SlideShare una empresa de Scribd logo
1 de 25
Critical systems engineering
Ian Sommerville

Critical systems engineering, 2013

Slide 1
Critical systems
•

Systems whose failure or unavailability can lead to
loss of life, injury, environmental damage or serious
economic consequences for businesses or countries

•

Almost all public and private sector activities in
developed countries now rely on critical, softwareintensive systems

•

Long-lifetime systems

Critical systems engineering, 2013

Slide 2
Image credit: http://www.barronmccann.com/
Critical systems engineering, 2013

Slide 3
Critical systems engineering
• The focus in critical systems
engineering is on the use of techniques
and methods to develop dependable
and secure systems

Critical systems engineering, 2013

Slide 4
•

The costs of critical system failure are so high that
development methods may be used that are not costeffective for other types of system.

•

A key difference between critical systems engineering
and other types of software engineering is often the
need to demonstrate compliance to laws and
regulations.

Critical systems engineering, 2013

Slide 5
Regulation
•

Regulators are government-appointed bodies whose
job is to ensure that companies and other bodies
conform to national and international laws.

•

This normally involves interpreting the law and
government policy and establishing standards and
regulations that must be followed by industry.

Critical systems engineering, 2013

Slide 6
UK regulators

Critical systems engineering, 2013

Slide 7
System certification
• The regulators check that the system is
conformant to current regulations and
standards and that due care and
attention has been paid to making the
system safe

Critical systems engineering, 2013

Slide 8
System certification
• Some critical systems have to be ‘certified’ by
an external regulator before they can be put
into use
– Aviation systems
– Nuclear systems
– Railway systems
– (Some) medical systems
Critical systems engineering, 2013

Slide 9
Certification costs
•

Certification is very expensive as it involves preparing
detailed documents for the regulator

•

There may be several thousand pages of
documentation that must be created and analysed

•

Certification costs can be comparable or even exceed
the system development costs

Critical systems engineering, 2013

Slide 10
• System owners and developers jointly
produce evidence (a safety case or a
dependability case) that demonstrates
to the regulator that a system is safe
and dependable

Critical systems engineering, 2013

Slide 11
Compliance
• Even when system do not need certification
before use, their owners may need to
demonstrate compliance with existing laws
and regulations
• This may involve collecting information about
the design and operation of a system
Critical systems engineering, 2013

Slide 12
System stakeholders
Customer
Critical systems
engineering
Regulator
System developer
Critical systems engineering, 2013

Slide 13
Critical systems engineering
• System failure costs are high
– Additional costs during system development are
justified if these reduce the likelihood of failure
– Tools and techniques to reduce the chances of
failure that are not cost-effective for other systems
may be used

Critical systems engineering, 2013

Slide 14
• Systems last a long time
– This requires the use of stable technologies
and the development of extensive system
documentation

Critical systems engineering, 2013

Slide 15
• Systems must demonstrate compliance
– Product and process record keeping

– Safety and dependability case development

Critical systems engineering, 2013

Slide 16
Critical systems engineering
processes
• Usually plan-driven processes where each
process stage is planned and carefully
documented
• Agile processes are not suitable for critical
systems engineering although some agile
practices such as test-first development may
be used
Critical systems engineering, 2013

Slide 17
• It is importantto have a complete description
of the system requirements and specification
so that they can be checked and analysed
before development begins
• Disciplined configuration management of all
software and hardware is essential
Critical systems engineering, 2013

Slide 18
Dependable systems
• Fault avoidance
• Fault detection and removal

• Fault tolerance
• Failure recovery and restart

Critical systems engineering, 2013

Slide 19
Software engineering techniques
• Formal methods for systems specification and
analysis
• Fault detection tools such as model checkers
and static analyzers

Critical systems engineering, 2013

Slide 20
Critical systems engineering, 2013

Slide 21
• Fault-tolerant architectures and software
redundancy
• Argumentation systems to support the
development of dependability cases

Critical systems engineering, 2013

Slide 22
Critical systems engineering, 2013

© Adelard 2013

Slide 23
Summary
• Focuses on the use of techniques and
methods to develop dependable and secure
systems
• The CSE process may have to develop
information to satisfy a regulator that a
system is safe and compliant with regulations
Critical systems engineering, 2013

Slide 24
• A plan-based process is normally used
• Techniques that are not used for other types
of system may be cost-effective for critical
systems

Critical systems engineering, 2013

Slide 25

Más contenido relacionado

La actualidad más candente

System quality attributes
System quality attributes System quality attributes
System quality attributes Adil Mehmoood
 
Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering arvind pandey
 
Introduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIntroduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIvano Malavolta
 
SDLC and Software Process Models
SDLC and Software Process ModelsSDLC and Software Process Models
SDLC and Software Process ModelsNana Sarpong
 
Software architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding GuideSoftware architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding GuideMohammed Fazuluddin
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15koolkampus
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specificationAryan Ajmer
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design pptfarazimlak
 
Software architecture
Software architectureSoftware architecture
Software architecturenazn
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1Mohammed Romi
 

La actualidad más candente (20)

System quality attributes
System quality attributes System quality attributes
System quality attributes
 
Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering
 
Introduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIntroduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTURE
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
Ch24 quality management
Ch24 quality managementCh24 quality management
Ch24 quality management
 
SDLC and Software Process Models
SDLC and Software Process ModelsSDLC and Software Process Models
SDLC and Software Process Models
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Software architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding GuideSoftware architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding Guide
 
Ch9 evolution
Ch9 evolutionCh9 evolution
Ch9 evolution
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
 
Ch20 systems of systems
Ch20 systems of systemsCh20 systems of systems
Ch20 systems of systems
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 
Ch7 implementation
Ch7 implementationCh7 implementation
Ch7 implementation
 
Ch6 architectural design
Ch6 architectural designCh6 architectural design
Ch6 architectural design
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design ppt
 
Ch7 - Implementation
Ch7 - ImplementationCh7 - Implementation
Ch7 - Implementation
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 

Similar a Critical systems engineering

Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Securityagoldsmith1
 
Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...UBMCanon
 
Project management through the eye of the systems engineer
Project management through the eye of the systems engineerProject management through the eye of the systems engineer
Project management through the eye of the systems engineerevolve2013
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsjayussuryawan
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsTommy Zul Hidayat
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013Ian Sommerville
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
Software Testing Future and Challenges
Software Testing Future and ChallengesSoftware Testing Future and Challenges
Software Testing Future and ChallengesBakr Salim
 
Innovation day 2013 2.5 joris vanderschrick (verhaert) - embedded system de...
Innovation day 2013   2.5 joris vanderschrick (verhaert) - embedded system de...Innovation day 2013   2.5 joris vanderschrick (verhaert) - embedded system de...
Innovation day 2013 2.5 joris vanderschrick (verhaert) - embedded system de...Verhaert Masters in Innovation
 
Real-Time Engineering Simulators
Real-Time Engineering SimulatorsReal-Time Engineering Simulators
Real-Time Engineering SimulatorsGSE Systems, Inc.
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering EthicsKapil Rajpurohit
 
07_SoftwareEvolution.pdf for student of comuter
07_SoftwareEvolution.pdf for student of comuter07_SoftwareEvolution.pdf for student of comuter
07_SoftwareEvolution.pdf for student of comuterabdulghaffarfrotan20
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to qualityDhanashriAmbre
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUniversity of the District of Columbia
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Huzaifa Saadat
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITSIan Sommerville
 

Similar a Critical systems engineering (20)

Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Security
 
Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...Systems Engineering and Requirements Management in Medical Device Product Dev...
Systems Engineering and Requirements Management in Medical Device Product Dev...
 
Project management through the eye of the systems engineer
Project management through the eye of the systems engineerProject management through the eye of the systems engineer
Project management through the eye of the systems engineer
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
Software Testing Future and Challenges
Software Testing Future and ChallengesSoftware Testing Future and Challenges
Software Testing Future and Challenges
 
Innovation day 2013 2.5 joris vanderschrick (verhaert) - embedded system de...
Innovation day 2013   2.5 joris vanderschrick (verhaert) - embedded system de...Innovation day 2013   2.5 joris vanderschrick (verhaert) - embedded system de...
Innovation day 2013 2.5 joris vanderschrick (verhaert) - embedded system de...
 
Real-Time Engineering Simulators
Real-Time Engineering SimulatorsReal-Time Engineering Simulators
Real-Time Engineering Simulators
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Software development
Software developmentSoftware development
Software development
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
07_SoftwareEvolution.pdf for student of comuter
07_SoftwareEvolution.pdf for student of comuter07_SoftwareEvolution.pdf for student of comuter
07_SoftwareEvolution.pdf for student of comuter
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITS
 

Más de sommerville-videos

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systemssommerville-videos
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processessommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challengessommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 

Más de sommerville-videos (20)

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Why se script
Why se scriptWhy se script
Why se script
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 

Último

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCRalexsharmaa01
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Último (20)

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 

Critical systems engineering

  • 1. Critical systems engineering Ian Sommerville Critical systems engineering, 2013 Slide 1
  • 2. Critical systems • Systems whose failure or unavailability can lead to loss of life, injury, environmental damage or serious economic consequences for businesses or countries • Almost all public and private sector activities in developed countries now rely on critical, softwareintensive systems • Long-lifetime systems Critical systems engineering, 2013 Slide 2
  • 3. Image credit: http://www.barronmccann.com/ Critical systems engineering, 2013 Slide 3
  • 4. Critical systems engineering • The focus in critical systems engineering is on the use of techniques and methods to develop dependable and secure systems Critical systems engineering, 2013 Slide 4
  • 5. • The costs of critical system failure are so high that development methods may be used that are not costeffective for other types of system. • A key difference between critical systems engineering and other types of software engineering is often the need to demonstrate compliance to laws and regulations. Critical systems engineering, 2013 Slide 5
  • 6. Regulation • Regulators are government-appointed bodies whose job is to ensure that companies and other bodies conform to national and international laws. • This normally involves interpreting the law and government policy and establishing standards and regulations that must be followed by industry. Critical systems engineering, 2013 Slide 6
  • 7. UK regulators Critical systems engineering, 2013 Slide 7
  • 8. System certification • The regulators check that the system is conformant to current regulations and standards and that due care and attention has been paid to making the system safe Critical systems engineering, 2013 Slide 8
  • 9. System certification • Some critical systems have to be ‘certified’ by an external regulator before they can be put into use – Aviation systems – Nuclear systems – Railway systems – (Some) medical systems Critical systems engineering, 2013 Slide 9
  • 10. Certification costs • Certification is very expensive as it involves preparing detailed documents for the regulator • There may be several thousand pages of documentation that must be created and analysed • Certification costs can be comparable or even exceed the system development costs Critical systems engineering, 2013 Slide 10
  • 11. • System owners and developers jointly produce evidence (a safety case or a dependability case) that demonstrates to the regulator that a system is safe and dependable Critical systems engineering, 2013 Slide 11
  • 12. Compliance • Even when system do not need certification before use, their owners may need to demonstrate compliance with existing laws and regulations • This may involve collecting information about the design and operation of a system Critical systems engineering, 2013 Slide 12
  • 13. System stakeholders Customer Critical systems engineering Regulator System developer Critical systems engineering, 2013 Slide 13
  • 14. Critical systems engineering • System failure costs are high – Additional costs during system development are justified if these reduce the likelihood of failure – Tools and techniques to reduce the chances of failure that are not cost-effective for other systems may be used Critical systems engineering, 2013 Slide 14
  • 15. • Systems last a long time – This requires the use of stable technologies and the development of extensive system documentation Critical systems engineering, 2013 Slide 15
  • 16. • Systems must demonstrate compliance – Product and process record keeping – Safety and dependability case development Critical systems engineering, 2013 Slide 16
  • 17. Critical systems engineering processes • Usually plan-driven processes where each process stage is planned and carefully documented • Agile processes are not suitable for critical systems engineering although some agile practices such as test-first development may be used Critical systems engineering, 2013 Slide 17
  • 18. • It is importantto have a complete description of the system requirements and specification so that they can be checked and analysed before development begins • Disciplined configuration management of all software and hardware is essential Critical systems engineering, 2013 Slide 18
  • 19. Dependable systems • Fault avoidance • Fault detection and removal • Fault tolerance • Failure recovery and restart Critical systems engineering, 2013 Slide 19
  • 20. Software engineering techniques • Formal methods for systems specification and analysis • Fault detection tools such as model checkers and static analyzers Critical systems engineering, 2013 Slide 20
  • 22. • Fault-tolerant architectures and software redundancy • Argumentation systems to support the development of dependability cases Critical systems engineering, 2013 Slide 22
  • 23. Critical systems engineering, 2013 © Adelard 2013 Slide 23
  • 24. Summary • Focuses on the use of techniques and methods to develop dependable and secure systems • The CSE process may have to develop information to satisfy a regulator that a system is safe and compliant with regulations Critical systems engineering, 2013 Slide 24
  • 25. • A plan-based process is normally used • Techniques that are not used for other types of system may be cost-effective for critical systems Critical systems engineering, 2013 Slide 25