Space: The Last Cybersecurity Frontier?

Brought to you by CYRIN

Cybersecurity has truly entered a new era and a new frontier - space. David Gilbert, writing in Wired, reports that “the U.S. military recently launched a groundbreaking initiative to strengthen ties with the commercial space industry.” According to the Department of Defense, the goal of this new partnership between government and private contractors, the Commercial Augmentation Space Reserve (CASR), is to enhance U.S. national security and the country’s “competitive advantage in space.”

Space is a growing part of the critical infrastructures in the world, and the risks of cyberattacks on satellites have increased, with commercial spacecraft and military communications at risk of being dangerously compromised.

There have been a number recent attacks that have shifted the focus to cybersecurity in space: The 2022 Viasat KA-SAT attack, attributed to Russian hackers, caused widespread Internet outages and disruptions in remote sensing services across Ukraine and other parts of Europe. The 2022 intrusion into SpaceX’s Starlink terminals highlighted the sophistication of cyberattacks against satellite systems. Attackers exploited a vulnerability in the satellites’ communication system, demonstrating the need for stronger encryption and more secure software. “Although SpaceX swiftly addressed the vulnerability in its system, the incident highlighted the potential for more clever attacks that could disrupt critical infrastructure and services in the future.”

In these cases, services were severely disrupted, but there are other possible attacks that would have more severe consequences; for example, anti-satellite (ASAT) weapons are specifically designed to compromise or even destroy spacecraft. But more often than not, cyberattacks can be carried out in ways that are cheaper, quicker, and more difficult to trace.

This strategic shift with CASR by the Department of Defense is being done to encourage more global companies to participate. The hope is that the supply chain for the US military will move from a restricted pool of commercial suppliers to a broader spectrum of partners. This could complicate the choice of security systems; commercial components may be more advanced, but their vulnerabilities may be unknown. Other issues include making sure standards are upheld consistently across systems, both commercial and military. However, the U.S. military believes that CASR will give it advanced strategic capabilities, and that potential risks can be minimized by actively avoiding overreliance on any single commercial entity.

What is the future of cybersecurity in space?

A recent story on GovTech talks about a new report called Outer Space Cyberattacks, from California Polytechnic State University's Ethics + Emerging Sciences Group think tank, and it highlights different manners and motivations for cyberattacks in space. It also includes a tool that can help cybersecurity teams create hypothetical threat scenarios. Technologies and threats are constantly evolving, and as such it's important to consider a wide variety of hypothetical near-and far-future concerns. This can help shape space cybersecurity policies that remain relevant long term. The report authors write that “Outer space is the next frontier for cybersecurity.” This is primarily because so much of satellite/space revolves around safeguarding technologies that are essential to modern life: weather forecasts, navigation services for vehicles, support for credit card processing and more.

The report goes on to say that maintaining up to date cybersecurity protocols is vital but “especially difficult.” Potential vulnerabilities in the supply chain and third-party risks remain crucial as well. And it’s not just human actors and cybercriminals that’s a problem in space. Solar flares are becoming more problematic, and space radiation could cause “bit flips - turning 1s into 0s, and vice versa - that corrupt the storage of cryptographic keys onboard, which could cause a valid credential to cease working and deny access.”

According to Booz Allen Hamilton, the threats in space are many, including: the technology of rival nations, outdated systems (designed before space was a viable or contested domain); increased connectivity, which creates a larger attack surface and more potential vulnerabilities. As Brad Stone, Booz Allen’s chief information officer says, “For space cyber defense, you need to understand the mission, the ecosystem, and what threats make this environment different—whether in the systems themselves or the processes used to manage those systems.” According to Booz Allen, a crucial part of this challenge will be a migration to “open systems architecture” that will serve as the “intersection of cybersecurity and space security.” All space systems will also require safeguards such as “zero-trust architectures, secure cloud environments with continuous monitoring and interoperability over simplified networks.” This and more will be a part of the next stage of cybersecurity in the wide world of space.

The next steps for robust cybersecurity in space

Sylvester Kaczmarek, reporting for Scientific American, states that one of the most pressing issues for satellites is, “a necessity for global security and reliability.” Satellites are a part of many aspects of modern life, including “navigation, communication and commerce.” Cyberattacks could seriously jeopardize our increasingly interconnected world. Satellites have evolved significantly since the Sputnik of 1957 and play a “critical role” in connectivity and therefore, security, across the globe. They are responsible for GPS, Internet access, international defense systems, global environmental monitoring and are therefore potential crucial targets for cyberattacks. In 2021, it was estimated that the “space economy” was $386 billion and growing. In such a high-profile market, the importance of protecting satellites against cyberthreats cannot be overstated.

As noted on GovTech, satellite security is increasingly important, and multilayered consisting of the technology on the ground, the equipment in orbit and the tech providing communication linkage between the two. The ground side involves systems for processing data and disseminating information. Ensuring that hackers cannot penetrate these systems means “communication between instruments in orbit and the ground systems must be encrypted and safeguarded against attacks like jamming or spoofing.” The other problem is that equipment in space could be there for 15 years or more, and technological advances during that period could make obsolescence in the satellite a serious concern.

Chuck Brooks, reporting for Forbes, makes clear the growing concerns around security for satellites. He writes that “due to the falling cost of space access and the growing financial possibilities in the space industry, cybercrime against space systems is becoming more prevalent, which presents a great problem. Because of the dramatic increase in the volume of data arriving from satellites, concerns have been raised about the security and integrity of data transport and storage between satellites and ground systems.” Addressing these vulnerabilities in a consistent, multi-faceted approach remains crucial.

Also, according to Forbes, is the sheer number of satellite launches in the last few years. Thousands of satellites are in low Earth orbit, making them susceptible to above- and below-earth intrusions. Many communication networks are currently switching from terrestrial (land-based) to cloud-based communications due to the ability of satellites to transfer data over enormous, global distances. By 2030, it’s estimated that “25,000 satellites carrying over 500,000 petabytes of data will be launched.” This can only increase the attack surface of space and the ensuing security concerns this will create.

DarkReading also took a look at the ‘Outer Space Cyberattacks’ study done by the researchers at Cal Poly and focused on another aspect of the 95-page report. Their concern, like Forbes, was that a driver of cyber threats was how many assets have been put into space: “the rapid congestion of outer space in recent years as the result of nations and private companies racing to deploy space technologies.”

As the report notes, the number of registered objects in space - most of which are satellites - has been climbing at an astonishing pace recently after holding steady at around 150 new objects per year between 1965 and 2012. In the last two years that number stood at 2,600 new objects on average each year. The remoteness — and vastness of space — also makes it more challenging for stakeholders - both government and private - to address vulnerabilities in space technologies. There are numerous objects that were deployed into space long before cybersecurity became a mainstream concern that could become targets for attacks. Even today, “as crazy as it sounds, satellites are still being launched with no cybersecurity, such as CubeSats that are popular with university labs and others for their inexpensive cost to build and launch," the report noted. "They typically have neither the onboard room to squeeze in cybersecurity components nor the budget for it anyway."

Government response to cybersecurity in space

The military is a primary mover in helping to fortify cybersecurity in space and make it cyber resilient with the ability to protect assets, materials, and information. In a recent AFCEA Signal article, Kimberly Underwood noted the ways in which the military is strengthening cyber assets for the next generation. The new “Space Force” service will cultivate what it refers to as “cyber warriors” that will expand security “missions and operations.” The Space Force is concerned with providing security for early warning systems; intelligence, surveillance and reconnaissance satellites; nuclear command and control systems; weapons delivery platforms; satellite communications capabilities; GPS; and other systems. Moreover, adversaries are acutely aware of U.S. reliance on space and have made U.S. high-value, high-priority space systems a prime target.

In defense of the increasingly diverse and complicated cyber terrain, the Space Force intends to “deliberately develop” these cyber warriors throughout the course of their miliary careers to achieve distinct proficiency levels, labeled as basic, senior and master, which will reflect their demonstrated level of competency.

Space, indeed, is the new, exciting and unknown frontier for cybersecurity, and it will require the cooperation of government, and the private and public sectors to ensure a cybersafe future in the years ahead.


How can CYRIN help?

As noted in Wired, being able to act across the commercial and defense sectors will require key skills—one of which is being informed and educated on cybersecurity. Whether it’s in space, on the ground or points in-between, at CYRIN we know that training and education is critical when it comes to cybersecurity. Training or lack of it will have consequences. Government, education, industry, basically all parties to the situation can become part of the solution.

We continue to work with our industry partners to address major challenges including incident response, ransomware, and phishing and set up realistic scenarios that allow them to train their teams and prepare new hires for the threats they will face. Government agencies have been using CYRIN for years, training their front-line specialists on the real threats faced on their ever-expanding risk surface.

For educators, we consistently work with colleges and universities both large and small to create realistic training to meet the environment students will encounter when they graduate and enter the workforce.

In an increasingly digitized world, training, and experiential training is critical. Unless you get the “hands-on” feel for the tools and attacks and train on incident response in real world scenarios, you just won’t be prepared for when the inevitable happens. A full-blown cyberattack is not something you can prepare for after it hits.

The best time to plan and prepare is before the attack. Our training platform teaches fundamental solutions that integrate actual cyber tools from CYRIN’s labs that allow you to practice 24/7, in the cloud, no special software required. Our new programs, including Digital Twins, can create real-world conditions for you to practice before you must act. Cyber is a team effort; to see what our team can do for you take a look at our course catalog, or better yet, contact us for further information and your personalized demonstration of CYRIN. Take a test drive and see for yourself!
 


You Might Also Read: 

Cyber Insurance: The Cost Of Doing Business:  

Image: Unsplash


If you like this website and use the comprehensive7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Britain Convenes An International Cyber Skills Conference
US Healthcare Firm Loses 22GB of Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.