Cybersecurity for space : protecting the final frontier /: protecting the final frontier. ([2020])
- Record Type:
- Book
- Title:
- Cybersecurity for space : protecting the final frontier /: protecting the final frontier. ([2020])
- Main Title:
- Cybersecurity for space : protecting the final frontier
- Further Information:
- Note: Jacob G. Oakley.
- Other Names:
- Oakley, Jacob G
- Contents:
- Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Space Systems -- Tipping Point -- An Introduction to Space Systems -- The Ground Station Design -- SV Design -- Ground Station Functionality -- SV Functionality -- Space System Architectures -- Conclusion -- Chapter 2: Space Challenges -- Environmental Challenges -- Radiation -- Temperature -- Space Objects and Collisions -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Detumble -- Power -- Emanations -- Frequency -- De-orbit -- Conclusion Chapter 3: Low Earth Orbit -- LEO, Smallsats, and the General Challenges of Space -- Environmental Challenges -- Radiation -- Temperature -- Space Objects -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Stabilizing -- Power -- Unique Aspects of LEO and Smallsats -- Communications -- Ground Footprint -- Persistence -- Mission Persistence -- Communications -- LEO Mesh Space Systems -- The Challenge of the Mesh -- The Anomaly -- Conclusion -- Chapter 4: Other Space Vehicles -- Medium Earth Orbit -- Geostationary Orbit -- Multi-orbit Constellations -- Special Systems Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Threats to the Vehicle -- Electrical Power System (EPS) -- Non-cyber Threat to EPS 1 -- Non-cyber Threat to EPS 2 -- Cyber Threat to EPS 1 -- Cyber Threat to EPS 2 -- Communication -- Non-cyber Threat to CommunicationIntro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Space Systems -- Tipping Point -- An Introduction to Space Systems -- The Ground Station Design -- SV Design -- Ground Station Functionality -- SV Functionality -- Space System Architectures -- Conclusion -- Chapter 2: Space Challenges -- Environmental Challenges -- Radiation -- Temperature -- Space Objects and Collisions -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Detumble -- Power -- Emanations -- Frequency -- De-orbit -- Conclusion Chapter 3: Low Earth Orbit -- LEO, Smallsats, and the General Challenges of Space -- Environmental Challenges -- Radiation -- Temperature -- Space Objects -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Stabilizing -- Power -- Unique Aspects of LEO and Smallsats -- Communications -- Ground Footprint -- Persistence -- Mission Persistence -- Communications -- LEO Mesh Space Systems -- The Challenge of the Mesh -- The Anomaly -- Conclusion -- Chapter 4: Other Space Vehicles -- Medium Earth Orbit -- Geostationary Orbit -- Multi-orbit Constellations -- Special Systems Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Threats to the Vehicle -- Electrical Power System (EPS) -- Non-cyber Threat to EPS 1 -- Non-cyber Threat to EPS 2 -- Cyber Threat to EPS 1 -- Cyber Threat to EPS 2 -- Communication -- Non-cyber Threat to Communication 1 -- Non-cyber Threat to Communication 2 -- Cyber Threat to Communication 1 -- Cyber Threat to Communication 2 -- Guidance, Navigation, and Control (GN&C) -- Non-cyber Threat to GN&C 1 -- Non-cyber Threat to GN&C 2 -- Cyber Threat to GN&C 1 -- Cyber Threat to GN&C 2 -- De-orbit Non-cyber Threat to De-orbit -- Cyber Threat to De-orbit 1 -- Cyber Threat to De-orbit 2 -- Non-LEO Space Systems -- Weapons -- Non-cyber Threat to Weapons -- Cyber Threat to Weapons -- Crewed -- Non-cyber Threat to Crewed -- Cyber Threat to Crewed -- Extraterrestrial -- Non-cyber Threat to Extraterrestrial -- Cyber Threat to Extraterrestrial -- Deep Space -- Non-cyber Threat to Deep Space -- Cyber Threat to Deep Space -- Conclusion -- Chapter 6: Threats to the Mission -- Cyber and Safeguards -- Watchdogs -- Gold Copies -- Fallback Encryption -- Resource Limits -- Sensing Missions -- Radio Signal Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Photo-Imagery -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Thermal Imagery -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Terrestrial Monitoring -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Space Monitoring -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Space Imaging -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Emitting Missions -- Positioning -- Non-cyber Threat to Mission -- Cyber Threat to Mission -- Jamming -- Non-cyber Threat to Mission … (more)
- Publisher Details:
- New York, NY : Apress
- Publication Date:
- 2020
- Extent:
- 1 online resource (xix, 164 pages)
- Subjects:
- 327.1/740919
Space security
Computer security
Computer security
Space security
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781484257326
1484257324 - Notes:
- Note: Description based on online resource; title from digital title page (viewed on April 22, 2020).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.506288
- Ingest File:
- 03_081.xml