Skip to main content

2015 | OriginalPaper | Buchkapitel

9. Space and Cyber Security

verfasst von : Dario Sgobbi, Michelangelo L’Abbate, Daniele Frasca, Vittoria Piantelli, Giorgio Sciascia

Erschienen in: Handbook of Space Security

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter will describe how space is strongly connected and interacting with cyber security. The latter, even though there is no wide consensus about any formal definition, will be described and defined, for the sake of the argument, using concepts borrowed from both the civilian and military context.
It will be shown that space system and cyber security challenges are to be faced through systems engineering concepts and methodologies and that such an approach paves the way to undertake effectively challenges in both these fields at the same time, achieving cyber secure space systems. Specialized technical issues will be mentioned when necessary but not dealt with in detail; on the other hand, specific information will be provided about tackling space system conception, development, detailed design, production, deployment, management of operations and maintenance, and exploitation from the standpoint of a correct cyber security approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Anderson R (2008) Security engineering: a guide to building dependable distributed systems, 2nd edn. Wiley, Indianapolis Anderson R (2008) Security engineering: a guide to building dependable distributed systems, 2nd edn. Wiley, Indianapolis
Zurück zum Zitat Angino G, Caltagirone F, D’alessandro G, Somma R (2010) Space security. Space Academy Foundation, L’Aquila, Italy Angino G, Caltagirone F, D’alessandro G, Somma R (2010) Space security. Space Academy Foundation, L’Aquila, Italy
Zurück zum Zitat Consultative Committee for Space Data Systems – CCSDS 350.0-G-2 (2006a) The application of CCSDS protocols to secure systems. Green Book. Issue 2. Available at www.ccsds.org Consultative Committee for Space Data Systems – CCSDS 350.0-G-2 (2006a) The application of CCSDS protocols to secure systems. Green Book. Issue 2. Available at www.​ccsds.​org
Zurück zum Zitat Consultative Committee for Space Data Systems – CCSDS 350.1-G-1 (2006b) Security threats against space missions. Green Book. Issue 1. Available at www.ccsds.org Consultative Committee for Space Data Systems – CCSDS 350.1-G-1 (2006b) Security threats against space missions. Green Book. Issue 1. Available at www.​ccsds.​org
Zurück zum Zitat Consultative Committee for Space Data Systems – CCSDS 350.4-G-1 (2007) CCSDS guide for secure system interconnection. Green Book. Issue 1. Available at www.ccsds.org Consultative Committee for Space Data Systems – CCSDS 350.4-G-1 (2007) CCSDS guide for secure system interconnection. Green Book. Issue 1. Available at www.​ccsds.​org
Zurück zum Zitat Consultative Committee for Space Data Systems – CCSDS 730.0-G-1 (2003) Next generation space internet. Green Book. Issue 1. Available at www.ccsds.org Consultative Committee for Space Data Systems – CCSDS 730.0-G-1 (2003) Next generation space internet. Green Book. Issue 1. Available at www.​ccsds.​org
Zurück zum Zitat Defence Acquisition University(DAU) (2001) Systems engineering fundamentals. DAU Press. Fort Belvoir, VA, USA. Available at www.dau.mil Defence Acquisition University(DAU) (2001) Systems engineering fundamentals. DAU Press. Fort Belvoir, VA, USA. Available at www.​dau.​mil
Zurück zum Zitat Gerosa S, Somma R (2011) Tecniche e metodologie di project management; la gestione di programmi complessi con particolare riferimento al settore spaziale, 1st edn. Aracne, Roma Gerosa S, Somma R (2011) Tecniche e metodologie di project management; la gestione di programmi complessi con particolare riferimento al settore spaziale, 1st edn. Aracne, Roma
Zurück zum Zitat ISO/IEC 27001 Information technology – security techniques – information security management systems – Requirements ISO/IEC 27001 Information technology – security techniques – information security management systems – Requirements
Zurück zum Zitat ISO/IEC 27002 Information technology – Security techniques – code of practice for information security management ISO/IEC 27002 Information technology – Security techniques – code of practice for information security management
Zurück zum Zitat ISO/IEC 15408 Common criteria for information technology security evaluation. Part 1 to 3, Version 3.1, Revision 4 ISO/IEC 15408 Common criteria for information technology security evaluation. Part 1 to 3, Version 3.1, Revision 4
Zurück zum Zitat ISO/IEC 18045 Common criteria for information technology security evaluation. Eval Methodol, Version 3.1, Revision 4 ISO/IEC 18045 Common criteria for information technology security evaluation. Eval Methodol, Version 3.1, Revision 4
Zurück zum Zitat Jacobs S (2011) Engineering information security – the application of systems engineering concepts to achieve information assurance, Wiley, Hoboken, NJ, USA Jacobs S (2011) Engineering information security – the application of systems engineering concepts to achieve information assurance, Wiley, Hoboken, NJ, USA
Zurück zum Zitat Menezes A, Van Oorschot P, Vanstone S (1996) Handbook of applied cryptography, 1st edn. CRC Press, Boca Raton Menezes A, Van Oorschot P, Vanstone S (1996) Handbook of applied cryptography, 1st edn. CRC Press, Boca Raton
Zurück zum Zitat Schneier B (1996) Applied cryptography – protocols, algorithms, and source code in C, 2nd edn, Wiley, New York Schneier B (1996) Applied cryptography – protocols, algorithms, and source code in C, 2nd edn, Wiley, New York
Zurück zum Zitat Spagnulo M (ed) (2011) Elementi di Management dei programmi spaziali. Springer, Milan, Italy Spagnulo M (ed) (2011) Elementi di Management dei programmi spaziali. Springer, Milan, Italy
Zurück zum Zitat Stamp M (2011) Information security – principles and practice, 2nd edn, Wiley, Hoboken, NJ, USA Stamp M (2011) Information security – principles and practice, 2nd edn, Wiley, Hoboken, NJ, USA
Zurück zum Zitat Wertz JR, Larson WG (1999) Space mission analysis and design, 3rd edn. Microcosm Press, Kluwer Wertz JR, Larson WG (1999) Space mission analysis and design, 3rd edn. Microcosm Press, Kluwer
Metadaten
Titel
Space and Cyber Security
verfasst von
Dario Sgobbi
Michelangelo L’Abbate
Daniele Frasca
Vittoria Piantelli
Giorgio Sciascia
Copyright-Jahr
2015
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-2029-3_49

    Premium Partner