-and-risk-assessment.pdf
cupdf.com_it-security-management-and-risk-assessment.pdfAgusNursidik
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Sil explained in valve actuators
Sil explained in valve actuatorsSil explained in valve actuators
Sil explained in valve actuatorsJohn Kingsley
 
Ich guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentIch guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentAshvin Bhoge
 
Understanding Safety Level Integrity Levels (SIL)
Understanding Safety Level Integrity Levels (SIL)Understanding Safety Level Integrity Levels (SIL)
Understanding Safety Level Integrity Levels (SIL)Power Specialties, Inc.
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Thorne & Derrick UK
 
Safety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetySafety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetyAli Sufyan
 
eHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile HealtheHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile Healthulmedical
 
Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails Ashley Finden
 

Similar a Ch12 (20)

Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Ch12 - Safety Engineering
Ch12 - Safety EngineeringCh12 - Safety Engineering
Ch12 - Safety Engineering
 
Ch9
Ch9Ch9
Ch9
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systems
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Topic5
Topic5Topic5
Topic5
 
cupdf.com_it-security-management-and-risk-assessment.pdf
cupdf.com_it-security-management-and-risk-assessment.pdfcupdf.com_it-security-management-and-risk-assessment.pdf
cupdf.com_it-security-management-and-risk-assessment.pdf
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Sil explained in valve actuators
Sil explained in valve actuatorsSil explained in valve actuators
Sil explained in valve actuators
 
Ich guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentIch guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangment
 
Safety system
Safety systemSafety system
Safety system
 
Understanding Safety Level Integrity Levels (SIL)
Understanding Safety Level Integrity Levels (SIL)Understanding Safety Level Integrity Levels (SIL)
Understanding Safety Level Integrity Levels (SIL)
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
 
Safety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetySafety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards Safety
 
eHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile HealtheHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile Health
 
Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails
 

Más de Keith Jasper Mier (20)

Ch26
Ch26Ch26
Ch26
 
Ch25
Ch25Ch25
Ch25
 
Ch24
Ch24Ch24
Ch24
 
Ch23
Ch23Ch23
Ch23
 
Ch22
Ch22Ch22
Ch22
 
Ch21
Ch21Ch21
Ch21
 
Ch20
Ch20Ch20
Ch20
 
Ch19
Ch19Ch19
Ch19
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch15
Ch15Ch15
Ch15
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 
Ch9
Ch9Ch9
Ch9
 
Ch8
Ch8Ch8
Ch8
 
Ch7
Ch7Ch7
Ch7
 
Ch6
Ch6Ch6
Ch6
 

Último

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 

Último (20)

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 

Ch12

  • 1. Chapter 12 – Dependability and Security Specification Lecture 1 1Chapter 12 Dependability and Security Specification
  • 2. Topics covered  Risk-driven specification  Safety specification  Security specification  Software reliability specification 2Chapter 12 Dependability and Security Specification
  • 3. Dependability requirements  Functional requirements to define error checking and recovery facilities and protection against system failures.  Non-functional requirements defining the required reliability and availability of the system.  Excluding requirements that define states and conditions that must not arise. 3Chapter 12 Dependability and Security Specification
  • 4. Risk-driven specification  Critical systems specification should be risk-driven.  This approach has been widely used in safety and security-critical systems.  The aim of the specification process should be to understand the risks (safety, security, etc.) faced by the system and to define requirements that reduce these risks. 4Chapter 12 Dependability and Security Specification
  • 5. Stages of risk-based analysis  Risk identification  Identify potential risks that may arise.  Risk analysis and classification  Assess the seriousness of each risk.  Risk decomposition  Decompose risks to discover their potential root causes.  Risk reduction assessment  Define how each risk must be taken into eliminated or reduced when the system is designed. 5Chapter 12 Dependability and Security Specification
  • 6. Risk-driven specification 6Chapter 12 Dependability and Security Specification
  • 7. Phased risk analysis  Preliminary risk analysis  Identifies risks from the systems environment. Aim is to develop an initial set of system security and dependability requirements.  Life cycle risk analysis  Identifies risks that emerge during design and development e.g. risks that are associated with the technologies used for system construction. Requirements are extended to protect against these risks.  Operational risk analysis  Risks associated with the system user interface and operator errors. Further protection requirements may be added to cope with these. 7Chapter 12 Dependability and Security Specification
  • 8. Safety specification  Goal is to identify protection requirements that ensure that system failures do not cause injury or death or environmental damage.  Risk identification = Hazard identification  Risk analysis = Hazard assessment  Risk decomposition = Hazard analysis  Risk reduction = safety requirements specification 8Chapter 12 Dependability and Security Specification
  • 9. Hazard identification  Identify the hazards that may threaten the system.  Hazard identification may be based on different types of hazard:  Physical hazards  Electrical hazards  Biological hazards  Service failure hazards  Etc. 9Chapter 12 Dependability and Security Specification
  • 10. Insulin pump risks  Insulin overdose (service failure).  Insulin underdose (service failure).  Power failure due to exhausted battery (electrical).  Electrical interference with other medical equipment (electrical).  Poor sensor and actuator contact (physical).  Parts of machine break off in body (physical).  Infection caused by introduction of machine (biological).  Allergic reaction to materials or insulin (biological). 10Chapter 12 Dependability and Security Specification
  • 11. Hazard assessment  The process is concerned with understanding the likelihood that a risk will arise and the potential consequences if an accident or incident should occur.  Risks may be categorised as:  Intolerable. Must never arise or result in an accident  As low as reasonably practical(ALARP). Must minimise the possibility of risk given cost and schedule constraints  Acceptable. The consequences of the risk are acceptable and no extra costs should be incurred to reduce hazard probability 11Chapter 12 Dependability and Security Specification
  • 12. The risk triangle 12Chapter 12 Dependability and Security Specification
  • 13. Social acceptability of risk  The acceptability of a risk is determined by human, social and political considerations.  In most societies, the boundaries between the regions are pushed upwards with time i.e. society is less willing to accept risk  For example, the costs of cleaning up pollution may be less than the costs of preventing it but this may not be socially acceptable.  Risk assessment is subjective  Risks are identified as probable, unlikely, etc. This depends on who is making the assessment. 13Chapter 12 Dependability and Security Specification
  • 14. Hazard assessment  Estimate the risk probability and the risk severity.  It is not normally possible to do this precisely so relative values are used such as ‘unlikely’, ‘rare’, ‘very high’, etc.  The aim must be to exclude risks that are likely to arise or that have high severity. 14Chapter 12 Dependability and Security Specification
  • 15. Risk classification for the insulin pump Identified hazard Hazard probability Accident severity Estimated risk Acceptability 1.Insulin overdose computation Medium High High Intolerable 2. Insulin underdose computation Medium Low Low Acceptable 3. Failure of hardware monitoring system Medium Medium Low ALARP 4. Power failure High Low Low Acceptable 5. Machine incorrectly fitted High High High Intolerable 6. Machine breaks in patient Low High Medium ALARP 7. Machine causes infection Medium Medium Medium ALARP 8. Electrical interference Low High Medium ALARP 9. Allergic reaction Low Low Low Acceptable 15Chapter 12 Dependability and Security Specification
  • 16. Hazard analysis  Concerned with discovering the root causes of risks in a particular system.  Techniques have been mostly derived from safety-critical systems and can be  Inductive, bottom-up techniques. Start with a proposed system failure and assess the hazards that could arise from that failure;  Deductive, top-down techniques. Start with a hazard and deduce what the causes of this could be. 16Chapter 12 Dependability and Security Specification
  • 17. Fault-tree analysis  A deductive top-down technique.  Put the risk or hazard at the root of the tree and identify the system states that could lead to that hazard.  Where appropriate, link these with ‘and’ or ‘or’ conditions.  A goal should be to minimise the number of single causes of system failure. 17Chapter 12 Dependability and Security Specification
  • 18. An example of a software fault tree 18Chapter 12 Dependability and Security Specification
  • 19. Fault tree analysis  Three possible conditions that can lead to delivery of incorrect dose of insulin  Incorrect measurement of blood sugar level  Failure of delivery system  Dose delivered at wrong time  By analysis of the fault tree, root causes of these hazards related to software are:  Algorithm error  Arithmetic error 19Chapter 12 Dependability and Security Specification
  • 20. Risk reduction  The aim of this process is to identify dependability requirements that specify how the risks should be managed and ensure that accidents/incidents do not arise.  Risk reduction strategies  Risk avoidance;  Risk detection and removal;  Damage limitation. 20Chapter 12 Dependability and Security Specification
  • 21. Strategy use  Normally, in critical systems, a mix of risk reduction strategies are used.  In a chemical plant control system, the system will include sensors to detect and correct excess pressure in the reactor.  However, it will also include an independent protection system that opens a relief valve if dangerously high pressure is detected. 21Chapter 12 Dependability and Security Specification
  • 22. Insulin pump - software risks  Arithmetic error  A computation causes the value of a variable to overflow or underflow;  Maybe include an exception handler for each type of arithmetic error.  Algorithmic error  Compare dose to be delivered with previous dose or safe maximum doses. Reduce dose if too high. 22Chapter 12 Dependability and Security Specification
  • 23. Examples of safety requirements SR1: The system shall not deliver a single dose of insulin that is greater than a specified maximum dose for a system user. SR2: The system shall not deliver a daily cumulative dose of insulin that is greater than a specified maximum daily dose for a system user. SR3: The system shall include a hardware diagnostic facility that shall be executed at least four times per hour. SR4: The system shall include an exception handler for all of the exceptions that are identified in Table 3. SR5: The audible alarm shall be sounded when any hardware or software anomaly is discovered and a diagnostic message, as defined in Table 4, shall be displayed. SR6: In the event of an alarm, insulin delivery shall be suspended until the user has reset the system and cleared the alarm. 23Chapter 12 Dependability and Security Specification
  • 24. Key points  Risk analysis is an important activity in the specification of security and dependability requirements. It involves identifying risks that can result in accidents or incidents.  A hazard-driven approach may be used to understand the safety requirements for a system. You identify potential hazards and decompose these (using methods such as fault tree analysis) to discover their root causes.  Safety requirements should be included to ensure that hazards and accidents do not arise or, if this is impossible, to limit the damage caused by system failure. 24Chapter 12 Dependability and Security Specification
  • 25. Chapter 12 – Dependability and Security Specification Lecture 2 25Chapter 12 Dependability and Security Specification
  • 26. System reliability specification  Reliability is a measurable system attribute so non- functional reliability requirements may be specified quantitatively. These define the number of failures that are acceptable during normal use of the system or the time in which the system must be available.  Functional reliability requirements define system and software functions that avoid, detect or tolerate faults in the software and so ensure that these faults do not lead to system failure.  Software reliability requirements may also be included to cope with hardware failure or operator error. 26Chapter 12 Dependability and Security Specification
  • 27. Reliability specification process  Risk identification  Identify the types of system failure that may lead to economic losses.  Risk analysis  Estimate the costs and consequences of the different types of software failure.  Risk decomposition  Identify the root causes of system failure.  Risk reduction  Generate reliability specifications, including quantitative requirements defining the acceptable levels of failure. 27Chapter 12 Dependability and Security Specification
  • 28. Types of system failure Failure type Description Loss of service The system is unavailable and cannot deliver its services to users. You may separate this into loss of critical services and loss of non-critical services, where the consequences of a failure in non-critical services are less than the consequences of critical service failure. Incorrect service delivery The system does not deliver a service correctly to users. Again, this may be specified in terms of minor and major errors or errors in the delivery of critical and non-critical services. System/data corruption The failure of the system causes damage to the system itself or its data. This will usually but not necessarily be in conjunction with other types of failures. 28Chapter 12 Dependability and Security Specification
  • 29. Reliability metrics  Reliability metrics are units of measurement of system reliability.  System reliability is measured by counting the number of operational failures and, where appropriate, relating these to the demands made on the system and the time that the system has been operational.  A long-term measurement programme is required to assess the reliability of critical systems.  Metrics  Probability of failure on demand  Rate of occurrence of failures/Mean time to failure  Availability 29Chapter 12 Dependability and Security Specification
  • 30. Probability of failure on demand (POFOD)  This is the probability that the system will fail when a service request is made. Useful when demands for service are intermittent and relatively infrequent.  Appropriate for protection systems where services are demanded occasionally and where there are serious consequence if the service is not delivered.  Relevant for many safety-critical systems with exception management components  Emergency shutdown system in a chemical plant. 30Chapter 12 Dependability and Security Specification
  • 31. Rate of fault occurrence (ROCOF)  Reflects the rate of occurrence of failure in the system.  ROCOF of 0.002 means 2 failures are likely in each 1000 operational time units e.g. 2 failures per 1000 hours of operation.  Relevant for systems where the system has to process a large number of similar requests in a short time  Credit card processing system, airline booking system.  Reciprocal of ROCOF is Mean time to Failure (MTTF)  Relevant for systems with long transactions i.e. where system processing takes a long time (e.g. CAD systems). MTTF should be longer than expected transaction length. 31Chapter 12 Dependability and Security Specification
  • 32. Availability  Measure of the fraction of the time that the system is available for use.  Takes repair and restart time into account  Availability of 0.998 means software is available for 998 out of 1000 time units.  Relevant for non-stop, continuously running systems  telephone switching systems, railway signalling systems. 32Chapter 12 Dependability and Security Specification
  • 33. Availability specification Availability Explanation 0.9 The system is available for 90% of the time. This means that, in a 24-hour period (1,440 minutes), the system will be unavailable for 144 minutes. 0.99 In a 24-hour period, the system is unavailable for 14.4 minutes. 0.999 The system is unavailable for 84 seconds in a 24-hour period. 0.9999 The system is unavailable for 8.4 seconds in a 24-hour period. Roughly, one minute per week. 33Chapter 12 Dependability and Security Specification
  • 34. Failure consequences  When specifying reliability, it is not just the number of system failures that matter but the consequences of these failures.  Failures that have serious consequences are clearly more damaging than those where repair and recovery is straightforward.  In some cases, therefore, different reliability specifications for different types of failure may be defined. 34Chapter 12 Dependability and Security Specification
  • 35. Over-specification of reliability  Over-specification of reliability is a situation where a high-level of reliability is specified but it is not cost- effective to achieve this.  In many cases, it is cheaper to accept and deal with failures rather than avoid them occurring.  To avoid over-specification  Specify reliability requirements for different types of failure. Minor failures may be acceptable.  Specify requirements for different services separately. Critical services should have the highest reliability requirements.  Decide whether or not high reliability is really required or if dependability goals can be achieved in some other way. 35Chapter 12 Dependability and Security Specification
  • 36. Steps to a reliability specification  For each sub-system, analyse the consequences of possible system failures.  From the system failure analysis, partition failures into appropriate classes.  For each failure class identified, set out the reliability using an appropriate metric. Different metrics may be used for different reliability requirements.  Identify functional reliability requirements to reduce the chances of critical failures. 36Chapter 12 Dependability and Security Specification
  • 37. Insulin pump specification  Probability of failure (POFOD) is the most appropriate metric.  Transient failures that can be repaired by user actions such as recalibration of the machine. A relatively low value of POFOD is acceptable (say 0.002) – one failure may occur in every 500 demands.  Permanent failures require the software to be re-installed by the manufacturer. This should occur no more than once per year. POFOD for this situation should be less than 0.00002. 37Chapter 12 Dependability and Security Specification
  • 38. Functional reliability requirements  Checking requirements that identify checks to ensure that incorrect data is detected before it leads to a failure.  Recovery requirements that are geared to help the system recover after a failure has occurred.  Redundancy requirements that specify redundant features of the system to be included.  Process requirements for reliability which specify the development process to be used may also be included. 38Chapter 12 Dependability and Security Specification
  • 39. Examples of functional reliability requirements for MHC-PMS RR1: A pre-defined range for all operator inputs shall be defined and the system shall check that all operator inputs fall within this pre-defined range. (Checking) RR2:Copies of the patient database shall be maintained on two separate servers that are not housed in the same building. (Recovery, redundancy) RR3:N-version programming shall be used to implement the braking control system. (Redundancy) RR4:The system must be implemented in a safe subset of Ada and checked using static analysis. (Process) 39Chapter 12 Dependability and Security Specification
  • 40. Security specification  Security specification has something in common with safety requirements specification – in both cases, your concern is to avoid something bad happening.  Four major differences  Safety problems are accidental – the software is not operating in a hostile environment. In security, you must assume that attackers have knowledge of system weaknesses  When safety failures occur, you can look for the root cause or weakness that led to the failure. When failure results from a deliberate attack, the attacker may conceal the cause of the failure.  Shutting down a system can avoid a safety-related failure. Causing a shut down may be the aim of an attack.  Safety-related events are not generated from an intelligent adversary. An attacker can probe defenses over time to discover weaknesses. 40Chapter 12 Dependability and Security Specification
  • 41. Types of security requirement  Identification requirements.  Authentication requirements.  Authorisation requirements.  Immunity requirements.  Integrity requirements.  Intrusion detection requirements.  Non-repudiation requirements.  Privacy requirements.  Security auditing requirements.  System maintenance security requirements. 41Chapter 12 Dependability and Security Specification
  • 42. The preliminary risk assessment process for security requirements 42Chapter 12 Dependability and Security Specification
  • 43. Security risk assessment  Asset identification  Identify the key system assets (or services) that have to be protected.  Asset value assessment  Estimate the value of the identified assets.  Exposure assessment  Assess the potential losses associated with each asset.  Threat identification  Identify the most probable threats to the system assets 43Chapter 12 Dependability and Security Specification
  • 44. Security risk assessment  Attack assessment  Decompose threats into possible attacks on the system and the ways that these may occur.  Control identification  Propose the controls that may be put in place to protect an asset.  Feasibility assessment  Assess the technical feasibility and cost of the controls.  Security requirements definition  Define system security requirements. These can be infrastructure or application system requirements. 44Chapter 12 Dependability and Security Specification
  • 45. Asset analysis in a preliminary risk assessment report for the MHC-PMS Asset Value Exposure The information system High. Required to support all clinical consultations. Potentially safety-critical. High. Financial loss as clinics may have to be canceled. Costs of restoring system. Possible patient harm if treatment cannot be prescribed. The patient database High. Required to support all clinical consultations. Potentially safety-critical. High. Financial loss as clinics may have to be canceled. Costs of restoring system. Possible patient harm if treatment cannot be prescribed. An individual patient record Normally low although may be high for specific high-profile patients. Low direct losses but possible loss of reputation. 45Chapter 12 Dependability and Security Specification
  • 46. Threat and control analysis in a preliminary risk assessment report Threat Probability Control Feasibility Unauthorized user gains access as system manager and makes system unavailable Low Only allow system management from specific locations that are physically secure. Low cost of implementation but care must be taken with key distribution and to ensure that keys are available in the event of an emergency. Unauthorized user gains access as system user and accesses confidential information High Require all users to authenticate themselves using a biometric mechanism. Log all changes to patient information to track system usage. Technically feasible but high- cost solution. Possible user resistance. Simple and transparent to implement and also supports recovery. 46Chapter 12 Dependability and Security Specification
  • 47. Security policy  An organizational security policy applies to all systems and sets out what should and should not be allowed.  For example, a military policy might be:  Readers may only examine documents whose classification is the same as or below the readers vetting level.  A security policy sets out the conditions that must be maintained by a security system and so helps identify system security requirements. 47Chapter 12 Dependability and Security Specification
  • 48. Security requirements for the MHC-PMS  Patient information shall be downloaded at the start of a clinic session to a secure area on the system client that is used by clinical staff.  All patient information on the system client shall be encrypted.  Patient information shall be uploaded to the database after a clinic session has finished and deleted from the client computer.  A log on a separate computer from the database server must be maintained of all changes made to the system database. 48Chapter 12 Dependability and Security Specification
  • 49. Formal specification  Formal specification is part of a more general collection of techniques that are known as ‘formal methods’.  These are all based on mathematical representation and analysis of software.  Formal methods include  Formal specification;  Specification analysis and proof;  Transformational development;  Program verification. 49Chapter 12 Dependability and Security Specification
  • 50. Use of formal methods  The principal benefits of formal methods are in reducing the number of faults in systems.  Consequently, their main area of applicability is in critical systems engineering. There have been several successful projects where formal methods have been used in this area.  In this area, the use of formal methods is most likely to be cost-effective because high system failure costs must be avoided. 50Chapter 12 Dependability and Security Specification
  • 51. Specification in the software process  Specification and design are inextricably intermingled.  Architectural design is essential to structure a specification and the specification process.  Formal specifications are expressed in a mathematical notation with precisely defined vocabulary, syntax and semantics. 51Chapter 12 Dependability and Security Specification
  • 52. Formal specification in a plan-based software process 52Chapter 12 Dependability and Security Specification
  • 53. Benefits of formal specification  Developing a formal specification requires the system requirements to be analyzed in detail. This helps to detect problems, inconsistencies and incompleteness in the requirements.  As the specification is expressed in a formal language, it can be automatically analyzed to discover inconsistencies and incompleteness.  If you use a formal method such as the B method, you can transform the formal specification into a ‘correct’ program.  Program testing costs may be reduced if the program is formally verified against its specification. 53Chapter 12 Dependability and Security Specification
  • 54. Acceptance of formal methods  Formal methods have had limited impact on practical software development:  Problem owners cannot understand a formal specification and so cannot assess if it is an accurate representation of their requirements.  It is easy to assess the costs of developing a formal specification but harder to assess the benefits. Managers may therefore be unwilling to invest in formal methods.  Software engineers are unfamiliar with this approach and are therefore reluctant to propose the use of FM.  Formal methods are still hard to scale up to large systems.  Formal specification is not really compatible with agile development methods. 54Chapter 12 Dependability and Security Specification
  • 55. Key points  Reliability requirements can be defined quantitatively. They include probability of failure on demand (POFOD), rate of occurrence of failure (ROCOF) and availability (AVAIL).  Security requirements are more difficult to identify than safety requirements because a system attacker can use knowledge of system vulnerabilities to plan a system attack, and can learn about vulnerabilities from unsuccessful attacks.  To specify security requirements, you should identify the assets that are to be protected and define how security techniques and technology should be used to protect these assets.  Formal methods of software development rely on a system specification that is expressed as a mathematical model. The use of formal methods avoids ambiguity in a critical systems specification. 55Chapter 12 Dependability and Security Specification