20220617
<Tech Trend>Cybersecurity of Space
When people started to focus and talk about cybersecurity, there is another entirely new cybersecurity issue beyond Earth. That is the space. In early 2018, SpaceX launched two Starlink satellites into space and began to provide services to the public. Today, people are increasingly reliant on these satellite access services. Starlink's satellite internet access service has been the primary method for Ukrainian people to communicate with each other during the recent war between Ukraine and Russia. However, are these satellite networks truly secure and could compare to traditional methods of accessing services? Or does use the satellite internet increase the chances of being hacked or having a security breach?
There isn't strong evidence to show that a security breach is in the Starlink system. However, there are unofficial sources prove that the system has survived a massive Russian hack. This was not the first time the satellite internet service had been attacked. In 2014, a foreign cyber espionage group hacked into a satellite internet provider to cover up the cyber-espionage against countries from the U.S. to the former Eastern European bloc, according to the experts in Kaspersky Lab. In May 2021, the Cybersecurity and Infrastructure Security Agency (CISA), a U.S. government organization established a task force called the “Space Systems Critical Infrastructure Task Force”. The formation of this group reflects the world's increasing focus on cybersecurity in space, whether for military or commercial use. The group works within the Critical Infrastructure Partnership Advisory Committee (CIPAC) framework to improve the safety and flexibility of commercial space systems.
Based on the above-mentioned attack issue, the FBI's Cybersecurity and Infrastructure Security Agency has provided recommended actions to customers using international satellite communications:
• Process authentication with a secure method
• Enforce the principle of the least privilege
• Review trust relationship
• Implement encryption
• Ensure strong patch and system configuration auditing
• Monitor logs for suspicious activity
• Ensure incident response, flexibility and continuity of operations plans are in place
In conclusion, most of the suggested actions appear to be using the existing solutions. However, how do we implement security control in a physical environment, especially in the space? This situation has increased the cost and resources of conducting audits and physical safety procedures. In 2014, the UK government launched a program to help the corporates and academies use the potential of science and business to support national cybersecurity. I believe that under the cooperation of the industry and government institutions will develop a set of information security management systems which is applicable, adequate and effective for space connectivity in the future.
Ringus Solution Enterprise Limited
A:Unit 4602, 46/F, COSCO Tower, 183 Queen's Road Central, HK
E:info@ringus-solution.com
T:(852) 2907 6011
W:www.ringus-solution.com
Previous Article
Next Article
Extended Reading
<La Vie Tang>A Lost Dynasty
BY Group Branding and Promotion FROM Hantec Group
<Corporate Sandwiches>Confessions of A Hedonist Worker
BY Group Branding and Promotion FROM Hantec Group
"Tibet - The Holy Land" Photography Exhibition of YL Tang (Dubai Station) was Successfully Held
BY Group Branding and Promotion FROM Hantec Group
5th Floor, 34-36 Gray’s Inn Road, London WC1X 8HR
(44) 20 4586 8213
Units 1817-1820, 18/F., Tower 1, Grand Century Place, 193 Prince Edward Road West, Mongkok, Kowloon, HK
(852) 2907 6011