Abstract
Regardless of specific defense applications, one of the most important features requested to a spaceborne Earth observation system for defense is to perform with high flexibility in order to assure the satisfaction of defense exigencies whenever and wherever they arise.
Further, in a military contest, it is of fundamental importance that the data availability, once requested to the system, is assured with a probability close to 100 %.
Last but not least, important aspect in the frame of defense application is the assurance of the confidentiality and integrity of the information; it is in fact of vital importance to be sure that only those who have requested the data can be able to use it and in addition that the data have not to be alterable by external entities.
All the above mentioned aspects involve system design features that have to be taken into account in order to answer to military exigencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- ASI:
-
Italian Space Agency
- AIS:
-
Automatic Identification System
- BPD:
-
Boundary Protection Device
- CAPP:
-
Controlled Access Protection Profile
- CC:
-
Common Criteria
- COMPUSEC:
-
Computer Security
- COMSEC:
-
Communication Security
- COSMO-SkyMed:
-
Constellation of Small Satellites for Mediterranean basin Observation
- DAC:
-
Discretionary Access Control
- EO:
-
Earth Observation
- GIS:
-
Geographical Information System
- HW:
-
Hardware
- I&A:
-
Identification and Authentication Mechanisms
- IEM:
-
Industrial Equipment Manufacturing
- ISLR:
-
Integrated Side Lobe Ratio
- IT:
-
Information technology
- ITSEC:
-
Information Technology Security Evaluation Criteria
- LEO:
-
Low Earth Orbit
- MAC:
-
Mandatory Access Control
- MOD:
-
Ministry of Defence
- NSA:
-
National Security Agency
- PSLR:
-
Peak to Side Lobe Ratio
- SAR:
-
Synthetic Aperture Radar
- SW:
-
Software
- TASI:
-
Thales Alenia Space Italia
- TC:
-
Telecommand
- TEMPEST:
-
Telecommunications Electronics Material Protected from Emanating Spurious Transmissions
- TRANSEC:
-
Transmission Security
- TM:
-
Telemetry
- VPN:
-
Virtual Private Network
- WAN:
-
Wide Area Network
References
Angino G, Caltagirone F, D’Alessandro G, Somma R (2010) Space security. Space Academy Foundation
Consultative Committee for Space Data Systems (CCSDS) (2006a) 350.0-G-2 –The application of CCSDS protocols to secure systems. Green Book. Issue 2. January 2006. www.ccsds.org
Consultative Committee for Space Data Systems (CCSDS) (2006b) 350.1-G-1 – Security threats against space missions. Green Book. Issue 1. October 2006. www.ccsds.org
Consultative Committee for Space Data Systems – CCSDS (2007) 350.4-G-1 – CCSDS Guide for secure system interconnection“. Green Book. Issue 1. November 2007. www.ccsds.org
Dongchen E, Zhou Chunxia, Liao Mingsheng (2004) Application of SAR interferometry on DEM, generation of the grove mountains. Photogramm Eng Remote Sensing
Italian Space Agency, Cosmo-SkyMed Mission, Cosmo-SkyMed system description & user guide
Jacobs S (2011) Engineering information security – the application of systems engineering concepts to achieve information assurance. Wiley, Hoboken
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Sgobbi, D., L’Abbate, M., Frasca, D., Piantelli, V., Sciascia, G., Rana, I. (2015). Earth Observation for Defense. In: Schrogl, KU., Hays, P., Robinson, J., Moura, D., Giannopapa, C. (eds) Handbook of Space Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-2029-3_44
Download citation
DOI: https://doi.org/10.1007/978-1-4614-2029-3_44
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-2028-6
Online ISBN: 978-1-4614-2029-3
eBook Packages: EngineeringReference Module Computer Science and Engineering