Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers
Abstract
:1. Introduction
1.1. Vulnerabilities and Cyber-Attacks in Space Infrastructure
- Space Equipment (SE) placed in space, such as a satellite, launch vehicle, rover, or flying object like ingenuity;
- Ground Stations (GSs) that directly support space activities;
- Launch Providers (LPs) deliver the space equipment into orbit.
- Kinetic Physical: These weapons target and destroy space-based space infrastructure, causing space debris. The ground-to-space missile (direct-ascent) is an example of a kinetic physical weapon.
- Non-Kinetic Physical: As the name suggests, these ASATs use electromagnetic pulses or microwaves to interrupt adversary space assets.
- Electronic: Signal jamming and spoofing examples of electronic weapons.
- Cyber: Data interception, corruption, man-in-middle attacks, control takeover, and code injection are some examples of cyber ASATs.
1.2. Challenges in Achieving Cyber Resilience for Space Infrastructure
1.2.1. Isolation and Limited Physical Access
1.2.2. SWaP Constraints and Legacy Systems
1.2.3. Cascading Failure Risk and Systemic Vulnerabilities
1.2.4. Unique Cyber Threats in the Space Domain
1.3. Motivation of Present Study
2. Literature Review
- No weapons to be carried in orbit either on satellites or space stations;
- No threat against any other outer space assets;
- Not to encourage other states/organisations to engage in prohibited activities.
- Protect critical space vehicle functions from unauthorised access;
- Implement physical security for command, control, and telemetry systems;
- Defend against communications jamming and spoofing;
- Secure ground systems using National Institute of Standards and Technology (NIST)-aligned cybersecurity best practices;
- Maintain cybersecurity hygiene and intrusion detection for system elements;
- Manage supply chain risks by tracking products and sourcing from trusted suppliers.
3. Methods
3.1. Participants
- Participants must be from the space engineering domain, holding roles such as project or program managers, systems engineers, mission designers, testers, or cybersecurity experts.
- Participants must have practical experience working on complex projects, as their hands-on knowledge is crucial to understanding the challenges and intricacies of designing cyber-resilient infrastructure.
- They could return the consent form via email after affixing an e-signature.
- Alternatively, participants could confirm their consent by replying to the email, indicating that they had read the participant information statement and agreed to participate in the research. For instance, the study advised participants to copy and paste the consent declaration into their reply email.
3.2. Measures
3.3. Procedure
3.4. Data Analytics
- Data immersion and familiarisation;
- Initial code generation;
- Theme identification;
- Theme review and refinement;
- Theme definition and nomenclature;
- Report compilation and presentation.
4. Results and Findings
4.1. Engineering Methodologies and Practices
4.2. Cybersecurity and Resilience Awareness
“Slightly familiar. Absolutely a gap in our current setup.”—Systems Architect, interview participant
4.3. Challenges and Barriers
“The complexity of the end-to-end system, involving multiple parties, is a primary challenge to integrating cyber resilience. Additionally, change management and testing, with high rates of change, pose difficulties. The speed of detection and response to threats is critical, balancing response methods with vulnerabilities and understanding trade-offs, including the risk of over-protecting systems to the point of impeding legitimate access.”—Lead Engineer, interview participant
4.4. Standards, Regulations, and Architectural Aspects
“Moving to a principles and risk-based approach has helped to unlock some of that stuffiness. If standards are risk-based and principles-based rather than compliance-based, then that’s a good thing.”—Cybersecurity Lead Engineer, interview participant
4.5. Framework Development and Implementation
“The cyber resilience framework must be flexible, adaptable, and integrated early into the engineering processes. It is essential from the outset, not as an afterthought, to avoid costly redesigns and rework later in the project. The framework should be fundamental to engineering processes, considering cyber security issues from the beginning. The framework needs to stay up to date with rapid changes in systems and technology, which requires the involvement of skilled professionals continuously assessing and addressing potential vulnerabilities and risks.”—Cyber GRC Engineer, interview participant
5. Discussions
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Gheorghe, A.V.; Georgescu, A.; Bucovețchi, O.; Lazăr, M.; Scarlat, C. New Dimensions for a Challenging Security Environment: Growing Exposure to Critical Space Infrastructure Disruption Risk. Int. J. Disaster Risk Sci. 2018, 9, 555–560. [Google Scholar] [CrossRef]
- Georgescu, A.; Bucovetchi, O.; Tatar, U. Space systems as critical infrastructures. FAIMA Bus. Manag. J. 2018, 6, 24–34. [Google Scholar]
- Commission, E. Proposal for a Regulation of the European Parliament and of the Council: Establishing a Union Resettlement Framework and Amending Regulation (EU) No 516/2014 of the European Parliament and the Council, COM(2016) 705 final, 2016. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A52016PC0468 (accessed on 10 October 2024).
- Adamy, D.L. EW 105: Space Electronic Warfare; Artech House: Norwood, MA, USA, 2021. [Google Scholar]
- Stevenson, A. Oxford Dictionary of English; Oxford University Press: Oxford, UK, 2010. [Google Scholar]
- İnce, F. Military Importance of Space and Space Security; Transnational Press: London, UK, 2024. [Google Scholar]
- Varadharajan, V.; Suri, N. Security challenges when space merges with cyberspace. Space Policy 2024, 67, 101600. [Google Scholar] [CrossRef]
- Jazeera, A. Russia Launches Space Weapon in Path of US Satellite: Pentagon, May 22, 2024. Available online: https://www.aljazeera.com/news/2024/5/22/russia-launches-space-weapon-in-path-of-us-satellite-pentagon (accessed on 10 October 2024).
- Brenner, S.W. At light speed: Attribution and response to cybercrime/terrorism/warfare. J. Crim. L. Criminol. 2006, 97, 379. [Google Scholar]
- Lehto, M.; Neittaanmäki, P. Cyber Security: Critical Infrastructure Protection; Springer Nature: Berlin/Heidelberg, Germany, 2022; Volume 56. [Google Scholar]
- Wheeler, T. In cyberwar, there are no rules. Foreign Policy 2018, 34–41. [Google Scholar]
- Hirshorn, S.R.; Voss, L.D.; Bromley, L.K. Nasa Systems Engineering Handbook; Technical Report; NASA: Washington, DC, USA, 2017.
- Wertz, J.R.; Everett, D.F.; Puschell, J.J. Space Mission Engineering: The New SMAD; Microcosm Press: Hawthorne, CA, USA, 2011. [Google Scholar]
- Georgescu, A.; Gheorghe, A.V.; Piso, M.I.; Katina, P.F. Critical Space Infrastructures: Risk, Resilience and Complexity; Springer: Berlin/Heidelberg, Germany, 2019; Volume 36. [Google Scholar]
- Schrogl, K.U.; Hays, P.L.; Robinson, J.; Moura, D.; Giannopapa, C. Space as a Critical Infrastructure, Handbook of Space Security; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Hughes, K.; di Pasquale, P.; Babuscia, A.; Fesq, L. On-demand command and control of asteria with cloud-based ground station services. In Proceedings of the 2021 IEEE Aerospace Conference (50100), Big Sky, MT, USA, 6–13 March 2021; IEEE: New York, NY, USA, 2021; pp. 1–15. [Google Scholar]
- Way, T. Counterspace Weapons 101—Aerospace Security. Available online: https://aerospace.csis.org/aerospace101/counterspace-weapons-101 (accessed on 1 September 2021).
- Burch, R. Resilient Space Systems Design: An Introduction; CRC Press: Boca Raton, FL, USA, 2019. [Google Scholar]
- Egeli, S. Space-to-Space Warfare and Proximity Operations: The Impact on Nuclear Command, Control, and Communications and Strategic Stability. J. Peace Nucl. Disarm. 2021, 4, 116–140. [Google Scholar] [CrossRef]
- Burnett, D.R.; Beckman, R.; Davenport, T.M. Submarine Cables: The Handbook of Law and Policy; Martinus Nijhoff Publishers: Leiden, The Netherlands, 2013. [Google Scholar]
- Aarne, H. Undersea optical cable network and cyber threats. In Proceedings of the European Conference on Information Warfare and Security, ECCWS, Coimbra, Portugal, 4–5 July 2019; pp. 650–659. [Google Scholar]
- Usman, M.; Qaraqe, M.; Asghar, M.R.; Shafique Ansari, I. Mitigating distributed denial of service attacks in satellite networks. Trans. Emerg. Telecommun. Technol. 2020, 31, e3936. [Google Scholar] [CrossRef]
- Slann, P.A. Anticipating uncertainty: The security of European critical outer space infrastructures. Space Policy 2016, 35, 6–14. [Google Scholar] [CrossRef]
- Shahzad, S.; Joiner, K.; Deane, F.; Qiao, L. Taming the Confluence of Space Systems and Cybersecurity. In Cybersecurity for Decision Makers; CRC Press: Boca Raton, FL, USA, 2023; pp. 147–167. [Google Scholar]
- Baylon, C. Challenges at the intersection of cyber security and space security. Int. Secur. 2014. [Google Scholar]
- Ciampa, P.D.; La Rocca, G.; Nagel, B. A mbse approach to mdao systems for the development of complex products. In Proceedings of the AIAA Aviation 2020 Forum, Virtual Event, 15–19 June 2020; p. 3150. [Google Scholar]
- Yost, B.; Weston, S. State-of-the-Art Small Spacecraft Technology; Technical report; Ames Research Center, Moffett Field: California, CA, USA, 2024.
- Sandau, R.; Brieß, K.; D’Errico, M. Small satellites for global coverage: Potential and limits. ISPRS J. Photogramm. Remote Sens. 2010, 65, 492–504. [Google Scholar] [CrossRef]
- Bankey, V.; Upadhyay, P.K.; Costa, D.B.d. Physical layer security in hybrid satellite-terrestrial relay networks. Phys. Layer Secur. 2021, 1–28. [Google Scholar]
- Han, S.; Li, J.; Meng, W.; Guizani, M.; Sun, S. Challenges of physical layer security in a satellite-terrestrial network. IEEE Netw. 2022, 36, 98–104. [Google Scholar] [CrossRef]
- Shahzad, S.; Qiao, L. Need for a cyber resilience framework for critical space infrastructure. In Proceedings of the International Conference on Cyber Warfare and Security, Albany, NY, USA, 17–18 March 2022; Volume 17, pp. 404–412. [Google Scholar]
- Boschetti, N.; Smethurst, C.; Epiphaniou, G.; Maple, C.; Sigholm, J.; Falco, G. Ground station as a service reference architectures and cyber security attack tree analysis. In Proceedings of the 2023 IEEE Aerospace Conference, Big Sky, MT, USA, 4–11 March 2023; pp. 1–12. [Google Scholar]
- Rieger, C.; Kolias, C.; Ivans, R.C.; Eggers, S. Trade-off analysis of operational technologies to advance cyber resilience through automated and autonomous response to threats. In Proceedings of the 2022 Resilience Week (RWS), National Harbor, MD, USA, 26–29 September 2022; pp. 1–8. [Google Scholar]
- Herget, M.; Saadatmand, F.S.; Bor, M.; Alonso, I.G.; Stefanov, T.; Akesson, B.; Pimentel, A.D. Design space exploration for distributed cyber-physical systems: State-of-the-art, challenges, and directions. In Proceedings of the 2022 25th Euromicro Conference on Digital System Design (DSD), Maspalomas, Spain, 31 August–2 September 2022; pp. 632–640. [Google Scholar]
- Khorrami, F.; Krishnamurthy, P.; Karri, R. Cybersecurity for control systems: A process-aware perspective. IEEE Des. Test 2016, 33, 75–83. [Google Scholar] [CrossRef]
- Wooderson, P.; Ward, D. Cybersecurity Testing and Validation; Technical report; SAE International: Warrendale, PA, USA, 2017. [Google Scholar]
- Glossary, N. Definition of cyber resiliency. Available online: https://csrc.nist.gov/glossary/term/cyber_resiliency (accessed on 25 May 2024).
- Björck, F.; Henkel, M.; Stirna, J.; Zdravkovic, J. Cyber resilience–fundamentals for a definition. In New Contributions in Information Systems and Technologies; Springer: Berlin/Heidelberg, Germany, 2015; pp. 311–316. [Google Scholar]
- Sadraey, M.H. Aircraft Design: A Systems Engineering Approach; John Wiley & Sons: Hoboken, NJ, USA, 2012. [Google Scholar]
- Nejib, P.; Beyer, D.; Yakabovicz, E. Systems security engineering: What every system engineer needs to know. In Proceedings of the INCOSE International Symposium; Wiley Online Library: Hoboken, NJ, USA, 2017; Volume 27, pp. 434–445. [Google Scholar]
- Falco, G. The vacuum of space cyber security. In Proceedings of the 2018 AIAA SPACE and Astronautics Forum and Exposition, Orlando, FL, USA, 17–19 September 2018; p. 5275. [Google Scholar]
- McGrath, E.; Ardis, M.; Lowes, S.; Lam, S.; Jurado, C. Research on building education and workforce capacity in systems engineering. In Proceedings of the Workshop Report, Systems Engineering Research Center, Arlington, TX, USA, 31 October 2011. [Google Scholar]
- O’Connor, S.E. Managing the Cyber-Related Risks to Space Activities. In Risk Management in Outer Space Activities: An Australian and New Zealand Perspective; Springer: Berlin/Heidelberg, Germany, 2022; pp. 151–175. [Google Scholar]
- Yaacoub, J.P.; Noura, H.; Salman, O.; Chehab, A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 2020, 11, 100218. [Google Scholar] [CrossRef]
- Maple, C.; Bradbury, M.; Yuan, H.; Farrell, M.; Dixon, C.; Fisher, M.; Atmaca, U.I. Security-minded verification of space systems. In Proceedings of the 2020 IEEE Aerospace Conference, Big Sky, MT, USA, 7–14 March 2020; pp. 1–13. [Google Scholar]
- Livingstone, D.; Lewis, P. Space, the Final Frontier for Cybersecurity? Chatham House: London, UK; The Royal Institute of International Affairs: London, UK, 2016. [Google Scholar]
- Jakhu, R.S.; Pelton, J.N.; Nyampong, Y.O.M. Space Mining and Its Regulation; Springer: Berlin/Heidelberg, Germany, 2017; Volume 106. [Google Scholar]
- Hutchins, R. Cyber Defense of Space Assets; Tufts School of Engineering: Medford, MA, USA, 2016; pp. 1–18. [Google Scholar]
- Shackelford, S.J.; Fort, T.L.; Charoen, D. Sustainable cybersecurity: Applying lessons from the green movement to managing Cyber Attacks. U. Ill. L. Rev. 2016, 2016, 1995. [Google Scholar] [CrossRef]
- Zhang, P.; Chen, N.; Shen, S.; Yu, S.; Kumar, N.; Hsu, C.H. AI-enabled space-air-ground integrated networks: Management and optimization. IEEE Netw. 2023, 38, 186–192. [Google Scholar] [CrossRef]
- Georgescu, A.; Botezatu, U.E.; Arseni, S.; Barbu, A.; Boiangiu, L. Deliberate threats to critical space infrastructure—ASAT and the strategic context. Sci. Bull. Nav. Acad. 2015, 18, 419–427. [Google Scholar]
- Hussain, E. CPEC: Governance and security challenges—Implications for the Belt and Road Initiative. Chin. Political Sci. Rev. 2019, 4, 135–147. [Google Scholar] [CrossRef]
- Pavur, J.; Martinovic, I. Sok: Building a launchpad for impactful satellite cyber-security research. arXiv 2020, arXiv:2010.10872. [Google Scholar]
- Van der Watt, R.; Slay, J. Modification of the Lockheed Martin Cyber Kill Chain (LMCKC) for cyber security breaches concerning Low Earth Orbit (LEO) Satellites. In Proceedings of the 16th International Conference on Cyber Warfare and Security, Online, 25–26 February 2021; pp. 473–476. [Google Scholar]
- Seedhouse, E. SpaceX: Making Commercial Spaceflight a Reality; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Bikos, A.N.; Kumar, S.A. Enhancing space security utilizing the blockchain: Current status and future directions. In Proceedings of the 2022 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), Winnipeg, MB, Canada, 12–14 October 2022; pp. 77–82. [Google Scholar]
- Cinar, B. Supply Chain Cybersecurity: Risks, Challenges, and Strategies for a Globalized World. J. Eng. Res. Rep. 2023, 25, 196–210. [Google Scholar] [CrossRef]
- Jacobs, B. A Comparative Study of EU and US Regulatory Approaches to Cybersecurity in Space. Air Space Law 2023, 48, 477–492. [Google Scholar] [CrossRef]
- Martin, A.S. Outer space, the final frontier of cyberspace: Regulating cybersecurity issues in two interwoven domains. Astropolitics 2023, 21, 1–22. [Google Scholar] [CrossRef]
- Abu-Bonsra, N.A. Summary Report of the International Institute of Air and Space Law’s (IIASL) International Air Law Conference on Aviation Cybersecurity, Leiden, Netherlands on 11th of May 2023. Air Space Law 2023, 48. [Google Scholar] [CrossRef]
- Vessels, L.; Heffner, K.; Johnson, D. Cybersecurity risk assessment for space systems. In Proceedings of the 2019 IEEE Space Computing Conference (SCC), Pasadena, CA, USA, 30 July–1 August 2019; pp. 11–19. [Google Scholar]
- Lane, D.; Leon, E.; Solio, D.; Cunningham, D.; Obukhov, D.; Tacliad, F.C. High-Assurance Cyber Space Systems for Small Satellite Mission Integrity. 2017. Available online: https://digitalcommons.usu.edu/smallsat/2017/all2017/95/ (accessed on 10 October 2024).
- Kirshner, M. Model-Based Systems Engineering Cybersecurity for Space Systems. Aerospace 2023, 10, 116. [Google Scholar] [CrossRef]
- Visner, S.S. Development of Cybersecurity Norms for Space Systems. In ASCEND 2021; The MITRE Corporation: McLean, VA, USA, 2021; p. 4050. [Google Scholar]
- Bodeau, D.; Brtis, J.; Graubart, R.; Salwen, J. Resiliency techniques for systems-of-systems extending and applying the Cyber Resiliency Engineering Framework to the space domain. In Proceedings of the 2014 7th International Symposium on Resilient Control Systems (ISRCS), Denver, Colorado, USA, 19-21 August 2014; pp. 1–6. [Google Scholar]
- Januário, F.; Cardoso, A.; Gil, P. Resilience enhancement through a multi-agent approach over cyber-physical systems. In Proceedings of the 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Bali, Indonesia, 24–26 July 2018; pp. 231–236. [Google Scholar]
- Freeland, S.; Gruttner, E. The laws of war in outer space. In Handbook of Space Security: Policies, Applications and Programs; Springer: Berlin/Heidelberg, Germany, 2020; pp. 73–93. [Google Scholar]
- Martinez, P. The UN COPUOS Guidelines for the Long-Term Sustainability of Outer Space Activities. J. Space Saf. Eng. 2021, 8, 98–107. [Google Scholar] [CrossRef]
- Policy, N.S. National Space Policy Directive5. Cybersecur. Princ. Space Syst. 2020. [Google Scholar]
- Schmitt, M.N. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
- NC, K.D. Creativity in the design process: Co-evolution of problem-solution. Des. Stud. 2001, 22, 13. [Google Scholar]
- DiMase, D.; Collier, Z.A.; Heffner, K.; Linkov, I. Systems engineering framework for cyber physical security and resilience. Environ. Syst. Decis. 2015, 35, 291–300. [Google Scholar] [CrossRef]
- Bodeau, D.; Graubart, R.; Picciotto, J.; McQuaid, R. Cyber Resiliency Engineering Framework; MTR110237; MITRECorporation: Bedford, MA, USA, 2011. [Google Scholar]
- Andreas, A.; Abdelmajid, K. A semantic model-based security engineering framework for cyber-physical systems. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021. [Google Scholar]
- Falco, G. Cybersecurity principles for space systems. J. Aerosp. Inf. Syst. 2019, 16, 61–70. [Google Scholar] [CrossRef]
- Manulis, M.; Bridges, C.P.; Harrison, R.; Sekar, V.; Davis, A. Cyber security in new space: Analysis of threats, key enabling technologies and challenges. Int. J. Inf. Secur. 2021, 20, 287–311. [Google Scholar] [CrossRef]
- Tedeschi, P.; Sciancalepore, S.; Di Pietro, R. Satellite-based communications security: A survey of threats, solutions, and research challenges. Comput. Netw. 2022, 216, 109246. [Google Scholar] [CrossRef]
- Braun, V.; Clarke, V. Using thematic analysis in psychology. Qual. Res. Psychol. 2006, 3, 77–101. [Google Scholar] [CrossRef]
- Vaismoradi, M.; Jones, J.; Turunen, H.; Snelgrove, S. Theme Development in Qualitative Content Analysis and Thematic Analysis; Sciedu Press: Richmond Hill, ON, Canada, 2016. [Google Scholar]
- Hirai, A.; Kovalyova, A. Speech-to-Text Applications’ Accuracy in English Language Learners’ Speech Transcription; University of Hawaii National Foreign Language Resource Center: Honolulu, HI, USA, 2024. [Google Scholar]
- Frey, T.K.; Bloch, B.S. Using Microsoft Teams to Facilitate Asynchronous Online Focus Groups. Int. J. Qual. Methods 2023, 22, 16094069231211251. [Google Scholar] [CrossRef]
- Ando, H.; Cousins, R.; Young, C. Achieving saturation in thematic analysis: Development and refinement of a codebook. Compr. Psychol. 2014, 3, 03-CP. [Google Scholar] [CrossRef]
- DeCuir-Gunby, J.T.; Marshall, P.L.; McCulloch, A.W. Developing and using a codebook for the analysis of interview data: An example from a professional development research project. Field Methods 2011, 23, 136–155. [Google Scholar] [CrossRef]
- Christou, P.A. Thematic Analysis through Artificial Intelligence (AI). Qual. Rep. 2024, 29, 560–576. [Google Scholar] [CrossRef]
- Measuring Inter-Coder Agreement: Why Cohen’s Kappa is Not a Good Choice. Available online: https://atlasti.com/research-hub/measuring-inter-coder-agreement-why-cohen-s-kappa-is-not-a-good-choice (accessed on 30 September 2024).
- Vasiliev, Y. Natural Language Processing with Python and spaCy: A Practical Introduction; No Starch Press: San Francisco, CA, USA, 2020. [Google Scholar]
- Honnibal, M.; Montani, I. spaCy 2: Natural language understanding with Bloom embeddings, convolutional neural networks and incremental parsing. Appear 2017, 7, 411–420. [Google Scholar]
- Ahmad, K.; Ayub, M.A.; Ahmad, K.; Khan, J.; Ahmad, N.; Al-Fuqaha, A. Merit-based fusion of nlp techniques for instant feedback on water quality from twitter text. arXiv 2022, arXiv:2202.04462. [Google Scholar]
- Parker, R.D.; Mancini, K.; Abram, M.D. Natural language processing enhanced qualitative methods: An opportunity to improve health outcomes. Int. J. Qual. Methods 2023, 22, 16094069231214144. [Google Scholar] [CrossRef]
- Baker, S.E.; Edwards, R. How Many Qualitative Interviews is Enough. 2012. Available online: http://eprints.ncrm.ac.uk/2273/ (accessed on 7 November 2016).
- Moral, C.; de Antonio, A.; Ferre, X.; Lara, G. A coding system for qualitative studies of the information-seeking process in computer science research. Inf. Res. Int. Electron. J. 2015, 20, n4. [Google Scholar]
- Rubin, H.J.; Rubin, I.S. Qualitative Interviewing: The Art of Hearing Data; Sage: Newcastle upon Tyne, UK, 2011. [Google Scholar]
- Boggero, L.; Ciampa, P.D.; Nagel, B. An MBSE architectural framework for the agile definition of complex system architectures. In Proceedings of the AIAA Aviation 2022 Forum, Chicago, IL, USA, 27 June–1 July 2022; p. 3720. [Google Scholar]
- Papke, B.L.; Wang, G.; Kratzke, R.; Schreiber, C. Implementing MBSE–an enterprise approach to an enterprise problem. In Proceedings of the INCOSE International Symposium, Vienna, Austria, 12 October–12 November 2020; Wiley Online Library: New York, NY, USA, 2020; Volume 30, pp. 1550–1567. [Google Scholar]
- Henderson, K.; Salado, A. Value and benefits of model-based systems engineering (MBSE): Evidence from the literature. Syst. Eng. 2021, 24, 51–66. [Google Scholar] [CrossRef]
- Brett, M. A principles-led approach to information assurance and governance in local government. Cyber Secur. A Peer-Rev. J. 2022, 5, 361–377. [Google Scholar] [CrossRef]
- Fowler, S.; Sitnikova, E. Toward a framework for assessing the cyber-worthiness of complex mission critical systems. In Proceedings of the 2019 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 12–14 November 2019; pp. 1–6. [Google Scholar]
- Buck, C.; Olenberger, C.; Schweizer, A.; Völter, F.; Eymann, T. Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 2021, 110, 102436. [Google Scholar] [CrossRef]
- Shaked, A.; Tabansky, L.; Reich, Y. Incorporating systems thinking into a cyber resilience maturity model. IEEE Eng. Manag. Rev. 2020, 49, 110–115. [Google Scholar] [CrossRef]
- Shaaban, A.R.; Abdelwaness, E.; Hussein, M. TCP and HTTP Flood DDOS Attack Analysis and Detection for space ground Network. In Proceedings of the 2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES), Cairo, Egypt, 4–6 September 2019; pp. 1–6. [Google Scholar]
- Shaaban, A.R.; Abdelwanees, E.; Hussein, M. Distributed Denial of Service Attacks Analysis, Detection, and Mitigation for the Space Control Ground Network: DDoS attacks analysis, detection and mitigation. Proc. Pak. Acad. Sci. A Phys. Comput. Sci. 2020, 57, 97–108. [Google Scholar]
- Hunker, J.; Probst, C.W. Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2011, 2, 4–27. [Google Scholar]
- Bureau, F.I.P. Unintentional insider threats: A foundational study. Softw. Eng. Inst. Tech. Rep. 2013. [Google Scholar]
- Sarkar, K.R. Assessing insider threats to information security using technical, behavioural and organisational measures. Inf. Secur. Tech. Rep. 2010, 15, 112–133. [Google Scholar] [CrossRef]
- Fortescue, P.; Swinerd, G.; Stark, J. Spacecraft Systems Engineering; John Wiley & Sons: Hoboken, NJ, USA, 2011. [Google Scholar]
- Brod, M.; Tesler, L.E.; Christensen, T.L. Qualitative research and content validity: Developing best practices based on science and experience. Qual. Life Res. 2009, 18, 1263–1278. [Google Scholar] [CrossRef]
- Arpaci, I.; Sevinc, K. Development of the cybersecurity scale (CS-S): Evidence of validity and reliability. Inf. Dev. 2022, 38, 218–226. [Google Scholar] [CrossRef]
- Zwilling, M.; Klien, G.; Lesjak, D.; Wiechetek, Ł.; Cetin, F.; Basim, H.N. Cyber security awareness, knowledge and behavior: A comparative study. J. Comput. Inf. Syst. 2022, 62, 82–97. [Google Scholar] [CrossRef]
Role | No. of Participants | Sector | Average Experience (Years) |
---|---|---|---|
Lead Engineers | 4 | Defence Industry, Aerospace, Consulting | 18+ |
Architects | 3 | Defence Industry, Aerospace, Consulting | 20+ |
Testers | 2 | Defence Industry, Aerospace | 12+ |
Aerospace Engineers | 4 | Aerospace | 10+ |
Cybersecurity Experts | 4 | Defence Industry, Aerospace, Consulting | 15+ |
Cyber Governance | 4 | Aerospace, Consulting | 14+ |
Technical Project Managers | 2 | Defence Industry, Aerospace | 20+ |
Systems Engineers | 4 | Government Agency | 20+ |
DevSecOps Engineers | 2 | Government Agency | 10+ |
Space Lawyer | 1 | Consulting | 15+ |
No | Theme | Question |
---|---|---|
Q1 | Engineering Methodologies and Practices | Effective engineering methodologies for designing, developing, and deploying critical systems |
Q2 | Engineering Methodologies and Practices | Incorporation of cybersecurity and resilience considerations into the engineering design process |
Q3 | Engineering Methodologies and Practices | Design principles and practices to enhance cyber resilience in systems engineering |
Q4 | Cybersecurity and Resilience Awareness | Familiarity with the concept of cybersecurity and resilience in the context of systems engineering |
Q5 | Cybersecurity and Resilience Awareness | Understanding of critical cyber vulnerabilities and risks specific to the industry |
Q6 | Cybersecurity and Resilience Awareness | Current level of cybersecurity and resilience in ground stations used for operations |
Q7 | Challenges and Barriers | Main challenges to integrating cyber resilience into system design |
Q8 | Challenges and Barriers | Significant challenges faced when ensuring the cyber resilience of complex systems |
Q9 | Challenges and Barriers | Potential challenges or barriers that might arise during the implementation of the cyber resilience engineering framework |
Q10 | Standards, Regulations, and Architectural Aspects | Impact of international and domestic standards and regulations on cybersecurity and resilience |
Q11 | Standards, Regulations, and Architectural Aspects | Crucial system-level architectural aspects for achieving cyber resilience in systems engineering |
Q12 | Framework Development and Implementation | Specific requirements or features expected in a new engineering framework for incorporating cyber resilience |
Q13 | Framework Development and Implementation | Integration of the cyber resilience framework into engineering processes and its flexibility and adaptability |
Q14 | Framework Development and Implementation | Metrics or indicators for assessing the effectiveness of the framework in enhancing cyber resilience |
Q15 | Framework Development and Implementation | Effective training formats and resources for promoting the incorporation of the framework into projects |
Stage | Description |
---|---|
Interview | Invitations were sent by the chief investigator. Participants chose to meet either face-to-face or via Microsoft Teams. |
Transcription | Interviews were automatically transcribed using Microsoft Teams. Transcripts were reviewed and checked for accuracy against the recordings. |
Coding | Inductive coding was applied to each data item, ensuring equal attention throughout the process. |
Verification | Codes were validated by comparing AtlasTI’s AI-generated codes [83,84] with spaCy libraries [86] and verified by human experts. Inductive codes were also cross-checked with deductive codes to identify new insights. |
Thematic Analysis | Themes were identified, collated, and cross-referenced with each other and the original data set [79]. |
Analysis | The final analysis ensured validity and reliability using rigorous methodological approaches. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shahzad, S.; Joiner, K.; Qiao, L.; Deane, F.; Plested, J. Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers. Systems 2024, 12, 434. https://doi.org/10.3390/systems12100434
Shahzad S, Joiner K, Qiao L, Deane F, Plested J. Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers. Systems. 2024; 12(10):434. https://doi.org/10.3390/systems12100434
Chicago/Turabian StyleShahzad, Syed, Keith Joiner, Li Qiao, Felicity Deane, and Jo Plested. 2024. "Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers" Systems 12, no. 10: 434. https://doi.org/10.3390/systems12100434
APA StyleShahzad, S., Joiner, K., Qiao, L., Deane, F., & Plested, J. (2024). Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers. Systems, 12(10), 434. https://doi.org/10.3390/systems12100434