Books+ Search Results

Cybersecurity for space : protecting the final frontier

Title
Cybersecurity for space : protecting the final frontier / Jacob G. Oakley.
ISBN
1484257324
9781484257326
Publication
Berkeley, Calif. : Apress, [2020]
Physical Description
1 online resource (xix, 164 pages) : illustrations
Local Notes
Access is available to the Yale community.
Notes
Includes index.
Cyber Threat to Mission
Access and use
Access restricted by licensing agreement.
Summary
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain.
Variant and related titles
O'Reilly Safari. OCLC KB.
Other formats
Print version: Oakley, Jacob G. Cybersecurity for Space : Protecting the Final Frontier. Berkeley, CA : Apress L.P., ©2020
Format
Books / Online
Language
English
Added to Catalog
October 03, 2023
Contents
Intro
Table of Contents
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Space Systems
Tipping Point
An Introduction to Space Systems
The Ground Station Design
SV Design
Ground Station Functionality
SV Functionality
Space System Architectures
Conclusion
Chapter 2: Space Challenges
Environmental Challenges
Radiation
Temperature
Space Objects and Collisions
Gravity
Operational Challenges
Testing
Launch
Deployment
Detumble
Power
Emanations
Frequency
De-orbit
Conclusion
Chapter 3: Low Earth Orbit
LEO, Smallsats, and the General Challenges of Space
Environmental Challenges
Radiation
Temperature
Space Objects
Gravity
Operational Challenges
Testing
Launch
Deployment
Stabilizing
Power
Unique Aspects of LEO and Smallsats
Communications
Ground Footprint
Persistence
Mission Persistence
Communications
LEO Mesh Space Systems
The Challenge of the Mesh
The Anomaly
Conclusion
Chapter 4: Other Space Vehicles
Medium Earth Orbit
Geostationary Orbit
Multi-orbit Constellations
Special Systems
Weapons
Human Aboard
Extraterrestrial
Deep Space
Conclusion
Chapter 5: Threats to the Vehicle
Electrical Power System (EPS)
Non-cyber Threat to EPS 1
Non-cyber Threat to EPS 2
Cyber Threat to EPS 1
Cyber Threat to EPS 2
Communication
Non-cyber Threat to Communication 1
Non-cyber Threat to Communication 2
Cyber Threat to Communication 1
Cyber Threat to Communication 2
Guidance, Navigation, and Control (GN & C)
Non-cyber Threat to GN & C 1
Non-cyber Threat to GN & C 2
Cyber Threat to GN & C 1
Cyber Threat to GN & C 2
De-orbit
Non-cyber Threat to De-orbit
Cyber Threat to De-orbit 1
Cyber Threat to De-orbit 2
Non-LEO Space Systems
Weapons
Non-cyber Threat to Weapons
Cyber Threat to Weapons
Crewed
Non-cyber Threat to Crewed
Cyber Threat to Crewed
Extraterrestrial
Non-cyber Threat to Extraterrestrial
Cyber Threat to Extraterrestrial
Deep Space
Non-cyber Threat to Deep Space
Cyber Threat to Deep Space
Conclusion
Chapter 6: Threats to the Mission
Cyber and Safeguards
Watchdogs
Gold Copies
Fallback Encryption
Resource Limits
Sensing Missions
Radio Signal
Non-cyber Threat to Mission
Cyber Threat to Mission
Terrestrial Photo-Imagery
Non-cyber Threat to Mission
Cyber Threat to Mission
Terrestrial Thermal Imagery
Non-cyber Threat to Mission
Cyber Threat to Mission
Terrestrial Monitoring
Non-cyber Threat to Mission
Cyber Threat to Mission
Space Monitoring
Non-cyber Threat to Mission
Cyber Threat to Mission
Space Imaging
Non-cyber Threat to Mission
Cyber Threat to Mission
Emitting Missions
Positioning
Non-cyber Threat to Mission
Cyber Threat to Mission
Jamming
Non-cyber Threat to Mission
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?