To really hammer home how real the threat to space systems is I wanted to step through a detailed example of a compromise originating with the targeting of a program at a high level and ending with an impacted space vehicle. To make this as relevant as possible I am also going to include example operating systems and software used in various Internet of things (IoT) devices and space systems as well. I will cover which exploits or techniques could actually be used to compromise those systems and will ...
10. Compromise Microanalysis
Get Cybersecurity for Space: A Guide to Foundations and Challenges now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.