07202221 Master Training Book

7/13/21

Training

u This situation awareness training aims to avoid losing SA and provide pilots cognitive resources to always operate below the maximum workload that they can withstand. u This provides not only a lower probability of incidents and accidents by human factors, but the hours of operation are at their optimum efficiency, extending the operating life of systems and operators.

39

Law enforcement

On-the-job examples

u

u Law enforcement training includes being situationally aware of what is going on around the police officer before, during, and after interactions with the general public while also being fully aware of what is happening around the officer in areas not currently the focus of an officer's immediate task. u In the law enforcement context, situation awareness involves keeping eyes and ears open and evaluating what is happening on the way to a specific task, remaining fully aware of one's surroundings during the commission of a task, and retaining one's awareness when exiting a specific task. Situational awareness in a law enforcement setting seeks to ensure that a police officer does not become focused and engrossed on a specific task or problem to the exclusion of being aware of approaching potential hazards or to the exclusion of being aware of other tasks of higher priority. Situational awareness is a 24/7 process and policy laid down in officer training.

Cybersecurity threat operations

u

u In cybersecurity, consider situational awareness, for threat operations, is being able to perceive threat activity and vulnerability in context so that the following can be actively defended: data, information, knowledge, and wisdom from compromise. Situational awareness is achieved by developing and using solutions that often consume data and information from many different sources. Technology and algorithms are then used to apply knowledge and wisdom in order to discern patterns of behavior that point to possible, probable, and real threats. u Situational awareness for cybersecurity threat operations teams appears in the form of a condensed, enriched, often graphical, prioritized, and easily searchable view of systems that are inside or related to security areas of responsibility (such as corporate networks or those used for national security interests). Different studies have analyzed the perception of security and privacy in the context of eHealth, network security, or using collaborative approaches to improve the awareness of users.

40

20

Made with FlippingBook - Online catalogs