100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Share Questions and Answers

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
17-09-2024
Written in
2024/2025

Share Questions and Answers ATSEP Air Traffic Safety Electronics Personnel. Eu373 regulations require a training programme to assess competence. Safety Management System Continually assessing risks. Proactive containment. In-line with regulator and safety goals. 0:04 / 0:15 ICAO definition of SMS Systematic approach to managing safety, including the necessary organisational structures, accountabilities, policies and procedures. SARPS Standards and Recommended Practices ESARR Definition of SMS A formalised, explicit and pro-active approach to systematic safety management in meeting its safety responsibilities within the provision of ATM services. Air Traffic Service Risk Statement Risk of causing or contributing to an aircraft accident. ALARP Meaning As Low As Reasonably Practicable. Mitigate the risk to Low. Seven Stage Assessment Process System Description, Hazard ID, Estimate Severity, Assess Likelihood, Evaluate Risk, Mitigate Risk, Safety Case Synonym for Risk Classification Scheme Tolerability Matrix Three Safety Management Regulation Authorities ICAO (International), EASA (Europe)/ESARR (Eurocontrol Safety Regulatory Requirement), CAA (Uk state) What does PANS stands for in ICAO? Procedures for Air Navigational Services. European Safety Management Regulation Key Docs Implementing Rules - EC 2017/373, ESARR 1-6, Standards and Guidelines such as ED109. UK CAA Docs for Safety Management Regs CAP 670, CAP 1649 ATSEP and Competence. What does AMC stand for? Acceptable Means of Compliance. Nats Definition of SMS? A systematic and explicit approach to managing safety risk. Three types of Safety Management Assurance Approaches Reactive, Proactive and Predictive. Combine all for the best approach. What is Risk? Likelihood times by Consequence (Severity) Hierarchy of Controls list Elimination, Substitution, Engineering Controls, Admin Controls, PPE. Should be undertaken before ATSEP undertakes task Task Specific Risk Assessment Potential to cause harm Hazard Risk Matrix also known as Tolerability Matrix Likelihood x Consequence Risk Risk of Causing or Contributing to an aircraft incident Air Traffic Service Risk Just Culture organizational culture that accepts people make mistakes and creates an atmosphere of fairness within an environment of responsibility. First Stage of Safety Assessment System Description Safety Oversight is normally The State's Responsibility Three types of Safety Management Strategies Reactive, Proactive and Predictive NATS Safety Management System Statement 'A systematic and explicit approach to managing safety Types of NOTAM NOTAM, SNOWTAM, ASHTAM, BIRDTAM What does TFR mean in relation to a NOTAM Temporary Flight Restrictions What does CIA stand for in Information System Sec? Confidentiality, Integrity and Availability 7 Cyber Kill Chain Sequence Recon, Weaponise, Deliver, Exploit, Install, Command and Control, Action Objectives. What does SHELL stand for? System context - ICAO Model for Human Factor Framework Software, Hardware, Environment and Liveware. What is a DMZ? Information System Security An isolated network between a private network and the internet, restricting outside access to internal servers and data. Name a Information Security Framework Standard ISO 27001 Name 6 parts of the planning process for ISO 27001 Define a Sec Policy, Define the Scope of the ISMS, Conduct a Risk Assessment, Manage Identified Assessment, Select Control Objectives and Controls to be implemented and Prepare a statement of Applicability. 4 Risk Treatment Methods for ISS Modify, Avoid, Share, Retain What is Malware? Software that is specifically designed to disrupt, damage, or gain unauthorized to a computer What is the capacity of short term memory? 7 +/- 2 Name the layers of Maslow's Hierarchy of Needs Physiological, Safety, Love/Belonging, Esteem, and Self Actualisation. How do we communicate? Verbal (Spoken and Written), Para Linguistic (Sounds of Disapproval), Non Verbal, and Visual. 4 Things that define a System People, Equipment, Training, Procedures. Organisation and Physical Environment encompass them What does CISM mean? Critical Incident Stress Management Collective measures for Working at Height Avoid, Prevent, Protect. In which areas of our business can Risk Mitigation be employed System, Procedural, People. What is an Audible way but not verbal for Communication? Para Linguistic. What does TRM stand for? Team Resource Management What does an IDS do? Device or App that analyses entire Packet that enters the system. Logs details about Malicious Packets. What does an IPS do? (Intrusion Prevention System) Same function as IDS but blocks the packet rather than Log the event. Difference between IPS and Firewall Firewall scans the header, looks for specific info rather than the entire packet which is what IPS does. Application Security meaning Process of developing, adding and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. 4 processes that happen with App Sec Authentication, Authorisation, Encryption, Logging. Network Security Meaning Any activity designed to protect the usability and integrity of a network and its data. This includes hardware and software technologies. Network security manages access to the network as well as targets a variety of threats, stops them entering or spreading through the network. What is a Business Continuity Plan (BCP)? Plan to recover the business from an Incident. What is a Disaster Recovery Plan? Recovery of a business after a crisis. 4 Elements of a BCP Business Impact Analysis, Recovery, Organisation, Training Physical Security Biometric, Locks, Cameras, Sec Pass, Barriers. 4 Types of Security Managerial Personnel Senior Leadership, Data Custodian, Sec Admin, Sec Analyst. Aim of Human Factors Make interaction between human and system so it can improve system performance, Reduces risk, human errors, fatigue/stress, increase safety and user acceptance/job satisfaction. Three types of Bias Confirmation, Expectation and Fundamental Attribution Error Human Information Processing Attention/Perception to Situational Awareness, Decision Making/Planning to Action. At all time using both short and long term memory. Three phase of skill development Cognitive, Associative, and Autonomous. How to improve memory Chunking capacity of sensory memory and long term unlimited What is CISM? Comprehensive, Systematic Program for the mitigation of critical incident related stress which and therefore give the following benefits, Prevent Traumatic Stress. What is Stress A state of mental tension and worry caused by problems in your life, work, and or environment. Something that causes strong feelings of worry or anxiety. Symptom and Signs of Stress Behavioural, Physiological, Psychological. What is a SOC/CERT? Security Operations Centre/Computer Emergency Response Team Purpose of a SOC/CERT Central unit that deals with security on an organisational level ISO Definition of a System Consisting of Parts, Relationships, and a whole that is greater than the sum of its parts. European H and S Guidlines Cenelec (CE) and DIN To support employers statutory duty for Health and Safety, what do we have? Legislation and Enforcement What does BOOST stand for? Balanced, Observed, Objective, Specific, Timely. What Acronym is used for Challenging Behaviour? CODES What is a Mistake A failure in Judgement or Planning What is a Slip Judgement and Plan is good but Action is carried out incorrectly. What is a Lapse Action is not carried out What is a Violation? Inappropriate action is carried out Name 5 Error Management Strategies Prevention, Reduction, Detection, Recovery and Tolerance Difference between Error and Violation Error is not intentional and a Violation is originally intentional, this can become routine. What does a Router do? Forwards packets within the network. Define Public Infrastructure Key A set of Roles, Policies, hardware/software and procedures used to manage, give, use, store, revoke digital certificates and manage public key encryption. What is a Proxy Server? Acts as intermediary for internet traffic between two parties. Often used to hide IP, can increase internet speed. What is a firewall Piece of hardware that has 2 functions, blocking/closing ports, use Indicators of Compromise (IOC) to detect and block malware from entering the network. Factor that affects a team known as people make quick decisions which match the group even if their personal opinion is different? Group think An inappropriate action is carried out Violation A failure in judgement or planning as a result of incorrect perception, interpretation or assessment of situation is a Mistake What does CODES stand for? Conversation, Observation, Discussion, Evaluation, Solutions/SMART In which ICAO resolution Document does CYBERSECURITY fall under A39-19 Fines for GDPR 2 Tiers, 10 Million Euro's/2 Percent or 20 Million/4 Percent of Global Annual Turnover What does NIS stand for Network and Information Systems Regulation What does NIS provide Provide legal measures to boost security, Provides a set of information and security principles such as managing security risk, defending attacks, detecting events, minimising impacts. What is Phishing the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Can also use fake website, SMS, Links. What is spear phishing? Email messages target specific users 4 types of Malware Virus, Worm, Spyware, Ransomware Types of Physical and Network Attacks DDOS, DOS, Port Scanning, Packet Sniffing, Spoofing, Man in the Middle, Advanced Persistent Threat, Cryptojacking and Tailgating Name two safe systems of work Permit to Work, Lockout/Tag Out/Safe Isolation Name three competency terms for Electrical Works Principal Authorising Authority, Authorising Engineers, Skilled Persons. Common Hazards in engineering RF, Radiation, Machinery, Asbestos, Height, Manual Handling, Fire. WEEE Waste Electrical and Electronic Equipment 2013 See 6 more Add or remove terms About us About Quizlet How Quizlet works Careers Advertise with us Get the app For students Flashcards Test Learn Solutions Q-Chat: your AI tutor Quizlet Plus Study Guides For teachers Live Checkpoint Blog Be the Change Quizlet Plus for teachers Resources Help center Honor code Community guidelines Privacy Terms Ad and Cookie Policy Quizlet for Schools Parents Language English (USA) © 2024 Quizlet, Inc. COPPA Safe Harbor Certification seal Play audio for this term

Show more Read less
Institution
ATSEP
Module
ATSEP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ATSEP
Module
ATSEP

Document information

Uploaded on
September 17, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Share Questions and Answers
ATSEP - answer Air Traffic Safety Electronics Personnel. Eu373 regulations require
a training programme to assess competence.

Safety Management System - answer Continually assessing risks. Proactive
containment. In-line with regulator and safety goals.

ICAO definition of SMS - answer Systematic approach to managing safety, including
the necessary organisational structures, accountabilities, policies and procedures.

SARPS - answer Standards and Recommended Practices

ESARR Definition of SMS - answer A formalised, explicit and pro-active approach to
systematic safety management in meeting its safety responsibilities within the provision
of ATM services.

Air Traffic Service Risk Statement - answer Risk of causing or contributing to an
aircraft accident.

ALARP Meaning - answer As Low As Reasonably Practicable. Mitigate the risk to
Low.

Seven Stage Assessment Process - answer System Description, Hazard ID,
Estimate Severity, Assess Likelihood, Evaluate Risk, Mitigate Risk, Safety Case

Synonym for Risk Classification Scheme - answer Tolerability Matrix

Three Safety Management Regulation Authorities - answer ICAO (International),
EASA (Europe)/ESARR (Eurocontrol Safety Regulatory Requirement), CAA (Uk state)

What does PANS stands for in ICAO? - answer Procedures for Air Navigational
Services.

European Safety Management Regulation Key Docs - answer Implementing Rules -
EC 2017/373, ESARR 1-6, Standards and Guidelines such as ED109.

UK CAA Docs for Safety Management Regs - answer CAP 670, CAP 1649 ATSEP
and Competence.

What does AMC stand for? - answer Acceptable Means of Compliance.

Nats Definition of SMS? - answer A systematic and explicit approach to managing
safety risk.

, Three types of Safety Management Assurance Approaches - answer Reactive,
Proactive and Predictive. Combine all for the best approach.

What is Risk? - answer Likelihood times by Consequence (Severity)

Hierarchy of Controls list - answer Elimination, Substitution, Engineering Controls,
Admin Controls, PPE.

Should be undertaken before ATSEP undertakes task - answer Task Specific Risk
Assessment

Potential to cause harm - answer Hazard

Risk Matrix also known as - answer Tolerability Matrix

Likelihood x Consequence - answer Risk

Risk of Causing or Contributing to an aircraft incident - answer Air Traffic Service
Risk

Just Culture - answer organizational culture that accepts people make mistakes and
creates an atmosphere of fairness within an environment of responsibility.

First Stage of Safety Assessment - answer System Description

Safety Oversight is normally - answer The State's Responsibility

Three types of Safety Management Strategies - answer Reactive, Proactive and
Predictive

NATS Safety Management System Statement - answer 'A systematic and explicit
approach to managing safety

Types of NOTAM - answer NOTAM, SNOWTAM, ASHTAM, BIRDTAM

What does TFR mean in relation to a NOTAM - answer Temporary Flight
Restrictions

What does CIA stand for in Information System Sec? - answer Confidentiality,
Integrity and Availability

7 Cyber Kill Chain Sequence - answer Recon, Weaponise, Deliver, Exploit, Install,
Command and Control, Action Objectives.
£10.41
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Pogba119 Harvard University
Follow You need to be logged in order to follow users or courses
Sold
48
Member since
1 year
Number of followers
2
Documents
4845
Last sold
3 weeks ago
NURSING TEST

BEST EDUCATIONAL RESOURCES FOR STUDENTS

3.9

9 reviews

5
4
4
2
3
2
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions