Software Safety Risk Evaluation (SSRE) Process SAŠA ŠPILER METHOD ENGINEERING UTRECHT, APRIL 2014.

Slides:



Advertisements
Similar presentations
EXERCISE IN MITIGATION DECISIONS MODULE 2 THE MULTI-HAZARD ENVIRONMENT.
Advertisements

Normal Operations Data: Air Traffic Facility Evaluations and NOSS
Define & Compare Flowcharts of Each Method Tom Delong.
Project Management Gaafar 2007 / 1 This Presentation is uses information from PMBOK Guide 2000 Project Management Risk Management* Dr. Lotfi Gaafar.
Ask Pete Acquired Software Knowledge Project - Estimation- Tool - Effort Presented to the NASA OSMA SAS ‘01 NASA IV&V Facility September 5-7, 2001 Tim.
Overview of Key Rule Features
SQM - 1DCS - ANULECTURE Software Quality Management Software Quality Management Processes V & V of Critical Software & Systems Ian Hirst.
Landry Consultants LLC Dave Fleet Consulting LLC 1 Perspectives on SMS and Airport Operations September 14, 2011.
Risk analysis – FMEA Workshops. FMEA 1 Simple risk assessment process!!  Identifying risk  Simple method for grading risk  Determines appropriate risk.
TIWANA WALTON MENTOR: SHARON MONICA JONES High Level Aviation Safety Risk Assessment.
Methodology for Architectural Level Reliability Risk Analysis Lalitha Krothapalli CSC 532.
Risk Analysis for Engineering Design J. M. McCarthy Fall 2003 Definitions Hazard Analysis Hazard Analysis Report Example for Mini Baja Nationally Recognized.
Prevention-Mitigation Fiscal Year 2010 Initial Grantee Meeting December 8 – 9, 2010, Santa Monica, California Arthur Cummins Director Safe and Healthy.
Office of Aviation Safety Customs and Border Protection Predator B Accident Nogales, Arizona April 25, 2006.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Research Heaven, West Virginia 1 FY 2004 Initiative: Risk Assessment of Software Architectures Hany Ammar, Katerina Goseva-Popstojanova, Ajith Guedem,
Software Quality Assurance Lecture #2 By: Faraz Ahmed.
The First Step—Restructuring the AIS Course.
Agile Release Planning Steven Jol. Overview (1) Release planning: release planning deals with selecting a set of requirements for a certain release (Karlsson,
Product Safety Consulting, Inc.© Failure Mode and Effects Analysis - FMEA.
DEPARTMENT OF REGIONAL DEVELOPMENT, PRIMARY INDUSTRY, FISHERIES AND RESOURCES Mining Management Act Workshop and Information Session Mining Operations.
Software Engineering Research at NASDA Masafumi Katahira System Analysis & Software Laboratory National Space Development Agency of Japan (NASDA) ISERN2000.
Chapter 11: Project Risk Management
Graduation Project Report Reducing Safety Risks at the Palestinian Stone and Marble Industrial Sector 1 Group Members: Ahmad Ghanayem Nabeel Khaleeliya.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 5 Slide 1 Risk management.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Slide 1V&V 10/2002 Software Quality Assurance Dr. Linda H. Rosenberg Assistant Director For Information Sciences Goddard Space Flight Center, NASA
INCOSE TOULOUSE - FRANCE 1. 2 James C. Helm Associate Professor, Systems Engineering School of Science and Computer Engineering 2700 Bay Area Boulevard.
Software Safety Risk Evaluation Process Yorick Bouma, , Group III.
Chapter 15: Risk Management
SAS ‘05 Reducing Software Security Risk through an Integrated Approach David P. Gilliam, John D. Powell Jet Propulsion Laboratory, California Institute.
Optimizing NASA IV&V Benefits Using Simulation Grant Number: NAG David M. Raffo, Ph.D College of Engineering and Computer Science School of Business.
Development of Methodologies for Independent Verification and Validation of Neural Networks NAG OSMA-F001-UNCLASS Methods and Procedures.
CRAC++ Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems.
Project & Risk Management
CSC 480 Software Engineering Lecture 5 September 3, 2004.
Operational Risk Policy. Risk Management Policy Planning of operational risk management. Identification of business lines. Mapping of business lines.
By: Date: Federal Aviation Administration Airport Direct-entry Digital NOTAMs Kathlyn Hoekstra Senior Policy Analyst FAA/ATO/Aeronautical Information Management.
DeSIRE Workshop, Pisa, 25-26/11/2002 1/7 A Case Study in Air Traffic Control Alberto Pasquini Deep Blue Srl.
SAS_08_Legacy_Safety_Hill Assurance and Recertification of Safety Critical Software In Legacy Systems Janie Hill NASA Kennedy Space Center, Florida
Quality Assurance and Risk Management Services, Inc. 
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
1 SAS ‘04 Reducing Software Security Risk through an Integrated Approach David P. Gilliam and John D. Powell.
Alberto Pasquini – Deep Blue Safety Assessment in MFF ASAS TN2 3-5 April 2006, Rome MENU: COVER | SUMMARY | OVERVIEW | TASKS | ALLOCATIONSCOVER SUMMARY.
A Software Engineering Model Based Curriculum Development Approach Leon Pan University of the Fraser Valley.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
1 /13 Risk Management What is Risk ?. 2 /13 Risk Management What is Risk ? Risk is the possibility of suffering loss. (Carnegie Mellon SEI definition)
Risk Assessment What is good about the Microsoft approach to threat modeling? OCTAVE…  Advantage: ___________  Disadvantage: ___________ What is bad.
Issue Tracking and Risk Management John D. McGregor Module 10 Session 1 Issue Tracking and Risk.
Safety Management Systems Session Two Safety Risk Management APTA Webinar April 28, 2016.
IV&V Facility 7/28/20041 IV&V in NASA Pre-Solicitation Conference/ Industry Day NASA IV&V FACILITY July 28, 2004.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
S7-1 © 2001 Carnegie Mellon University OCTAVE SM Process 7 Conduct Risk Analysis Software Engineering Institute Carnegie Mellon University Pittsburgh,
Customs and Border Protection Predator B Accident
Requirements Engineering Lecture 13
NUCLEAR POWER PLANTS DECOMMISSIONING
Chapter 6: Database Project Management
Presented to the NASA OSMA SAS ‘01
RISK ASSESSMENT TOOL FOR CONFINED SPACE ENTRIES
Quality Risk Management
Management. Management What is a risk? A risk is simply a probability that some adverse circumstance will actually occur.
Risk Management Process (Revised)
Safety Risk Management (SRM) Process Overview
Final Conference 18 Set 2018.
Methodology for Architectural Level Reliability Risk Analysis
And now the Framework WP4.
PFMEA Summary Process Steps
Action title DUMMY SLIDE DUMMY SLIDE DUMMY SLIDE Situation
Table 1. Project Control Factors and their hierarchy
Presentation transcript:

Software Safety Risk Evaluation (SSRE) Process SAŠA ŠPILER METHOD ENGINEERING UTRECHT, APRIL 2014

Content  What is SSRE process?  Phases  PDD and example  Related literature

Software Safety Risk Evaluation process  Represented in 2010 (18th IEEE International Requirements Engineering Conference)  Based on: SEI Software Risk Evaluation (SRE) developed in 1992 It is a process used for identification, analysis, consolidation and mitigation of software safety risks (Hill & Talley, 2010).

Software Safety Risk Evaluation process  SSRE USAGE: 4 projects at 3 NASA Centres  AUTHORS: JANICE HILL SCOTT TILLEY Works at IV&V Facility at NASA Professor of Software Engineering in a Department of Computer Sciences at Florida Institute of Technology

Phases Detection Risk specification Assessmen t ConsolidationMitigation

PDD

PHASE 1: DETECTION Project Profile Safety Related Questions Risks

PHASE 2: RISK SPECIFICATION PerformanceSupport Cost Schedule ProjectPerformanceSupportCostSchedule ATCS

PHASE 3: ASSESSMENT MAGNITUDE 1 7 Catastrophic * IMPACT Critical Marginal Negligible Likely LIKELIHOOD Probable Possible Unlikely Improbable RISK PROFILE low high

PHASE 3: ASSESSMENT Project ATCS lowhigh

PHASE 4: CONSOLIDATION Risk Candidates Priority Ranking (1-5) Project12345 ATCS

Safety Air Traffic Control Procedure Restart Safety-Critical Assurance System Hazard Analysis PHASE 5: MITIGATION IMPORTANCE RISK AREA

Related Literature  SEI safety requirements evaluation process  Legacy System Risk Database (LSRD) tool

Questions?