Software Safety Risk Evaluation Process Yorick Bouma, 3407020, Group III.

Slides:



Advertisements
Similar presentations
Truth – N – Beauty Science Outreach Software and Content Purpose and Philosophy Who we are Our Products Whats Ahead.
Advertisements

Integrated Analysis of Transportation Network with Pipeline System Vulnerabilities Berrin Tansel 1, Xia Jin 1, Kollol Shams 1, Bahareh Inanloo 1, Albert.
Pedigreed Attribute eLicitation Method (PALM) Onno Dijkstra.
Define & Compare Flowcharts of Each Method Tom Delong.
Ask Pete Acquired Software Knowledge Project - Estimation- Tool - Effort Presented to the NASA OSMA SAS ‘01 NASA IV&V Facility September 5-7, 2001 Tim.
ACS 567: Software Project Management Spring 2009 Instructor: Dr. John Tanik.
GRADUATING PROJECT ORIENTATION BY Professor Muhammad Arshad Malik
Technical Specification / Schedule Department of Computer Science and Engineering Michigan State University Spring 2007 Team : CSE 498, Collaborative Design.
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
SQM - 1DCS - ANULECTURE Software Quality Management Software Quality Management Processes V & V of Critical Software & Systems Ian Hirst.
Presenter : Zamarak. Agenda Overview Related Literature Process Deliverable Diagram An Example.
Software Safety Risk Evaluation (SSRE) Process SAŠA ŠPILER METHOD ENGINEERING UTRECHT, APRIL 2014.
Software Architecture Risk Assessment (SARA) Tool Khader Basha Shaik Problem Report Defense Master of Science in Computer Science Lane Department of Computer.
Process Assessment: the ‘BOOTSTRAP’ approach
Software Engineering Chapter 12 The Generic Iteration Workflow Fall 2000.
Research Heaven, West Virginia Verification and Validation of Adaptive Systems Online Failure Detection and Identification for IFCS through Statistical.
بسم الله الرحمن الرحيم الحمد لله ، والصلاة والسلام على رسول الله
CSCE 548 Secure Software Development Test 1 Review.
Research Heaven, West Virginia 1 FY 2004 Initiative: Risk Assessment of Software Architectures Hany Ammar, Katerina Goseva-Popstojanova, Ajith Guedem,
Software Quality Assurance Lecture #2 By: Faraz Ahmed.
Requirements Engineering CSE-305 Requirements Engineering Process Tasks Lecture-5.
Software Quality Assurance SE Software Quality Assurance What is “quality”?
MaRMI-RE: Systematic Componentization Process for Reengineering Legacy System Jung-Eun Cha, Chul-Hong Kim, Computational Science and Its Applications –
SMALL BUSINESS SHOWCASE Syneren Technologies Corp. Small Business Size: 8(a), SDB, Woman owned small business Niche Areas: R&D, Hardware, Systems Engineering.
Graduation Project Report Reducing Safety Risks at the Palestinian Stone and Marble Industrial Sector 1 Group Members: Ahmad Ghanayem Nabeel Khaleeliya.
Software Project Management
International Conference on Risk Assessment and Management: objectives and current status Valentin Nikonov, PhD (Economics), PMP IPMA, QMS Auditor, Coordinator.
Slide 1V&V 10/2002 Software Quality Assurance Dr. Linda H. Rosenberg Assistant Director For Information Sciences Goddard Space Flight Center, NASA
INCOSE TOULOUSE - FRANCE 1. 2 James C. Helm Associate Professor, Systems Engineering School of Science and Computer Engineering 2700 Bay Area Boulevard.
Quality Evaluation methodologies for e-Learning systems (in the frame of the EC Project UNITE) Tatiana Rikure Researcher, Riga Technical University (RTU),
Chapter 15: Risk Management
1 INNOVATIONS 2001 Organized by The Clear Lake Council Of Technical Societies (CLCTS) in cooperation with and co-sponsored by CLCTS member organizations.
Method Engineering Wensi Ai Value-Driven Service Matching.
IV&V Facility 1 FY 2002 Initiative IV&V of UML Hany Ammar, Katerina Goseva-Popstojanova, V. Cortelessa, Ajith Guedem, Diaa Eldin Nassar, Walid AbdelMoez,
SAS ‘05 Reducing Software Security Risk through an Integrated Approach David P. Gilliam, John D. Powell Jet Propulsion Laboratory, California Institute.
1 Fault-Based Analysis: Improving IV&V Through Requirements Risk Reduction '02 Jane Hayes Rama Bireddy D.N. American SAIC Department of Computer Science.
Optimizing NASA IV&V Benefits Using Simulation Grant Number: NAG David M. Raffo, Ph.D College of Engineering and Computer Science School of Business.
A Strategy and an Eclipse Based Environment for the Migration of Legacy Systems to Multi-tier Web-based Architectures Horia Constantin.
Development of Methodologies for Independent Verification and Validation of Neural Networks NAG OSMA-F001-UNCLASS Methods and Procedures.
Research Heaven, West Virginia FY2003 Initiative: Hany Ammar, Mark Shereshevsky, Walid AbdelMoez, Rajesh Gunnalan, and Ahmad Hassan LANE Department of.
CLV Based Product Recommendation Integrating AHP and data mining for product recommendation based on customer lifetime value Shaheen Syed Department of.
RISK MANAGEMENT Risk Management. RM Application Sequence Phase I: Identification Phase II: Quantification and analysis Phase III: Action Plan (Mitigation)
CRAC++ Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems.
Software Architecture Risk Assessment (SARA) Tool Khader Shaik, Wallid Abdelmoez, Dr. Hanny Ammar Lane Department of Computer Science and Electrical Engineering,
1 James C. Helm Assistant Professor, Systems Engineering School of Natural and Applied Sciences 2700 Bay Area Boulevard Houston, Texas VPN
Community Plan Implementation Training Training of Trainers LUNCH Community meeting Practice presentation process KLO presentations CBO presentations.
Electronic Portfolios Define. Design. Deliver. Elon University Virginia Assessment Group
Independent Verification and Validation. IV&V Independent group –Outside of the development shop –Responsible for verifying and validating a system –May.
Risk Management Managing the Software Process - Risk Management Advanced Software Engineering COM360 University of Sunderland © 1998.
DECIDERelease Method Engineering - Presentation Maarten Huijs.
1 Undergraduate Software Engineering Programs in the United States (in 2003) Mark A. Ardis Rose-Hulman Institute of Technology.
SAS_08_Legacy_Safety_Hill Assurance and Recertification of Safety Critical Software In Legacy Systems Janie Hill NASA Kennedy Space Center, Florida
COIT23003 Games Development Research Directions. References C. Fairclough, M. Fagan, B. Mac Namee and P. Cunningham, "Research Directions for AI in Computer.
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
1 SAS ‘04 Reducing Software Security Risk through an Integrated Approach David P. Gilliam and John D. Powell.
Risk Assessment What is good about the Microsoft approach to threat modeling? OCTAVE…  Advantage: ___________  Disadvantage: ___________ What is bad.
Enterprise Risk Management Lucas Taylor Fermilab Strategic Planning Workshop 4 – 5 November 2015.
1 The Software Engineering Education at CSULA Jiang Guo Jose M. Macias June 4, 2010.
IV&V Facility 7/28/20041 IV&V in NASA Pre-Solicitation Conference/ Industry Day NASA IV&V FACILITY July 28, 2004.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
PhD at CSE: Overview CSE department offers Doctoral degree in the Computer Science (CS) or Computer Engineering areas (CpE) at both MS to PhD and BS to.
Software Project Configuration Management
Computerized Systems in Clinical Research
CS4311 Spring 2011 Process Improvement Dr
Cleanroom Software Engineering
Presented to the NASA OSMA SAS ‘01
CSCE 548 Secure Software Development Test 1 Review
For Computer Society Internal Use Only
Enterprise Content Management Owners Representative Contract Approval
Software Risk Assessment based on UML models
Presentation transcript:

Software Safety Risk Evaluation Process Yorick Bouma, , Group III

Contents Background Information Main Phases PDD Related Literature

BACKGROUND INFORMATION

Authors Janice Hill PhD student IV&V Facility at NASA in Fairmont, West Virginia, USA Scott Tilley Professor Department of Computer Sciences at Florida Institute of Technology in Melbourne, Florida, USA Co(authored) more than 100 academic publications

Origins SEI Software Risk Evaluation (SRE) practice Primary functions SRE Detection Specification Assessment Consolidation Planning & Coordination Verification & Validation Training & Communcation Support functions

Purpose High software safety standards NASA (Possibly) a lot of software safety risks Legacy Systems

MAIN PHASES

Main Phases Detection Risk Specification Assessment Consolidation Mitigation

Detection Project profile Questions regarding software safety Risks

PDD and example

Risk Specification Source of risk impact Performance Support Cost Schedule

PDD and example

Assessment Risk profile Possible consequence CatastrophicCriticalMarginalNegligible Probability of occurrence LikelyProbablePossibleUnlikelyImprobable

PDD and example

Consolidation Group similar risks Assign priority ranking Determine risk area importance

PDD and example

Mitigation List risk areas Develop mitigation plans for risk areas Develop report on project

PDD and example

PDD

RELATED LITERATURE

Related Literature SEI Software Risk Evaluation (SRE) practice Higuera, R. P., & Haimes, Y. Y. (1996). Software Risk Management. Technical Report CMU/SEI- 96-TR-012. Software Engineering Institute. Primary functions SRE Detection Specification Assessment Consolidation Mitigation Planning & Coordination Verification & Validation Training & Communcation Support functions

Related Literature Software Safety Risk Taxonomy Based Questionnaire (TBQ) Hill, J., & Victor, D. (2008). The Product Engineering Class in the Software Safety Risk Taxonomy for Building Safety-Critical Systems. Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008) (pp ). IEEE CS Press. Legacy Systems Risk Database (LSRD) tool

Questions?