BS EN 61069-5:2016 – TC:2020 Edition
$217.84
Tracked Changes. Industrial-process measurement, control and automation. Evaluation of system properties for the purpose of system assessment – Assessment of system dependability
Published By | Publication Date | Number of Pages |
BSI | 2020 | 100 |
IEC 61069-5:2016 specifies the detailed method of the assessment of dependability of a basic control system (BCS) based on the basic concepts of IEC 61069-1 and methodology of IEC 61069-2, defines basic categorization of dependability properties, describes the factors that influence dependability and which need to be taken into account when evaluating dependability, and provides guidance in selecting techniques from a set of options (with references) for evaluating the dependability. This second edition cancels and replaces the first edition published in 1994. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: – reorganization of the material of IEC 61069-5:1994 to make the overall set of standards more organized and consistent; – IEC TS 62603-1 has been incorporated into this edition.
PDF Catalog
PDF Pages | PDF Title |
---|---|
62 | European foreword Endorsement notice |
64 | Annex ZA (normative) Normative references to international publications with their corresponding European publications |
65 | English CONTENTS |
67 | FOREWORD |
69 | INTRODUCTION |
70 | Figure 1 – General layout of IEC 61069 |
71 | 1 Scope 2 Normative references |
72 | 3 Terms, definitions, abbreviated terms, acronyms, conventions and symbols 3.1 Terms and definitions 3.2 Abbreviated terms, acronyms, conventions and symbols 4 Basis of assessment specific to dependability 4.1 Dependability properties 4.1.1 General Figure 2 – Dependability |
73 | 4.1.2 Availability 4.1.3 Reliability 4.1.4 Maintainability |
74 | 4.1.5 Credibility 4.1.6 Security |
75 | 4.1.7 Integrity 4.2 Factors influencing dependability 5 Assessment method 5.1 General 5.2 Defining the objective of the assessment |
76 | 5.3 Design and layout of the assessment 5.4 Planning of the assessment program 5.5 Execution of the assessment 5.6 Reporting of the assessment 6 Evaluation techniques 6.1 General |
77 | 6.2 Analytical evaluation techniques 6.2.1 Overview |
78 | 6.2.2 Inductive analysis 6.2.3 Deductive analysis 6.2.4 Predictive evaluation |
79 | 6.3 Empirical evaluation techniques 6.3.1 Overview 6.3.2 Tests by fault-injection techniques |
80 | 6.3.3 Tests by environmental perturbations 6.4 Additional topics for evaluation techniques |
81 | Annex A (informative) Checklist and/or example of SRD for system dependability |
82 | Annex B (informative) Checklist and/or example of SSD for system dependability B.1 SSD information B.2 Check points for system dependability |
83 | Annex C (informative) An example of a list of assessment items (information from IEC TS 62603-1) C.1 Overview C.2 Dependability C.3 Availability C.3.1 System self-diagnostics C.3.2 Single component fault tolerance and redundancy |
84 | C.3.3 Redundancy methods |
85 | C.4 Reliability |
86 | C.5 Maintainability C.5.1 General C.5.2 Generation of maintenance requests C.5.3 Strategies for maintenance C.5.4 System software maintenance C.6 Credibility |
87 | C.7 Security C.8 Integrity C.8.1 General C.8.2 Hot-swap C.8.3 Module diagnostic C.8.4 Input validation C.8.5 Read-back function C.8.6 Forced output C.8.7 Monitoring functions C.8.8 Controllers |
88 | C.8.9 Networks C.8.10 Workstations and servers |
89 | Annex D (informative) Credibility tests D.1 Overview |
90 | D.2 Injected faults D.2.1 General D.2.2 System failures due to a faulty module, element or component D.2.3 System failures due to human errors D.2.4 System failures resulting from incorrect or unauthorized inputs into the system through the man-machine interface |
91 | D.3 Observations D.4 Interpretation of the results |
92 | Annex E (informative) Available failure rate databases E.1 Databases |
93 | E.2 Helpful standards concerning component failure |
94 | Annex F (informative) Security considerations F.1 Physical security F.2 Cyber-security F.2.1 General F.2.2 Security policy F.2.3 Other considerations |
96 | Bibliography |