Top Banner
Sources of Risks CIT304 University of Sunderland
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Sources of Risks CIT304 University of Sunderland.

Sources of Risks

CIT304University of Sunderland

Page 2: Sources of Risks CIT304 University of Sunderland.

References

• P. Neumann, 1995, Computer-Related Risks, Addison-Wesley, ISBN: 0-201-55805-X

Page 3: Sources of Risks CIT304 University of Sunderland.

Risks in Development• System conceptualization

– Miss-assessment of the technology.

• Requirements definition – Erroneous, incomplete,

or inconsistent requirements.

• System design – Fundamental

misconceptions or flaws.

• Implementation – Various errors.

• Support systems – Faulty or poor tools.

• System analysis – False assumptions or

erroneous models.

• Testing – Incomplete or erroneous

testing.

• Evolution – Sloppy maintenance and

upgrades.

• Decommission – Premature removal;

removal of components

used elsewhere.

Page 4: Sources of Risks CIT304 University of Sunderland.

Risks in Use

• Environment – Earthquakes, floods, fires, etc.

• Animals – E.g., squirrelcide.

• Infrastructure – Loss of power, air conditioning

• Hardware – Malfunction due to ageing or transients

• Software – Bugs

• Communications – Outages, interference, and jamming

• Human Limitations – Installation or misuse

Page 5: Sources of Risks CIT304 University of Sunderland.

Note Well…

• Risks are not just security…• By the way, security risks tend to be:– Mostly involving insiders– Mostly involving human behavior– Sometimes resulting from unwarranted assumptions

– Often are due to design errors or incomplete understanding of a system or technology

Page 6: Sources of Risks CIT304 University of Sunderland.

System Conceptualization

• Misunderstanding of the technology– Too far– Not far enough

• Cost overruns• Schedule overruns• Lack of FeasibilityExample—MIFASS (Marine Fire and Air Support System). The agency direction was to use a CPU somewhat slower than a first generation Apple II. There was no recovery.

Page 7: Sources of Risks CIT304 University of Sunderland.

Requirements Definition

• Erroneous requirements• Incomplete requirements• Inconsistent requirementsExtremely common and expensive. Missing requirements are the worst problem.

Page 8: Sources of Risks CIT304 University of Sunderland.

System Design

• Fundamentally false assumptions– E.g., infinite speed of light

• Erroneous modelsExample: the FAA’s Advance Automation System. The contractor assumed that the average statement in Ada generated 5 machine instructions (actually it was 10) and that the speed of a 10 MHz machine was (with parallelism) 20 MHz (actually it was 12 MHz). There was no recovery.

Page 9: Sources of Risks CIT304 University of Sunderland.

Implementation

• Various and varied.– Chip fabrication (Intel’s early Pentium chip)

– Wiring– Programming bugs– Trojan horses– Viruses

We will discuss this.

Page 10: Sources of Risks CIT304 University of Sunderland.

Support Systems

• Faulty or poor tools– Language choice– Compiler/debugger– Bad tools– Editing

CASE tools never met their expectations…Sometimes reflect failure to meet standards.Sometimes is deliberate on the part of a vendor.

Page 11: Sources of Risks CIT304 University of Sunderland.

System Analysis

• False assumptions about– World– Operating environment– Human behavior

• Erroneous models and simulationsPrototypes help here.

Page 12: Sources of Risks CIT304 University of Sunderland.

Testing

• Incomplete testing• Erroneous testing• Faulty code verificationWhat is a testable requirement? One way of dealing with this is Test-Driven Development (TDD), where you write the unit tests first. We teach this in CSE301.

Page 13: Sources of Risks CIT304 University of Sunderland.

Evolution

• Sloppy maintenance and upgrades.• Misconceptions• New flaws• Loss of design coherencyMaintenance organizations do not attract the best engineers. Design the system so it can be maintained by entry-level staff.

Page 14: Sources of Risks CIT304 University of Sunderland.

Decommission

• Premature removal.• Removal of components needed elsewhere.

• Hidden dependencies• Replacement not done in time• Hardware and software end of life

• Vendor profiteering

Page 15: Sources of Risks CIT304 University of Sunderland.

Environment

• Earthquake• Flood• Fire• Temperature extremes• EMI• Etc…

Page 16: Sources of Risks CIT304 University of Sunderland.

Animals

• Sharks (underwater cables)• Squirrels (enjoy fibre and cabling)• Monkeys (inquisitive)• Birds (watch your neighborhood telephone poles)

• Horses (enjoy practical jokes)• Cattle• Pigs• Etc.

Page 17: Sources of Risks CIT304 University of Sunderland.

Infrastructure

• Power• Air Conditioning• Physical Security

Page 18: Sources of Risks CIT304 University of Sunderland.

Hardware

• Ageing• Transients• Environmental problems• Errors in Design

Page 19: Sources of Risks CIT304 University of Sunderland.

Software

• Bugs of many sorts– System development– Change implementation– Maintenance

Page 20: Sources of Risks CIT304 University of Sunderland.

Communications

• Outages• Natural interference• Jamming

– Intentional– Accidental

• Tapping• Other

Page 21: Sources of Risks CIT304 University of Sunderland.

Human Error

• Installation• Misuse

– Intentional– Unintentional

Page 22: Sources of Risks CIT304 University of Sunderland.

Adverse Effects

• A myriadDiscuss…