Cybersecurity for Space : A Guide to Foundations and Challenges |
Autore | Oakley Jacob G |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress L. P., , 2024 |
Descrizione fisica | 1 online resource (229 pages) |
Disciplina | 358.8 |
Soggetto topico |
Space security
Computer security |
ISBN | 9798868803390 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Foreword -- Chapter 1: Space Systems -- Tipping Point -- An Introduction to Space Systems -- The Ground Station Design -- SV Design -- Ground Station Functionality -- SV Functionality -- Space System Architectures -- Conclusion -- Chapter 2: Space Challenges -- Environmental Challenges -- Radiation -- Temperature -- Space Objects and Collisions -- Vacuum -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Detumble -- Power -- Emanations -- Radio Frequency -- De-orbit -- Conclusion -- Chapter 3: Low Earth Orbit -- LEO, SmallSats, and the General Challenges of Space -- Environmental Challenges -- Radiation -- Temperature -- Space Objects -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Stabilizing -- Power -- Unique Aspects of LEO and SmallSats -- Communications -- Ground Footprint -- Persistence -- Mission Persistence -- Communications -- LEO Mesh Space Systems -- The Challenge of the Mesh -- The Anomaly -- Conclusion -- Chapter 4: Other Space Vehicles -- Medium Earth Orbit -- Geostationary Orbit -- Multi-orbit Constellations -- Special Systems -- Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Targeting -- Target Selection Methods -- Opportunity -- Ownership -- Function -- Specificity -- Intent -- Collection -- Redirection -- Subversion -- Theft -- Disable -- Mission Classification Taxonomy -- Sensing -- Radio Waves -- Microwave Radiation -- Infrared Radiation -- Visible Light -- Ultraviolet Radiation, X-Ray, and Gamma Radiation -- Emitting -- Detrimental -- Overt -- Covert -- Beneficial -- Transit -- Cargo -- Passenger -- Communication -- Weapon -- Taxonomy -- Conclusion -- Chapter 6: Pre-operational Vectors -- Design -- Confidentiality -- Non-cyber -- Cyber -- Integrity.
Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Development -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Supply Chain Interdiction -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Testing and Validation -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- General Interdiction -- Conclusion -- Chapter 7: Operational Vectors -- Between Ground and Space -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Between Space and Space -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Between Bus and Payload -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Flight and Operation -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Analysis and Dissemination -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Consumers -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Availability -- Non-cyber -- Cyber -- Conclusion -- Chapter 8: Exploiting Spacecraft -- Safeguards -- Watchdogs -- Gold Copies -- Fall Back Encryption -- Resource Limits -- Power -- Non-cyber Threat to Power 1 -- Non-cyber Threat to Power 2 -- Cyber Threat to Power 1 -- Cyber Threat to Power 2 -- Communication -- Non-cyber Threat to Communication 1 -- Non-cyber Threat to Communication 2 -- Cyber Threat to Communication 1 -- Cyber Threat to Communication 2 -- Navigation -- Non-cyber Threat to Navigation 1 -- Non-cyber Threat to Navigation 2. Cyber Threat to Navigation 1 -- Cyber Threat to Navigation 2 -- De-orbit -- Non-cyber Threat to De-orbit -- Cyber Threat to De-orbit 1 -- Cyber Threat to De-orbit 2 -- Non-LEO Space Systems -- Weapons -- Non-cyber Threat to Weapons -- Cyber Threat to Weapons -- Crewed -- Non-cyber Threat to Crewed -- Cyber Threat to Crewed -- Extraterrestrial -- Non-cyber Threat to Extraterrestrial -- Cyber Threat to Extraterrestrial -- Deep Space -- Non-cyber Threat to Deep Space -- Cyber Threat to Deep Space -- Conclusion -- Chapter 9: Exploiting Payloads -- Sensing Missions -- Radio Signal -- Non-cyber -- Cyber -- Terrestrial Photo-Imagery -- Non-cyber -- Cyber -- Terrestrial Thermal-Imagery -- Non-cyber -- Cyber -- Terrestrial Monitoring -- Non-cyber -- Cyber -- Space Monitoring -- Non-cyber -- Cyber -- Space Imaging -- Non-cyber -- Cyber -- Emitting Missions -- Positioning -- Non-cyber -- Cyber -- Jamming -- Non-cyber -- Cyber -- Communication Missions -- Broadcast -- Non-cyber -- Cyber -- Pipe -- Non-cyber -- Cyber -- Weapon Missions -- Non-cyber -- Cyber -- Life Support -- Non-cyber -- Cyber -- Other Mission Threats -- Watchdog Abuse -- Bus/Payload Comms -- Conclusion -- Chapter 10: Compromise Microanalysis -- A Series of Unfortunate Events -- The Plan -- Targeting -- Personal Computer -- How -- Why -- Phone -- How -- Why -- Lab Computer -- How -- Why -- Ground Station Computer -- How -- Why -- Payload Computer -- How -- Why -- Data Handler -- How -- Why -- SDR -- How -- Why -- Conclusion -- Chapter 11: Compromise Macroanalysis -- Initial Ground Station -- How -- Why -- Payload Computer 1 -- How -- Why -- Payload Ground Network -- How -- Why -- Flight Computer -- How -- Why -- Flight Ground Network -- How -- Why -- Payload Computer 2 -- How -- Why -- Mesh -- How -- Why -- Conclusion -- Chapter 12: Architecture -- Data Classification Levels -- System Ownership. Architectural Segmentation -- Payload A -- Payload B -- Conclusion -- Chapter 13: Compromise -- TREKS -- SPARTA -- Mapping a Compromise -- Reconnaissance -- Resource Development -- Known Compromises -- ROSAT Hack -- NASA Landsat Hack -- VIASAT KA-SAT Hack -- Hack-a-Sat -- Conclusion -- Chapter 14: Summary -- The Cost Problem -- The Culture Problem -- Supply Chain Problems -- The Cyber Warfare Problem -- The Test Problem -- The Adaptation Problem -- The Defense in Depth Problem -- The Modernization Problem -- The Failure Analysis Problem -- The Disclosure Problem -- Conclusion -- Index. |
Record Nr. | UNINA-9910874668403321 |
Oakley Jacob G | ||
Berkeley, CA : , : Apress L. P., , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity for Space : Protecting the Final Frontier / / by Jacob G. Oakley |
Autore | Oakley Jacob G |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 |
Descrizione fisica | 1 online resource (XIX, 164 p. 34 illus.) |
Disciplina | 327.1740919 |
Soggetto topico |
Data protection
Aerospace engineering Astronautics Security Aerospace Technology and Astronautics |
ISBN | 1-4842-5732-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Space Systems -- Chapter 2: Space Challenges -- Chapter 3: Low Earth Orbit -- Chapter 4: Other Space Vehicles -- Chapter 5: Threats to the Vehicle -- Chapter 6: Threats to the Mission -- Chapter 7: Pre-Operational Vectors -- Chapter 8: Communications Vectors -- Chapter 9: Operational Vectors -- Chapter 10: Compromise Microanalysis -- Chapter 11: Compromise Macroanalysis -- Chapter 12: Summary. |
Record Nr. | UNINA-9910383826803321 |
Oakley Jacob G | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Professional Red Teaming : Conducting Successful Cybersecurity Engagements / / by Jacob G. Oakley |
Autore | Oakley Jacob G |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 |
Descrizione fisica | 1 online resource (215 pages) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Security |
ISBN | 1-4842-4309-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Red Teams in Cyberspace -- Chapter 2: Why Human Hackers? -- Chapter 3: The State of Modern Offensive Security -- Chapter 4: Shaping -- Chapter 5: Rules of Engagement -- Chapter 6: Executing -- Chapter 7: Reporting -- Chapter 8: Purple Teaming -- Chapter 9: Counter-APT Red Teaming -- Chapter 10: Outcome Oriented Scoping -- Chapter 11: Initialization Perspectives -- Chapter 12: Reverse Red Teaming -- Chapter 13: Evaluating Offensive Security Processes -- Chapter 14: Experimentation -- Chapter 15: Validation.-. |
Record Nr. | UNINA-9910338014803321 |
Oakley Jacob G | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Waging cyber war : technical challenges and operational constraints / / Jacob G. Oakley |
Autore | Oakley Jacob G |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Berkeley, California : , : Apress, , [2019] |
Descrizione fisica | 1 online resource (xvii, 192 pages) : illustrations (some color) |
Disciplina | 355.4 |
Collana | Gale eBooks |
Soggetto topico |
Cyberspace operations (Military science)
Cyberterrorism Computer networks - Security measures Cyberterrorism - Prevention |
ISBN |
1-5231-5043-2
1-4842-4950-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Cyber and Warfare -- Chapter 2: Legal Authority -- Chapter 3: Cyber Exploitation -- Chapter 4: Cyber-Attack -- Chapter 5: Cyber Collection -- Chapter 6: Enemy Attribution -- Chapter 7: Targeting -- Chapter 8: Access -- Chapter 9: Self-Attribution -- Chapter 10: Association -- Chapter 11: Resource Resilience -- Chapter 12: Control and Ownership -- Chapter 13: Challenges -- Chapter 14: Contemplation. |
Record Nr. | UNINA-9910338231303321 |
Oakley Jacob G | ||
Berkeley, California : , : Apress, , [2019] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|