© Jacob G. Oakley 2020
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/978-1-4842-5732-6_9

9. Operational Vectors

Jacob G. Oakley1 
Owens Cross Roads, AL, USA

Now we will address the breadth of attack surface represented by the operational vector. This is the ground station back infrastructure, networks, users, consumers, and computing equipment responsible for the complete execution of the space system mission from tasking to receiving the data from the space vehicle (SV) and ultimately getting it in the hands of the space system customers which justify its existence. Obviously, this discussion on operational vectors is more tailored in its totality to something like a satellite that has an obvious tasking, receiving, analysis, ...

Get Cybersecurity for Space: Protecting the Final Frontier now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.