Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity for space = protecting...
~
Oakley, Jacob G.
Linked to FindBook
Google Book
Amazon
博客來
Cybersecurity for space = protecting the final frontier /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity for space/ by Jacob G. Oakley.
Reminder of title:
protecting the final frontier /
Author:
Oakley, Jacob G.
Published:
Berkeley, CA :Apress : : 2020.,
Description:
xix, 164 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: Space Systems -- Chapter 2: Space Challenges -- Chapter 3: Low Earth Orbit -- Chapter 4: Other Space Vehicles -- Chapter 5: Threats to the Vehicle -- Chapter 6: Threats to the Mission -- Chapter 7: Pre-Operational Vectors -- Chapter 8: Communications Vectors -- Chapter 9: Operational Vectors -- Chapter 10: Compromise Microanalysis -- Chapter 11: Compromise Macroanalysis -- Chapter 12: Summary.
Contained By:
Springer eBooks
Subject:
Space security. -
Online resource:
https://doi.org/10.1007/978-1-4842-5732-6
ISBN:
9781484257326
Cybersecurity for space = protecting the final frontier /
Oakley, Jacob G.
Cybersecurity for space
protecting the final frontier /[electronic resource] :by Jacob G. Oakley. - Berkeley, CA :Apress :2020. - xix, 164 p. :ill., digital ;24 cm.
Chapter 1: Space Systems -- Chapter 2: Space Challenges -- Chapter 3: Low Earth Orbit -- Chapter 4: Other Space Vehicles -- Chapter 5: Threats to the Vehicle -- Chapter 6: Threats to the Mission -- Chapter 7: Pre-Operational Vectors -- Chapter 8: Communications Vectors -- Chapter 9: Operational Vectors -- Chapter 10: Compromise Microanalysis -- Chapter 11: Compromise Macroanalysis -- Chapter 12: Summary.
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in today's world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain.
ISBN: 9781484257326
Standard No.: 10.1007/978-1-4842-5732-6doiSubjects--Topical Terms:
1598382
Space security.
LC Class. No.: JZ5695 / .O25 2020
Dewey Class. No.: 327.1740919
Cybersecurity for space = protecting the final frontier /
LDR
:03342nmm a2200325 a 4500
001
2217410
003
DE-He213
005
20200331092618.0
006
m d
007
cr nn 008maaau
008
201120s2020 cau s 0 eng d
020
$a
9781484257326
$q
(electronic bk.)
020
$a
9781484257319
$q
(paper)
024
7
$a
10.1007/978-1-4842-5732-6
$2
doi
035
$a
978-1-4842-5732-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
JZ5695
$b
.O25 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
327.1740919
$2
23
090
$a
JZ5695
$b
.O11 2020
100
1
$a
Oakley, Jacob G.
$3
3387239
245
1 0
$a
Cybersecurity for space
$h
[electronic resource] :
$b
protecting the final frontier /
$c
by Jacob G. Oakley.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xix, 164 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Space Systems -- Chapter 2: Space Challenges -- Chapter 3: Low Earth Orbit -- Chapter 4: Other Space Vehicles -- Chapter 5: Threats to the Vehicle -- Chapter 6: Threats to the Mission -- Chapter 7: Pre-Operational Vectors -- Chapter 8: Communications Vectors -- Chapter 9: Operational Vectors -- Chapter 10: Compromise Microanalysis -- Chapter 11: Compromise Macroanalysis -- Chapter 12: Summary.
520
$a
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in today's world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain.
650
0
$a
Space security.
$3
1598382
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Aerospace Technology and Astronautics.
$3
928116
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5732-6
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9392314
電子資源
11.線上閱覽_V
電子書
EB JZ5695 .O25 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login