Cybersecurity for Space -  Jacob G. Oakley

Cybersecurity for Space (eBook)

Protecting the Final Frontier
eBook Download: PDF
2020 | 1. Auflage
XIX, 164 Seiten
Apress (Verlag)
978-1-4842-5732-6 (ISBN)
Systemvoraussetzungen
46,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.

Space is one of the fastest growing military, government, and industry sectors. Because everything in today's world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations.

You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems.

The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems.


What You Will Learn

  • Understand what constitutes a space system and the challenges unique to operations of all spacecraft
  • Get introduced to various space vehicles and their unique constraints and challenges
  • Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit
  • Know the physical and cyber vectors from which threats may manifest
  • Study the micro- and macro-analysis provided of space system attack scenarios
  • Be familiar with the high-level problems of cybersecurity in the space domain


Who This Book Is For

This book is written for two audiences: those with a background in space operations as well as those in cybersecurity. It offers the guidance needed to understand the unique challenges to space operations that affect the implementation of cybersecurity.



Dr. Jacob G. Oakley spent over seven years in the US Marines and was one of the founding members of the operational arm of the Marine Corps Forces Cyberspace Command at Ft. Meade, Maryland, leaving that unit as the senior Marine Corps operator and a division technical lead. After his enlistment he wrote and taught an advanced computer operations course, eventually returning back to mission support at Ft. Meade. He later left government contracting to do threat emulation and red teaming at a private company for commercial clients, serving as the principal penetration tester and director of penetration testing and cyber operations. He is currently working as a cyber SME for a government customer. He completed his doctorate in IT at Towson University, researching and developing offensive cybersecurity methods, and is the author of Professional Red Teaming: Conducting Successful Cybersecurity Engagements (Apress) as well as Waging Cyber War: Technical Challenges and Operational Constraints (Apress).


This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.Space is one of the fastest growing military, government, and industry sectors. Because everything in today s world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems.What You Will LearnUnderstand what constitutes a space system and the challenges unique to operations of all spacecraftGet introduced to various space vehicles and their unique constraints and challengesBe aware of the physical and cyber threats to the space vehicle and its ability to fly and orbitKnow the physical and cyber vectors from which threats may manifestStudy the micro- and macro-analysis provided of space system attack scenariosBe familiar with the high-level problems of cybersecurity in the space domainWho This Book Is ForThis book is written for two audiences: those with a background in space operations as well as those in cybersecurity. It offers the guidance needed to understand the unique challenges to space operations that affect the implementation of cybersecurity.
Erscheint lt. Verlag 31.3.2020
Zusatzinfo XIX, 164 p. 34 illus.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Fahrzeugbau / Schiffbau
Technik Luft- / Raumfahrttechnik
Schlagworte Cyber defense • cybersecurity • Geosynchronous orbit • Ground stations • Low Earth Orbit • Mission Control • Satellites • space • Space security • space systems • Threat actors • threats
ISBN-10 1-4842-5732-4 / 1484257324
ISBN-13 978-1-4842-5732-6 / 9781484257326
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90