Muutke küpsiste eelistusi

Hazard Analysis Techniques for System Safety 2nd edition [Kõva köide]

  • Formaat: Hardback, 640 pages, kõrgus x laius x paksus: 257x180x41 mm, kaal: 1247 g
  • Ilmumisaeg: 11-Aug-2015
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118940385
  • ISBN-13: 9781118940389
  • Formaat: Hardback, 640 pages, kõrgus x laius x paksus: 257x180x41 mm, kaal: 1247 g
  • Ilmumisaeg: 11-Aug-2015
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118940385
  • ISBN-13: 9781118940389

This book explains, in detail, how to perform the most commonly used hazard analysis techniques employed by the system safety engineering discipline. The book also explains when and why to use each technique. The goal of this book is to explain each technique with sufficient detail and examples that the techniques can be easily understood and performed by the reader. The book is not overly technical, and can be easily understood by readers with a minimal amount of technical background. This book gathers the techniques safety analysts can apply into one reference source and describes them in a way that benefits both new and seasoned safety analysts. In addition, this book describes the three components that comprise a hazard, and how to use these components to recognized hazards during an analysis. It includes detailed examples that apply the methodology to everyday problems, making the concepts easier for the reader to grasp.

The new edition updates the chapters with the latest information and includes new chapters on Concepts of Hazard Recognition, as well as chapters that address new techniques added in MIL-STD-882E and techniques that are becoming popular in different industries such as: Environmental Hazard Analysis, Process Hazard Analysis, Test Hazard Analysis, Job Hazard Analysis, and System of Systems Hazard Analysis

Preface xxi
Acknowledgments xxiii
1 System Safety and Hazard Analysis 1(9)
1.1 Introduction
1(1)
1.2 The Need for Hazard Analysis
2(1)
1.3 System Safety Background
3(1)
1.4 System Safety Overview
4(2)
1.5 System Safety Process
6(1)
1.6 System Safety Standards
7(1)
1.7 System Safety Principles
7(1)
1.8 Key Terms
8(1)
1.9 Summary
9(1)
2 Systems 10(18)
2.1 System Concept
10(2)
2.2 System Attributes
12(1)
2.3 System Types
13(1)
2.4 System Life Cycle
13(2)
2.5 System Development
15(1)
2.6 System Development Process
16(1)
2.7 System Hierarchy
16(2)
2.8 System Views
18(1)
2.9 System Development Artifacts
19(1)
2.10 Systems Complexity and Safety
20(1)
2.11 System Requirements
21(5)
2.12 System Laws
26(1)
2.13 Summary
26(2)
3 Hazards, Mishap, and Risk 28(17)
3.1 Introduction
28(1)
3.2 Hazard, Mishap, and Risk Definitions
29(1)
3.3 Accident (Mishap) Theory
30(1)
3.4 The Hazard-Mishap Relationship
31(2)
3.5 Hazard Risk
33(1)
3.6 The Components of a Hazard
33(2)
3.7 Hazard Triangle
35(1)
3.8 Hazard Actuation
35(2)
3.9 Hazard Causal Factors
37(2)
3.10 Hazard-Mishap Probability Example
39(1)
3.11 Recognizing Hazards
40(3)
3.12 Hazard Description
43(1)
3.13 Hazard Theory Summary
43(2)
4 Hazard Analysis Features 45(24)
4.1 Introduction
45(1)
4.2 Types Versus Technique
46(2)
4.3 Description of Hazard Analysis Types
48(9)
4.3.1 Conceptual Design Hazard Analysis Type
48(1)
4.3.2 Preliminary Design Hazard Analysis Type
49(2)
4.3.3 Detailed Design Hazard Analysis Type
51(1)
4.3.4 System Design Hazard Analysis Type
52(1)
4.3.5 Operations Design Hazard Analysis Type
53(1)
4.3.6 Human Health Design Hazard Analysis Type (HD-HAT)
54(1)
4.3.7 Requirements Design Hazard Analysis Type (RD-HAT)
55(2)
4.4 The Timing of Hazard Analysis Types
57(1)
4.5 The Interrelationship of Hazard Analysis Types
57(2)
4.6 Hazard Analysis Techniques
59(1)
4.7 Hazard Analysis Technique Attributes
59(1)
4.8 Primary and Secondary Techniques
59(4)
4.9 Inductive and Deductive Techniques
63(2)
4.10 Qualitative and Quantitative Techniques
65(2)
4.11 Summary
67(2)
5 Hazard Recognition and Management 69(24)
5.1 Introduction
69(1)
5.2 Hazard Analysis Tasks
69(5)
5.2.1 Plan the Hazard Analysis
70(1)
5.2.2 Understand the System Design
71(1)
5.2.3 Acquire Hazard Analysis Tools
71(1)
5.2.4 Identify Hazards
72(1)
5.2.5 Validate Hazards
72(1)
5.2.6 Assess Risk
72(1)
5.2.7 Mitigate Risk
72(1)
5.2.8 Verify Mitigation
73(1)
5.2.9 Accept Risk
73(1)
5.2.10 Track Hazards
73(1)
5.3 Hazard Recognition
74(5)
5.3.1 Hazard Recognition Introduction
74(1)
5.3.2 Hazard Recognition: System Perspectives
74(1)
5.3.3 Hazard Recognition: Failure Perspectives
75(1)
5.3.4 Key Hazard Recognition Factors
76(3)
5.3.5 Hazard Recognition Basics
79(1)
5.3.6 Hazard Recognition Sources
79(1)
5.4 Describing the Identified Hazard
79(2)
5.5 Hazard Types by General Circumstances
81(1)
5.6 Hazard Types by Analysis Category
82(1)
5.7 Modelling Hazard Space
83(9)
5.7.1 System Mishap Model
84(3)
5.7.2 System Mishap Model Examples
87(5)
5.8 Summary
92(1)
6 Functional Hazard Analysis 93(16)
6.1 FHA Introduction
93(1)
6.2 FHA Background
93(1)
6.3 FHA History
94(1)
6.4 FHA Theory
94(1)
6.5 FHA Methodology
95(1)
6.6 FHA Worksheets
96(3)
6.7 FHA Example 1: Aircraft Flight Functions
99(1)
6.8 FHA Example 2: Aircraft Landing Gear Software
99(3)
6.9 FHA Example 3: Ace Missile System
102(3)
6.10 FHA Advantages and Disadvantages
105(1)
6.11 Common FHA Mistakes to Avoid
105(3)
6.12 FHA Summary
108(1)
7 Preliminary Hazard List Analysis 109(16)
7.1 PHL Introduction
109(1)
7.2 PHL Background
109(1)
7.3 PHL History
110(1)
7.4 PHL Theory
110(1)
7.5 PHL Methodology
111(3)
7.6 PHL Worksheet
114(1)
7.7 Hazard Checklists
115(2)
7.8 PHL Guidelines
117(1)
7.9 PHL Example: Ace Missile System
118(3)
7.10 PHL Advantages and Disadvantages
121(1)
7.11 Common PHL Mistakes to Avoid
122(2)
7.12 PHL Summary
124(1)
8 Preliminary Hazard Analysis 125(20)
8.1 PHA Introduction
125(1)
8.2 PHA Background
125(1)
8.3 PHA History
126(1)
8.4 PHA Theory
126(1)
8.5 PHA Methodology
127(3)
8.6 PHA Worksheet
130(2)
8.7 PHA Guidelines
132(1)
8.8 PHA Example: Ace Missile System
133(3)
8.9 PHA Advantages and Disadvantages
136(1)
8.10 Common PHA Mistakes to Avoid
136(7)
8.11 PHA Summary
143(2)
9 Subsystem Hazard Analysis 145(19)
9.1 SSHA Introduction
145(1)
9.2 SSHA Background
145(1)
9.3 SSHA History
146(1)
9.4 SSHA Theory
146(1)
9.5 SSHA Methodology
147(2)
9.6 SSHA Worksheet
149(2)
9.7 SSHA Guidelines
151(1)
9.8 SSHA Example: Ace Missile System
152(4)
9.9 SSHA Advantages and Disadvantages
156(1)
9.10 Common SSHA Mistakes to Avoid
156(6)
9.11 SSHA Summary
162(2)
10 System Hazard Analysis 164(13)
10.1 SHA Introduction
164(1)
10.2 SHA Background
165(1)
10.3 SHA History
166(1)
10.4 SHA Theory
166(1)
10.5 SHA Methodology
167(1)
10.6 SHA Worksheet
167(3)
10.7 SHA Guidelines
170(2)
10.8 SHA Example
172(3)
10.9 SHA Advantages and Disadvantages
175(1)
10.10 Common SHA Mistakes to Avoid
175(1)
10.11 SHA Summary
176(1)
11 Operating and Support Hazard Analysis 177(22)
11.1 O&SHA Introduction
177(1)
11.2 O&SHA Background
177(1)
11.3 O&SHA History
178(1)
11.4 O&SHA Definitions
179(1)
11.4.1 Operation
179(1)
11.4.2 Procedure
179(1)
11.4.3 Task
179(1)
11.5 O&SHA Theory
180(1)
11.6 O&SHA Methodology
181(2)
11.7 O&SHA Worksheet
183(2)
11.8 O&SHA Hazard Checklists
185(1)
11.9 O&SHA Support Tools
186(1)
11.10 O&SHA Guidelines
187(1)
11.11 O&SHA Examples
188(10)
11.11.1 Example 1
188(1)
11.11.2 O&SHA Example 2
188(10)
11.12 O&SHA Advantages and Disadvantages
198(1)
11.13 Common O&SHA Mistakes to Avoid
198(1)
11.14 Summary
198(1)
12 Health Hazard Analysis 199(13)
12.1 HHA Introduction
199(1)
12.2 HHA Background
199(1)
12.3 HHA History
200(1)
12.4 HHA Theory
200(1)
12.5 HHA Methodology
201(3)
12.6 HHA Worksheet
204(2)
12.7 Human Health Hazard Checklist
206(1)
12.8 HHA Example
207(1)
12.9 HHA Advantages and Disadvantages
207(1)
12.10 Common HHA Mistakes to Avoid
207(4)
12.11 Summary
211(1)
13 Requirements Hazard Analysis 212(12)
13.1 RHA Introduction
212(1)
13.2 RHA Background
212(1)
13.3 RHA History
213(1)
13.4 RHA Theory
213(1)
13.5 RHA Methodology
214(1)
13.6 RHA Worksheets
214(3)
13.7 RHA Example
217(5)
13.8 RHA Advantages and Disadvantages
222(1)
13.9 Common RHA Mistakes to Avoid
222(1)
13.10 Summary
222(2)
14 Environmental Hazard Analysis (EHA) 224(16)
14.1 EHA Introduction
224(1)
14.2 EHA Background
225(1)
14.3 EHA History
226(1)
14.4 EHA Theory
226(1)
14.5 EHA Methodology
227(3)
14.6 EHA Worksheet
230(2)
14.7 Example Checklists
232(1)
14.8 EHA Example
233(1)
14.9 EHA Advantages and Disadvantages
233(4)
14.10 Common EHA Mistakes to Avoid
237(1)
14.11 Summary
237(1)
14.12 References
237(1)
14.13 National Environmental Policy Act
237(1)
14.14 Environmental Protection Agency
238(2)
15 Fault Tree Analysis 240(38)
15.1 FTA Introduction
240(2)
15.2 FTA Background
242(1)
15.3 FTA History
243(1)
15.4 FTA Theory
243(1)
15.5 FTA Methodology
244(9)
15.5.1 FT Building Blocks
245(2)
15.5.2 FT Definitions
247(1)
15.5.3 FT Construction: Basics
248(3)
15.5.4 FT Construction: Advanced
251(1)
15.5.5 FT Construction Rules
252(1)
15.6 Functional Block Diagrams
253(1)
15.7 FT Cut Sets
254(1)
15.8 MOCUS Algorithm
254(2)
15.9 Bottom-Up Algorithm
256(1)
15.10 FT Mathematics
256(2)
15.10.1 Probability of Success
256(1)
15.10.2 Probability of Failure
256(1)
15.10.3 Boolean Rules for FTA
256(1)
15.10.4 AND Gate Probability Expansion
257(1)
15.10.5 OR Gate Probability Expansion
257(1)
15.10.6 FT Probability Expansion
257(1)
15.10.7 Inclusion—Exclusion Approximation
257(1)
15.11 Probability
258(1)
15.12 Importance Measures
259(3)
15.12.1 Cut Set Importance
260(1)
15.12.2 Fussell—Vesely Importance
260(1)
15.12.3 Risk Reduction Worth
261(1)
15.12.4 Risk Achievement Worth
261(1)
15.12.5 Birnbaum's Importance Measure
261(1)
15.13 FT Example 1
262(1)
15.14 FT Example 2
262(9)
15.15 FT Example 3
271(1)
15.16 Phase- and Time-Dependent FTA
271(3)
15.17 Dynamic FTA
274(1)
15.18 FTA Advantages and Disadvantages
275(1)
15.19 Common FTA Mistakes to Avoid
276(1)
15.20 Summary
276(2)
16 Failure Mode and Effects Analysis 278(22)
16.1 FMEA Introduction
278(1)
16.2 FMEA Background
278(1)
16.3 FMEA History
279(1)
16.4 FMEA Definitions
280(1)
16.5 FMEA Theory
281(5)
16.5.1 FMEA Structural and Functional Models
283(1)
16.5.2 FMEA Product and Process FMEA
283(1)
16.5.3 FMEA Functional Failure Modes
283(1)
16.5.4 FMEA Hardware Failure Modes
284(1)
16.5.5 FMEA Software Failure Modes
285(1)
16.5.6 Quantitative Data Sources
286(1)
16.6 Methodology
286(3)
16.7 FMEA Worksheet
289(3)
16.8 FMEA Example 1: Hardware Product FMEA
292(1)
16.9 FMEA Example 3: Functional FMEA
292(3)
16.10 FMEA Level of Detail
295(3)
16.11 FMEA Advantages and Disadvantages
298(1)
16.12 Common FMEA Mistakes to Avoid
298(1)
16.13 FMEA Summary
298(2)
17 Hazard and Operability (HAZOP) Analysis 300(16)
17.1 Introduction
300(1)
17.2 HAZOP Analysis Background
301(1)
17.3 HAZOP History
301(1)
17.4 HAZOP Theory
302(1)
17.5 HAZOP Methodology
303(6)
17.5.1 Design Representations
305(1)
17.5.2 System Parameters
305(1)
17.5.3 Guide Words
306(1)
17.5.4 Deviation from Design Intent
307(2)
17.6 HAZOP Worksheet
309(1)
17.7 HAZOP Example 1
310(1)
17.8 HAZOP Example 2
311(1)
17.9 HAZOP Advantages and Disadvantages
311(2)
17.10 Common HAZOP Analysis Mistakes to Avoid
313(1)
17.11 HAZOP Summary
313(3)
18 Event Tree Analysis (ETA) 316(11)
18.1 ETA Introduction
316(1)
18.2 ETA Background
316(1)
18.3 ETA History
317(1)
18.4 ETA Definitions
317(1)
18.5 ETA Theory
318(2)
18.6 ETA Methodology
320(3)
18.7 ETA Worksheet
323(1)
18.8 ETA Example 1
323(1)
18.9 ETA Example 2
323(1)
18.10 ETA Example 3
324(1)
18.11 ETA Example 4
324(1)
18.12 ETA Advantages and Disadvantages
324(1)
18.13 Common ETA Mistakes to Avoid
325(1)
18.14 Summary
326(1)
19 Cause—Consequence Analysis 327(12)
19.1 Introduction
327(1)
19.2 CCA Background
327(1)
19.3 CCA History
328(1)
19.4 CCA Definitions
328(1)
19.5 CCA Theory
329(1)
19.6 CCA Methodology
330(1)
19.7 CCD Symbols
331(1)
19.8 CCA Worksheet
332(1)
19.9 CCA Example 1: Three-Component Parallel System
332(1)
19.10 CCA Example 2: Gas Pipeline System
333(4)
19.10.1 Reducing Repeated Events
335(2)
19.11 CCA Advantages and Disadvantages
337(1)
19.12 Common CCA Mistakes to Avoid
338(1)
19.13 Summary
338(1)
20 Common Cause Failure Analysis 339(24)
20.1 Introduction
339(1)
20.2 CCFA Background
340(1)
20.3 CCFA History
340(1)
20.4 CCFA Definitions
341(3)
20.4.1 Independent Event
341(1)
20.4.2 Dependent Event
341(1)
20.4.3 Independence (in Design)
341(1)
20.4.4 Dependence (in Design)
341(1)
20.4.5 Common Cause Failure
342(1)
20.4.6 Common Mode Failure
342(1)
20.4.7 Cascading Failure
343(1)
20.4.8 Mutually Exclusive Events
343(1)
20.4.9 CCF Root Cause
343(1)
20.4.10 CCF Coupling Factor
343(1)
20.4.11 Common Cause Component Group
343(1)
20.5 CCFA Theory
344(2)
20.6 CCFA Methodology
346(8)
20.6.1 CCFA Process Step 2: Initial System Fault Tree Model
347(1)
20.6.2 CCFA Process Step 3: Common Cause Screening
348(3)
20.6.3 CCFA Process Step 4: Detailed CCF Analysis
351(3)
20.7 CCF Defense Mechanisms
354(1)
20.8 CCFA Example
354(4)
20.9 CCFA Models
358(1)
20.10 CCFA Advantages and Disadvantages
359(1)
20.11 Common CCFA Mistakes to Avoid
360(1)
20.12 Summary
361(2)
21 Software Hazard Analysis 363(18)
21.1 SwHA Introduction
363(1)
21.2 SwHA Background
364(1)
21.3 SwHA History
365(1)
21.4 SwHA Theory
365(1)
21.5 SwHA Methodology
366(1)
21.6 SwHA Worksheet
367(1)
21.7 Software Criticality Level
368(1)
21.8 SwHA Example
369(7)
21.9 Software Fault Tree Analysis
376(1)
21.10 SwHA Advantages and Disadvantages
377(2)
21.11 SwHA Mistakes to Avoid
379(1)
21.12 SwHA Summary
379(2)
22 Process Hazard Analysis 381(9)
22.1 PHA Introduction
381(1)
22.2 PHA Background
381(1)
22.3 PHA History
382(1)
22.4 Processing Mishaps
382(1)
22.5 Process Safety Management
383(1)
22.6 PHA Theory
384(1)
22.7 PHA Methodology
385(1)
22.8 PHA Worksheet
386(1)
22.9 Supporting Notes
387(1)
22.10 PHA Advantages and Disadvantages
388(1)
22.11 Common PHA Mistakes to Avoid
389(1)
22.12 Summary
389(1)
23 Test Hazard Analysis 390(16)
23.1 THA Introduction
390(1)
23.2 THA Background
390(1)
23.3 THA History
391(1)
23.4 THA Theory
391(2)
23.5 THA Methodology
393(1)
23.6 THA Worksheet
394(1)
23.7 THA Considerations
395(1)
23.7.1 Verification
395(1)
23.7.2 Validation
395(1)
23.8 Testing in the System Development Life Cycle
396(1)
23.9 Types of Testing
397(1)
23.9.1 Standard Development Test Types
397(1)
23.9.2 Performance Tests
397(1)
23.9.3 Software Performance Tests
397(1)
23.9.4 Special Safety-Related Testing
398(1)
23.10 THA Safety Goals
398(6)
23.11 THA Advantages and Disadvantages
404(1)
23.12 Common THA Mistakes to Avoid
404(1)
23.13 Summary
404(2)
24 Fault Hazard Analysis 406(10)
24.1 FHA Introduction
406(1)
24.2 FHA Background
406(1)
24.3 FHA History
407(1)
24.4 FHA Theory
407(1)
24.5 FHA Methodology
408(2)
24.6 FHA Worksheet
410(1)
24.7 FHA Example
411(3)
24.8 FHA Advantages and Disadvantages
414(1)
24.9 Common FHA Mistakes to Avoid
414(1)
24.10 Summary
414(2)
25 Sneak Circuit Analysis 416(14)
25.1 SCA Introduction
416(1)
25.2 SCA Background
417(1)
25.3 SCA History
418(1)
25.4 SCA Definitions
418(1)
25.5 SCA Theory
419(1)
25.6 SCA Methodology
419(5)
25.6.1 Step 1: Acquire Data
420(1)
25.6.2 Step 2: Code Data
421(1)
25.6.3 Step 3: Process Data
421(1)
25.6.4 Step 4: Produce Network Trees
422(1)
25.6.5 Step 5: Identify Topographs
422(1)
25.6.6 Step 6: Perform Analysis
423(1)
25.6.7 Step 7: Generate SCA Report
424(1)
25.7 Example 1: Sneak Path
424(1)
25.8 Example 2: Sneak Label
425(1)
25.9 Example 3: Sneak Indicator
425(1)
25.10 Example Sneak Clues
425(1)
25.11 Software Sneak Circuit Analysis
425(3)
25.12 SCA Advantages and Disadvantages
428(1)
25.13 Common SCA Mistakes to Avoid
428(1)
25.14 Summary
429(1)
26 Markov Analysis 430(16)
26.1 MA Introduction
430(1)
26.2 MA Background
430(1)
26.3 MA History
431(1)
26.4 MA Definitions
431(1)
26.5 MA Theory
432(2)
26.6 MA Methodology
434(4)
26.6.1 State Transition Diagram Construction
434(2)
26.6.2 State Equation Construction
436(2)
26.7 MA Examples
438(3)
26.7.1 Markov Chain
438(1)
26.7.2 Markov Model of Two-Component Series System with No Repair
438(1)
26.7.3 Markov Model of Two-Component Parallel System with No Repair
439(1)
26.7.4 Markov Model of Two-Component Parallel System with Component Repair
439(1)
26.7.5 Markov Model of Two-Component Parallel System with Component/System Repair
440(1)
26.7.6 Markov Model of Two-Component Parallel System with Sequencing
440(1)
26.8 MA and FTA Comparisons
441(1)
26.9 MA Advantages and Disadvantages
442(3)
26.10 Common MA Mistakes to Avoid
445(1)
26.11 Summary
445(1)
27 Petri Net Analysis 446(10)
27.1 PNA Introduction
446(1)
27.2 PNA Background
447(1)
27.3 PNA History
447(1)
27.4 PNA Definitions
448(1)
27.5 PNA Theory
448(4)
27.6 PNA Methodology
452(1)
27.7 PNA Example
452(1)
27.8 PNA Advantages and Disadvantages
453(1)
27.9 Common PNA Mistakes to Avoid
454(1)
27.10 Summary
454(2)
28 Barrier Analysis 456(15)
28.1 BA Introduction
456(1)
28.2 BA Background
456(1)
28.3 BA History
457(1)
28.4 BA Definitions
457(1)
28.4.1 Energy Source
458(1)
28.4.2 Energy Path
458(1)
28.4.3 Energy Barrier
458(1)
28.5 BA Theory
458(1)
28.6 BA Methodology
459(6)
28.6.1 Example Checklist of Energy Sources for BA
460(3)
28.6.2 BA Considerations
463(2)
28.7 BA Worksheet
465(2)
28.8 BA Example
467(2)
28.9 BA Advantages and Disadvantages
469(1)
28.10 Common Barrier Analysis Mistakes to Avoid
469(1)
28.11 Summary
470(1)
29 Bent Pin Analysis 471(12)
29.1 BPA Introduction
471(1)
29.2 BPA Background
471(1)
29.3 BPA History
472(1)
29.4 BPA Theory
472(2)
29.5 BPA Methodology
474(1)
29.6 BPA Worksheet
474(2)
29.7 BPA Example
476(2)
29.8 BPA Advantages and Disadvantages
478(1)
29.9 Common BPA Mistakes to Avoid
478(4)
29.10 Summary
482(1)
30 Management Oversight Risk Tree Analysis 483(7)
30.1 Introduction To MORT Analysis
483(1)
30.2 MORT Background
483(1)
30.3 MORT History
484(1)
30.4 MORT Theory
484(1)
30.5 MORT Methodology
485(1)
30.6 MORT Analysis Worksheet
486(1)
30.7 MORT Advantages and Disadvantages
487(2)
30.8 Common MORT Analysis Mistakes to Avoid
489(1)
30.9 MORT Summary
489(1)
31 Job Hazard Analysis 490(16)
31.1 JHA Introduction
490(1)
31.2 JHA Background
491(1)
31.3 JHA History
492(1)
31.4 JHA Theory
492(1)
31.5 JHA Methodology
493(4)
31.6 JHA Worksheet
497(2)
31.7 Example Hazard Checklist
499(2)
31.8 JHA Tool
501(1)
31.9 JHA Example
502(1)
31.10 JHA Advantages and Disadvantages
502(3)
31.11 Common JHA Mistakes to Avoid
505(1)
31.12 Summary
505(1)
32 Threat Hazard Analysis 506(14)
32.1 THA Introduction
506(1)
32.2 THA Background
506(1)
32.3 THA History
507(1)
32.4 THA Theory
507(2)
32.5 THA Methodology
509(2)
32.5.1 Cradle-to-Grave Sequences
509(1)
32.5.2 Threat Scenarios
510(1)
32.5.3 Characterization of Environments
511(1)
32.5.4 Threats
511(1)
32.6 THA Worksheet
511(4)
32.7 THA Example
515(3)
32.8 THA Advantages and Disadvantages
518(1)
32.9 Common THA Mistakes to Avoid
518(1)
32.10 Summary
518(2)
33 System of Systems Hazard Analysis 520(17)
33.1 SoSHA Introduction
520(1)
33.2 SoSHA Background
521(1)
33.3 SoSHA History
522(1)
33.4 SoS Theory
522(4)
33.5 SoS Safety and Hazards
526(2)
33.6 SoSHA Tools
528(3)
33.6.1 SMM
528(2)
33.6.2 SoS Component System Matrix
530(1)
33.7 SoSHA Methodology
531(2)
33.8 SoSHA Example
533(1)
33.9 SoSHA Worksheet
534(1)
33.10 SoSHA Guidelines
535(1)
33.11 SoSHA Advantages and Disadvantages
535(1)
33.12 Common SoSHA Mistakes to Avoid
535(1)
33.13 Summary
536(1)
34 Summary 537(12)
34.1 Tenets of Hazard Analysis
537(1)
34.2 Description of Tenets
538(9)
34.2.1 Hazards and Mishaps are Not Chance Events; Hazards Lead to Mishaps If Left Unchecked
538(1)
34.2.2 Hazards are Created During System Design and Exist with the Design
538(1)
34.2.3 Hazards are Comprised of Three Components: HA, IMs, and TTO
539(1)
34.2.4 Many Hazards Cannot be Eliminated due to the Hazard Sources that are Required by the System
540(1)
34.2.5 Hazards Present Risk; Risk is the Metric for Measuring the Criticality or Danger Level of a Hazard
541(1)
34.2.6 Hazards can be Modified via Design Methods, which in Turn can Reduce Risk
541(2)
34.2.7 Hazard Analysis is the Key to Preventing Mishaps; Hazard Identification and Mitigation Reduce Mishap Risk
543(1)
34.2.8 The System Mishap Model is an Effective Hazard Analysis Tool
543(1)
34.2.9 Hazard Analysis and Hazard Descriptions can Easily Become Abused, Confused, and/or Misused
544(1)
34.2.10 Utilizing More than One Hazard Analysis Technique is Recommended
544(1)
34.2.11 Hazard Mitigation is not Hazard Elimination
545(1)
34.2.12 Hazard Risk is the Same as Mishap Risk
546(1)
34.2.13 There are Both Primary and Secondary Hazard Analysis Techniques
546(1)
34.2.14 There are Pseudo-Hazards and Real Hazards
546(1)
34.3 FINIS
547(2)
Appendix A List of Acronyms 549(3)
Appendix B Glossary 552(15)
Appendix C Hazard Checklists 567(42)
Appendix D References 609(4)
Index 613
Clifton Ericson II has over 45 years of experience in the field of system safety, software safety and fault tree analysis. He currently works for URS Corporation (formerly EG&G). Mr. Ericson was President of the System Safety Society (2001-2003. Mr. Ericson won the System Safety Society's Presidents Achievement Award in 1998, 1999 and 2004 for outstanding work in the system safety field. Mr. Ericson is author of the book Hazard Analysis Techniques for System Safety and Concise Encyclopedia of System Safety both published by Wiley. He has prepared and presented training courses in system safety and software safety in the U.S., Singapore and Australia and has presented numerous technical papers at safety conferences.