Abstract
This chapter will describe how space is strongly connected and interacting with cyber security. The latter, even though there is no wide consensus about any formal definition, will be described and defined, for the sake of the argument, using concepts borrowed from both the civilian and military context.
It will be shown that space system and cyber security challenges are to be faced through systems engineering concepts and methodologies and that such an approach paves the way to undertake effectively challenges in both these fields at the same time, achieving cyber secure space systems. Specialized technical issues will be mentioned when necessary but not dealt with in detail; on the other hand, specific information will be provided about tackling space system conception, development, detailed design, production, deployment, management of operations and maintenance, and exploitation from the standpoint of a correct cyber security approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson R (2008) Security engineering: a guide to building dependable distributed systems, 2nd edn. Wiley, Indianapolis
Angino G, Caltagirone F, D’alessandro G, Somma R (2010) Space security. Space Academy Foundation, L’Aquila, Italy
Consultative Committee for Space Data Systems – CCSDS 350.0-G-2 (2006a) The application of CCSDS protocols to secure systems. Green Book. Issue 2. Available at www.ccsds.org
Consultative Committee for Space Data Systems – CCSDS 350.1-G-1 (2006b) Security threats against space missions. Green Book. Issue 1. Available at www.ccsds.org
Consultative Committee for Space Data Systems – CCSDS 350.4-G-1 (2007) CCSDS guide for secure system interconnection. Green Book. Issue 1. Available at www.ccsds.org
Consultative Committee for Space Data Systems – CCSDS 730.0-G-1 (2003) Next generation space internet. Green Book. Issue 1. Available at www.ccsds.org
Cyber Security. Definition available at www.whatis.techtarget.com/definition/cybersecurity
Defence Acquisition University(DAU) (2001) Systems engineering fundamentals. DAU Press. Fort Belvoir, VA, USA. Available at www.dau.mil
ECSS Standards. www.ecss.nl
Gerosa S, Somma R (2011) Tecniche e metodologie di project management; la gestione di programmi complessi con particolare riferimento al settore spaziale, 1st edn. Aracne, Roma
Information Assurance. Definition available at www.en.wikipedia.org/wiki/Information_assurance
Information Security. Definition available at www.en.wikipedia.org/wiki/Information_security
ISO/IEC 27001 Information technology – security techniques – information security management systems – Requirements
ISO/IEC 27002 Information technology – Security techniques – code of practice for information security management
ISO/IEC 15408 Common criteria for information technology security evaluation. Part 1 to 3, Version 3.1, Revision 4
ISO/IEC 18045 Common criteria for information technology security evaluation. Eval Methodol, Version 3.1, Revision 4
Jacobs S (2011) Engineering information security – the application of systems engineering concepts to achieve information assurance, Wiley, Hoboken, NJ, USA
Menezes A, Van Oorschot P, Vanstone S (1996) Handbook of applied cryptography, 1st edn. CRC Press, Boca Raton
NASA (2007) Systems engineering handbook NASA/SP-2007-6105 Rev1. Available at www.nas.gov
OECD principles available at www.oecd.org
Schneier B (1996) Applied cryptography – protocols, algorithms, and source code in C, 2nd edn, Wiley, New York
Security Engineering. Definition available at www.en.wikipedia.org/wiki/Security_engineering
Spagnulo M (ed) (2011) Elementi di Management dei programmi spaziali. Springer, Milan, Italy
Stamp M (2011) Information security – principles and practice, 2nd edn, Wiley, Hoboken, NJ, USA
System Engineering. Definition available at www.en.wikipedia.org/wiki/Systems_engineering
Wertz JR, Larson WG (1999) Space mission analysis and design, 3rd edn. Microcosm Press, Kluwer
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Sgobbi, D., L’Abbate, M., Frasca, D., Piantelli, V., Sciascia, G. (2015). Space and Cyber Security. In: Schrogl, KU., Hays, P., Robinson, J., Moura, D., Giannopapa, C. (eds) Handbook of Space Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-2029-3_49
Download citation
DOI: https://doi.org/10.1007/978-1-4614-2029-3_49
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-2028-6
Online ISBN: 978-1-4614-2029-3
eBook Packages: EngineeringReference Module Computer Science and Engineering