1 CS 501 Spring 2007 CS 501: Software Engineering Lecture 20 Reliability 2.

Slides:



Advertisements
Similar presentations
Principles of Engineering System Design Dr T Asokan
Advertisements

1 CS 501 Spring 2005 CS 501: Software Engineering Lecture 21 Reliability 3.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development.
Malicious Logic What is malicious logic Types of malicious logic Defenses Computer Security: Art and Science © Matt Bishop.
CS 501: Software Engineering Fall 2000 Lecture 14 System Architecture I Data Intensive Systems.
CS CS 5150 Software Engineering Lecture 22 Reliability 3.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 19 Performance of Computer Systems.
CS 501: Software Engineering Fall 2000 Lecture 16 System Architecture III Distributed Objects.
1 CS 501 Spring 2008 CS 501: Software Engineering Lecture 20 Reliability 2.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
CS CS 5150 Software Engineering Lecture 24 Reliability 4.
CS-550 (M.Soneru): Recovery [SaS] 1 Recovery. CS-550 (M.Soneru): Recovery [SaS] 2 Recovery Computer system recovery: –Restore the system to a normal operational.
Modified from Sommerville’s originals Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development.
CS CS 5150 Software Engineering Lecture 21 Reliability 3.
Developing Dependable Systems CIS 376 Bruce R. Maxim UM-Dearborn.
1 CS 501 Spring 2006 CS 501: Software Engineering Lecture 20 Reliability 2.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CS 501: Software Engineering Fall 2000 Lecture 21 Dependable Systems I Reliability.
CS 501: Software Engineering Fall 2000 Lecture 22 Dependable Systems II Validation and Verification.
1 Software Testing and Quality Assurance Lecture 1 Software Verification & Validation.
Page 1 Copyright © Alexander Allister Shvartsman CSE 6510 (461) Fall 2010 Selected Notes on Fault-Tolerance (12) Alexander A. Shvartsman Computer.
1 CS 501 Spring 2008 CS 501: Software Engineering Lecture 21 Reliability 3.
CS CS 5150 Software Engineering Lecture 19 Reliability 1.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Software Testing Verification and validation planning Software inspections Software Inspection vs. Testing Automated static analysis Cleanroom software.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
System/Software Testing
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
CS 501: Software Engineering Fall 1999 Lecture 16 Verification and Validation.
1 Software Engineering II Software Reliability. 2 Dependable and Reliable Systems: The Royal Majesty From the report of the National Transportation Safety.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CS CS 5150 Software Engineering Lecture 18 Security.
CS 360 Lecture 9.  The security goal:  To make sure that agents (people or external systems) who interact with a computer system, its data and resources,
Testing Basics of Testing Presented by: Vijay.C.G – Glister Tech.
 Chapter 13 – Dependability Engineering 1 Chapter 12 Dependability and Security Specification 1.
Lecture 3 Software Engineering Models (Cont.)
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 22 Slide 1 Software Verification, Validation and Testing.
ACM 511 Introduction to Computer Networks. Computer Networks.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 22 Reliability II.
Chapter 8 Lecture 1 Software Testing. Program testing Testing is intended to show that a program does what it is intended to do and to discover program.
Design - programming Cmpe 450 Fall Dynamic Analysis Software quality Design carefully from the start Simple and clean Fewer errors Finding errors.
CS 360 Lecture 17.  Software reliability:  The probability that a given system will operate without failure under given environmental conditions for.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
HNDIT23082 Lecture 09:Software Testing. Validations and Verification Validation and verification ( V & V ) is the name given to the checking and analysis.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 21 Reliability II.
Security Issues CS 560. Security in the software development process The security goal:  To make sure that agents (people or external systems) who interact.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 3: Windows7 Part 3.
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 20 Reliability 2.
INFORMATION SYSTEMS SECURITY AND CONTROL.
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Controlling Computer-Based Information Systems, Part II
Chapter 8 – Software Testing
Chapter 18 Software Testing Strategies
Security in Networking
Software testing strategies 2
Lecture 09:Software Testing
Fault Tolerance Distributed Web-based Systems
Systems Design Chapter 6.
CS 5150 Software Engineering
INFORMATION SYSTEMS SECURITY and CONTROL
CS 501: Software Engineering Fall 1999
Critical Systems Development
Baisc Of Software Testing
System Testing.
Presentation transcript:

1 CS 501 Spring 2007 CS 501: Software Engineering Lecture 20 Reliability 2

2 CS 501 Spring 2007 Administration Projects Four weeks to the end of the semester. Leave time for system testing and to make small changes discovered when the complete system is assembled. Better to deliver a limited first phase done well than a fuller system that is incomplete, untested, or without documentation.

3 CS 501 Spring 2007 Quiz 3: An Online Bookstore A bookstore decides to create a system for selling books online. The company has in production a product database with information about books, suppliers and prices. For the online system they will need to create: a customer database, and an ordering system for online customers. The plan is to develop the system in two phases. During Phase 1, simple versions of the customer database and ordering system will be brought into production. In Phase 2, major enhancements will be made to these components.

4 CS 501 Spring 2007 Security in the Software Development Process The security goal The security goal is to make sure that the agents (people or external systems) who interact with a computer system, its data, and its resources, are those that the owner of the system would wish to have such interactions. Security considerations need to be part of the entire software development process. They may have a major impact on the architecture chosen. Example. Integration of Internet Explorer into Windows

5 CS 501 Spring 2007 Agents and Components A large system will have many agents and components: each is potentially unreliable and insecure components acquired from third parties may have unknown security problems (COTS problem) The software development challenge: develop secure and reliable components protect whole system from security problems in parts of it

6 CS 501 Spring 2007 Techniques: Barriers Place barriers that separate parts of a complex system: Isolate components, e.g., do not connect a computer to a network Firewalls Require authentication to access certain systems or parts of systems Every barrier imposes restrictions on permitted uses of the system Barriers are most effective when the system can be divided into subsystems with simple boundaries

7 CS 501 Spring 2007 Techniques: Authentication & Authorization Authentication establishes the identity of an agent: What the agent knows (e.g., password) What the agent possess (e.g., smart card) Where does the agent have access to (e.g., crt-alt-del) What are the physical properties of the agent (e.g., fingerprint) Authorization establishes what an authenticated agent may do: Access control lists Group membership

8 CS 501 Spring 2007 Example: An Access Model for Digital Content Digital material Attributes User Roles Actions Operations Access Policies

9 CS 501 Spring 2007 Techniques: Encryption Allows data to be stored and transmitted securely, even when the bits are viewed by unauthorized agents Private key and public key Digital signatures Encryption Decryption X Y Y X

10 CS 501 Spring 2007 Security and People People are intrinsically insecure: Careless (e.g, leave computers logged on, use simple passwords, leave passwords where others can read them) Dishonest (e.g., stealing from financial systems) Malicious (e.g., denial of service attack) Many security problems come from inside the organization: In a large organization, there will be some disgruntled and dishonest employees Security relies on trusted individuals. What if they are dishonest?

11 CS 501 Spring 2007 Design for Security: People Make it easy for responsible people to use the system Make it hard for dishonest or careless people (e.g., password management) Train people in responsible behavior Test the security of the system Do not hide violations

12 CS 501 Spring 2007 Suggested Reading Trust in Cyberspace, Committee on Information Systems Trustworthiness, National Research Council (1999) Fred Schneider, Cornell Computer Science, was the chair of this study.

13 CS 501 Spring 2007 Failures and Faults Failure: Software does not deliver the service expected by the user (e.g., mistake in requirements, confusing user interface) Fault (BUG): Programming or design error whereby the delivered system does not conform to specification (e.g., coding error, interface error)

14 CS 501 Spring 2007 Faults and Failures? Actual examples (a) A mathematical function loops for ever from rounding error. (b) A distributed system hangs because of a concurrency problem. (c) After a network is hit by lightning, it crashes on restart. (d) A program dies because the programmer typed: x = 1 instead of x == 1. (e) The head of an organization is paid $5 a month instead of $10,005 because the maximum salary allowed by the program is $10,000. (f) An operating system fails because of a page-boundary error in the firmware.

15 CS 501 Spring 2007 Terminology Fault avoidance Build systems with the objective of creating fault- free (bug-free) software Fault tolerance Build systems that continue to operate when faults (bugs) occur Fault detection (testing and validation) Detect faults (bugs) before the system is put into operation.

16 CS 501 Spring 2007 Fault Avoidance Software development process that aims to develop zero-defect software. Formal specification Incremental development with customer input Constrained programming options Static verification Statistical testing It is always better to prevent defects than to remove them later. Example: The four color problem.

17 CS 501 Spring 2007 Defensive Programming Murphy's Law: If anything can go wrong, it will. Defensive Programming: Redundant code is incorporated to check system state after modifications. Implicit assumptions are tested explicitly. Risky programming constructs are avoided.

18 CS 501 Spring 2007 Defensive Programming: Error Avoidance Risky programming constructs Pointers Dynamic memory allocation Floating-point numbers Parallelism Recursion Interrupts All are valuable in certain circumstances, but should be used with discretion

19 CS 501 Spring 2007 Defensive Programming Examples Use boolean variable not integer Test i <= n not i = = n Assertion checking (e.g., validate parameters) Build debugging code into program with a switch to display values at interfaces Error checking codes in data (e.g., checksum or hash)

20 CS 501 Spring 2007 Maintenance Most production programs are maintained by people other than the programmers who originally wrote them. (a) What factors make a program easy for somebody else to maintain? (b) What factors make a program hard for somebody else to maintain?

21 CS 501 Spring 2007 Fault Tolerance General Approach: Failure detection Damage assessment Fault recovery Fault repair N-version programming -- Execute independent implementation in parallel, compare results, accept the most probable.

22 CS 501 Spring 2007 Fault Tolerance Basic Techniques: Timers and timeout in networked systems After error continue with next transaction (e.g., drop packet) User break options (e.g., force quit, cancel) Error correcting codes in data Bad block tables on disk drives Forward and backward pointers in databases Report all errors for quality control

23 CS 501 Spring 2007 Fault Tolerance Backward Recovery: Record system state at specific events (checkpoints). After failure, recreate state at last checkpoint. Backup of files Combine checkpoints with system log (audit trail of transactions) that allows transactions from last checkpoint to be repeated automatically. Test the restore software!

24 CS 501 Spring 2007 Software Engineering for Real Time The special characteristics of real time computing require extra attention to good software engineering principles: Requirements analysis and specification Special techniques (e.g., locks on data, semaphores, etc.) Development of tools Modular design Exhaustive testing Heroic programming will fail!

25 CS 501 Spring 2007 Software Engineering for Real Time Testing and debugging need special tools and environments Debuggers, etc., can not be used to test real time performance Simulation of environment may be needed to test interfaces -- e.g., adjustable clock speed General purpose tools may not be available

26 CS 501 Spring 2007 Some Notable Bugs Even commercial systems may have horrific bugs Built-in function in Fortran compiler (e 0 = 0) Japanese microcode for Honeywell DPS virtual memory The microfilm plotter with the missing byte (1:1023) The Sun 3 page fault that IBM paid to fix Left handed rotation in the graphics package The preload system with the memory leak Good people work around problems. The best people track them down and fix them!