Page 324 -
P. 324

Chapter 11   Exercises  307


                     EXERCISES

                          11.1. Suggest six reasons why software dependability is important in most sociotechnical
                               systems.
                          11.2. What are the most important dimensions of system dependability?
                          11.3. Why do the costs of assuring dependability increase exponentially as the reliability
                               requirement increases?
                          11.4. Giving reasons for your answer, suggest which dependability attributes are likely to be most
                               critical for the following systems:

                               An Internet server provided by an ISP with thousands of customers
                               A computer-controlled scalpel used in keyhole surgery
                               A directional control system used in a satellite launch vehicle

                               An Internet-based personal finance management system
                          11.5. Identify six consumer products that are likely to be controlled by safety-critical software
                               systems.

                          11.6. Reliability and safety are related but distinct dependability attributes. Describe the most
                               important distinction between these attributes and explain why it is possible for a reliable
                               system to be unsafe and vice versa.

                          11.7. In a medical system that is designed to deliver radiation to treat tumors, suggest one hazard
                               that may arise and propose one software feature that may be used to ensure that the
                               identified hazard does not result in an accident.
                          11.8. In computer security terms, explain the differences between an attack and a threat.
                          11.9. Using the MHC-PMS as an example, identify three threats to this system (in addition to the
                               threat shown in Figure 11.8). Suggest controls that might be put in place to reduce the
                               chances of a successful attack based on these threats.

                         11.10. As an expert in computer security, you have been approached by an organization that
                               campaigns for the rights of torture victims and have been asked to help the organization
                               gain unauthorized access to the computer systems of an American company. This will help
                               them confirm or deny that this company is selling equipment that is used directly in the
                               torture of political prisoners. Discuss the ethical dilemmas that this request raises and how
                               you would react to this request.
   319   320   321   322   323   324   325   326   327   328   329