首页> 外文会议>Accelerating Space Commerce, Exploration, and New Discocery Conference >A cyber attack-centric view of commercial space vehicles and the steps needed to mitigate
【24h】

A cyber attack-centric view of commercial space vehicles and the steps needed to mitigate

机译:以网络攻击为中心的商业空间车辆和减轻所需的步骤

获取原文

摘要

This paper is provided to inform commercial satellite operators on the workflow of a cyber attacker against their unique ecosystems; it provides techniques and best practices to mitigate steps of an attack. The paper's principal recommendation is the need for robust monitoring of: the ground network, the RF and optical apertures, spacecraft bus, and command and telemetry. The Space ISAC can help members share findings from monitoring activities and provide indications and or signatures of attackers on their systems to the community. Other members of the ISAC can hunt for these signatures on their network to defend and mitigate attacks, thus increasing the security of all commercial space. Progress toward sharing signatures and other threat intel has progressed greatly as membership in the ISAC has increased. Further participation and sharing information among members will increase greatly cyber protection for commercial space.
机译:本文提供了通知商业卫星运营商对其独特的生态系统的网络攻击者的工作流程;它提供了减轻攻击步骤的技巧和最佳实践。本文的主要建议是需要强大的监控:地面网络,RF和光学孔径,航天器总线和指挥和遥测。空间ISAC可以帮助成员分享调查结果监测活动,并为其系统提供攻击者的指示和或签名。 ISAC的其他成员可以在其网络上寻找这些签名,以捍卫和减轻攻击,从而增加所有商业空间的安全性。分享签名和其他威胁英特尔的进展在ISAC的成员增加了大大进展。成员之间的进一步参与和分享信息将增加对商业空间的网络保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号