© Jacob G. Oakley 2020
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/978-1-4842-5732-6_10

10. Compromise Microanalysis

Jacob G. Oakley1 
Owens Cross Roads, AL, USA

To really hammer home how real the threat to space systems is, I wanted to step through a detailed example of a compromise originating with the targeting of program at a high level and ending with an impacted space vehicle (SV). To make this as relevant as possible, I am also going to include example operating systems and software used in various Internet of Things (IOT) devices and space systems as well. I will cover which exploits or techniques could actually be used to compromise those systems and will do my best to keep the targets as timely and relevant as ...

Get Cybersecurity for Space: Protecting the Final Frontier now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.