Software Engineering (Chapter 4)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/60

flashcard set

Earn XP

Description and Tags

Midterms

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

61 Terms

1
New cards
  1. Safety-critical systems

  2. Mission-critical systems

  3. Business-critical systems

What are the three Critical Systems?

2
New cards

Safety-critical systems

Failure Results = loss of life, injury or damage

3
New cards

Mission-critical systems

Failure results = some goal-directed activity

4
New cards

Business-critical systems

Failure results = high economic losses

5
New cards

important system property

what is the system dependability for critical systems?

6
New cards

System Dependability

reflects the user’s degree of trust: it will not “fail“

7
New cards
  1. systems that are not dependable, unreliable, unsafe or insecure = rejected by users

  2. cost of system failure = very high

  3. Undependable Systems = information loss = high consequent recovery cosf

What are The Three Importance of Dependability?

8
New cards
  1. Formal Methods of software development

  2. Static Analysis

  3. External Quality Assurance

What are the Three Development Methods for Critical Systems?

9
New cards

Development Methods for Critical Systems

This may be used due to the cost of critical systems failure that are so high

10
New cards
  1. Hardware Failure

  2. Software Failure

  3. Operational Failure

What are the Three Socio-Technical Critical Systems?

11
New cards

Hardware Failure

because of design and manufacturing errors or because components have reached the end of their natural life.

12
New cards

Software Failure

due to errors in its specification, design or implementation

13
New cards

Operational Failure

Human Operators make mistakes (the largest single cause of system failures)

14
New cards

Dependability

  • trustworthiness

  • trusted by its users

15
New cards
  1. Availability

  2. Reliability

  3. Safety

  4. Security

What are the 4 Principal Dimensions of Dependability?

16
New cards

Availability

the ability of the system to deliver services when requested

17
New cards

Reliability

the ability of the system to deliver services as specified

18
New cards

Safety

the ability of the system to operate without catastrophic failure

19
New cards

Security

the ability of the system to protect itself against accidental or deliberate intrusion

20
New cards
  1. Repairability

  2. Maintainability

  3. Survivability

  4. Error Tolerance

What are the OTHER 4 Dependability Properties?

21
New cards

Repairability

Reflects the extent to which the system can be repaired in the event of a failure

22
New cards

Maintainability

Reflects the extent to which the system can be adapted to new requirements

23
New cards

Survivability

Reflects the extent to which the system can deliver services whilst under hostile attack

24
New cards

Error Tolerance

Reflects the extent to which user input errors can be avoided and tolerated

25
New cards

Dependability Costs

tends to increase exponentially.

2 reasons:
1. use of more expensive techniques and hardware
2. increased testing and system validation

26
New cards

Dependability Economics

more cost effective to accept untrustworthy systems

27
New cards

System Failure (reliability)

An event that occurs when the system does not deliver a service as expected by users

28
New cards

System Error (reliability)

an erroneous system state that can lead to system behavior that is unexpected by system users

29
New cards

System Fault (Reliability)

characteristic of a software system that can lead to a system error

30
New cards

Human Error or Mistake (Reliability)

human behavior that results in the introduction of faults into a system

31
New cards
  1. System Failure

  2. System Error

  3. System Fault

  4. Human Error or Mistake

What are the 4 Reliability Terminology?

32
New cards

Failures

are usually a result of system errors

33
New cards
  1. Fault Avoidance

  2. Fault Detection and Removal

  3. Fault Tolerance

What are the 3 Reliability Achievement?

34
New cards

Fault Avoidance

development technique to minimize the possibility of mistake

35
New cards

Fault Detection and Removal

Verification and Validation techniques before the system goes into service

36
New cards

Fault Tolerance

run-time techniques to ensure that system faults do not result in system errors

37
New cards

Reliability Modelling

input-output mapping = some input results in erroneous outputs

38
New cards

Safety

a property of a system that operates without danger to human injury or death

39
New cards
  1. Primary Safety-Critical Systems

  2. Secondary Safety-Critical Systems

What are the 2 Safety Criticality?

40
New cards

Primary safety-critical system

embedded software system whose failure can cause the associated hardware to fail

41
New cards

Secondary safety-critical systems

systems whose failure results in faults in other system

42
New cards
  1. Specification Errors

  2. Hardware Failures generating spurious inputs

  3. Context-sensitive commands

What are the 3 Unsafe Reliable Systems

43
New cards

Specification Errors

system specification is incorrect

44
New cards

Hardware Failures generating spurious inputs

hard to anticipate in the specification

45
New cards

Context-sensitive commands

often the result of operator error

46
New cards
  1. Accident

  2. Hazard

  3. Damage

  4. Hazard Severity

  5. Hazard Probability

  6. Risk

What are the 6 Safety Terminology?

47
New cards
  1. Hazard Avoidance

  2. Hazard Detection and Removal

  3. Damage Limitation

What are the 3 Safety Achievement?

48
New cards

Hazard Avoidance

system is designed so that some classes of hazard cannot arise

49
New cards

Hazard Detection and Removal

system is designed so that hazards are detected and removed

50
New cards

Damage Limitation

system includes protection features that minimizes damage

51
New cards

Fundamental Security

networked system is insecure then statement (reliability and safety) is unreliable

52
New cards
  1. Exposure

  2. Vulnerability

  3. Attack

  4. Threats

  5. Control

What are the 5 Security Terminology?

53
New cards
  1. Denial of Service

  2. Corruption of Programs or Data

  3. Disclosure of Confidential Information

What are the 3 Damage from insecurity

54
New cards

Denial of Service

normal services are unavailable

55
New cards

Corruption of programs or data

programs of data may be modified in an unauthorized way

56
New cards

Disclosure of Confidential Information

information may be exposed to people who are unauthorized to read or use

57
New cards
  1. Vulnerability Avoidance

  2. Attack Detection and Elimination

  3. Exposure Limitation

What are the 3 Security Assurance?

58
New cards

Vulnerability Avoidance

system is designed so that vulnerabilities do not occur

59
New cards

Attack Detection and Elimination

system is designed so that attacks on vulnerabilities are detected and neutralized

60
New cards

Exposure Limitation

system is designed so that consequences of attacks are minimized

61
New cards