100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Share Questions and Answers

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
17-09-2024
Escrito en
2024/2025

Share Questions and Answers ATSEP Air Traffic Safety Electronics Personnel. Eu373 regulations require a training programme to assess competence. Safety Management System Continually assessing risks. Proactive containment. In-line with regulator and safety goals. 0:04 / 0:15 ICAO definition of SMS Systematic approach to managing safety, including the necessary organisational structures, accountabilities, policies and procedures. SARPS Standards and Recommended Practices ESARR Definition of SMS A formalised, explicit and pro-active approach to systematic safety management in meeting its safety responsibilities within the provision of ATM services. Air Traffic Service Risk Statement Risk of causing or contributing to an aircraft accident. ALARP Meaning As Low As Reasonably Practicable. Mitigate the risk to Low. Seven Stage Assessment Process System Description, Hazard ID, Estimate Severity, Assess Likelihood, Evaluate Risk, Mitigate Risk, Safety Case Synonym for Risk Classification Scheme Tolerability Matrix Three Safety Management Regulation Authorities ICAO (International), EASA (Europe)/ESARR (Eurocontrol Safety Regulatory Requirement), CAA (Uk state) What does PANS stands for in ICAO? Procedures for Air Navigational Services. European Safety Management Regulation Key Docs Implementing Rules - EC 2017/373, ESARR 1-6, Standards and Guidelines such as ED109. UK CAA Docs for Safety Management Regs CAP 670, CAP 1649 ATSEP and Competence. What does AMC stand for? Acceptable Means of Compliance. Nats Definition of SMS? A systematic and explicit approach to managing safety risk. Three types of Safety Management Assurance Approaches Reactive, Proactive and Predictive. Combine all for the best approach. What is Risk? Likelihood times by Consequence (Severity) Hierarchy of Controls list Elimination, Substitution, Engineering Controls, Admin Controls, PPE. Should be undertaken before ATSEP undertakes task Task Specific Risk Assessment Potential to cause harm Hazard Risk Matrix also known as Tolerability Matrix Likelihood x Consequence Risk Risk of Causing or Contributing to an aircraft incident Air Traffic Service Risk Just Culture organizational culture that accepts people make mistakes and creates an atmosphere of fairness within an environment of responsibility. First Stage of Safety Assessment System Description Safety Oversight is normally The State's Responsibility Three types of Safety Management Strategies Reactive, Proactive and Predictive NATS Safety Management System Statement 'A systematic and explicit approach to managing safety Types of NOTAM NOTAM, SNOWTAM, ASHTAM, BIRDTAM What does TFR mean in relation to a NOTAM Temporary Flight Restrictions What does CIA stand for in Information System Sec? Confidentiality, Integrity and Availability 7 Cyber Kill Chain Sequence Recon, Weaponise, Deliver, Exploit, Install, Command and Control, Action Objectives. What does SHELL stand for? System context - ICAO Model for Human Factor Framework Software, Hardware, Environment and Liveware. What is a DMZ? Information System Security An isolated network between a private network and the internet, restricting outside access to internal servers and data. Name a Information Security Framework Standard ISO 27001 Name 6 parts of the planning process for ISO 27001 Define a Sec Policy, Define the Scope of the ISMS, Conduct a Risk Assessment, Manage Identified Assessment, Select Control Objectives and Controls to be implemented and Prepare a statement of Applicability. 4 Risk Treatment Methods for ISS Modify, Avoid, Share, Retain What is Malware? Software that is specifically designed to disrupt, damage, or gain unauthorized to a computer What is the capacity of short term memory? 7 +/- 2 Name the layers of Maslow's Hierarchy of Needs Physiological, Safety, Love/Belonging, Esteem, and Self Actualisation. How do we communicate? Verbal (Spoken and Written), Para Linguistic (Sounds of Disapproval), Non Verbal, and Visual. 4 Things that define a System People, Equipment, Training, Procedures. Organisation and Physical Environment encompass them What does CISM mean? Critical Incident Stress Management Collective measures for Working at Height Avoid, Prevent, Protect. In which areas of our business can Risk Mitigation be employed System, Procedural, People. What is an Audible way but not verbal for Communication? Para Linguistic. What does TRM stand for? Team Resource Management What does an IDS do? Device or App that analyses entire Packet that enters the system. Logs details about Malicious Packets. What does an IPS do? (Intrusion Prevention System) Same function as IDS but blocks the packet rather than Log the event. Difference between IPS and Firewall Firewall scans the header, looks for specific info rather than the entire packet which is what IPS does. Application Security meaning Process of developing, adding and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. 4 processes that happen with App Sec Authentication, Authorisation, Encryption, Logging. Network Security Meaning Any activity designed to protect the usability and integrity of a network and its data. This includes hardware and software technologies. Network security manages access to the network as well as targets a variety of threats, stops them entering or spreading through the network. What is a Business Continuity Plan (BCP)? Plan to recover the business from an Incident. What is a Disaster Recovery Plan? Recovery of a business after a crisis. 4 Elements of a BCP Business Impact Analysis, Recovery, Organisation, Training Physical Security Biometric, Locks, Cameras, Sec Pass, Barriers. 4 Types of Security Managerial Personnel Senior Leadership, Data Custodian, Sec Admin, Sec Analyst. Aim of Human Factors Make interaction between human and system so it can improve system performance, Reduces risk, human errors, fatigue/stress, increase safety and user acceptance/job satisfaction. Three types of Bias Confirmation, Expectation and Fundamental Attribution Error Human Information Processing Attention/Perception to Situational Awareness, Decision Making/Planning to Action. At all time using both short and long term memory. Three phase of skill development Cognitive, Associative, and Autonomous. How to improve memory Chunking capacity of sensory memory and long term unlimited What is CISM? Comprehensive, Systematic Program for the mitigation of critical incident related stress which and therefore give the following benefits, Prevent Traumatic Stress. What is Stress A state of mental tension and worry caused by problems in your life, work, and or environment. Something that causes strong feelings of worry or anxiety. Symptom and Signs of Stress Behavioural, Physiological, Psychological. What is a SOC/CERT? Security Operations Centre/Computer Emergency Response Team Purpose of a SOC/CERT Central unit that deals with security on an organisational level ISO Definition of a System Consisting of Parts, Relationships, and a whole that is greater than the sum of its parts. European H and S Guidlines Cenelec (CE) and DIN To support employers statutory duty for Health and Safety, what do we have? Legislation and Enforcement What does BOOST stand for? Balanced, Observed, Objective, Specific, Timely. What Acronym is used for Challenging Behaviour? CODES What is a Mistake A failure in Judgement or Planning What is a Slip Judgement and Plan is good but Action is carried out incorrectly. What is a Lapse Action is not carried out What is a Violation? Inappropriate action is carried out Name 5 Error Management Strategies Prevention, Reduction, Detection, Recovery and Tolerance Difference between Error and Violation Error is not intentional and a Violation is originally intentional, this can become routine. What does a Router do? Forwards packets within the network. Define Public Infrastructure Key A set of Roles, Policies, hardware/software and procedures used to manage, give, use, store, revoke digital certificates and manage public key encryption. What is a Proxy Server? Acts as intermediary for internet traffic between two parties. Often used to hide IP, can increase internet speed. What is a firewall Piece of hardware that has 2 functions, blocking/closing ports, use Indicators of Compromise (IOC) to detect and block malware from entering the network. Factor that affects a team known as people make quick decisions which match the group even if their personal opinion is different? Group think An inappropriate action is carried out Violation A failure in judgement or planning as a result of incorrect perception, interpretation or assessment of situation is a Mistake What does CODES stand for? Conversation, Observation, Discussion, Evaluation, Solutions/SMART In which ICAO resolution Document does CYBERSECURITY fall under A39-19 Fines for GDPR 2 Tiers, 10 Million Euro's/2 Percent or 20 Million/4 Percent of Global Annual Turnover What does NIS stand for Network and Information Systems Regulation What does NIS provide Provide legal measures to boost security, Provides a set of information and security principles such as managing security risk, defending attacks, detecting events, minimising impacts. What is Phishing the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Can also use fake website, SMS, Links. What is spear phishing? Email messages target specific users 4 types of Malware Virus, Worm, Spyware, Ransomware Types of Physical and Network Attacks DDOS, DOS, Port Scanning, Packet Sniffing, Spoofing, Man in the Middle, Advanced Persistent Threat, Cryptojacking and Tailgating Name two safe systems of work Permit to Work, Lockout/Tag Out/Safe Isolation Name three competency terms for Electrical Works Principal Authorising Authority, Authorising Engineers, Skilled Persons. Common Hazards in engineering RF, Radiation, Machinery, Asbestos, Height, Manual Handling, Fire. WEEE Waste Electrical and Electronic Equipment 2013 See 6 more Add or remove terms About us About Quizlet How Quizlet works Careers Advertise with us Get the app For students Flashcards Test Learn Solutions Q-Chat: your AI tutor Quizlet Plus Study Guides For teachers Live Checkpoint Blog Be the Change Quizlet Plus for teachers Resources Help center Honor code Community guidelines Privacy Terms Ad and Cookie Policy Quizlet for Schools Parents Language English (USA) © 2024 Quizlet, Inc. COPPA Safe Harbor Certification seal Play audio for this term

Mostrar más Leer menos
Institución
ATSEP
Grado
ATSEP









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ATSEP
Grado
ATSEP

Información del documento

Subido en
17 de septiembre de 2024
Número de páginas
7
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Share Questions and Answers
ATSEP - answer Air Traffic Safety Electronics Personnel. Eu373 regulations require
a training programme to assess competence.

Safety Management System - answer Continually assessing risks. Proactive
containment. In-line with regulator and safety goals.

ICAO definition of SMS - answer Systematic approach to managing safety, including
the necessary organisational structures, accountabilities, policies and procedures.

SARPS - answer Standards and Recommended Practices

ESARR Definition of SMS - answer A formalised, explicit and pro-active approach to
systematic safety management in meeting its safety responsibilities within the provision
of ATM services.

Air Traffic Service Risk Statement - answer Risk of causing or contributing to an
aircraft accident.

ALARP Meaning - answer As Low As Reasonably Practicable. Mitigate the risk to
Low.

Seven Stage Assessment Process - answer System Description, Hazard ID,
Estimate Severity, Assess Likelihood, Evaluate Risk, Mitigate Risk, Safety Case

Synonym for Risk Classification Scheme - answer Tolerability Matrix

Three Safety Management Regulation Authorities - answer ICAO (International),
EASA (Europe)/ESARR (Eurocontrol Safety Regulatory Requirement), CAA (Uk state)

What does PANS stands for in ICAO? - answer Procedures for Air Navigational
Services.

European Safety Management Regulation Key Docs - answer Implementing Rules -
EC 2017/373, ESARR 1-6, Standards and Guidelines such as ED109.

UK CAA Docs for Safety Management Regs - answer CAP 670, CAP 1649 ATSEP
and Competence.

What does AMC stand for? - answer Acceptable Means of Compliance.

Nats Definition of SMS? - answer A systematic and explicit approach to managing
safety risk.

, Three types of Safety Management Assurance Approaches - answer Reactive,
Proactive and Predictive. Combine all for the best approach.

What is Risk? - answer Likelihood times by Consequence (Severity)

Hierarchy of Controls list - answer Elimination, Substitution, Engineering Controls,
Admin Controls, PPE.

Should be undertaken before ATSEP undertakes task - answer Task Specific Risk
Assessment

Potential to cause harm - answer Hazard

Risk Matrix also known as - answer Tolerability Matrix

Likelihood x Consequence - answer Risk

Risk of Causing or Contributing to an aircraft incident - answer Air Traffic Service
Risk

Just Culture - answer organizational culture that accepts people make mistakes and
creates an atmosphere of fairness within an environment of responsibility.

First Stage of Safety Assessment - answer System Description

Safety Oversight is normally - answer The State's Responsibility

Three types of Safety Management Strategies - answer Reactive, Proactive and
Predictive

NATS Safety Management System Statement - answer 'A systematic and explicit
approach to managing safety

Types of NOTAM - answer NOTAM, SNOWTAM, ASHTAM, BIRDTAM

What does TFR mean in relation to a NOTAM - answer Temporary Flight
Restrictions

What does CIA stand for in Information System Sec? - answer Confidentiality,
Integrity and Availability

7 Cyber Kill Chain Sequence - answer Recon, Weaponise, Deliver, Exploit, Install,
Command and Control, Action Objectives.
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Pogba119 Harvard University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
48
Miembro desde
1 año
Número de seguidores
2
Documentos
4859
Última venta
3 semanas hace
NURSING TEST

BEST EDUCATIONAL RESOURCES FOR STUDENTS

3.9

9 reseñas

5
4
4
2
3
2
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes