000931460 000__ 03738cam\a2200445Ii\4500 000931460 001__ 931460 000931460 005__ 20230306151514.0 000931460 006__ m\\\\\o\\d\\\\\\\\ 000931460 007__ cr\un\nnnunnun 000931460 008__ 200418s2020\\\\nyua\\\\o\\\\\001\0\eng\d 000931460 019__ $$a1152537834$$a1152541220$$a1153159887$$a1153958793$$a1154488720 000931460 020__ $$a9781484257326$$q(electronic book) 000931460 020__ $$a1484257324$$q(electronic book) 000931460 0247_ $$a10.1007/978-1-4842-5732-6$$2doi 000931460 0247_ $$a10.1007/978-1-4842-5 000931460 035__ $$aSP(OCoLC)on1150169951 000931460 035__ $$aSP(OCoLC)1150169951$$z(OCoLC)1152537834$$z(OCoLC)1152541220$$z(OCoLC)1153159887$$z(OCoLC)1153958793$$z(OCoLC)1154488720 000931460 040__ $$aEBLCP$$beng$$erda$$cEBLCP$$dGW5XE$$dYDX$$dEBLCP$$dSFB$$dLQU 000931460 049__ $$aISEA 000931460 050_4 $$aJZ5695$$b.O25 2020 000931460 08204 $$a327.1/740919$$223 000931460 1001_ $$aOakley, Jacob G. 000931460 24510 $$aCybersecurity for space :$$bprotecting the final frontier /$$cJacob G. Oakley. 000931460 264_1 $$a[New York, NY] :$$bApress,$$c[2020] 000931460 300__ $$a1 online resource (xix, 164 pages) 000931460 336__ $$atext$$btxt$$2rdacontent 000931460 337__ $$acomputer$$bc$$2rdamedia 000931460 338__ $$aonline resource$$bcr$$2rdacarrier 000931460 500__ $$aIncludes index. 000931460 500__ $$aCyber Threat to Mission 000931460 506__ $$aAccess limited to authorized users. 000931460 520__ $$aThis is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain. 000931460 588__ $$aDescription based on online resource; title from digital title page (viewed on April 22, 2020). 000931460 650_0 $$aSpace security. 000931460 650_0 $$aComputer security. 000931460 77608 $$iPrint version:$$aOakley, Jacob G.$$tCybersecurity for Space : Protecting the Final Frontier$$dBerkeley, CA : Apress L. P.,c2020$$z9781484257319 000931460 852__ $$bebk 000931460 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-5732-6$$zOnline Access$$91397441.1 000931460 909CO $$ooai:library.usi.edu:931460$$pGLOBAL_SET 000931460 980__ $$aEBOOK 000931460 980__ $$aBIB 000931460 982__ $$aEbook 000931460 983__ $$aOnline 000931460 994__ $$a92$$bISE