Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The increasing connectivity and automation of electronic and electrical systems in modern vehicles has led to the need for cyber security to be built in to the design of such systems from the early stages of development. Although formal international standards for automotive cyber security are still to be developed, the recently published SAE J3061TM recommended practice sets out a framework for organisations...
This paper analyses safety and security risks posed by the introduction of autopilot functions for road vehicles. Drawing on lessons learned from the aviation industry, the authors make the case for standardising the behaviour and interfaces of advanced driver assistance systems. This paper proposes a modular functional architecture to support both iterative development and an iterative increase in...
Model-based development of software using tools such as MathWorks Simulink has become common in the engineering of safety-critical systems. When working with Simulink, engineers need to be able to assure that the subject models possess crucial properties such as: (1) safety properties are met, (2) the use of measurement units is consistent, (3) freedom from exceptions, (4) the execution sequences...
Safety Management has matured from simple process based arguments to become hazard focused and proactive. The adoption of Goal Structuring Notation and 'product line' safety arguments means that products comprise multiple constituents in several axis. Data is now ubiquitous in the development, operation and assurance of products. This paper therefore explores data safety in the form of a three-axis...
As the development of ship software systems has followed the growth curve of digital technologies, Marine & Offshore assessors like BUREAU VERITAS, are lacking dedicated software standards and tools which are available to other industrial sectors like railways or aeronautics. Indeed, in this field of Marine & Offshore, software systems are seen as black-boxes, i.e. only verified through system...
Early applications of system safety focused on analysis resulting in the identification of the risks associated with functional failure, and attribution of integrity requirements to functions. Limitations in early software systems restricted their application to small-scale protection systems. Subsequent developments have seen such systems grow in scope, scale and complexity, not only in the application,...
Data is everywhere. Data permeates our Safety Cases and even the way we form our Safety Cases. The Safety Critical Systems Club (SCSC) formed the Data Safety Initiative Working Group (DSIWG) in January 2013 to provide a forum for discussion across industries. The DSIWG has published the Data Safety Guidance, intended to be a starting point providing advice on how to conduct a data-focussed safety...
None of ED-153, IEC 61508-3:2010 and CAP 670 provide specific measures for assurance of information veridicality in ANSP-deployed VCS and ATCDS. We have suggested some here. We propose that any international standard governing safety in ANSP-deployed software-based systems such as VCS and ATCDS require specific measure for assurance of information veridicality.
This article reports a validation exercise regarding a novel, Total Aviation System (TAS) method for the certification of aeronautical products, systems, and services that constitute a change to the aviation system. The method promotes the development of a TAS-level safety argument that can potentially support performance based and compliance based certification. The validation exercise consisted...
This study compares Signals Passed At Danger (SPAD) severity assessments between train drivers and railway safety advisors. The classification and assessment of 58 SPADs caused by driver error in a Norwegian railway operating company in 2015 were analysed to identify differences between SPAD assessments conducted by train drivers and safety advisors. The results showed a normal distribution among...
This paper proposes generic architectures, claims and limitations for combinations of automatic and autonomous functions for manned and unmanned systems. The proposals may be applicable in civil systems, but they are based on a review of current systems and how they are operated in Defence, particularly the Ministry of Defence (MOD).
Providing assurances in newly developed Programmable Electronic Hardware (PEH) used in safety critical system is becoming standard practise following the development of standards such as DO 254. Although these standards mention legacy PEH, they lack detail on the assurance approaches that should be used. This situation is made more challenging by the fact that often limited developmental evidence...
Field Programmable Gate Arrays (FPGAs) implementation in nuclear is becoming increasingly attractive. This paper discusses the advantages and challenges of utilising FPGAs in nuclear applications, including the improved simplicity over alternative approaches. An overview of FPGAs and the development lifecycle is given. The paper examines the current approaches to meet regulatory requirements, including...
Safety critical control logic is indispensable in any modern equipment with safety responsibility. When these systems are deployed into operation, it is the software that covertly makes most of the control decisions, with little data input from the operators. The volume of responsibility reposed on the software of control equipment has also increased over the years, making their logic more complex...
This paper presents research to examine the benefits of deploying a high interaction hardware Operational Technology (OT) or Industrial Control System (ICS) honeypot, as opposed to a virtualised system. The Honeypot Project successfully developed and demonstrated an innovative approach to implementing a situational awareness capability in an operational industrial control system environment. The approach...
Due to an increasing level of reliance on ICT and the proliferation of sophisticated cyberattacks, organisations are increasingly vulnerable to them. Cyberattacks take a variety of forms and have a broad spectrum of effects. Also, the growth of cyberattacks and the damage caused by them has highlighted the concern about the theme. Therefore, this study aims, through the use of a survey, to comprehend...
International Atomic Energy Agency (IAEA) [1] Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities guidance to sovereign states clearly establishes that the disciplines of nuclear safety and nuclear security are of equal importance. Both activities have an ultimate common purpose of protecting the public from harm. Both must be delivered in a coherent,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.