Spring 2012

Secure Coding

Secure Coding Adherence to secure coding standards can greatly improve a system’s resistance to targeted cyberattacks by avoiding common software flaws. For example, component failures and malicious activities can both result in bogus inputs and outputs. Graceful, predictable rejection of invalid inputs and outputs improves overall system stability by reducing the set of inconsistent and […]  More »

Laser-Scripted Modification of Nanomaterials for Supply-Chain Integrity

  Laser-Scripted Modification of Nanomaterials for Supply-Chain Integrity A major concern in supply-chain security is that a component should not be modified after it has been constructed and verified to meet its specifications; that is, the integrity of the component must be maintained. But because the communication and transportation channels required to deliver the component […]  More »

Cyber Protection and Space System Acquisition

Cyber Protection and Space System Acquisition Space systems will undoubtedly be targeted for future cyberattacks—but by focusing on capabilities, rather than components, developers can ensure that space assets will deliver critical functionality when it is needed most. Charles H. Lavine, Daniel Faigin, Michael H. Cole, Jerome Myers, and Deborah Shands   The process of acquiring […]  More »

Toward Space Cyber Integration

Toward Space Cyber Integration Many of today’s cyber systems are engineered with a networked layer model, which is different from the way traditional space systems were designed. Legacy space systems are typically a collection of subsystems supporting space and ground segments. Because of the different engineering methodologies that went into establishing space and cyber systems, […]  More »

Cybersecurity Testbeds at The Aerospace Corporation

Cybersecurity Testbeds at The Aerospace Corporation Aerospace has developed several testbeds for prototyping candidate architectures and testing their vulnerabilities and proposed defenses. For example, the flight cybersecurity defense testbeds contain realistic satellite hardware and software to allow investigation of cyberattack and defense. These testbeds employ technologies such as CubeSats, software-defined radios, modular space components, and […]  More »

Achieving Mission Resilience for Space Systems

Achieving Mission Resilience for Space Systems Space systems need enhanced resiliency to ensure performance of critical functions and overall mission operations during a cyberattack. Aerospace is investigating various approaches to achieving such resilience for current and future programs. Jandria S. Alexander Space assets are an integral part of cyberspace. As such, they are directly and […]  More »

Cybersecurity for the Nation’s Infrastructure and Financial Institutions

Cybersecurity for the Nation’s Infrastructure and Financial Institutions Cyberattacks, and the damage they cause, are not limited to national security space systems. Financial markets and institutions, the nation’s power grid, national and local government institutions and facilities, transportation networks, and individuals are among those that have experienced cyberattacks. Symantec Corporation, the largest maker of security […]  More »

Meeting the Cyber Challenges of the Tomorrow

Meeting the Cyber Challenges of Tomorrow Aerospace researchers are pursuing diverse means of endowing space systems with the intelligence, autonomy, and adaptability needed to overcome a range of future threats. Elizabeth L. Scruggs, John Nilles, Jason P. Andryuk, Kirstie L. Bellman, Josh Train, Philip A. Dafesh, and Brad Wilkins   Emerging technologies have the potential […]  More »

Wikileaks and the Insider Threat

Wikileaks and the Insider Threat A young U.S. Army private was arrested in May 2010 for allegedly collecting several classified videos and 150,000 classified U.S. diplomatic cables and releasing them to unauthorized parties. The unauthorized parties were the principal actors in an Internet-based organization known as Wikileaks. Wikileaks and its volunteers collect documents and imagery […]  More »

Profile: Randy Blaisdell, Systems Director, Space Cyber Integration

Profile: Randy Blaisdell, Systems Director, Space Cyber Integration Integrating Information Assurance Into Space Programs How can information in cyberspace be assured for its accuracy and integrity, yet not be shared with an adversary? In the rapidly changing cyber environment, this is a question that keeps Randy Blaisdell on his toes. “What we do in information […]  More »

« Previous PageNext Page »