© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/979-8-8688-0339-0_10

10. Compromise Microanalysis

Jacob G. Oakley1  
(1)
Owens Cross Roads, AL, USA
 

To really hammer home how real the threat to space systems is I wanted to step through a detailed example of a compromise originating with the targeting of a program at a high level and ending with an impacted space vehicle. To make this as relevant as possible I am also going to include example operating systems and software used in various Internet of things (IoT) devices and space systems as well. I will cover which exploits or techniques could actually be used to compromise those systems and will ...

Get Cybersecurity for Space: A Guide to Foundations and Challenges now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.