PROTECTING SATELLITE LINK

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

SPECIFIC ISSUES ON PROTECTING YOUR SATELLITE LINK AND PRIVACY:

SPECIFIC ISSUES ON PROTECTING YOUR SATELLITE LINK AND PRIVACY PRESENTERS Kazema ,T-M0 44 /T.11 Jehovajire K.N Mazima-M051/T.11

Outlines:

Outlines Introduction Vulnerabilities of Satellite Communication Link Threats and vulnerable components Intentional Threats to Commercial Satellite Systems Protecting Satellite Communication Link Security Techniques to Protect TT&C Data Links, Satellites, and Ground Stations Conclusion References

Introduction :

Introduction Government and private-sector entities rely on satellites for services such as communication, navigation, remote sensing, imaging, weather and meteorological support. Although the government owns satellites, it also relies for certain services on satellites owned and operated by commercial satellite service providers. Due to the sensitivity, threats and vulnerability of some operations, security has become very important. For that reason ,a range of security techniques have been developed for protecting satellite system.

Introduction cont . . .:

Introduction cont . . . The application of these (security) techniques varies across federal agencies and the private sector. Commercial satellite service providers typically use some of these security techniques to meet most of their customer’s security requirements, and they base their decisions on business objectives. Generally, the military applies more stringent security techniques to their satellites than do civilian agencies or the private sector.

Introduction cont...:

Introduction cont... From; DOD and GAO [1]

Vulnerabilities of Satellite Communication Link :

Vulnerabilities of Satellite Communication Link Satellites are vulnerable to various threats in all parts of its systems. Such threats can be ground-based, space-based, and interference-oriented. The probability of these threats occurring and the difficulty of exploiting these vulnerabilities vary.

Threats and vulnerable components :

Threats and vulnerable components From; DOD and GAO [1]

Threats and vulnerable components cont . . .:

Threats and vulnerable components cont . . . Links are vulnerable both to natural conditions (in space and in the atmosphere) and to congestion. They can be severely degraded by the effects of solar activity and atmospheric disturbances. Both orbital and spectral congestion are a threat to links (as well as to satellites). .

Threats and vulnerable components cont …:

Threats and vulnerable components cont … Source:www.coolest-gadgets.com [2]

Intentional Threats to Commercial Satellite Systems :

Intentional Threats to Commercial Satellite Systems From; DOD and GAO [1]

Protecting Satellite Communication Link :

Protecting Satellite Communication Link Include System of surveillance, Assessment, Early warning, and Response mechanisms to mitigate the potential for threats. Protecting satellite systems against these threats requires attention to; The satellite. The communications ground stations. Communications links between satellite and ground stations.

Security Techniques to Protect TT& C and Data Links, Satellites, and Ground Stations :

Security Techniques to Protect TT& C and Data Links, Satellites, and Ground Stations A range of security techniques is available for protecting satellite systems encryption on TT&C and data links; robust parts on the satellites; physical and cyber security controls at the ground stations. High power radio frequency (RF) uplinks. spread spectrum communications.

Security Techniques Available to Address Unintentional and Intentional Threats:

Security Techniques Available to Address Unintentional and Intentional Threats From; DOD and GAO [1]

Conclusion:

Conclusion These are techniques and methods make the satellite communication more secure against possible attacks The methods present today tackle possible attack against satellite communication More work is still needed because of the complexity of the matter Future work can be carried out which will include evaluation of techniques in terms of their efficiency to provide protection

References:

References [1].DOD and GAO,”CRITICAL INFRASTRUCTURE PROTECTION” ,August 2002 [2].www.coolest-gadgets.com,14/05/2012:16:35 [3]. www.satellite-evolution.com,17/05/2012:10:26

THANK YOUR YOUR !!!!!:

THANK YOUR YOUR !!!!! Source: www.satellite-evolution.com

authorStream Live Help