© Jacob G. Oakley 2020
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/978-1-4842-5732-6_7

7. Pre-operational Vectors

Jacob G. Oakley1 
(1)
Owens Cross Roads, AL, USA
 

Now that we have covered a wide range of threats to the space vehicle (SV) and the mission on board, we need to understand the vectors from which those threats will manifest themselves. The threats we discussed were entirely purposeful when performed from the cyber domain by a malicious actor. This was not the case for many of the non-cyber examples where some may have been purposefully carried out, but many others were bad happenstance or a result of environmental and other factors of space system operation.

Discussion on the vectors for such threats there will have a similar ...

Get Cybersecurity for Space: Protecting the Final Frontier now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.