Abstract
To really hammer home how real the threat to space systems is, I wanted to step through a detailed example of a compromise originating with the targeting of program at a high level and ending with an impacted space vehicle (SV). To make this as relevant as possible, I am also going to include example operating systems and software used in various Internet of Things (IOT) devices and space systems as well. I will cover which exploits or techniques could actually be used to compromise those systems and will do my best to keep the targets as timely and relevant as possible.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Jacob G. Oakley
About this chapter
Cite this chapter
Oakley, J.G. (2020). Compromise Microanalysis. In: Cybersecurity for Space. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5732-6_10
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5732-6_10
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5731-9
Online ISBN: 978-1-4842-5732-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)