© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
J. G. OakleyCybersecurity for Spacehttps://doi.org/10.1007/979-8-8688-0339-0_9

9. Exploiting Payloads

Jacob G. Oakley1  
(1)
Owens Cross Roads, AL, USA
 

In all cases, a threat to the space vehicle itself is likely to disrupt the mission of any payload as well. Threats to missions on the other hand have little to do with the type of space vehicle the mission is being conducted from and are almost always specific to aspects of the mission itself and the payload that performs it. This means that threats to missions are as diverse and numerous as there are types of missions that can be conjured up for execution aboard space vehicles in space. There are certainly ...

Get Cybersecurity for Space: A Guide to Foundations and Challenges now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.