Skip to main content

Space and Cyber Security

  • Reference work entry
  • First Online:
Handbook of Space Security

Abstract

This chapter will describe how space is strongly connected and interacting with cyber security. The latter, even though there is no wide consensus about any formal definition, will be described and defined, for the sake of the argument, using concepts borrowed from both the civilian and military context.

It will be shown that space system and cyber security challenges are to be faced through systems engineering concepts and methodologies and that such an approach paves the way to undertake effectively challenges in both these fields at the same time, achieving cyber secure space systems. Specialized technical issues will be mentioned when necessary but not dealt with in detail; on the other hand, specific information will be provided about tackling space system conception, development, detailed design, production, deployment, management of operations and maintenance, and exploitation from the standpoint of a correct cyber security approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Anderson R (2008) Security engineering: a guide to building dependable distributed systems, 2nd edn. Wiley, Indianapolis

    Google Scholar 

  • Angino G, Caltagirone F, D’alessandro G, Somma R (2010) Space security. Space Academy Foundation, L’Aquila, Italy

    Google Scholar 

  • Consultative Committee for Space Data Systems – CCSDS 350.0-G-2 (2006a) The application of CCSDS protocols to secure systems. Green Book. Issue 2. Available at www.ccsds.org

  • Consultative Committee for Space Data Systems – CCSDS 350.1-G-1 (2006b) Security threats against space missions. Green Book. Issue 1. Available at www.ccsds.org

  • Consultative Committee for Space Data Systems – CCSDS 350.4-G-1 (2007) CCSDS guide for secure system interconnection. Green Book. Issue 1. Available at www.ccsds.org

  • Consultative Committee for Space Data Systems – CCSDS 730.0-G-1 (2003) Next generation space internet. Green Book. Issue 1. Available at www.ccsds.org

  • Cyber Security. Definition available at www.whatis.techtarget.com/definition/cybersecurity

  • Defence Acquisition University(DAU) (2001) Systems engineering fundamentals. DAU Press. Fort Belvoir, VA, USA. Available at www.dau.mil

  • ECSS Standards. www.ecss.nl

  • Gerosa S, Somma R (2011) Tecniche e metodologie di project management; la gestione di programmi complessi con particolare riferimento al settore spaziale, 1st edn. Aracne, Roma

    Google Scholar 

  • Information Assurance. Definition available at www.en.wikipedia.org/wiki/Information_assurance

  • Information Security. Definition available at www.en.wikipedia.org/wiki/Information_security

  • ISO/IEC 27001 Information technology – security techniques – information security management systems – Requirements

    Google Scholar 

  • ISO/IEC 27002 Information technology – Security techniques – code of practice for information security management

    Google Scholar 

  • ISO/IEC 15408 Common criteria for information technology security evaluation. Part 1 to 3, Version 3.1, Revision 4

    Google Scholar 

  • ISO/IEC 18045 Common criteria for information technology security evaluation. Eval Methodol, Version 3.1, Revision 4

    Google Scholar 

  • Jacobs S (2011) Engineering information security – the application of systems engineering concepts to achieve information assurance, Wiley, Hoboken, NJ, USA

    Google Scholar 

  • Menezes A, Van Oorschot P, Vanstone S (1996) Handbook of applied cryptography, 1st edn. CRC Press, Boca Raton

    Google Scholar 

  • NASA (2007) Systems engineering handbook NASA/SP-2007-6105 Rev1. Available at www.nas.gov

  • OECD principles available at www.oecd.org

  • Schneier B (1996) Applied cryptography – protocols, algorithms, and source code in C, 2nd edn, Wiley, New York

    Google Scholar 

  • Security Engineering. Definition available at www.en.wikipedia.org/wiki/Security_engineering

  • Spagnulo M (ed) (2011) Elementi di Management dei programmi spaziali. Springer, Milan, Italy

    Google Scholar 

  • Stamp M (2011) Information security – principles and practice, 2nd edn, Wiley, Hoboken, NJ, USA

    Google Scholar 

  • System Engineering. Definition available at www.en.wikipedia.org/wiki/Systems_engineering

  • Wertz JR, Larson WG (1999) Space mission analysis and design, 3rd edn. Microcosm Press, Kluwer

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dario Sgobbi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Sgobbi, D., L’Abbate, M., Frasca, D., Piantelli, V., Sciascia, G. (2015). Space and Cyber Security. In: Schrogl, KU., Hays, P., Robinson, J., Moura, D., Giannopapa, C. (eds) Handbook of Space Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-2029-3_49

Download citation

Publish with us

Policies and ethics