Now we will address the breadth of attack surface represented by the operational vector. This is the ground station back infrastructure, networks, users, consumers, and computing equipment responsible for the complete execution of the space system mission from tasking to receiving the data from the space vehicle (SV) and ultimately getting it in the hands of the space system customers which justify its existence. Obviously, this discussion on operational vectors is more tailored in its totality to something like a satellite that has an obvious tasking, receiving, analysis, and ...
© Jacob G. Oakley 2020
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/978-1-4842-5732-6_99. Operational Vectors
Jacob G. Oakley1
(1)
Owens Cross Roads, AL, USA
Get Cybersecurity for Space: Protecting the Final Frontier now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.