© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/979-8-8688-0339-0_8

8. Exploiting Spacecraft

Jacob G. Oakley1  
(1)
Owens Cross Roads, AL, USA
 

This chapter will provide example scenarios of threats manifesting themselves within space systems. For each type of threat scenario, I will present a non-cyber example for context before stepping through how cyber exploitation could allow the same threat to affect the spacecraft. As with the chapters on vectors which enable cyber exploitation, those already involved or familiar with the space industry might not find every example of threats and exploitation in this and the following chapter new and informative. ...

Get Cybersecurity for Space: A Guide to Foundations and Challenges now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.