SlideShare ist ein Scribd-Unternehmen logo
1 von 21
System safety

System safety, 2013

Slide 1
Safety
• Safety is a property of a system that
reflects the system’s ability to
operate, normally or abnormally, without
danger of causing human injury or death
and without damage to the system’s
environment.
System safety, 2013

Slide 2
Principal dependability
properties

System safety, 2013

Slide 3
Safety criticality
• Primary safety-critical systems
– Embedded software systems whose
failure can cause the associated
hardware to fail and directly threaten
people.

System safety 2013

Slide 4
System safety 2013

Slide 5
• Secondary safety-critical systems
– Systems whose failure results in faults in other
(socio-technical) systems, which can then have
safety consequences.
– For example, a medical records system is safetycritical as failure may lead to inappropriate
treatment being prescribed.
System safety 2013

Slide 6
System safety 2013

Slide 7
Safety and reliability
• Safety and reliability are related but
distinct
• For a system to be safe, it must
generally be reliable
• However, this is not enough. It must
also be safe in the event of system
failure
System safety 2013

Slide 8
• Reliability is concerned with
conformance to a given specification
and delivery of service
• Safety is concerned with ensuring
system cannot cause damage
irrespective of whether or not it
conforms to its specification
System safety 2013

Slide 9
• A reliable system can be unsafe if the
requirements are incorrect or
incomplete

System safety 2013

Slide 10
Unsafe reliable systems

The software on this plane operated ‘reliably’ yet the plane
crashed- covered in a separate video
System safety 2013

Slide 11
Unsafe reliable systems
• There may be dormant faults in a system
that are undetected for many years and
only rarely arise.
• Specification errors
– If the system specification is incorrect then
the system can behave as specified but still
cause an accident.
System safety 2013

Slide 12
• Hardware failures generating spurious inputs
– Hard to anticipate in the specification.

• Context-sensitive commands i.e. issuing the
right command at the wrong time
– Often the result of operator error.

System safety 2013

Slide 13
Accident
• An unplanned event or sequence of events
which results in human death or
injury, damage to property, or to the
environment.
• An overdose of insulin by a softwarecontrolled insulin injection system is an
example of an accident.
System safety 2013

Slide 14
Hazard
• A condition with the potential for causing or
contributing to an accident. A failure of the
sensor that measures blood glucose is an
example of a hazard.

System safety 2013

Slide 15
Damage
•

A measure of the loss resulting from a mishap.
Damage can range from many people being killed as
a result of an accident to minor injury or property
damage.

•

Damage resulting from an overdose of insulin could
be serious injury or the death of the user of the insulin
pump.

System safety 2013

Slide 16
Safety critical systems
development
• Hazard avoidance
– The system is designed so that some
classes of hazard simply cannot arise.

System safety 2013

Slide 17
• Hazard detection and removal
– The system is designed so that hazards are
detected and removed before they result in
an accident.

System safety 2013

Slide 18
• Damage limitation
– The system includes protection features
that minimise the damage that may result
from an accident.

System safety 2013

Slide 19
Summary
• Safety is a property of a system that reflects
the system’s ability to operate, normally or
abnormally, without danger of causing human
injury or death.
• Safety and reliability are related but reliable
systems may be unsafe.
System safety 2013

Slide 20
Summary
• Hazards are conditions that may (but need
not) lead to an accident
• Safety is achieved through
– Hazard avoidance

– Hazard detection and removal
– Damage limitation
System safety 2013

Slide 21

Weitere ähnliche Inhalte

Was ist angesagt?

1. history of industrial safety converted
1. history of industrial safety converted1. history of industrial safety converted
1. history of industrial safety convertedMudit M. Saxena
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenanceNafis Ahmad
 
Industry risk assessment and risk managemnt
Industry risk assessment and risk managemntIndustry risk assessment and risk managemnt
Industry risk assessment and risk managemntMd Niamul Islam
 
Lecture 4 part ii
Lecture 4 part iiLecture 4 part ii
Lecture 4 part iiYusof Omar
 
EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfBimal Chandra Das
 
Health and safety in the workplace: Safety Budget
Health and safety in the workplace:  Safety BudgetHealth and safety in the workplace:  Safety Budget
Health and safety in the workplace: Safety BudgetElsie Lessing
 
Human factor basic
Human factor  basicHuman factor  basic
Human factor basicS P Singh
 
Safety Management System
Safety Management SystemSafety Management System
Safety Management SystemConsultivo
 
MS Risk Assessment_Arabic.docx
MS Risk Assessment_Arabic.docxMS Risk Assessment_Arabic.docx
MS Risk Assessment_Arabic.docxAhmedRaoof1
 
Emergency Preparedness and Workplace Safety
Emergency Preparedness and Workplace SafetyEmergency Preparedness and Workplace Safety
Emergency Preparedness and Workplace SafetyGAURAV. H .TANDON
 
Near miss presentation
Near miss presentationNear miss presentation
Near miss presentationKyawKoKo13
 
Maintenance management and control
Maintenance management and controlMaintenance management and control
Maintenance management and controlNafis Ahmad
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and managementTaekHyeun Kim
 

Was ist angesagt? (20)

1. history of industrial safety converted
1. history of industrial safety converted1. history of industrial safety converted
1. history of industrial safety converted
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenance
 
Industry risk assessment and risk managemnt
Industry risk assessment and risk managemntIndustry risk assessment and risk managemnt
Industry risk assessment and risk managemnt
 
Industrial Safety
Industrial SafetyIndustrial Safety
Industrial Safety
 
General HSE Training (Level 1 & 2)
General HSE Training (Level 1 & 2)General HSE Training (Level 1 & 2)
General HSE Training (Level 1 & 2)
 
Lecture 4 part ii
Lecture 4 part iiLecture 4 part ii
Lecture 4 part ii
 
COST OF ACCIDENT.ppt
COST OF ACCIDENT.pptCOST OF ACCIDENT.ppt
COST OF ACCIDENT.ppt
 
EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdf
 
Health and safety in the workplace: Safety Budget
Health and safety in the workplace:  Safety BudgetHealth and safety in the workplace:  Safety Budget
Health and safety in the workplace: Safety Budget
 
Human factor basic
Human factor  basicHuman factor  basic
Human factor basic
 
Industrial accidents
Industrial accidentsIndustrial accidents
Industrial accidents
 
NEBOSH IGC RRC
NEBOSH IGC RRCNEBOSH IGC RRC
NEBOSH IGC RRC
 
Safety Management System
Safety Management SystemSafety Management System
Safety Management System
 
MS Risk Assessment_Arabic.docx
MS Risk Assessment_Arabic.docxMS Risk Assessment_Arabic.docx
MS Risk Assessment_Arabic.docx
 
Emergency Preparedness and Workplace Safety
Emergency Preparedness and Workplace SafetyEmergency Preparedness and Workplace Safety
Emergency Preparedness and Workplace Safety
 
Hazard identification and control
Hazard identification and controlHazard identification and control
Hazard identification and control
 
Near miss presentation
Near miss presentationNear miss presentation
Near miss presentation
 
HUMAN ERROR
HUMAN ERRORHUMAN ERROR
HUMAN ERROR
 
Maintenance management and control
Maintenance management and controlMaintenance management and control
Maintenance management and control
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 

Andere mochten auch

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safetydalesanders
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItinerarySalie Lim
 
Smart material presentation
Smart material presentationSmart material presentation
Smart material presentationyogesh meenA
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systemssommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 

Andere mochten auch (20)

System dependability
System dependabilitySystem dependability
System dependability
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
System security
System securitySystem security
System security
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safety
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto Itinerary
 
Smart material presentation
Smart material presentationSmart material presentation
Smart material presentation
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Risk Mitigation for Highway and Railway Bridges
Risk Mitigation for Highway and Railway BridgesRisk Mitigation for Highway and Railway Bridges
Risk Mitigation for Highway and Railway Bridges
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 

Ähnlich wie System safety

Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3Siddharth Ayer
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9Siddharth Ayer
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Micro
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdfFelixKipyego1
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16koolkampus
 
Vijeo citect quick start tutorial - part 1 ver d
Vijeo citect   quick start tutorial - part 1 ver dVijeo citect   quick start tutorial - part 1 ver d
Vijeo citect quick start tutorial - part 1 ver dAbdul Budiman
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecuritysommerville-videos
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience EngineeringHarsh Verdhan Raj
 

Ähnlich wie System safety (20)

Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Ch12 - Safety Engineering
Ch12 - Safety EngineeringCh12 - Safety Engineering
Ch12 - Safety Engineering
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
 
Vijeo citect quick start tutorial - part 1 ver d
Vijeo citect   quick start tutorial - part 1 ver dVijeo citect   quick start tutorial - part 1 ver d
Vijeo citect quick start tutorial - part 1 ver d
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Ch12
Ch12Ch12
Ch12
 
Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience Engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 

Mehr von sommerville-videos

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processessommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challengessommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 

Mehr von sommerville-videos (20)

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

System safety

  • 2. Safety • Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death and without damage to the system’s environment. System safety, 2013 Slide 2
  • 4. Safety criticality • Primary safety-critical systems – Embedded software systems whose failure can cause the associated hardware to fail and directly threaten people. System safety 2013 Slide 4
  • 6. • Secondary safety-critical systems – Systems whose failure results in faults in other (socio-technical) systems, which can then have safety consequences. – For example, a medical records system is safetycritical as failure may lead to inappropriate treatment being prescribed. System safety 2013 Slide 6
  • 8. Safety and reliability • Safety and reliability are related but distinct • For a system to be safe, it must generally be reliable • However, this is not enough. It must also be safe in the event of system failure System safety 2013 Slide 8
  • 9. • Reliability is concerned with conformance to a given specification and delivery of service • Safety is concerned with ensuring system cannot cause damage irrespective of whether or not it conforms to its specification System safety 2013 Slide 9
  • 10. • A reliable system can be unsafe if the requirements are incorrect or incomplete System safety 2013 Slide 10
  • 11. Unsafe reliable systems The software on this plane operated ‘reliably’ yet the plane crashed- covered in a separate video System safety 2013 Slide 11
  • 12. Unsafe reliable systems • There may be dormant faults in a system that are undetected for many years and only rarely arise. • Specification errors – If the system specification is incorrect then the system can behave as specified but still cause an accident. System safety 2013 Slide 12
  • 13. • Hardware failures generating spurious inputs – Hard to anticipate in the specification. • Context-sensitive commands i.e. issuing the right command at the wrong time – Often the result of operator error. System safety 2013 Slide 13
  • 14. Accident • An unplanned event or sequence of events which results in human death or injury, damage to property, or to the environment. • An overdose of insulin by a softwarecontrolled insulin injection system is an example of an accident. System safety 2013 Slide 14
  • 15. Hazard • A condition with the potential for causing or contributing to an accident. A failure of the sensor that measures blood glucose is an example of a hazard. System safety 2013 Slide 15
  • 16. Damage • A measure of the loss resulting from a mishap. Damage can range from many people being killed as a result of an accident to minor injury or property damage. • Damage resulting from an overdose of insulin could be serious injury or the death of the user of the insulin pump. System safety 2013 Slide 16
  • 17. Safety critical systems development • Hazard avoidance – The system is designed so that some classes of hazard simply cannot arise. System safety 2013 Slide 17
  • 18. • Hazard detection and removal – The system is designed so that hazards are detected and removed before they result in an accident. System safety 2013 Slide 18
  • 19. • Damage limitation – The system includes protection features that minimise the damage that may result from an accident. System safety 2013 Slide 19
  • 20. Summary • Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death. • Safety and reliability are related but reliable systems may be unsafe. System safety 2013 Slide 20
  • 21. Summary • Hazards are conditions that may (but need not) lead to an accident • Safety is achieved through – Hazard avoidance – Hazard detection and removal – Damage limitation System safety 2013 Slide 21