top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cybersecurity for Space : A Guide to Foundations and Challenges
Cybersecurity for Space : A Guide to Foundations and Challenges
Autore Oakley Jacob G
Edizione [2nd ed.]
Pubbl/distr/stampa Berkeley, CA : , : Apress L. P., , 2024
Descrizione fisica 1 online resource (229 pages)
Disciplina 358.8
Soggetto topico Space security
Computer security
ISBN 9798868803390
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Foreword -- Chapter 1: Space Systems -- Tipping Point -- An Introduction to Space Systems -- The Ground Station Design -- SV Design -- Ground Station Functionality -- SV Functionality -- Space System Architectures -- Conclusion -- Chapter 2: Space Challenges -- Environmental Challenges -- Radiation -- Temperature -- Space Objects and Collisions -- Vacuum -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Detumble -- Power -- Emanations -- Radio Frequency -- De-orbit -- Conclusion -- Chapter 3: Low Earth Orbit -- LEO, SmallSats, and the General Challenges of Space -- Environmental Challenges -- Radiation -- Temperature -- Space Objects -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Stabilizing -- Power -- Unique Aspects of LEO and SmallSats -- Communications -- Ground Footprint -- Persistence -- Mission Persistence -- Communications -- LEO Mesh Space Systems -- The Challenge of the Mesh -- The Anomaly -- Conclusion -- Chapter 4: Other Space Vehicles -- Medium Earth Orbit -- Geostationary Orbit -- Multi-orbit Constellations -- Special Systems -- Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Targeting -- Target Selection Methods -- Opportunity -- Ownership -- Function -- Specificity -- Intent -- Collection -- Redirection -- Subversion -- Theft -- Disable -- Mission Classification Taxonomy -- Sensing -- Radio Waves -- Microwave Radiation -- Infrared Radiation -- Visible Light -- Ultraviolet Radiation, X-Ray, and Gamma Radiation -- Emitting -- Detrimental -- Overt -- Covert -- Beneficial -- Transit -- Cargo -- Passenger -- Communication -- Weapon -- Taxonomy -- Conclusion -- Chapter 6: Pre-operational Vectors -- Design -- Confidentiality -- Non-cyber -- Cyber -- Integrity.
Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Development -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Supply Chain Interdiction -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Testing and Validation -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- General Interdiction -- Conclusion -- Chapter 7: Operational Vectors -- Between Ground and Space -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Between Space and Space -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Between Bus and Payload -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Flight and Operation -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Analysis and Dissemination -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Non-cyber -- Cyber -- Availability -- Non-cyber -- Cyber -- Consumers -- Confidentiality -- Non-cyber -- Cyber -- Integrity -- Availability -- Non-cyber -- Cyber -- Conclusion -- Chapter 8: Exploiting Spacecraft -- Safeguards -- Watchdogs -- Gold Copies -- Fall Back Encryption -- Resource Limits -- Power -- Non-cyber Threat to Power 1 -- Non-cyber Threat to Power 2 -- Cyber Threat to Power 1 -- Cyber Threat to Power 2 -- Communication -- Non-cyber Threat to Communication 1 -- Non-cyber Threat to Communication 2 -- Cyber Threat to Communication 1 -- Cyber Threat to Communication 2 -- Navigation -- Non-cyber Threat to Navigation 1 -- Non-cyber Threat to Navigation 2.
Cyber Threat to Navigation 1 -- Cyber Threat to Navigation 2 -- De-orbit -- Non-cyber Threat to De-orbit -- Cyber Threat to De-orbit 1 -- Cyber Threat to De-orbit 2 -- Non-LEO Space Systems -- Weapons -- Non-cyber Threat to Weapons -- Cyber Threat to Weapons -- Crewed -- Non-cyber Threat to Crewed -- Cyber Threat to Crewed -- Extraterrestrial -- Non-cyber Threat to Extraterrestrial -- Cyber Threat to Extraterrestrial -- Deep Space -- Non-cyber Threat to Deep Space -- Cyber Threat to Deep Space -- Conclusion -- Chapter 9: Exploiting Payloads -- Sensing Missions -- Radio Signal -- Non-cyber -- Cyber -- Terrestrial Photo-Imagery -- Non-cyber -- Cyber -- Terrestrial Thermal-Imagery -- Non-cyber -- Cyber -- Terrestrial Monitoring -- Non-cyber -- Cyber -- Space Monitoring -- Non-cyber -- Cyber -- Space Imaging -- Non-cyber -- Cyber -- Emitting Missions -- Positioning -- Non-cyber -- Cyber -- Jamming -- Non-cyber -- Cyber -- Communication Missions -- Broadcast -- Non-cyber -- Cyber -- Pipe -- Non-cyber -- Cyber -- Weapon Missions -- Non-cyber -- Cyber -- Life Support -- Non-cyber -- Cyber -- Other Mission Threats -- Watchdog Abuse -- Bus/Payload Comms -- Conclusion -- Chapter 10: Compromise Microanalysis -- A Series of Unfortunate Events -- The Plan -- Targeting -- Personal Computer -- How -- Why -- Phone -- How -- Why -- Lab Computer -- How -- Why -- Ground Station Computer -- How -- Why -- Payload Computer -- How -- Why -- Data Handler -- How -- Why -- SDR -- How -- Why -- Conclusion -- Chapter 11: Compromise Macroanalysis -- Initial Ground Station -- How -- Why -- Payload Computer 1 -- How -- Why -- Payload Ground Network -- How -- Why -- Flight Computer -- How -- Why -- Flight Ground Network -- How -- Why -- Payload Computer 2 -- How -- Why -- Mesh -- How -- Why -- Conclusion -- Chapter 12: Architecture -- Data Classification Levels -- System Ownership.
Architectural Segmentation -- Payload A -- Payload B -- Conclusion -- Chapter 13: Compromise -- TREKS -- SPARTA -- Mapping a Compromise -- Reconnaissance -- Resource Development -- Known Compromises -- ROSAT Hack -- NASA Landsat Hack -- VIASAT KA-SAT Hack -- Hack-a-Sat -- Conclusion -- Chapter 14: Summary -- The Cost Problem -- The Culture Problem -- Supply Chain Problems -- The Cyber Warfare Problem -- The Test Problem -- The Adaptation Problem -- The Defense in Depth Problem -- The Modernization Problem -- The Failure Analysis Problem -- The Disclosure Problem -- Conclusion -- Index.
Record Nr. UNINA-9910874668403321
Oakley Jacob G  
Berkeley, CA : , : Apress L. P., , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity for Space : Protecting the Final Frontier / / by Jacob G. Oakley
Cybersecurity for Space : Protecting the Final Frontier / / by Jacob G. Oakley
Autore Oakley Jacob G
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (XIX, 164 p. 34 illus.)
Disciplina 327.1740919
Soggetto topico Data protection
Aerospace engineering
Astronautics
Security
Aerospace Technology and Astronautics
ISBN 1-4842-5732-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Space Systems -- Chapter 2: Space Challenges -- Chapter 3: Low Earth Orbit -- Chapter 4: Other Space Vehicles -- Chapter 5: Threats to the Vehicle -- Chapter 6: Threats to the Mission -- Chapter 7: Pre-Operational Vectors -- Chapter 8: Communications Vectors -- Chapter 9: Operational Vectors -- Chapter 10: Compromise Microanalysis -- Chapter 11: Compromise Macroanalysis -- Chapter 12: Summary.
Record Nr. UNINA-9910383826803321
Oakley Jacob G  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Professional Red Teaming : Conducting Successful Cybersecurity Engagements / / by Jacob G. Oakley
Professional Red Teaming : Conducting Successful Cybersecurity Engagements / / by Jacob G. Oakley
Autore Oakley Jacob G
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Descrizione fisica 1 online resource (215 pages)
Disciplina 005.8
Soggetto topico Data protection
Security
ISBN 1-4842-4309-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Red Teams in Cyberspace -- Chapter 2: Why Human Hackers? -- Chapter 3: The State of Modern Offensive Security -- Chapter 4: Shaping -- Chapter 5: Rules of Engagement -- Chapter 6: Executing -- Chapter 7: Reporting -- Chapter 8: Purple Teaming -- Chapter 9: Counter-APT Red Teaming -- Chapter 10: Outcome Oriented Scoping -- Chapter 11: Initialization Perspectives -- Chapter 12: Reverse Red Teaming -- Chapter 13: Evaluating Offensive Security Processes -- Chapter 14: Experimentation -- Chapter 15: Validation.-.
Record Nr. UNINA-9910338014803321
Oakley Jacob G  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Waging cyber war : technical challenges and operational constraints / / Jacob G. Oakley
Waging cyber war : technical challenges and operational constraints / / Jacob G. Oakley
Autore Oakley Jacob G
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Berkeley, California : , : Apress, , [2019]
Descrizione fisica 1 online resource (xvii, 192 pages) : illustrations (some color)
Disciplina 355.4
Collana Gale eBooks
Soggetto topico Cyberspace operations (Military science)
Cyberterrorism
Computer networks - Security measures
Cyberterrorism - Prevention
ISBN 1-5231-5043-2
1-4842-4950-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Cyber and Warfare -- Chapter 2: Legal Authority -- Chapter 3: Cyber Exploitation -- Chapter 4: Cyber-Attack -- Chapter 5: Cyber Collection -- Chapter 6: Enemy Attribution -- Chapter 7: Targeting -- Chapter 8: Access -- Chapter 9: Self-Attribution -- Chapter 10: Association -- Chapter 11: Resource Resilience -- Chapter 12: Control and Ownership -- Chapter 13: Challenges -- Chapter 14: Contemplation.
Record Nr. UNINA-9910338231303321
Oakley Jacob G  
Berkeley, California : , : Apress, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui