{"id":245593,"date":"2024-10-19T16:09:14","date_gmt":"2024-10-19T16:09:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-61069-52016-tc\/"},"modified":"2024-10-25T11:09:42","modified_gmt":"2024-10-25T11:09:42","slug":"bs-en-61069-52016-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-61069-52016-tc\/","title":{"rendered":"BS EN 61069-5:2016 – TC"},"content":{"rendered":"
IEC 61069-5:2016 specifies the detailed method of the assessment of dependability of a basic control system (BCS) based on the basic concepts of IEC 61069-1 and methodology of IEC 61069-2, defines basic categorization of dependability properties, describes the factors that influence dependability and which need to be taken into account when evaluating dependability, and provides guidance in selecting techniques from a set of options (with references) for evaluating the dependability. This second edition cancels and replaces the first edition published in 1994. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: – reorganization of the material of IEC 61069-5:1994 to make the overall set of standards more organized and consistent; – IEC TS 62603-1 has been incorporated into this edition.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
62<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Annex ZA (normative) Normative references to international publications with their corresponding European publications <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Figure 1 \u2013 General layout of IEC\u00a061069 <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 3 Terms, definitions, abbreviated terms, acronyms, conventions and symbols 3.1 Terms and definitions 3.2 Abbreviated terms, acronyms, conventions and symbols 4 Basis of assessment specific to dependability 4.1 Dependability properties 4.1.1 General Figure 2 \u2013 Dependability <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 4.1.2 Availability 4.1.3 Reliability 4.1.4 Maintainability <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 4.1.5 Credibility 4.1.6 Security <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 4.1.7 Integrity 4.2 Factors influencing dependability 5 Assessment method 5.1 General 5.2 Defining the objective of the assessment <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 5.3 Design and layout of the assessment 5.4 Planning of the assessment program 5.5 Execution of the assessment 5.6 Reporting of the assessment 6 Evaluation techniques 6.1 General <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 6.2 Analytical evaluation techniques 6.2.1 Overview <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 6.2.2 Inductive analysis 6.2.3 Deductive analysis 6.2.4 Predictive evaluation <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 6.3 Empirical evaluation techniques 6.3.1 Overview 6.3.2 Tests by fault-injection techniques <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 6.3.3 Tests by environmental perturbations 6.4 Additional topics for evaluation techniques <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | Annex A (informative) Checklist and\/or example of SRD for system dependability <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | Annex B (informative) Checklist and\/or example of SSD for system dependability B.1 SSD information B.2 Check points for system dependability <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | Annex C (informative) An example of a list of assessment items (information from IEC TS 62603-1) C.1 Overview C.2 Dependability C.3 Availability C.3.1 System self-diagnostics C.3.2 Single component fault tolerance and redundancy <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | C.3.3 Redundancy methods <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | C.4 Reliability <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | C.5 Maintainability C.5.1 General C.5.2 Generation of maintenance requests C.5.3 Strategies for maintenance C.5.4 System software maintenance C.6 Credibility <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | C.7 Security C.8 Integrity C.8.1 General C.8.2 Hot-swap C.8.3 Module diagnostic C.8.4 Input validation C.8.5 Read-back function C.8.6 Forced output C.8.7 Monitoring functions C.8.8 Controllers <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | C.8.9 Networks C.8.10 Workstations and servers <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Annex D (informative) Credibility tests D.1 Overview <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | D.2 Injected faults D.2.1 General D.2.2 System failures due to a faulty module, element or component D.2.3 System failures due to human errors D.2.4 System failures resulting from incorrect or unauthorized inputs into the system through the man-machine interface <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | D.3 Observations D.4 Interpretation of the results <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | Annex E (informative) Available failure rate databases E.1 Databases <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | E.2 Helpful standards concerning component failure <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | Annex F (informative) Security considerations F.1 Physical security F.2 Cyber-security F.2.1 General F.2.2 Security policy F.2.3 Other considerations <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Industrial-process measurement, control and automation. Evaluation of system properties for the purpose of system assessment – Assessment of system dependability<\/b><\/p>\n |