Preview

Safety-Critical Software and Life Critical Software

Satisfactory Essays
Open Document
Open Document
371 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Safety-Critical Software and Life Critical Software
Safety-critical software and life critical software means that any malfunction of the software will very probably result in extreme consequence and even loss of human life. Organisation developing such systems ought to exercise extreme caution against system failure (Nilsen, 2004). Tavani (2007) emphasize the importance of industry wide standard for design and development of such artefacts to assure the reliability and safety towards society. Additionally, most industries are closely regulated by government agencies with stringent certification requirements. For example, IEC 60880 describes European standards for certification of nuclear power generating software.
As there exist dubious dispute about the accountability and liability of organisation for any glitch that violates law, social norms and moral responsibilities, Nissenbaum argues that substantive standards for computer professional should be “clarified and vigorously promoted”. He believes, a formal analysis, meaningful quality assurance and built-in redundancy approach eliminate the obscure line between malfunctions due to adequate practices and those that occurs despite of programmer’s best efforts.
Such standards, VSD (value sensitive design) for example is very vital to provide guidelines in developing tools and technology so that they are more likely to support the actions, relationships, institutions, and experiences that human beings care deeply about. Analysis approach of direct and indirect stakeholders significantly alleviates the oversighted concerns related to safety and quality issue. These standards in the field of computer professional field help to achieve an acceptable level of safety for software used in critical applications and determine who is accountable and liable for any erroneous practices (Friedman, 2013).
Conclusively, software system in domain of safety and security are increasingly becoming crucial and convoluted. Over the past decade, there has been a significant evidence

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    Windows and Linux operating systems have a few large advantages and disadvantages that are worth analyzing when considering security. Interestingly enough, the…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    As one of the Health & Safety Manager for the CSS UK team I have responsibilities for Express Reinforcement Ltd (ERL) site at Neath (South Wales). I have responsibility for the maintenance of the (ERL) Safety Management Systems. (SMS)…

    • 1828 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    NT1310 NFPA Codes

    • 1390 Words
    • 5 Pages

    In order for us as a person and an IT Administrator is to stay safe. History has shown the safety departments about having to write policies which are used to provide recommended practices for the design and installation of safety standards with the Telecommunications infrastructure that will support a wide variety of existing and future services, using industry accepted design and installation methods.…

    • 1390 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    6. Rules and References- Technical specifications, programming structures and guidelines for software and standards development.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    California Space Heaters

    • 438 Words
    • 2 Pages

    3) What framework should the company use to make decisions about which product safety features to add? Given that framework, which particular product safety features should they add?…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    You must respect the integrity of computing and network systems; for example, you shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system or network and/or damage or alter the software components of a computer, computing system or network.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Standards are there to ensure that we complete a task to a required standard. If standards are not met we are required to reflect back and make improvements to ensure we meet the requirements of those standards.…

    • 922 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Security of Cloud Computing System enabled by Trusted Computing Technology Zhidong Shen International School of Software, Wuhan University, Wuhan, China, 430079 zhidongshen@163.com Qiang Tong School of Software, Northeastern University, Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment.…

    • 3993 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    The SDLC Process

    • 907 Words
    • 4 Pages

    The SDLC process was designed to ensure end-state solutions meet user requirements in support of business strategic goals and objectives. In addition, the SDLC also provides a detailed guide to help Program Managers with ALL aspects of IT system development, regardless of the system size and scope. The SDLC contains a comprehensive checklist of the rules and regulations governing IT systems, and is one way to ensure system developers comply with all applicable Government regulations, because the consequences of not doing so are high and wide ranging. This is especially true in the post 9/11 environment where larger amounts of information are considered sensitive in nature, and are shared among commercial, international, Federal, state, and local partners.…

    • 907 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Introduction Our Contribution Generation of Program Invariants using Abstract Interpretation Framework 41st Annual International IEEE/IFIP conference, DSN- 2011, Hong Kong Anirban Roy Choudhury Homi Bhabha National Institute Mumbai, India 30 June, 2011 Anirban Roy Choudhury Generation of Program Invariants using Abstract Interpretation Introduction Our Contribution Abstract Interpretation Abstract Domains Motivation A faulty computer software can cause significant economic and human loss eg.…

    • 2661 Words
    • 11 Pages
    Better Essays