Title : Verifying and Validating Defensive Designs and Implementations for Space-Based Assets in Cyberspace

Author : A.Sai Krishna, Shaik Maseer, P.Goutham Kumar, Sala Mohan Rao

Abstract :

Unlike dangers such as radioactivity that have always been a part of space travel, a malevolent and enduring threat can change over time. As a result, conventional systems engineering methods and models may need to be extended or modified to successfully handle the more dynamic behavior and uncertainty of modern mission systems.intelligence based features of one's opponent. This document details the implementation of a typical espionage assault against mission systems that have been "secured" in the conventional sense, such as by being in accordance with the standard IT Security Plan. By analyzing a real-world assault in the context of a task, we were able to pinpoint the most pressing issues in need of systems engineering attention moving forward. In particular, initiatives that seek to fortify mission systems against the online enemy. In brief, the basic espionage example given here shows how a group of "secure" computers can be constructed into a

[ PDF ]

Indexing

Impact Indexing 2 Google Index Indexing 4 Indexing 5

Submit Article

Email: editor@ijeri.info

International Journal of Engineering Research & Informatics (IJERI)
E-ISSN: 2348-6481

COPYRIGHT NOTICE: © 2014–2025. All rights reserved to IJERI. No part of this publication may be reproduced, stored, or transmitted in any form or by any means without prior written permission from the Publisher. Authorization to photocopy items for internal and personal use by subscribers is granted by the copyright holder. This consent does not extend to other kinds of copying such as reproduction for general distribution, resale, or use in derivative works.

DISCLAIMER: The Publisher and the Editorial Board of IJERI shall not be held responsible for any errors, inaccuracies, or consequences arising from the use of information contained in this journal. The views and opinions expressed in published articles are solely those of the respective authors and do not necessarily reflect the official policy or position of the Publisher or Editors.