Page 160 - Cyber Defense eMagazine January 2024
P. 160

increased bandwidth, cybersecurity,  resilience, and interoperability among the U.S. and its international
            partners.



            Why SATCOM cybersecurity  is critical

            Satellite operations  are built on memory, compute and communications  infrastructures.  These systems
            rely on microelectronics and circuitry and are increasingly connected to the internet. As a result, both in-
            orbit satellites and their ground operations may contain network vulnerabilities that bad actors can exploit.

            If a malicious actor successfully deployed a phishing or ransomware attack to gain control of a network
            of terrestrial-based stations that are communicating commands to a satellite constellation, the attackers
            could  issue  commands  to  alter  a  satellite’s  telemetry,  control,  memory  and  content.  From  there,  the
            attackers could use their own wireless uplink to mimic command and control signals to targeted satellites
            completely taking over a target satellite.

            With satellites now responsible  for critical functions  such as military communications,  national defense
            systems, missile launch detection, aircraft navigation services and much more, such an attack could have
            seismic consequences.  It’s imperative that the U.S. government  continue to invest in a system such as
            PATS and prioritize international cooperation with our allies to improve global SATCOM security.



            Bolstering satellite and ground system cybersecurity postures

            Comprehensive  SATCOM security  requires diligence  and dedication  to ensure  systems are kept up to
            date; however, this investment is well worth it to avoid the potentially severe outcome of a cyberattack.

            Legacy systems are a primary hurdle that engineers and IT professionals must overcome when striving
            to secure satellite constellations and ground systems. Many satellites that were engineered decades ago
            are  still  in-orbit  and  being  used  today,  however,  the  notion  of  a  cyberattack  against  a  satellite  was
            considered  impossible  when those systems  were developed  and launched. Therefore,  few safeguards
            were put in place to defend against cyberattacks.

            While the ability to push upgrades  via software  is inherent to each spacecraft’s  operating  system,  it is
            important to realize that comprehensive security is more than just a piece of software and should include
            an architecture that involves authentication  layers and encryption.  Even the ground control data link to
            the satellite can potentially be compromised with the limited encryption used in legacy SATCOM systems.


            However, the ability to provide a software upgrade and add layers of security to the legacy satellite itself
            is often limited when the satellite utilizes a first or second-generation  microprocessor,  whereas modern,
            advanced  cybersecurity  software  systems  require  a  fifth  or  sixth  generation  processor.  As  such,  it’s
            imperative to invest in and protect the numerous servers and command controls on the ground. To defend
            the ground  base  network  and  provide  a more  sophisticated  level of  security,  it’s critical  to  ensure  the
            entire architecture has the authentication, encryption and different layers of protection necessary to deter
            and defend against bad actors. With each of those security layers receiving  updates against emerging
            threats.




            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          160
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   155   156   157   158   159   160   161   162   163   164   165