Safety Assessment: Safety Integrity Levels

Slides:



Advertisements
Similar presentations
Integra Consult A/S Safety Assessment. Integra Consult A/S SAFETY ASSESSMENT Objective Objective –Demonstrate that an acceptable level of safety will.
Advertisements

2013 Northwest Hydro Operators Forum 1 Risk-Informed Decision Making – FERC Perspective David Lord, P.E., D2SI Dam Safety Risk team – Portland, Or Natural.
Frequencies Estimation Ricki M Mulia, ST. MSc. Unsafe Act Unsafe Condition HAZARD EXPOSURE Penyakit Akibat kerja RISK Kecelakaan kerja Higiene Industri.
Reliable System Design 2011 by: Amir M. Rahmani
Dependability ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University August.
Scandpower AS P.O. Box 3, N-2027 Kjeller, Norway Risk management in the Scandinavian railway industry Karl Ove Ingebrigtsen Vice president Sweden Norway.
Software Fault Tolerance – The big Picture RTS April 2008 Anders P. Ravn Aalborg University.
SWE Introduction to Software Engineering
“ Hard work and concern for the society is the key to success ” - O P Jindal On-site and Off-site Emergency Plans Based on Integral Risk Management – Key.
Process ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University August.
Mini Project ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University August.
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
Documentation ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University August.
SWE Introduction to Software Engineering
1 Risk evaluation Risk treatment. 2 Risk Management Process Risk Management Process.
Safety Analysis – A quick introduction RTS February 2006 Anders P. Ravn Aalborg University.
Software Fault Tolerance – The big Picture mMIC-SFT September 2003 Anders P. Ravn Aalborg University.
Introduction ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University August.
Safety Assessment (Fault Trees) ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg.
Software project management (intro)
Summary and Safety Assessment mMIC-SFT November 2003 Anders P. Ravn Aalborg University.
Risk Management. RISK RISK = the probability and severity of loss linked to hazards. RISK = the probability and severity of loss linked to hazards. The.
Annex I: Methods & Tools prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9 QUALITY.
IV&V Facility Model-based Design Verification IVV Annual Workshop September, 2009 Tom Hempler.
Systems Engineering Approach to MPS Risk Management Kelly Mahoney Presented at the Workshop for Machine Protection in Linear Accelerators.
OH&S Management System
Software Project Management Fifth Edition
Hazard Management for Safety Critical Systems Philip Benjamin Supervised by: Dr. David Hemer Computer Science Department University Of Adelaide.
Isograph Reliability Software RiskVu V3. Isograph Reliability Software ESSM – The first risk monitor ? Essential Systems Status Monitor Installed at Heysham.
Test Organization and Management
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
WHAT IS SYSTEM SAFETY? The field of safety analysis in which systems are evaluated using a number of different techniques to improve safety. There are.
ERT 312 SAFETY & LOSS PREVENTION IN BIOPROCESS RISK ASSESSMENT Prepared by: Miss Hairul Nazirah Abdul Halim.
ERT 322 SAFETY AND LOSS PREVENTION RISK ASSESSMENT
Software Testing Course Shmuel Ur
Layers of Protection Analysis
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 11 Project Risk Management.
Software availability –the probability that a program is operating according to requirements at a given point in time. Availability = (MTTF/MTBF) x 100.
Safety Critical Systems ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University.
FAULT TREE ANALYSIS (FTA). QUANTITATIVE RISK ANALYSIS Some of the commonly used quantitative risk assessment methods are; 1.Fault tree analysis (FTA)
Are You Ready for an SIS? What to do before starting on your SIS…and after it’s installed March 24, 2009.
Método de NASA
SIPI61508 Soft computing based qualitative method for determination of SILs István Ajtonyi 1 – László Ormos 2 1 University of Miskolc, Institute of Electric.
Safety-Critical Systems T Ilkka Herttua. Safety Context Diagram HUMANPROCESS SYSTEM - Hardware - Software - Operating Rules.
9 th Workshop on European Collaboration for Higher Education and Research in Nuclear Engineering & Radiological Protection Salamanca, Spain 5-7 June 2013.
Product & Technology Quality. Excellence. Support SIL Explanation 27.JAN 2006 Automation & Safety.
TUGAS K3 DALAM INDUSTRI KIMIA
RLV Reliability Analysis Guidelines Terry Hardy AST-300/Systems Engineering and Training Division October 26, 2004.
WHAT IF ANALYSIS USED TO IDENTIFY HAZARDS HAZARDOUS EVENTS
Attributes Availability Reliability Safety Confidentiality Integrity Maintainability Dependability Means Fault Prevention Fault Tolerance Fault Removal.
Process system and safety laboratory
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Risk Assessment Techniques
Egyptian and Italian Cooperation Programme on Environment Quantitative Risk Assessment of Oil and Gas Plants Mr. Gaetano Battistella 1 Working Group n°.
Risk Assessment: A Practical Guide to Assessing Operational Risk
OH&S Management System
Dependability Requirements of the LBDS and their Design Implications
Critical Systems Specification
Layers of Protection Analysis
OH&S Management System
HSE Case: Risk Based Approach.
Quantitative Risk Assessment
תקציב הבטיחות והבריאות בתעסוקה וניהולו בארגון
A. Mancusoa,b, M. Compareb, A. Saloa, E. Ziob,c
سیستم مدیریت ایمنی، بهداشت و محیط زیست
Fault Tolerance Distributed
Software Engineering for Safety: a Roadmap
Layers of Protection Analysis
BHOPAL Industrial Disaster Management Cycle: OECD 2004.
Safety Analysis and Safety Functions
Presentation transcript:

Safety Assessment: Safety Integrity Levels ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University September 2011

Safety Assessment Find hazards that may lead to incidents or mishaps, analyze their relations, and estimate their consequences. May involve probabilistic reasoning (Reliability Engineering). Is PFH < 10-6 per hour (h-1 ) ?

Process & Documents

System Analysis and Definition

Model the context Hazards! Problem domain: That part of a context that is administrated, monitored, or controlled by a system Application domain: The organization that administrates, monitors, or controls a problem domain Hazards!

System Definition (FACTOR) Functionality: The system functions that support the application-domain tasks. Application domain: Those parts of an organization that administrate, monitor, or control a problem domain. Conditions: The conditions under which the system will be developed and used. Technology: Both the technology used to develop the system and the technology on which the system will run. Objects: The main objects in the problem domain. Responsibility: The system’s overall responsibility in relation to its context.

Determining the Hazards and risks

Hazard Determination HAZOP (hazard and operability) -study

Determine Event Sequences Fault Trees Primary Events: Basic event – fault in atomic component Undeveloped Event – fault in composite component (may be analyzed later) External event – expected event from environment Intermediate event: Nodes inside a fault-tree

Fault Tree - Gates ... ... condition Inhibit gate

Determining the SIL

Methods ALARP (As Low As Resonably Possibble) with Quantitative method (Appendix C, D) Risk Graphs (Appendix E) LOPA (Layer of Protection Analysis) (Appendix F) Hazardous Event Severity Matrix (Appendix G)

ALARP – Frequency and Consequence

C a weight of the consequence, eg on a scale [0,1]. ALARP – to SIL C a weight of the consequence, eg on a scale [0,1]. Fnp frequency in h-1 or y-1. Fp (Ft) tolerable frequency = PFHavg  Fnp

Risk Graphs - SIL

Data for Risk Graph