Cybersecurity for Space: Protecting the Final Frontier
Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Space Systems -- Tipping Point -- An Introduction to Space Systems -- The Ground Station Design -- SV Design -- Ground Station Functionality -- SV Functionality -- Space System Architectures -- Conclusion -- Chapter 2: Space Challenges -- Environmental Challenges -- Radiation -- Temperature -- Space Objects and Collisions -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Detumble -- Power -- Emanations -- Frequency -- De-orbit -- Conclusion -- Chapter 3: Low Earth Orbit -- LEO, Smallsats, and the General Challenges of Space -- Environmental Challenges -- Radiation -- Temperature -- Space Objects -- Gravity -- Operational Challenges -- Testing -- Launch -- Deployment -- Stabilizing -- Power -- Unique Aspects of LEO and Smallsats -- Communications -- Ground Footprint -- Persistence -- Mission Persistence -- Communications -- LEO Mesh Space Systems -- The Challenge of the Mesh -- The Anomaly -- Conclusion -- Chapter 4: Other Space Vehicles -- Medium Earth Orbit -- Geostationary Orbit -- Multi-orbit Constellations -- Special Systems -- Weapons -- Human Aboard -- Extraterrestrial -- Deep Space -- Conclusion -- Chapter 5: Threats to the Vehicle -- Electrical Power System (EPS) -- Non-cyber Threat to EPS 1 -- Non-cyber Threat to EPS 2 -- Cyber Threat to EPS 1 -- Cyber Threat to EPS 2 -- Communication -- Non-cyber Threat to Communication 1 -- Non-cyber Threat to Communication 2 -- Cyber Threat to Communication 1 -- Cyber Threat to Communication 2 -- Guidance, Navigation, and Control (GN& -- C) -- Non-cyber Threat to GN& -- C 1 -- Non-cyber Threat to GN& -- C 2 -- Cyber Threat to GN& -- C 1 -- Cyber Threat to GN& -- C 2 -- De-orbit -- Non-cyber Threat to De-orbit.