SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Safety Critical Systems
Safety Critical Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Safety? ,[object Object],Safety is NOT an absolute quantity! Safety is also defined as "freedom from unacceptable risk of harm" A basic concept in System Safety Engineering is the avoidance of " hazards "
Safety vs. Security ,[object Object],[object Object]
SILs and Dangerous Failure Probability
Railway Signalling Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
(Old) Interlocking Systems Mechanical /  Electromechanical Systems
Signal Box / Interlocking Tower ,[object Object]
Modern Signal Box / Interlocking Tower  ,[object Object]
What is a Hazard? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hazard Severity Level (Example) Category Id. Definition CATASTROPHIC I General : A hazard, which may cause death, system  loss, or severe property or environmental damage. CRITICAL II General : A hazard, which may cause severe injury, major system, property or environmental damage. MARGINAL III General : A hazard, which may cause marginal injury, marginal system, property or environmental damage.  NEGLIGIBLE IV General : A hazard, which does not cause injury, system, property or environmental damage.
Hazard Probability Level (Example) Level Probability [h -1 ] Definition Occurrences per year Frequent P ≥ 10 -3 may occur several times a month More than 10 Probable 10 -3  > P ≥ 10 -4 likely to occur once a year 1 to 10 Occasional 10 -4  > P ≥ 10 -5 likely to occur in the life of the system 10 -1  to 1 Remote 10 -5  > P ≥ 10 -6 unlikely but possible to occur in the life of the system 10 -2  to 10 -1 Improbable 10 -6  > P ≥ 10 -7 very unlikely to occur 10 -3  to 10 -2 Incredible P < 10 -7 extremely unlikely, if not inconceivable to occur Less than 10 -3
Risk Classification Scheme (Example) Hazard Severity Hazard Probability CATASTROPHIC CRITICAL MARGINAL NEGLIGIBLE Frequent A A A B Probable A A B C Occasional A B C C Remote B C C D Improbable C C D D Incredible C D D D
Risk Class Definition (Example) Risk Class Interpretation A Intolerable B Undesirable and shall only be accepted when risk reduction is impracticable. C Tolerable with the endorsement of the authority. D Tolerable with the endorsement of the normal project reviews.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Risk Acceptability
Risk Tolerability Hazard Severity Probability Risk Risk Criteria Tolerable? No Risk Reduction Measures Yes
What are Safety Requirements ,[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Diversity ,[object Object],[object Object],[object Object],&quot;The most certain and effectual check upon errors which arise in the process of computation, is to cause the same computations to be made by separate and independent computers; and this check is rendered still more decisive if they make their computations by different methods .&quot; Dionysius Lardner, 1834
Layers of Diversity
Examples for Diversity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some faults to be targeted: programming bugs, specification faults, compiler faults, CPU faults, random hardware faults (e.g. bit flips), security attacks,...
Compiler Diversity ,[object Object]
Compiler Diversity: Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Systematic Automatic Diversity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation Living Online
 
Process Safety Management System
Process Safety Management SystemProcess Safety Management System
Process Safety Management SystemACM Facility Safety
 
Functional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling IndustryFunctional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling IndustryLloyd's Register Energy
 
Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety Enform
 
Asset Integrity Management
Asset Integrity Management Asset Integrity Management
Asset Integrity Management Advisian
 
Elements of Process Safety Management
Elements of Process Safety ManagementElements of Process Safety Management
Elements of Process Safety ManagementShirazeh arghami
 
Hazardous Area Classification
Hazardous Area ClassificationHazardous Area Classification
Hazardous Area Classificationdebuddit
 
Contractor safety management system
Contractor safety management systemContractor safety management system
Contractor safety management systemgraha katiga
 
Safety instrumented systems
Safety instrumented systemsSafety instrumented systems
Safety instrumented systemsMowaten Masry
 
LOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh RajputLOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh RajputGaurav Singh Rajput
 
Process Safety Kpi
Process Safety KpiProcess Safety Kpi
Process Safety KpiArthurGroot
 
Safety presentation isolation and tagging
Safety presentation isolation and taggingSafety presentation isolation and tagging
Safety presentation isolation and taggingWarwick Bursey
 
Process Safety
Process SafetyProcess Safety
Process SafetyConsultivo
 
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...Cairn India Limited
 

Was ist angesagt? (20)

Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
Process Safety Management System
Process Safety Management SystemProcess Safety Management System
Process Safety Management System
 
14 Tips for Process Safety Management
14 Tips for Process Safety Management14 Tips for Process Safety Management
14 Tips for Process Safety Management
 
Functional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling IndustryFunctional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling Industry
 
Safety system
Safety systemSafety system
Safety system
 
Introduction to oil & gas health safety environment
Introduction to oil & gas health safety environmentIntroduction to oil & gas health safety environment
Introduction to oil & gas health safety environment
 
Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety
 
Asset Integrity Management
Asset Integrity Management Asset Integrity Management
Asset Integrity Management
 
Elements of Process Safety Management
Elements of Process Safety ManagementElements of Process Safety Management
Elements of Process Safety Management
 
Hazardous Area Classification
Hazardous Area ClassificationHazardous Area Classification
Hazardous Area Classification
 
Contractor safety management system
Contractor safety management systemContractor safety management system
Contractor safety management system
 
Safety instrumented systems
Safety instrumented systemsSafety instrumented systems
Safety instrumented systems
 
Hazardous Area Classification
Hazardous Area ClassificationHazardous Area Classification
Hazardous Area Classification
 
LOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh RajputLOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
LOPA | Layer Of Protection Analysis | Gaurav Singh Rajput
 
Process Safety Kpi
Process Safety KpiProcess Safety Kpi
Process Safety Kpi
 
Safety presentation isolation and tagging
Safety presentation isolation and taggingSafety presentation isolation and tagging
Safety presentation isolation and tagging
 
What is a LOPA?
What is a LOPA?What is a LOPA?
What is a LOPA?
 
Process Safety
Process SafetyProcess Safety
Process Safety
 
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
 
Process safety managment
Process safety managmentProcess safety managment
Process safety managment
 

Ähnlich wie Safety Integrity Levels

2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systemsJaap van Ekris
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systemsJaap van Ekris
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Vincenzo De Florio
 
Safety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetySafety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetyAli Sufyan
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how bdemchak
 
Functional safety certification guide
Functional safety certification guideFunctional safety certification guide
Functional safety certification guideMohammed Majid Khan
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systemsEinar Landre
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems Einar Landre
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Thorne & Derrick UK
 
Safety Analysis Profile
Safety Analysis ProfileSafety Analysis Profile
Safety Analysis ProfileBruce Douglass
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17koolkampus
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopmentCISEC
 
ARRL: A Criterion for Composable Safety and Systems Engineering
ARRL: A Criterion for Composable Safety and Systems EngineeringARRL: A Criterion for Composable Safety and Systems Engineering
ARRL: A Criterion for Composable Safety and Systems EngineeringVincenzo De Florio
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management Seapine Software
 
T89 introductiontofunctionalsafetyformachinery
T89 introductiontofunctionalsafetyformachineryT89 introductiontofunctionalsafetyformachinery
T89 introductiontofunctionalsafetyformachineryVo Quoc Hieu
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Mikro Elektronik GmbH
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Micro
 

Ähnlich wie Safety Integrity Levels (20)

2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
 
Ch9
Ch9Ch9
Ch9
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013
 
Safety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetySafety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards Safety
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how
 
Functional safety certification guide
Functional safety certification guideFunctional safety certification guide
Functional safety certification guide
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
 
Safety Analysis Profile
Safety Analysis ProfileSafety Analysis Profile
Safety Analysis Profile
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment
 
ARRL: A Criterion for Composable Safety and Systems Engineering
ARRL: A Criterion for Composable Safety and Systems EngineeringARRL: A Criterion for Composable Safety and Systems Engineering
ARRL: A Criterion for Composable Safety and Systems Engineering
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management
 
ETD featurespdf
ETD featurespdfETD featurespdf
ETD featurespdf
 
T89 introductiontofunctionalsafetyformachinery
T89 introductiontofunctionalsafetyformachineryT89 introductiontofunctionalsafetyformachinery
T89 introductiontofunctionalsafetyformachinery
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Safety Integrity Levels

  • 2.
  • 3.
  • 4.
  • 5. SILs and Dangerous Failure Probability
  • 6.
  • 7. (Old) Interlocking Systems Mechanical / Electromechanical Systems
  • 8.
  • 9.
  • 10.
  • 11. Hazard Severity Level (Example) Category Id. Definition CATASTROPHIC I General : A hazard, which may cause death, system loss, or severe property or environmental damage. CRITICAL II General : A hazard, which may cause severe injury, major system, property or environmental damage. MARGINAL III General : A hazard, which may cause marginal injury, marginal system, property or environmental damage. NEGLIGIBLE IV General : A hazard, which does not cause injury, system, property or environmental damage.
  • 12. Hazard Probability Level (Example) Level Probability [h -1 ] Definition Occurrences per year Frequent P ≥ 10 -3 may occur several times a month More than 10 Probable 10 -3 > P ≥ 10 -4 likely to occur once a year 1 to 10 Occasional 10 -4 > P ≥ 10 -5 likely to occur in the life of the system 10 -1 to 1 Remote 10 -5 > P ≥ 10 -6 unlikely but possible to occur in the life of the system 10 -2 to 10 -1 Improbable 10 -6 > P ≥ 10 -7 very unlikely to occur 10 -3 to 10 -2 Incredible P < 10 -7 extremely unlikely, if not inconceivable to occur Less than 10 -3
  • 13. Risk Classification Scheme (Example) Hazard Severity Hazard Probability CATASTROPHIC CRITICAL MARGINAL NEGLIGIBLE Frequent A A A B Probable A A B C Occasional A B C C Remote B C C D Improbable C C D D Incredible C D D D
  • 14. Risk Class Definition (Example) Risk Class Interpretation A Intolerable B Undesirable and shall only be accepted when risk reduction is impracticable. C Tolerable with the endorsement of the authority. D Tolerable with the endorsement of the normal project reviews.
  • 15.
  • 16. Risk Tolerability Hazard Severity Probability Risk Risk Criteria Tolerable? No Risk Reduction Measures Yes
  • 17.
  • 18.  
  • 19.
  • 20.
  • 21.
  • 22.
  • 24.
  • 25.
  • 26.
  • 27.

Hinweis der Redaktion

  1. WSN: health monitoring systems, bridge monitoring, tire pressure sensors with MEMs,
  2. Safety Standards relevance in future
  3. Safety Integrity applies to a function, not a system/subsystem/component! Note that the implication good process  good product is assumed to be valid Mention that there is another SIL table for demand mode Mention that many SIL standards define SILs – and they may be different!
  4. Risk Matrix must be agreed with customer/regulatot/ISA