To really hammer home how real the threat to space systems is, I wanted to step through a detailed example of a compromise originating with the targeting of program at a high level and ending with an impacted space vehicle (SV). To make this as relevant as possible, I am also going to include example operating systems and software used in various Internet of Things (IOT) devices and space systems as well. I will cover which exploits or techniques could actually be used to compromise those systems and will do my best to keep the targets as timely and relevant as possible. ...
© Jacob G. Oakley 2020
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/978-1-4842-5732-6_1010. Compromise Microanalysis
Jacob G. Oakley1
(1)
Owens Cross Roads, AL, USA
Get Cybersecurity for Space: Protecting the Final Frontier now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.