Cybersecurity for space : protecting the final frontier /

This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Sp...

Full description

Bibliographic Details
Main Author: Oakley, Jacob G
Format: Book
Language:English
Published: [New York, NY] : Apress, [2020]
Subjects:
LEADER 09087nam a2200745Ii 4500
001 997606cb-7e99-49e9-b1cb-5fa76994e874
005 20240926000000.0
008 200418s2020 nyua o 001 0 eng d
015 |a GBC074158  |2 bnb 
016 7 |a 019809057  |2 Uk 
019 |a 1152537834  |a 1152541220  |a 1153159887  |a 1153958793  |a 1154488720   |a 1191132540 
019 |a 1152537834  |a 1152541220  |a 1153159887  |a 1153958793  |a 1154488720  |a 1191132540 
020 |a 1484257324  |q (electronic book) 
020 |a 1484257324  |q electronic book 
020 |a 9781484257326  |q (electronic bk.) 
024 7 |a 10.1007/978-1-4842-5 
024 7 |a 10.1007/978-1-4842-5732-6  |2 doi 
024 8 |a 10.1007/978-1-4842-5 
035 |a (OCoLC)1150169951  |z (OCoLC)1152537834  |z (OCoLC)1152541220   |z (OCoLC)1153159887  |z (OCoLC)1153958793  |z (OCoLC)1154488720  |z (OCoLC)1191132540 
035 |a (OCoLC)1150169951  |z (OCoLC)1152537834  |z (OCoLC)1152541220  |z (OCoLC)1153159887  |z (OCoLC)1153958793  |z (OCoLC)1154488720  |z (OCoLC)1191132540 
035 |a (Sirsi) a13666059 
035 |a (Sirsi) sron1150169951 
035 9 |a (OCLCCM-CC)1150169951 
037 |a com.springer.onix.9781484257326  |b Springer Nature 
040 |a EBLCP  |b eng  |e rda  |c EBLCP  |d GW5XE  |d YDX  |d EBLCP  |d SFB  |d LQU  |d OCLCF  |d UKAHL  |d N$T  |d UKMGB 
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d GW5XE  |d YDX  |d EBLCP  |d SFB  |d LQU  |d OCLCF  |d UKAHL   |d N$T  |d UKMGB  |d OCLCQ  |d OCLCO  |d COM 
049 |a MAIN 
050 4 |a JZ5695  |b .O25 2020 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UR  |2 thema 
082 0 4 |a 327.1/740919  |2 23 
100 1 |a Oakley, Jacob G 
245 1 0 |a Cybersecurity for space :  |b protecting the final frontier /  |c Jacob G. Oakley 
264 1 |a [New York, NY] :  |b Apress,  |c [2020] 
300 |a 1 online resource (xix, 164 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Cyber Threat to Mission 
500 |a Includes index 
505 0 |a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Space Systems -- Tipping Point -- An Introduction to Space Systems -- The Ground Station Design -- SV Design -- Ground Station Functionality -- SV Functionality -- Space System Architectures -- Conclusion -- Chapter 2: Space Challenges -- Environmental Challenges -- Radiation -- Temperature -- Space Objects and Collisions -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Detumble -- Power -- Emanations -- Frequency -- De-orbit -- Conclusion 
505 8 |a Chapter 3: Low Earth Orbit -- LEO, Smallsats, and the General Challenges of Space -- Environmental Challenges -- Radiation -- Temperature -- Space Objects -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Stabilizing -- Power -- Unique Aspects of LEO and Smallsats -- Communications -- Ground Footprint -- Persistence -- Mission Persistence -- Communications -- LEO Mesh Space Systems -- The Challenge of the Mesh -- The Anomaly -- Conclusion -- Chapter 4: Other Space Vehicles -- Medium Earth Orbit -- Geostationary Orbit -- Multi-orbit Constellations -- Special Systems 
505 8 |a Non-cyber Threat to De-orbit -- Cyber Threat to De-orbit 1 -- Cyber Threat to De-orbit 2 -- Non-LEO Space Systems -- Weapons -- Non-cyber Threat to Weapons -- Cyber Threat to Weapons -- Crewed -- Non-cyber Threat to Crewed -- Cyber Threat to Crewed -- Extraterrestrial -- Non-cyber Threat to Extraterrestrial -- Cyber Threat to Extraterrestrial -- Deep Space -- Non-cyber Threat to Deep Space -- Cyber Threat to Deep Space -- Conclusion -- Chapter 6: Threats to the Mission -- Cyber and Safeguards -- Watchdogs -- Gold Copies -- Fallback Encryption -- Resource Limits -- Sensing Missions -- Radio Signal 
505 8 |a Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Photo-Imagery -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Thermal Imagery -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Monitoring -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Space Monitoring -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Space Imaging -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Emitting Missions -- Positioning -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Jamming -- Non-cyber Threat to Mission 
505 8 |a Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Threats to the Vehicle -- Electrical Power System (EPS) -- Non-cyber Threat to EPS 1 -- Non-cyber Threat to EPS 2 -- Cyber Threat to EPS 1 -- Cyber Threat to EPS 2 -- Communication -- Non-cyber Threat to Communication 1 -- Non-cyber Threat to Communication 2 -- Cyber Threat to Communication 1 -- Cyber Threat to Communication 2 -- Guidance, Navigation, and Control (GN & C) -- Non-cyber Threat to GN & C 1 -- Non-cyber Threat to GN & C 2 -- Cyber Threat to GN & C 1 -- Cyber Threat to GN & C 2 -- De-orbit 
505 8 |a Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Threats to the Vehicle -- Electrical Power System (EPS) -- Non-cyber Threat to EPS 1 -- Non-cyber Threat to EPS 2 -- Cyber Threat to EPS 1 -- Cyber Threat to EPS 2 -- Communication -- Non-cyber Threat to Communication 1 -- Non-cyber Threat to Communication 2 -- Cyber Threat to Communication 1 -- Cyber Threat to Communication 2 -- Guidance, Navigation, and Control (GN&C) -- Non-cyber Threat to GN&C 1 -- Non-cyber Threat to GN&C 2 -- Cyber Threat to GN&C 1 -- Cyber Threat to GN&C 2 -- De-orbit 
520 |a This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain 
588 |a Description based on online resource; title from digital title page (viewed on April 22, 2020) 
588 0 |a Online resource; title from digital title page (viewed on April 22, 2020) 
650 0 |a Computer security 
650 0 |a Space security 
650 2 |a Computer Security 
650 6 |a Sécurité informatique 
650 6 |a Sécurité spatiale 
650 7 |a Computer security  |2 fast 
650 7 |a Space security  |2 fast 
655 0 |a Electronic books 
655 4 |a Electronic books 
776 0 8 |i Print version:  |a Oakley, Jacob G  |t Cybersecurity for Space : Protecting the Final Frontier  |d Berkeley, CA : Apress L. P.,c2020  |z 9781484257319 
776 0 8 |i Print version:  |a Oakley, Jacob G  |t Cybersecurity for Space : Protecting the Final Frontier.  |d Berkeley, CA : Apress L.P., ©2020   |z 9781484257319 
999 1 0 |i 997606cb-7e99-49e9-b1cb-5fa76994e874  |l a13666059  |s US-CST  |m cybersecurity_for_spaceprotecting_the_final_frontier_______________________2020_______apresa________________________________________oakley__jacob_g____________________e 
999 1 0 |i 997606cb-7e99-49e9-b1cb-5fa76994e874  |l 12604791  |s US-ICU  |m cybersecurity_for_spaceprotecting_the_final_frontier_______________________2020_______apresa________________________________________oakley__jacob_g____________________e 
999 1 1 |l a13666059  |s ISIL:US-CST  |t BKS  |b 11f7446a-90e7-5630-aa44-81fe3dca64df  |y 11f7446a-90e7-5630-aa44-81fe3dca64df  |p UNLOANABLE 
999 1 1 |l a13666059  |s ISIL:US-CST  |t BKS  |a SUL-ELECTRONIC  |p UNLOANABLE