Cybersecurity for space : protecting the final frontier
(eBook)

Book Cover
Average Rating
Published
Berkeley, Calif. : Apress, [2020].
Format
eBook
ISBN
1484257324, 9781484257326
Physical Desc
1 online resource (xix, 164 pages) : illustrations
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Syndetics Unbound

More Details

Language
English
UPC
10.1007/978-1-4842-5732-6, 10.1007/978-1-4842-5

Notes

General Note
Includes index.
General Note
Cyber Threat to Mission
Description
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain.

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Oakley, J. G. (2020). Cybersecurity for space: protecting the final frontier . Apress.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Oakley, Jacob G. 2020. Cybersecurity for Space: Protecting the Final Frontier. Apress.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Oakley, Jacob G. Cybersecurity for Space: Protecting the Final Frontier Apress, 2020.

MLA Citation, 9th Edition (style guide)

Oakley, Jacob G. Cybersecurity for Space: Protecting the Final Frontier Apress, 2020.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
47874e0c-0bbf-3ebb-054c-3f23a1ca845c-eng
Go To Grouped Work

Grouping Information

Grouped Work ID47874e0c-0bbf-3ebb-054c-3f23a1ca845c-eng
Full titlecybersecurity for space protecting the final frontier
Authoroakley jacob g
Grouping Categorybook
Last Update2024-09-06 16:31:08PM
Last Indexed2024-09-21 03:13:29AM

Marc Record

First DetectedJul 29, 2024 04:05:17 PM
Last File Modification TimeSep 06, 2024 04:40:56 PM

MARC Record

LEADER07202cam a2200517 i 4500
001on1150169951
003OCoLC
00520240830103855.0
006m     o  d        
007cr |||||||||||
008200418s2020    caua    o     001 0 eng d
015 |a GBC074158|2 bnb
0167 |a 019809057|2 Uk
019 |a 1152537834|a 1152541220|a 1153159887|a 1153958793|a 1154488720|a 1191132540
020 |a 1484257324|q (electronic book)
020 |a 9781484257326|q (electronic bk.)
0247 |a 10.1007/978-1-4842-5732-6|2 doi
0248 |a 10.1007/978-1-4842-5
035 |a (OCoLC)1150169951|z (OCoLC)1152537834|z (OCoLC)1152541220|z (OCoLC)1153159887|z (OCoLC)1153958793|z (OCoLC)1154488720|z (OCoLC)1191132540
037 |a com.springer.onix.9781484257326|b Springer Nature
040 |a EBLCP|b eng|e rda|e pn|c EBLCP|d GW5XE|d YDX|d EBLCP|d SFB|d LQU|d OCLCF|d UKAHL|d N$T|d UKMGB|d OCLCQ|d OCLCO|d COM|d OCLCQ|d GUA|d AUD|d OCLCQ|d OCLCO|d OCLCQ|d OCLCL|d HOPLA
049 |a FMGA
050 4|a JZ5695|b .O25 2020
08204|a 327.1/740919|2 23
1001 |a Oakley, Jacob G.|0 http://id.loc.gov/authorities/names/no2019166813
24510|a Cybersecurity for space :|b protecting the final frontier /|c Jacob G. Oakley.
264 1|a Berkeley, Calif. :|b Apress,|c [2020]
300 |a 1 online resource (xix, 164 pages) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
500 |a Includes index.
500 |a Cyber Threat to Mission
5050 |a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Space Systems -- Tipping Point -- An Introduction to Space Systems -- The Ground Station Design -- SV Design -- Ground Station Functionality -- SV Functionality -- Space System Architectures -- Conclusion -- Chapter 2: Space Challenges -- Environmental Challenges -- Radiation -- Temperature -- Space Objects and Collisions -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Detumble -- Power -- Emanations -- Frequency -- De-orbit -- Conclusion
5058 |a Chapter 3: Low Earth Orbit -- LEO, Smallsats, and the General Challenges of Space -- Environmental Challenges -- Radiation -- Temperature -- Space Objects -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Stabilizing -- Power -- Unique Aspects of LEO and Smallsats -- Communications -- Ground Footprint -- Persistence -- Mission Persistence -- Communications -- LEO Mesh Space Systems -- The Challenge of the Mesh -- The Anomaly -- Conclusion -- Chapter 4: Other Space Vehicles -- Medium Earth Orbit -- Geostationary Orbit -- Multi-orbit Constellations -- Special Systems
5058 |a Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Threats to the Vehicle -- Electrical Power System (EPS) -- Non-cyber Threat to EPS 1 -- Non-cyber Threat to EPS 2 -- Cyber Threat to EPS 1 -- Cyber Threat to EPS 2 -- Communication -- Non-cyber Threat to Communication 1 -- Non-cyber Threat to Communication 2 -- Cyber Threat to Communication 1 -- Cyber Threat to Communication 2 -- Guidance, Navigation, and Control (GN & C) -- Non-cyber Threat to GN & C 1 -- Non-cyber Threat to GN & C 2 -- Cyber Threat to GN & C 1 -- Cyber Threat to GN & C 2 -- De-orbit
5058 |a Non-cyber Threat to De-orbit -- Cyber Threat to De-orbit 1 -- Cyber Threat to De-orbit 2 -- Non-LEO Space Systems -- Weapons -- Non-cyber Threat to Weapons -- Cyber Threat to Weapons -- Crewed -- Non-cyber Threat to Crewed -- Cyber Threat to Crewed -- Extraterrestrial -- Non-cyber Threat to Extraterrestrial -- Cyber Threat to Extraterrestrial -- Deep Space -- Non-cyber Threat to Deep Space -- Cyber Threat to Deep Space -- Conclusion -- Chapter 6: Threats to the Mission -- Cyber and Safeguards -- Watchdogs -- Gold Copies -- Fallback Encryption -- Resource Limits -- Sensing Missions -- Radio Signal
5058 |a Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Photo-Imagery -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Thermal Imagery -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Monitoring -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Space Monitoring -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Space Imaging -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Emitting Missions -- Positioning -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Jamming -- Non-cyber Threat to Mission
520 |a This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain.
5880 |a Online resource; title from digital title page (viewed on April 22, 2020).
650 0|a Space security.|0 http://id.loc.gov/authorities/subjects/sh2008005752
650 0|a Computer security.|0 http://id.loc.gov/authorities/subjects/sh90001862
650 2|a Computer Security
758 |i has work:|a Cybersecurity for space (Text)|1 https://id.oclc.org/worldcat/entity/E39PCFYpR4XFQqhwwfyYJDcr7b|4 https://id.oclc.org/worldcat/ontology/hasWork
77608|i Print version:|a Oakley, Jacob G.|t Cybersecurity for Space : Protecting the Final Frontier.|d Berkeley, CA : Apress L.P., ©2020|z 9781484257319
85640|u https://www.aclib.us/OReilly