Cybersecurity and Mediation
The Mars Probe
The Mars probe is an example of poor mediation. It led to the loss of critical information. The satellite orbited Mars for 10 years collecting geospatial intelligence; however, over time it continued its orbit but ceases to continue its intelligence gathering operation. Due to the creation and implementation of new code, it took some of the satellites information and stored it in a location that already had stored data which resulted in it no longer being available. This error snowballed into a larger issue that made it more challenging to collect intelligence remotely from earth. This occurred due to inefficient testing of the new code. It is an example of incomplete mediation since the cyber professionals did not run the appropriate test and verify that the satellite had everything it needed to remain in orbit and gather intelligence simultaneously.
Mediation and Database Management for an Airline
The first step in the process involves ensuring that cybersecurity staff will implement the CIA triad and AAA. A major point of emphasis would be the race condition of the settings of the technologies used for the airline, as the cybersecurity professional would need to understand the procedures that need to be implemented and in what order. The goal is not to have two processes occur at the same time. When developing an airline reservation system, it is imperative to use mediation to verify all protocols are ready to be launched by aircraft. Mediation should also be used for the seating of the airline, preventing multiple consumers from purchasing the same seat at the same time.
Verifying Mediation
I would observe the implemented procedures through the perspective of the CIA triad and AAA. I would look for opportunities to promote information assurance and threat detection. Through the mediation process I would examine systems and networks to verify each’s ability to execute the procedures necessary for efficient operations of the airline. In order to make the airline prepared for operations I would perform the following test: penetration testing, verification, validation, unit, integration, function, performance, acceptances, installing and regression tests. I would direct multiple cybersecurity experts to implement this extensive, costly yet efficient model of preparing aircraft for operations. If all of these tests are used it will minimize or eliminate the prospect of incomplete mediation. I would want cybersecurity professionals to know that it will be a time-consuming project to implement all these tests, and a lot of vulnerabilities may be discovered in the process, but each are necessary in order to have the strongest mediation possible.