Advertisement

Protecting Vital Cyber Infrastructure

Chapter
  • 1.1k Downloads

Abstract

It is remarkable that there is in modern life “hidden” vital infrastructure that controls a good deal of our daily lives and on which we vitally depend. Yet we are completely unaware of these systems until something goes wrong. In this chapter we discuss two examples of such vital infrastructure. One type of vital infrastructure is a remote control system called supervisory control and data acquisition (SCADA) networks. These electronic digital networks control virtually all of our utilities and transportation systems. The other type of infrastructure are applications satellites. Both of these systems, if attacked by cyber-criminals or cyber-terrorists, could create major problems in our lives and community. The following pages examine the cyber vulnerabilities that exist for both SCADA networks and application satellites and what can be done to better protect this vital infrastructure on which our lives depend.

Keywords

Satellite Network Mobile Satellite Orbital Debris Application Satellite Fiber Optic Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
  2. 2.
    U. S. General Accounting Office Report to Congressional Committees, “Library of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses,” March 2015. http://www.gao.gov/assets/670/669367.pdf.
  3. 3.
    Joseph N. Pelton, Indu Singh and Elena Sitnikova, “Cyber Threats, Extreme Solar Events and EMPs,” Inside Homeland Security, March 2015.Google Scholar
  4. 4.
    Indu Singh and Joseph N. Pelton, The Safe City: Living Free in a Dangerous World, (2013). Emerald Planet, Washington, D. C., pp. 199-200.Google Scholar
  5. 5.
    Anggoro K. Widiawan, and Rahim Tafazolli, “High Altitude Platform Station (HAPS): A Review of New Infrastructure Development for Future Wireless Communications.” Wireless Personal Communications August 2007, Volume 42, Issue 3 2006. pp 387-404.Google Scholar
  6. 6.
    Joseph N. Pelton, Scott Madry and Sergio Comacho-Lara, Handbook of Satellite Applications, (2013) Springer Press, New York, Chapter 1.Google Scholar
  7. 7.
    Joseph N. Pelton, “Meteorological Satellites,” in Joseph N. Pelton’s, Scott Madry’s and Sergio Comacho-Lara’s Handbook of Satellite Applications, (2013). Springer Press, New York.Google Scholar
  8. 8.
    Siamak Khorram, Frank H. Koch, Cynthia F. van der Wiele, and Stacy Nelson, Remote Sensing (2012). Springer Press, New York.Google Scholar
  9. 9.
    Scott Madry, Global Navigation Satellite Systems and Their Applications (2015). Springer Press, New York.Google Scholar
  10. 10.
    op cit. Joseph N. Pelton, Indu Singh and Elena Sitnikova, “Cyber Threats, Extreme Solar Events and EMPs,” Inside Homeland Security, March 2015.Google Scholar
  11. 11.
    Joel Hruska, “Elon Musk unveils new plan for global satellite Internet, while Google invests a billion in SpaceX,” ExtremeTech, January 20, 2015. www.extremetech.com/extreme/197711-elon-musk-unveils-new-plan-to-circle-to-earth-in-satellites-for-fast-low-latency-internet.
  12. 12.
    Elizabeth Palermo, “Google Invests Billions on Satellites to Expand Internet Access,” Live Science, June 4, 2014. http://www.livescience.com/46109-google-satellites-expand-internet-access.html.
  13. 13.
    Joseph N. Pelton, Orbital Debris and Other Threats from Space, (2013) Springer Press, New York.Google Scholar
  14. 14.
  15. 15.
    Hughes: Broadband Satellite Services, Managed Networks www.hughes.com/.
  16. 16.
    The Comsys VSAT Report, 13th edition, “Hughes Market Summary and Company Profile,” London, UK.Google Scholar
  17. 17.
    Inmarsat Global Xpress. The first high-speed broadband network to span the world http://www.inmarsat.com/service-group/global-xpress/.
  18. 18.
  19. 19.
    Ramesh Gupta and Dan Swearingen, “Mobile Satellite Communications Markets: Dynamics and Trends” in Joseph N. Pelton’s, Scott Madry’s, and Sergio Comacho-Lara’s (eds.) Handbook of Satellite Applications (2013). Springer Press, New York, Chapter 8, pp. 163-186.Google Scholar
  20. 20.
  21. 21.
    “U. S. Cyber and Space Security Challenges and Opportunities,” George C. Marshall Institute and Tech American Space Enterprise Council Symposia, April 10, 2015.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Executive Board International Association for the Advancement of Space SafetySpace and Advanced Communications Research InstituteArlingtonUSA
  2. 2.LATA’s Global Institute for Security TrainingLos Alamos Technical AssociatesMcLeanUSA

Personalised recommendations