Toward Space Cyber Integration

Toward Space Cyber Integration Many of today’s cyber systems are engineered with a networked layer model, which is different from the way traditional space systems were designed. Legacy space systems are typically a collection of subsystems supporting space and ground segments. Because of the different engineering methodologies that went into establishing space and cyber systems, […]  More »

Cybersecurity Testbeds at The Aerospace Corporation

Cybersecurity Testbeds at The Aerospace Corporation Aerospace has developed several testbeds for prototyping candidate architectures and testing their vulnerabilities and proposed defenses. For example, the flight cybersecurity defense testbeds contain realistic satellite hardware and software to allow investigation of cyberattack and defense. These testbeds employ technologies such as CubeSats, software-defined radios, modular space components, and […]  More »

Achieving Mission Resilience for Space Systems

Achieving Mission Resilience for Space Systems Space systems need enhanced resiliency to ensure performance of critical functions and overall mission operations during a cyberattack. Aerospace is investigating various approaches to achieving such resilience for current and future programs. Jandria S. Alexander Space assets are an integral part of cyberspace. As such, they are directly and […]  More »

Cybersecurity for the Nation’s Infrastructure and Financial Institutions

Cybersecurity for the Nation’s Infrastructure and Financial Institutions Cyberattacks, and the damage they cause, are not limited to national security space systems. Financial markets and institutions, the nation’s power grid, national and local government institutions and facilities, transportation networks, and individuals are among those that have experienced cyberattacks. Symantec Corporation, the largest maker of security […]  More »

Meeting the Cyber Challenges of the Tomorrow

Meeting the Cyber Challenges of Tomorrow Aerospace researchers are pursuing diverse means of endowing space systems with the intelligence, autonomy, and adaptability needed to overcome a range of future threats. Elizabeth L. Scruggs, John Nilles, Jason P. Andryuk, Kirstie L. Bellman, Josh Train, Philip A. Dafesh, and Brad Wilkins   Emerging technologies have the potential […]  More »

Wikileaks and the Insider Threat

Wikileaks and the Insider Threat A young U.S. Army private was arrested in May 2010 for allegedly collecting several classified videos and 150,000 classified U.S. diplomatic cables and releasing them to unauthorized parties. The unauthorized parties were the principal actors in an Internet-based organization known as Wikileaks. Wikileaks and its volunteers collect documents and imagery […]  More »

Meeting National Security Space Needs in the Contested Cyberspace Domain

Meeting National Security Space Needs in the Contested Cyberspace Domain Growing concern over emerging cyber threats is shifting attention to mission resilience—the ability to operate through new and evolving threats in the cyberspace domain. Rami R. Razouk and Frank C. Belz   During the last two decades, the U.S. government and private sectors have come […]  More »

From the Editors

From the Editors Cyberspace and cybersecurity are relatively new terms, ones that are increasingly important to all businesses, and space is no exception when it comes to the necessity of protection in this realm. There is no shortage of news stories related to computer hacking, intrusion, theft, and exfiltration into and out of an array […]  More »

Profile: Randy Blaisdell, Systems Director, Space Cyber Integration

Profile: Randy Blaisdell, Systems Director, Space Cyber Integration Integrating Information Assurance Into Space Programs How can information in cyberspace be assured for its accuracy and integrity, yet not be shared with an adversary? In the rapidly changing cyber environment, this is a question that keeps Randy Blaisdell on his toes. “What we do in information […]  More »

Cybersecurity Challenges in a Net-centric World

Cybersecurity Challenges in a Net-centric World Transition to net-centricity encourages users throughout the Department of Defense to share information, but it also introduces cybersecurity vulnerabilities. Recognizing, understanding, and addressing these vulnerabilities are essential to successful transition. Judith S. Kerner and Eltefaat Shokri   As the pace and scope of decisions in the battlespace accelerate, the […]  More »

« Previous Page