Wednesday, June 12, 2019

System Safety Essay Example | Topics and Well Written Essays - 3500 words

governing body Safety - Essay ExampleOne of the biggest challenges face by the development team is management of hazards in critical software implementations for control systems and automation. The objective of this paper is to present a detailed analysis of challenges of System Safety, analysis of hazards, techniques of implementing System safety and global best practices followed.Mueller in 1968 described System Safety Engineering as an organized common sense (Leveson, 2003). Quoting this input signal in her paper on safety engineering, Nancy Leveson (2003) stressed on the need for a disciplined and systematic approach to identify, analyze and control the hazards throughout the life-time cycle of a system (Leveson, 2003). She proposed a systematic approach of safety engineering in this paper. The steps of her approach will be taken as benchmark and mapped with the modern approach to System Safety in developing software program for Critical Systems in this paper. jeopardy prud ence Nancy Leveson emphasized the need for Risk Management as one of the major disciplines in Safety Engineering (Leveson, 2003). ... viating from the System Requirements or becoming vulnerable to hackers & unauthorized modifications in production surroundings if improper controls are practiced in the development environment. Example, If the software is supposed to control electro-mechanical devices then vulnerabilities and unauthorized modifications in the software system may make to hazards, accidents, loss of property and loss of mission in the operating environment. There can be many approaches to Risk Management in developing Software for critical systems. The most appropriate Risk Management approach applicable in the modern Software Development environments is defined in the Risk Management guide by National Institute of Standards & Technology, US Department of commerce (Stoneburner, Guguen, et al, 2004) and the BS ISO/IEC 270052008 standard (www.bsi-global.com). The approa ch presented herewith (Figure 1) can be very easily mapped with a software development project. This process is an intelligent mix of qualitative as well as quantitative analytical processing. The first step is to collate a list of all additions planned to be used in the software environment and then carry out their characterization. Risk Assessment workflowFigure 1The assets used in a software controlled critical production environment are Software Workflows, Software Components (Units, Modules, Connectors, etc.), Servers, Desktops/Laptops, RDBMS systems, Middleware, Interfacing devices, Control devices, High approachability components, Underlying Network Architecture, Alerts & Alarm systems, Network Integration components (example, TCP/IP to RS232 converters), etc. The characterization of these assets essentially requires proper identification (asset tagging), asset ownership, purpose of asset and location of asset. Post

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.