Cybersecurity for space: protecting the final frontier
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Sp...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berkeley, Calif.
Apress
[2020]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484257326/?ar |
Zusammenfassung: | This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain. |
Beschreibung: | Includes index. - Cyber Threat to Mission. - Online resource; title from digital title page (viewed on April 22, 2020) |
Umfang: | 1 Online-Ressource (xix, 164 Seiten) illustrations |
ISBN: | 1484257324 9781484257326 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051689626 | ||
003 | DE-627-1 | ||
005 | 20240228121022.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2020 xx |||||o 00| ||eng c | ||
020 | |a 1484257324 |c electronic book |9 1-4842-5732-4 | ||
020 | |a 9781484257326 |c electronic bk. |9 978-1-4842-5732-6 | ||
035 | |a (DE-627-1)051689626 | ||
035 | |a (DE-599)KEP051689626 | ||
035 | |a (ORHE)9781484257326 | ||
035 | |a (DE-627-1)051689626 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 327.1/740919 |2 23 | |
100 | 1 | |a Oakley, Jacob G. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity for space |b protecting the final frontier |c Jacob G. Oakley |
264 | 1 | |a Berkeley, Calif. |b Apress |c [2020] | |
300 | |a 1 Online-Ressource (xix, 164 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Cyber Threat to Mission. - Online resource; title from digital title page (viewed on April 22, 2020) | ||
520 | |a This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain. | ||
650 | 0 | |a Space security | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité spatiale | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Space security | |
776 | 1 | |z 9781484257319 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484257319 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484257326/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051689626 |
---|---|
_version_ | 1821494843321352192 |
adam_text | |
any_adam_object | |
author | Oakley, Jacob G. |
author_facet | Oakley, Jacob G. |
author_role | aut |
author_sort | Oakley, Jacob G. |
author_variant | j g o jg jgo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051689626 (DE-599)KEP051689626 (ORHE)9781484257326 |
dewey-full | 327.1/740919 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.1/740919 |
dewey-search | 327.1/740919 |
dewey-sort | 3327.1 6740919 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03613cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-051689626</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121022.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484257324</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-4842-5732-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484257326</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-5732-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051689626</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051689626</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484257326</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051689626</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.1/740919</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oakley, Jacob G.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity for space</subfield><subfield code="b">protecting the final frontier</subfield><subfield code="c">Jacob G. Oakley</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, Calif.</subfield><subfield code="b">Apress</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 164 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Cyber Threat to Mission. - Online resource; title from digital title page (viewed on April 22, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Space security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité spatiale</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Space security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484257319</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484257319</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484257326/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051689626 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:49Z |
institution | BVB |
isbn | 1484257324 9781484257326 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xix, 164 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Apress |
record_format | marc |
spelling | Oakley, Jacob G. VerfasserIn aut Cybersecurity for space protecting the final frontier Jacob G. Oakley Berkeley, Calif. Apress [2020] 1 Online-Ressource (xix, 164 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Cyber Threat to Mission. - Online resource; title from digital title page (viewed on April 22, 2020) This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain. Space security Computer security Computer Security Sécurité spatiale Sécurité informatique 9781484257319 Erscheint auch als Druck-Ausgabe 9781484257319 |
spellingShingle | Oakley, Jacob G. Cybersecurity for space protecting the final frontier Space security Computer security Computer Security Sécurité spatiale Sécurité informatique |
title | Cybersecurity for space protecting the final frontier |
title_auth | Cybersecurity for space protecting the final frontier |
title_exact_search | Cybersecurity for space protecting the final frontier |
title_full | Cybersecurity for space protecting the final frontier Jacob G. Oakley |
title_fullStr | Cybersecurity for space protecting the final frontier Jacob G. Oakley |
title_full_unstemmed | Cybersecurity for space protecting the final frontier Jacob G. Oakley |
title_short | Cybersecurity for space |
title_sort | cybersecurity for space protecting the final frontier |
title_sub | protecting the final frontier |
topic | Space security Computer security Computer Security Sécurité spatiale Sécurité informatique |
topic_facet | Space security Computer security Computer Security Sécurité spatiale Sécurité informatique |
work_keys_str_mv | AT oakleyjacobg cybersecurityforspaceprotectingthefinalfrontier |