SlideShare a Scribd company logo
Critical Systems Validation
B.Sakthibala
II-M.Sc .(CS)
Department of CS&IT
Nadar Saraswathi College Of
Arts & science,Theni.
• Content.,
Reliability validation
Safety assurance
Security assessment
Safety and dependability cases
Validation of critical systems
• The verification and validation costs for critical
systems involves additional validation processes and
analysis than for non-critical systems:
– The costs and consequences of failure are high so it is cheaper to find
and remove faults than to pay for system failure;
– You may have to make a formal case to customers or to a regulator
that the system meets its dependability requirements. This
dependability case may require specific V & V activities to be carried
out.
Reliability validation
Reliability validation involves exercising the program to
assess whether or not it has reached the required level of
reliability.
This cannot normally be included as part of a normal
defect testing process because data for defect testing is
(usually) atypical of actual usage data.
Reliability measurement therefore requires a specially
designed data set that replicates the pattern of inputs to be
processed by the system
Reliability validation activities
Establish the operational profile for the
system.
Construct test data reflecting the
operational profile.
Test the system and observe the number of
failures and the times of these failures.
Compute the reliability after a statistically
significant number of failures have been
observed.
Reliability measurement problems
• Operational profile uncertainty
– The operational profile may not be an
accurate reflection of the real use of
the system.
• High costs of test data generation
– Costs can be very high if the test data
for the system cannot be generated
automatically.
• Statistical uncertainty
– You need a statistically significant
number of failures to compute the
reliability but highly reliable systems
will rarely fail.
• Safety assurance
Safety assurance and reliability measurement
are quite different:
Within the limits of measurement error, you
know whether or not a required level of
reliability has been achieved;
However, quantitative measurement of
safety is impossible. Safety assurance is
concerned with establishing a confidence
level in the system
Safety confidence
• Confidence in the safety of a system can vary from
very low to very high.
• Confidence is developed through:
– Past experience with the company developing the
software;
– The use of dependable processes and process
activities geared to safety;
– Extensive V & V including both static and dynamic
validation techniques.
Safety reviews
Review for correct intended function.
Review for maintainable, understandable
structure.
Review to verify algorithm and data
structure design against specification.
Review to check code consistency with
algorithm and data structure design.
Review adequacy of system testing.
Security assessment
Security assessment has something in common with
safety assessment.
It is intended to demonstrate that the system cannot
enter some state (an unsafe or an insecure state) rather
than to demonstrate that the system can do something.
However, there are differences
Safety problems are accidental; security problems are
deliberate;
Security problems are more generic - many systems suffer from
the same problems; Safety problems are mostly related to the
application domain
Security validation
• Experience-based validation
– The system is reviewed and analysed against the types of attack that
are known to the validation team.
• Tool-based validation
– Various security tools such as password checkers are used to analyse
the system in operation.
• Tiger teams
– A team is established whose goal is to breach the security of the
system by simulating attacks on the system.
• Formal verification
– The system is verified against a formal security specification.
Safety and dependability cases
• Safety and dependability cases are
structured documents that set out
detailed arguments and evidence that a
required level of safety or dependability
has been achieved.
• They are normally required by
regulators before a system can be
certified for operational use.
The system safety case
• It is now normal practice for a formal safety case to
be required for all safety-critical computer-based
systems e.g. railway signalling, air traffic control, etc.
• A safety case is:
– A documented body of evidence that provides a convincing and valid
argument that a system is adequately safe for a given application in a
given environment.
• Arguments in a safety or dependability case can be
based on formal proof, design rationale, safety proofs,
etc. Process factors may also be included.
Components of a safety case
Component Description
System description An overview of the system and a description of its critical components.
Safety requirements The safety requirements abstracted from the system requirements
specification.
Hazard and risk
analysis
Documents describing the hazards and risks that have been identified
and the measures taken to reduce risk.
Design analysis A set of structured arguments that justify why the design is safe.
Verification and
validation
A description of the V & V procedures used and, where appropriate,
the test plans for the system. Results of system V &V.
Review reports Records of all design and safety reviews.
Team competences Evidence of the competence of all of the team involved in safety-
related systems development and validation.
Process QA Records of the quality assurance processes carried out during system
development.
Change
management
processes
Records of all changes proposed, actions taken and, where appropriate,
justification of the safety of these changes.
Associated safety
cases
References to other safety cases that may impact on this safety case.
Software  engineering

More Related Content

PPT
Critical System Validation in Software Engineering SE21
PPT
Dependable Software Development in Software Engineering SE18
PPT
Quality Management in Software Engineering SE24
PPTX
Software Reliability
PPT
Defect Testing in Software Engineering SE20
PPT
Software reliability
PPTX
Software quality metrics methodology _tanmi kiran
Critical System Validation in Software Engineering SE21
Dependable Software Development in Software Engineering SE18
Quality Management in Software Engineering SE24
Software Reliability
Defect Testing in Software Engineering SE20
Software reliability
Software quality metrics methodology _tanmi kiran

What's hot (20)

PPTX
Software matrics and measurement
PPT
Software Metrics
PPT
Ch15 software reliability
PPTX
Software maintenance
PPT
Lecture3
PPT
Software Quality Metrics
PPTX
Software Reliability Testing Training Crash Course - Tonex Training
PPTX
Software metrics
PPTX
Spm unit v-software reliability-
PPTX
Software engineering 13 software product metrics
DOC
The importance of quality software
PPT
Introduction to Software Engineering 1
PPT
Software cost estimation
PDF
System analysis and_design.docx
PPTX
software metrics(process,project,product)
PPTX
Testing strategies part -1
PPTX
Quality & Reliability in Software Engineering
PPTX
Reliability and its principals
PPTX
Non Functional Test Management
PPT
Lecture 20 software testing (2)
Software matrics and measurement
Software Metrics
Ch15 software reliability
Software maintenance
Lecture3
Software Quality Metrics
Software Reliability Testing Training Crash Course - Tonex Training
Software metrics
Spm unit v-software reliability-
Software engineering 13 software product metrics
The importance of quality software
Introduction to Software Engineering 1
Software cost estimation
System analysis and_design.docx
software metrics(process,project,product)
Testing strategies part -1
Quality & Reliability in Software Engineering
Reliability and its principals
Non Functional Test Management
Lecture 20 software testing (2)
Ad

Similar to Software engineering (20)

PPT
Ch24
PPTX
Risk assessment for computer system validation
PPTX
Information Systems Audit & CISA Prep 2010
PPTX
Ch15-Software Engineering 9
PPTX
Controls in Audit.pptx
PPTX
System testing
PDF
Equipment qualification of medical device
PPTX
Verifikasi dan Validasi keamanan informasi
PPTX
Reliability
PPTX
IT Security Bachelor in information technology.pptx
PDF
Introduction to validation
PPT
SLVA - Security monitoring and reporting itweb workshop
PPT
Manual testing concepts course 1
PPT
Software_Verification_and_Validation.ppt
PPTX
Static analysis and reliability testing (CS 5032 2012)
PPTX
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
PPTX
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Ch24
Risk assessment for computer system validation
Information Systems Audit & CISA Prep 2010
Ch15-Software Engineering 9
Controls in Audit.pptx
System testing
Equipment qualification of medical device
Verifikasi dan Validasi keamanan informasi
Reliability
IT Security Bachelor in information technology.pptx
Introduction to validation
SLVA - Security monitoring and reporting itweb workshop
Manual testing concepts course 1
Software_Verification_and_Validation.ppt
Static analysis and reliability testing (CS 5032 2012)
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Ad

More from sakthibalabalamuruga (14)

PPTX
Software engineering
PPTX
web programming
PPTX
compiler design
PPTX
Apache mahout and R-mining complex dataobject
PPTX
Computer network
PPTX
Operating system
PPTX
PPTX
Data structure and algorithm
PPTX
Remote method invocatiom
Software engineering
web programming
compiler design
Apache mahout and R-mining complex dataobject
Computer network
Operating system
Data structure and algorithm
Remote method invocatiom

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Pre independence Education in Inndia.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Structure & Organelles in detailed.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O7-L3 Supply Chain Operations - ICLT Program
Pharma ospi slides which help in ospi learning
O5-L3 Freight Transport Ops (International) V1.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPH.pptx obstetrics and gynecology in nursing
Renaissance Architecture: A Journey from Faith to Humanism
Pre independence Education in Inndia.pdf
Supply Chain Operations Speaking Notes -ICLT Program
VCE English Exam - Section C Student Revision Booklet
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Institutional Correction lecture only . . .
Cell Structure & Organelles in detailed.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Final Presentation General Medicine 03-08-2024.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...

Software engineering

  • 1. Critical Systems Validation B.Sakthibala II-M.Sc .(CS) Department of CS&IT Nadar Saraswathi College Of Arts & science,Theni.
  • 2. • Content., Reliability validation Safety assurance Security assessment Safety and dependability cases
  • 3. Validation of critical systems • The verification and validation costs for critical systems involves additional validation processes and analysis than for non-critical systems: – The costs and consequences of failure are high so it is cheaper to find and remove faults than to pay for system failure; – You may have to make a formal case to customers or to a regulator that the system meets its dependability requirements. This dependability case may require specific V & V activities to be carried out.
  • 4. Reliability validation Reliability validation involves exercising the program to assess whether or not it has reached the required level of reliability. This cannot normally be included as part of a normal defect testing process because data for defect testing is (usually) atypical of actual usage data. Reliability measurement therefore requires a specially designed data set that replicates the pattern of inputs to be processed by the system
  • 5. Reliability validation activities Establish the operational profile for the system. Construct test data reflecting the operational profile. Test the system and observe the number of failures and the times of these failures. Compute the reliability after a statistically significant number of failures have been observed.
  • 6. Reliability measurement problems • Operational profile uncertainty – The operational profile may not be an accurate reflection of the real use of the system. • High costs of test data generation – Costs can be very high if the test data for the system cannot be generated automatically. • Statistical uncertainty – You need a statistically significant number of failures to compute the reliability but highly reliable systems will rarely fail.
  • 7. • Safety assurance Safety assurance and reliability measurement are quite different: Within the limits of measurement error, you know whether or not a required level of reliability has been achieved; However, quantitative measurement of safety is impossible. Safety assurance is concerned with establishing a confidence level in the system
  • 8. Safety confidence • Confidence in the safety of a system can vary from very low to very high. • Confidence is developed through: – Past experience with the company developing the software; – The use of dependable processes and process activities geared to safety; – Extensive V & V including both static and dynamic validation techniques.
  • 9. Safety reviews Review for correct intended function. Review for maintainable, understandable structure. Review to verify algorithm and data structure design against specification. Review to check code consistency with algorithm and data structure design. Review adequacy of system testing.
  • 10. Security assessment Security assessment has something in common with safety assessment. It is intended to demonstrate that the system cannot enter some state (an unsafe or an insecure state) rather than to demonstrate that the system can do something. However, there are differences Safety problems are accidental; security problems are deliberate; Security problems are more generic - many systems suffer from the same problems; Safety problems are mostly related to the application domain
  • 11. Security validation • Experience-based validation – The system is reviewed and analysed against the types of attack that are known to the validation team. • Tool-based validation – Various security tools such as password checkers are used to analyse the system in operation. • Tiger teams – A team is established whose goal is to breach the security of the system by simulating attacks on the system. • Formal verification – The system is verified against a formal security specification.
  • 12. Safety and dependability cases • Safety and dependability cases are structured documents that set out detailed arguments and evidence that a required level of safety or dependability has been achieved. • They are normally required by regulators before a system can be certified for operational use.
  • 13. The system safety case • It is now normal practice for a formal safety case to be required for all safety-critical computer-based systems e.g. railway signalling, air traffic control, etc. • A safety case is: – A documented body of evidence that provides a convincing and valid argument that a system is adequately safe for a given application in a given environment. • Arguments in a safety or dependability case can be based on formal proof, design rationale, safety proofs, etc. Process factors may also be included.
  • 14. Components of a safety case Component Description System description An overview of the system and a description of its critical components. Safety requirements The safety requirements abstracted from the system requirements specification. Hazard and risk analysis Documents describing the hazards and risks that have been identified and the measures taken to reduce risk. Design analysis A set of structured arguments that justify why the design is safe. Verification and validation A description of the V & V procedures used and, where appropriate, the test plans for the system. Results of system V &V. Review reports Records of all design and safety reviews. Team competences Evidence of the competence of all of the team involved in safety- related systems development and validation. Process QA Records of the quality assurance processes carried out during system development. Change management processes Records of all changes proposed, actions taken and, where appropriate, justification of the safety of these changes. Associated safety cases References to other safety cases that may impact on this safety case.