SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Dependability and Security Specification

                                                 Lecture 1




Dependability and Security Specification, 2013               Slide 1
Topics covered

  •       Risk-driven specification
  •       Safety specification
  •       Security specification
  •       Software reliability specification




Dependability and Security Specification, 2013              Slide 2
Dependability requirements

  •       Functional requirements to define error checking and
          recovery facilities and protection against system
          failures.
  •       Non-functional requirements defining the required
          reliability and availability of the system.
  •       Excluding requirements that define states and
          conditions that must not arise.




Dependability and Security Specification, 2013            Slide 3
Risk-driven specification

                                                 •   Critical systems specification
                                                     should be risk-driven as risks
                                                     pose a threat to the system.
                                                 •   This approach has been widely
                                                     used in safety and security-
                                                     critical systems.
                                                 •   The aim of the specification
                                                     process should be to
                                                     understand the risks (safety,
                                                     security, etc.) faced by the
                                                     system and to define
                                                     requirements that reduce these
Dependability and Security Specification, 2013                                    Slide 4
                                                     risks.
Phased risk analysis

 •    Preliminary risk analysis
     –   Identifies risks from the systems environment. Aim is to
         develop an initial set of system security and dependability
         requirements.

 •    Life cycle risk analysis
     –   Identifies risks that emerge during design and development
         e.g. risks that are associated with the technologies used for
         system construction. Requirements are extended to protect
         against these risks.

 •    Operational risk analysis
     –          Risks associated with the system user interface and operator
                errors. Further protection requirements may be added to
                cope with these.
Dependability and Security Specification, 2013                         Slide 5
Risk-driven specification




Dependability and Security Specification, 2013           Slide 6
Stages of risk-based analysis

   •       Risk identification
         –       Identify potential risks that may arise.

   •       Risk analysis and classification
         –       Assess the seriousness of each risk.

   •       Risk decomposition
         –       Decompose risks to discover their potential root causes.

   •       Risk reduction assessment
         –       Define how each risk must be taken into eliminated or
                 reduced when the system is designed.


Dependability and Security Specification, 2013                           Slide 7
Safety specification

  •       Identify protection requirements that ensure that
          system failures do not cause injury or death or
          environmental damage.
  •       Risk identification = Hazard identification
  •       Risk analysis = Hazard assessment
  •       Risk decomposition = Hazard analysis
  •       Risk reduction = safety requirements specification




Dependability and Security Specification, 2013                Slide 8
Hazard identification

                                                 •   Identify the hazards that may
                                                     threaten the system.
                                                 •   Hazard identification may be
                                                     based on different types of
                                                     hazard:
                                                     –   Physical hazards
                                                     –   Electrical hazards
                                                     –   Biological hazards
                                                     –   Service failure hazards
                                                     –   Etc.


Dependability and Security Specification, 2013                                     Slide 9
A software-controlled insulin pump
  •       Safety-critical embedded system. Failure can lead to
          injury or death of the system user.
  •       Used by diabetics to simulate the function of the
          pancreas which manufactures insulin, an essential
          hormone that metabolises blood glucose.
  •       Measures blood glucose (sugar) using a micro-
          sensor and computes the insulin dose required to
          metabolise the glucose.
  •       The system software, is embedded control software
          for the sensing and insulin delivery functions.

Dependability and Security Specification, 2013            Slide 10
Dependability and Security Specification, 2013   Slide 11
Insulin pump organisation

                                                      Insulin reservoir

                         Needle
                                                              Pump                  Clock
                        assembly



                          Sensor                            Controller              Alarm




                                                 Display1                Display2


                                                       Power supply


Dependability and Security Specification, 2013                                              Slide 12
Insulin pump data-flow

                                            Blood
Blood                                     parameters
                    Blood sugar                          Blood sugar   Blood sugar
                      sensor                               analysis       level


                                                                                   Insulin
                                                                                requirement
                                                                                computation
                                          Pump control
  Insulin                                  commands                       Insulin
                                                           Insulin
                       Insulin                             delivery    requirement
                        pump                              controller




Dependability and Security Specification, 2013                                           Slide 13
Dependability requirements

                                                 •   The system shall be available to
                                                     deliver insulin when required to do
                                                     so.
                                                 •   The system shall perform
                                                     reliability and deliver the correct
                                                     amount of insulin to counteract
                                                     the current level of blood sugar.
                                                 •   The essential safety requirement
                                                     is that excessive doses of insulin
                                                     should never be delivered as this
                                                     is potentially life threatening.



Dependability and Security Specification, 2013                                      Slide 14
Insulin pump risks

  •       Insulin overdose (service failure).
  •       Insulin underdose (service failure).
  •       Power failure due to exhausted battery (electrical).
  •       Electrical interference with other medical equipment
          (electrical).
  •       Poor sensor and actuator contact (physical).
  •       Parts of machine break off in body (physical).
  •       Infection caused by introduction of machine
          (biological).
  •       Allergic reaction to materials or insulin (biological).
Dependability and Security Specification, 2013                 Slide 15
The risk triangle




Dependability and Security Specification, 2013                Slide 16
Hazard assessment

  •       What is the the likelihood that a risk will arise and
          what are the potential consequences if an accident or
          incident should occur?
  •       Risks are categorised as:
        –       Intolerable Must never arise or result in an accident
        –       As low as reasonably practical (ALARP) Must minimise the
                possibility of risk given cost and schedule constraints
        –       Acceptable The consequences of the risk are acceptable
                and no extra costs should be incurred to reduce hazard
                probability




Dependability and Security Specification, 2013                          Slide 17
Social acceptability of safety-related
                          risks
                                                 •    In most societies, the
                                                      boundaries between the
                                                      regions are pushed upwards
                                                      with time i.e. society is less
                                                      willing to accept risk
                                                     – For example, the costs of
                                                         cleaning up pollution may be
                                                         less than the costs of
                                                         preventing it but this may not
                                                         be socially acceptable.
                                                 •    Risk assessment is subjective
                                                     – Risks are identified as
                                                        probable, unlikely, etc. This
Dependability and Security Specification, 2013
                                                        depends on who is making18Slide
Hazard assessment

                                                 •   Estimate the hazard probability
                                                     and the hazard severity.
                                                 •   It is not normally possible to do
                                                     this precisely so relative values
                                                     are used such as ‘unlikely’,
                                                     ‘rare’, ‘very high’, etc.
                                                 •   The aim is to make sure that the
                                                     system can handle hazards that
                                                     are likely to arise or that have
                                                     high severity.


Dependability and Security Specification, 2013                                    Slide 19
Risk classification for the insulin pump


Identified                 Hazard                  Accident   Estimated risk   Acceptability
hazard                     probability             severity
1.Insulin                  Medium                  High       High             Intolerable
overdose
computation
2. Insulin                 Medium                  Low        Low              Acceptable
underdose
computation
3. Failure of              Medium                  Medium     Low              ALARP
hardware
monitoring
system
4. Power failure           High                    Low        Low              Acceptable



  Dependability and Security Specification, 2013                                        Slide 20
Risk classification for the insulin pump


Identified                 Hazard                  Accident   Estimated risk   Acceptability
hazard                     probability             severity
5. Machine                 High                    High       High             Intolerable
incorrectly fitted
6. Machine        Low                              High       Medium           ALARP
breaks in patient
7. Machine       Medium                            Medium     Medium           ALARP
causes infection
8. Electrical              Low                     High       Medium           ALARP
interference
9. Allergic                Low                     Low        Low              Acceptable
reaction




  Dependability and Security Specification, 2013                                        Slide 21
Hazard analysis

                                                 •   Concerned with discovering the
                                                     root causes of risks in a particular
                                                     system.
                                                 •   Techniques have been mostly
                                                     derived from safety-critical
                                                     systems and can be
                                                     –   Inductive, bottom-up techniques. Start
                                                         with a proposed system failure and
                                                         assess the hazards that could arise
                                                         from that failure;
                                                     –   Deductive, top-down techniques.
                                                         Start with a hazard and deduce what
                                                         the causes of this could be.

Dependability and Security Specification, 2013                                           Slide 22
Fault-tree analysis
                                                               •   Put the risk or
                                                                   hazard at the root
                                                                   of the tree and
                                                                   identify the system
                                                                   states that could
                                                                   lead to that hazard.
                                                               •   Where appropriate,
                                                                   link these with
                                                                   ‘and’ or ‘or’
                                                                   conditions.


                                  NO SINGLE POINT OF FAILURE

The key goal should be to minimise the number of single causes of system failure.
 Dependability and Security Specification, 2013                                Slide 23
Dependability and Security Specification, 2013   Slide 24
Fault tree analysis

  •       Three possible conditions that can lead to delivery of
          incorrect dose of insulin
        –       Incorrect measurement of blood sugar level
        –       Failure of delivery system
        –       Dose delivered at wrong time

  •       By analysis of the fault tree, root causes of these
          hazards related to software are:
        –       Algorithm error
        –       Arithmetic error



Dependability and Security Specification, 2013                  Slide 25
Risk reduction

                                                     •   The aim of this process is
                                                         to identify dependability
                                                         requirements that specify
                                                         how the risks should be
                                                         managed and ensure that
                                                         accidents/incidents do
                                                         not arise.
                                                     •   Risk reduction strategies
                                                         –   Risk avoidance;
                                                         –   Risk detection and removal;
                                                         –   Damage limitation.

Dependability and Security Specification, 2013                                    Slide 26
Strategy use

                                                   •   Normally, in critical systems, a
                                                       mix of risk reduction strategies
                                                       are used.
                                                   •   In a chemical plant control
                                                       system, the system will include
                                                       sensors to detect and correct
                                                       excess pressure in the reactor.
                                                   •   However, it will also include an
                                                       independent protection system
                                                       that opens a relief valve if
                                                       dangerously high pressure is
                                                       detected.
Dependability and Security Specification, 2013                                     Slide 27
Insulin pump - software risks

                                                 •   Arithmetic error
                                                     –   A computation causes the value
                                                         of a variable to overflow or
                                                         underflow;
                                                     –   Maybe include an exception
                                                         handler for each type of arithmetic
                                                         error.

                                                 •   Algorithmic error
                                                     –   Compare dose to be delivered
                                                         with previous dose or safe
                                                         maximum doses. Reduce dose if
                                                         too high.

Dependability and Security Specification, 2013                                        Slide 28
Examples of safety requirements

SR1: The system shall not deliver a single dose of insulin that is greater
than a specified maximum dose for a system user.
SR2: The system shall not deliver a daily cumulative dose of insulin that is
greater than a specified maximum daily dose for a system user.
SR3: The system shall include a hardware diagnostic facility that shall be
executed at least four times per hour.
SR4: The system shall include an exception handler for all of the
exceptions that are identified in Table 3.
SR5: The audible alarm shall be sounded when any hardware or software
anomaly is discovered and a diagnostic message, as defined in Table 4,
shall be displayed.
SR6: In the event of an alarm, insulin delivery shall be suspended until the
user has reset the system and cleared the alarm.


Dependability and Security Specification, 2013                           Slide 29
Key points

 •   Risk analysis is an important activity in the
     specification of security and dependability
     requirements. It involves identifying risks that can
     result in accidents or incidents.
 •   A hazard-driven approach may be used to
     understand the safety requirements for a system. You
     identify potential hazards and decompose these
     (using methods such as fault tree analysis) to
     discover their root causes.
 •       Safety requirements should be included to ensure
         that hazards and accidents do not arise or, if this is
         impossible, to limit the damage caused by system
Dependability and Security Specification, 2013               Slide 30
         failure.

Weitere ähnliche Inhalte

Was ist angesagt?

CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
Ian Sommerville
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
Ian Sommerville
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)
Ian Sommerville
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
Ian Sommerville
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
Ian Sommerville
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
Aryan Ajmer
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9
Ian Sommerville
 

Was ist angesagt? (20)

CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)
 
Reliability and security specification (CS 5032 2012)
Reliability and security specification (CS 5032 2012)Reliability and security specification (CS 5032 2012)
Reliability and security specification (CS 5032 2012)
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Ch3
Ch3Ch3
Ch3
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Norman Patch and Remediation
Norman Patch and  RemediationNorman Patch and  Remediation
Norman Patch and Remediation
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Ispe Article
Ispe ArticleIspe Article
Ispe Article
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 
DSDConference07
DSDConference07DSDConference07
DSDConference07
 
C90 Security Service
C90 Security ServiceC90 Security Service
C90 Security Service
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Security engineering
Security engineeringSecurity engineering
Security engineering
 
Presentation
PresentationPresentation
Presentation
 

Andere mochten auch

CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disaster
Ian Sommerville
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
Ian Sommerville
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systems
Ian Sommerville
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
Ian Sommerville
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
Ian Sommerville
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
Ian Sommerville
 
CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013
Ian Sommerville
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
sommerville-videos
 

Andere mochten auch (18)

CS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disasterCS5032 Case study Kegworth air disaster
CS5032 Case study Kegworth air disaster
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
CS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systemsCS 5032 L18 Critical infrastructure 2: SCADA systems
CS 5032 L18 Critical infrastructure 2: SCADA systems
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructure
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
System dependability
System dependabilitySystem dependability
System dependability
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013CS 5032 L3 socio-technical systems 2013
CS 5032 L3 socio-technical systems 2013
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
System security
System securitySystem security
System security
 

Ähnlich wie CS 5032 L5 safety specification 2013

Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9
Siddharth Ayer
 
Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)
Ian Sommerville
 
Information Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docxInformation Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docx
lanagore871
 

Ähnlich wie CS 5032 L5 safety specification 2013 (20)

Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9
 
Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)
 
Ch9
Ch9Ch9
Ch9
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
Ch12
Ch12Ch12
Ch12
 
System safety
System safetySystem safety
System safety
 
Sil explained in valve actuators
Sil explained in valve actuatorsSil explained in valve actuators
Sil explained in valve actuators
 
Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails Operational Security for Transportation: Connectivity to Rails
Operational Security for Transportation: Connectivity to Rails
 
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
 
SIL.ppt
SIL.pptSIL.ppt
SIL.ppt
 
Iec61508 guide
Iec61508 guideIec61508 guide
Iec61508 guide
 
Information Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docxInformation Security Assurance Capability Maturity Model (ISA-.docx
Information Security Assurance Capability Maturity Model (ISA-.docx
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
A Framework for Security Components Anomalies Severity Evaluation and Classif...
A Framework for Security Components Anomalies Severity Evaluation and Classif...A Framework for Security Components Anomalies Severity Evaluation and Classif...
A Framework for Security Components Anomalies Severity Evaluation and Classif...
 
A Framework for Security Components Anomalies Severity Evaluation and Classif...
A Framework for Security Components Anomalies Severity Evaluation and Classif...A Framework for Security Components Anomalies Severity Evaluation and Classif...
A Framework for Security Components Anomalies Severity Evaluation and Classif...
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
 
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 

Mehr von Ian Sommerville

CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failure
Ian Sommerville
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructure
Ian Sommerville
 

Mehr von Ian Sommerville (13)

Ultra Large Scale Systems
Ultra Large Scale SystemsUltra Large Scale Systems
Ultra Large Scale Systems
 
Resp modellingintro
Resp modellingintroResp modellingintro
Resp modellingintro
 
Resilience and recovery
Resilience and recoveryResilience and recovery
Resilience and recovery
 
LSCITS-engineering
LSCITS-engineeringLSCITS-engineering
LSCITS-engineering
 
Requirements reality
Requirements realityRequirements reality
Requirements reality
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Conceptual systems design
Conceptual systems designConceptual systems design
Conceptual systems design
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITS
 
An introduction to LSCITS
An introduction to LSCITSAn introduction to LSCITS
An introduction to LSCITS
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million users
 
CS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failureCS5032 Case study Ariane 5 launcher failure
CS5032 Case study Ariane 5 launcher failure
 
L17 CS5032 critical infrastructure
L17 CS5032 critical infrastructureL17 CS5032 critical infrastructure
L17 CS5032 critical infrastructure
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

CS 5032 L5 safety specification 2013

  • 1. Dependability and Security Specification Lecture 1 Dependability and Security Specification, 2013 Slide 1
  • 2. Topics covered • Risk-driven specification • Safety specification • Security specification • Software reliability specification Dependability and Security Specification, 2013 Slide 2
  • 3. Dependability requirements • Functional requirements to define error checking and recovery facilities and protection against system failures. • Non-functional requirements defining the required reliability and availability of the system. • Excluding requirements that define states and conditions that must not arise. Dependability and Security Specification, 2013 Slide 3
  • 4. Risk-driven specification • Critical systems specification should be risk-driven as risks pose a threat to the system. • This approach has been widely used in safety and security- critical systems. • The aim of the specification process should be to understand the risks (safety, security, etc.) faced by the system and to define requirements that reduce these Dependability and Security Specification, 2013 Slide 4 risks.
  • 5. Phased risk analysis • Preliminary risk analysis – Identifies risks from the systems environment. Aim is to develop an initial set of system security and dependability requirements. • Life cycle risk analysis – Identifies risks that emerge during design and development e.g. risks that are associated with the technologies used for system construction. Requirements are extended to protect against these risks. • Operational risk analysis – Risks associated with the system user interface and operator errors. Further protection requirements may be added to cope with these. Dependability and Security Specification, 2013 Slide 5
  • 6. Risk-driven specification Dependability and Security Specification, 2013 Slide 6
  • 7. Stages of risk-based analysis • Risk identification – Identify potential risks that may arise. • Risk analysis and classification – Assess the seriousness of each risk. • Risk decomposition – Decompose risks to discover their potential root causes. • Risk reduction assessment – Define how each risk must be taken into eliminated or reduced when the system is designed. Dependability and Security Specification, 2013 Slide 7
  • 8. Safety specification • Identify protection requirements that ensure that system failures do not cause injury or death or environmental damage. • Risk identification = Hazard identification • Risk analysis = Hazard assessment • Risk decomposition = Hazard analysis • Risk reduction = safety requirements specification Dependability and Security Specification, 2013 Slide 8
  • 9. Hazard identification • Identify the hazards that may threaten the system. • Hazard identification may be based on different types of hazard: – Physical hazards – Electrical hazards – Biological hazards – Service failure hazards – Etc. Dependability and Security Specification, 2013 Slide 9
  • 10. A software-controlled insulin pump • Safety-critical embedded system. Failure can lead to injury or death of the system user. • Used by diabetics to simulate the function of the pancreas which manufactures insulin, an essential hormone that metabolises blood glucose. • Measures blood glucose (sugar) using a micro- sensor and computes the insulin dose required to metabolise the glucose. • The system software, is embedded control software for the sensing and insulin delivery functions. Dependability and Security Specification, 2013 Slide 10
  • 11. Dependability and Security Specification, 2013 Slide 11
  • 12. Insulin pump organisation Insulin reservoir Needle Pump Clock assembly Sensor Controller Alarm Display1 Display2 Power supply Dependability and Security Specification, 2013 Slide 12
  • 13. Insulin pump data-flow Blood Blood parameters Blood sugar Blood sugar Blood sugar sensor analysis level Insulin requirement computation Pump control Insulin commands Insulin Insulin Insulin delivery requirement pump controller Dependability and Security Specification, 2013 Slide 13
  • 14. Dependability requirements • The system shall be available to deliver insulin when required to do so. • The system shall perform reliability and deliver the correct amount of insulin to counteract the current level of blood sugar. • The essential safety requirement is that excessive doses of insulin should never be delivered as this is potentially life threatening. Dependability and Security Specification, 2013 Slide 14
  • 15. Insulin pump risks • Insulin overdose (service failure). • Insulin underdose (service failure). • Power failure due to exhausted battery (electrical). • Electrical interference with other medical equipment (electrical). • Poor sensor and actuator contact (physical). • Parts of machine break off in body (physical). • Infection caused by introduction of machine (biological). • Allergic reaction to materials or insulin (biological). Dependability and Security Specification, 2013 Slide 15
  • 16. The risk triangle Dependability and Security Specification, 2013 Slide 16
  • 17. Hazard assessment • What is the the likelihood that a risk will arise and what are the potential consequences if an accident or incident should occur? • Risks are categorised as: – Intolerable Must never arise or result in an accident – As low as reasonably practical (ALARP) Must minimise the possibility of risk given cost and schedule constraints – Acceptable The consequences of the risk are acceptable and no extra costs should be incurred to reduce hazard probability Dependability and Security Specification, 2013 Slide 17
  • 18. Social acceptability of safety-related risks • In most societies, the boundaries between the regions are pushed upwards with time i.e. society is less willing to accept risk – For example, the costs of cleaning up pollution may be less than the costs of preventing it but this may not be socially acceptable. • Risk assessment is subjective – Risks are identified as probable, unlikely, etc. This Dependability and Security Specification, 2013 depends on who is making18Slide
  • 19. Hazard assessment • Estimate the hazard probability and the hazard severity. • It is not normally possible to do this precisely so relative values are used such as ‘unlikely’, ‘rare’, ‘very high’, etc. • The aim is to make sure that the system can handle hazards that are likely to arise or that have high severity. Dependability and Security Specification, 2013 Slide 19
  • 20. Risk classification for the insulin pump Identified Hazard Accident Estimated risk Acceptability hazard probability severity 1.Insulin Medium High High Intolerable overdose computation 2. Insulin Medium Low Low Acceptable underdose computation 3. Failure of Medium Medium Low ALARP hardware monitoring system 4. Power failure High Low Low Acceptable Dependability and Security Specification, 2013 Slide 20
  • 21. Risk classification for the insulin pump Identified Hazard Accident Estimated risk Acceptability hazard probability severity 5. Machine High High High Intolerable incorrectly fitted 6. Machine Low High Medium ALARP breaks in patient 7. Machine Medium Medium Medium ALARP causes infection 8. Electrical Low High Medium ALARP interference 9. Allergic Low Low Low Acceptable reaction Dependability and Security Specification, 2013 Slide 21
  • 22. Hazard analysis • Concerned with discovering the root causes of risks in a particular system. • Techniques have been mostly derived from safety-critical systems and can be – Inductive, bottom-up techniques. Start with a proposed system failure and assess the hazards that could arise from that failure; – Deductive, top-down techniques. Start with a hazard and deduce what the causes of this could be. Dependability and Security Specification, 2013 Slide 22
  • 23. Fault-tree analysis • Put the risk or hazard at the root of the tree and identify the system states that could lead to that hazard. • Where appropriate, link these with ‘and’ or ‘or’ conditions. NO SINGLE POINT OF FAILURE The key goal should be to minimise the number of single causes of system failure. Dependability and Security Specification, 2013 Slide 23
  • 24. Dependability and Security Specification, 2013 Slide 24
  • 25. Fault tree analysis • Three possible conditions that can lead to delivery of incorrect dose of insulin – Incorrect measurement of blood sugar level – Failure of delivery system – Dose delivered at wrong time • By analysis of the fault tree, root causes of these hazards related to software are: – Algorithm error – Arithmetic error Dependability and Security Specification, 2013 Slide 25
  • 26. Risk reduction • The aim of this process is to identify dependability requirements that specify how the risks should be managed and ensure that accidents/incidents do not arise. • Risk reduction strategies – Risk avoidance; – Risk detection and removal; – Damage limitation. Dependability and Security Specification, 2013 Slide 26
  • 27. Strategy use • Normally, in critical systems, a mix of risk reduction strategies are used. • In a chemical plant control system, the system will include sensors to detect and correct excess pressure in the reactor. • However, it will also include an independent protection system that opens a relief valve if dangerously high pressure is detected. Dependability and Security Specification, 2013 Slide 27
  • 28. Insulin pump - software risks • Arithmetic error – A computation causes the value of a variable to overflow or underflow; – Maybe include an exception handler for each type of arithmetic error. • Algorithmic error – Compare dose to be delivered with previous dose or safe maximum doses. Reduce dose if too high. Dependability and Security Specification, 2013 Slide 28
  • 29. Examples of safety requirements SR1: The system shall not deliver a single dose of insulin that is greater than a specified maximum dose for a system user. SR2: The system shall not deliver a daily cumulative dose of insulin that is greater than a specified maximum daily dose for a system user. SR3: The system shall include a hardware diagnostic facility that shall be executed at least four times per hour. SR4: The system shall include an exception handler for all of the exceptions that are identified in Table 3. SR5: The audible alarm shall be sounded when any hardware or software anomaly is discovered and a diagnostic message, as defined in Table 4, shall be displayed. SR6: In the event of an alarm, insulin delivery shall be suspended until the user has reset the system and cleared the alarm. Dependability and Security Specification, 2013 Slide 29
  • 30. Key points • Risk analysis is an important activity in the specification of security and dependability requirements. It involves identifying risks that can result in accidents or incidents. • A hazard-driven approach may be used to understand the safety requirements for a system. You identify potential hazards and decompose these (using methods such as fault tree analysis) to discover their root causes. • Safety requirements should be included to ensure that hazards and accidents do not arise or, if this is impossible, to limit the damage caused by system Dependability and Security Specification, 2013 Slide 30 failure.