Cargando…

Cybersecurity for space : protecting the final frontier /

This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Sp...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oakley, Jacob G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berkeley, Calif. : Apress, [2020]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • About the Author
  • About the Technical Reviewer
  • Acknowledgments
  • Introduction
  • Chapter 1: Space Systems
  • Tipping Point
  • An Introduction to Space Systems
  • The Ground Station Design
  • SV Design
  • Ground Station Functionality
  • SV Functionality
  • Space System Architectures
  • Conclusion
  • Chapter 2: Space Challenges
  • Environmental Challenges
  • Radiation
  • Temperature
  • Space Objects and Collisions
  • Gravity
  • Operational Challenges
  • Testing
  • Launch
  • Deployment
  • Detumble
  • Power
  • Emanations
  • Frequency
  • De-orbit
  • Conclusion
  • Chapter 3: Low Earth Orbit
  • LEO, Smallsats, and the General Challenges of Space
  • Environmental Challenges
  • Radiation
  • Temperature
  • Space Objects
  • Gravity
  • Operational Challenges
  • Testing
  • Launch
  • Deployment
  • Stabilizing
  • Power
  • Unique Aspects of LEO and Smallsats
  • Communications
  • Ground Footprint
  • Persistence
  • Mission Persistence
  • Communications
  • LEO Mesh Space Systems
  • The Challenge of the Mesh
  • The Anomaly
  • Conclusion
  • Chapter 4: Other Space Vehicles
  • Medium Earth Orbit
  • Geostationary Orbit
  • Multi-orbit Constellations
  • Special Systems
  • Weapons
  • Human Aboard
  • Extraterrestrial
  • Deep Space
  • Conclusion
  • Chapter 5: Threats to the Vehicle
  • Electrical Power System (EPS)
  • Non-cyber Threat to EPS 1
  • Non-cyber Threat to EPS 2
  • Cyber Threat to EPS 1
  • Cyber Threat to EPS 2
  • Communication
  • Non-cyber Threat to Communication 1
  • Non-cyber Threat to Communication 2
  • Cyber Threat to Communication 1
  • Cyber Threat to Communication 2
  • Guidance, Navigation, and Control (GN & C)
  • Non-cyber Threat to GN & C 1
  • Non-cyber Threat to GN & C 2
  • Cyber Threat to GN & C 1
  • Cyber Threat to GN & C 2
  • De-orbit
  • Non-cyber Threat to De-orbit
  • Cyber Threat to De-orbit 1
  • Cyber Threat to De-orbit 2
  • Non-LEO Space Systems
  • Weapons
  • Non-cyber Threat to Weapons
  • Cyber Threat to Weapons
  • Crewed
  • Non-cyber Threat to Crewed
  • Cyber Threat to Crewed
  • Extraterrestrial
  • Non-cyber Threat to Extraterrestrial
  • Cyber Threat to Extraterrestrial
  • Deep Space
  • Non-cyber Threat to Deep Space
  • Cyber Threat to Deep Space
  • Conclusion
  • Chapter 6: Threats to the Mission
  • Cyber and Safeguards
  • Watchdogs
  • Gold Copies
  • Fallback Encryption
  • Resource Limits
  • Sensing Missions
  • Radio Signal
  • Non-cyber Threat to Mission
  • Cyber Threat to Mission
  • Terrestrial Photo-Imagery
  • Non-cyber Threat to Mission
  • Cyber Threat to Mission
  • Terrestrial Thermal Imagery
  • Non-cyber Threat to Mission
  • Cyber Threat to Mission
  • Terrestrial Monitoring
  • Non-cyber Threat to Mission
  • Cyber Threat to Mission
  • Space Monitoring
  • Non-cyber Threat to Mission
  • Cyber Threat to Mission
  • Space Imaging
  • Non-cyber Threat to Mission
  • Cyber Threat to Mission
  • Emitting Missions
  • Positioning
  • Non-cyber Threat to Mission
  • Cyber Threat to Mission
  • Jamming
  • Non-cyber Threat to Mission