{"id":6819,"date":"2020-11-12T15:09:33","date_gmt":"2020-11-12T18:09:33","guid":{"rendered":"http:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6819"},"modified":"2020-11-12T15:09:33","modified_gmt":"2020-11-12T18:09:33","slug":"asegurando-el-espacio-gemelos-digitales-satelites-y-ciberseguridad","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6819","title":{"rendered":"Asegurando el espacio: gemelos digitales, sat\u00e9lites y ciberseguridad"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"justify\">Estados Unidos y sus aliados dependen cada vez m\u00e1s del acceso sin restricciones al espacio. Sin embargo, no esta completamente resuelto el problema de la seguridad. Un &#8220;gemelo digital&#8221; es un modelo de espejo virtual que sincroniza un objeto f\u00edsico con una representaci\u00f3n cibern\u00e9tica. Con este enfoque, las organizaciones pueden probar un sat\u00e9lite en diferentes escenarios para identificar vulnerabilidades y desarrollar estrategias de protecci\u00f3n, incluso antes de que se construya el sat\u00e9lite.<\/p>\n<hr \/>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The United States and our allies are increasingly dependent on unfettered access to space. However, it has become abundantly clear that our space systems have significant cybersecurity vulnerabilities that our adversaries are eager to exploit.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Earlier this year, <a href=\"https:\/\/theconversation.com\/hackers-could-shut-down-satellites-or-turn-them-into-weapons-130932\" target=\"_blank\" rel=\"noopener noreferrer\">William Akoto wrote<\/a> about the growing constellations of satellites operated by private industry, led by SpaceX, Blue Origin and others: \u201cIf hackers were to take control of these satellites, the consequences could be dire. On the mundane end of scale, hackers could simply shut satellites down, denying access to their services. Hackers could also jam or spoof the signals from satellites, creating havoc for critical infrastructure. This includes electric grids, water networks and transportation systems.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\"><a href=\"https:\/\/www.c4isrnet.com\/battlefield-tech\/space\/2020\/09\/04\/white-house-issues-new-cybersecurity-policy-for-space-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">Space Policy Directive 5<\/a>, recently issued by the White House, notes that \u201ccybersecurity principles and practices that apply to terrestrial systems also apply to space systems\u201d and that we must integrate these principles and practices into every phase of the space system life cycle.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">SPD-5 is charting the right course toward assuring our cybersecurity in the space domain. This article highlights the unique vulnerabilities of space systems and how innovative solutions like \u201cdigital twins\u201d can help us protect systems in orbit today and design more secure ones for the future.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Cyberattacks on space systems \u2014 comprised of satellites, ground control stations, and user terminals (e.g., GPS receivers) \u2014 are appealing to nation-states, criminal groups, hackers and other bad actors. It\u2019s a tremendous opportunity to breach data and disrupt operations in a low-risk way with a low cost of execution. The different components that make up space systems each come with their own set of cyber vulnerabilities, the ground segment in particular.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Some space systems were built with speed to market rather than cybersecurity in mind. In contrast, for traditional defense-focused space systems, a slower design and development process has introduced vulnerabilities as well. Space systems operating today may have taken a full 20 years to go from paper to launch and lack the capabilities to recognize or respond to today\u2019s cyberthreats. Space systems are increasingly interconnected \u2014 a malicious attack can easily spread from a single point of vulnerability in a ground station to the satellites.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Cybersecurity in space systems has struggled to keep pace with the rapid evolution of threat actors and exploits. Given these challenges, how can organizations with space systems stay ahead of cyberthreats and protect their missions and users?<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The older approach of paper-based assessments has significant limitations, like the inability to duplicate reactions to all possible scenarios. At the other end of the spectrum, full-scale replicas are expensive and time-consuming to build.<\/p>\n<p>In the middle is the \u201cdigital twin\u201d concept \u2014 a virtual mirror model that synchronizes a physical object with a cyber representation. With this approach, organizations can test a satellite in different scenarios to identify vulnerabilities and develop protection strategies, even before the satellite is built.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">One specific project that demonstrated digital twins&#8217; strengths and capabilities: testing Air Force GPS space systems for vulnerabilities after the passage of Section 1647 of the 2016 National Defense Authorization Act.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Starting with a model-based system engineering review of thousands of pages of design documents, we built a digital replica of critical GPS Block IIR satellite components launched between 1987 and 2004 that ran on a single laptop with lightweight applications.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Our digital twin created the foundation for a flexible cyber test bed \u2014 a suite of scalable software applications to demonstrate and validate cyber vulnerabilities and protection strategies as the system is designed or modified. The test bed can connect with assets beyond the network to generate data, provide war-gaming support and explore attack scenarios.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">We need this flexibility and functionality for future space system protection. The next generation of satellites will encounter more extreme service conditions and increased, simultaneous cyberattack vectors over longer periods of time. To respond to these challenges, these space systems will need increasingly complex designs, and with such complexity comes potentially greater vulnerability to cyberattacks and threats.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Digital twins and model-based system engineering approaches can strengthen security throughout the acquisition and sustainment phases. Use them to:<\/p>\n<ul class=\"a-list o-articleBody__list element-ul\">\n<li class=\"a-list__item\">Develop system requirements and analyze design trades.<\/li>\n<li class=\"a-list__item\">Create test scenarios for requirements clarification and reference systems.<\/li>\n<li class=\"a-list__item\">Simulate threats, anomalies and impacts without risk to critical infrastructure.<\/li>\n<li class=\"a-list__item\">Assess the impact of new threats or operational scenarios on an on-orbit system design.<\/li>\n<\/ul>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">What can space system acquisition professionals, developers and operators learn here? Digital twins offer an innovative approach that can streamline and strengthen the testing and design process of our space assets. They can also provide insights on as-built systems and enable the buydown of risks across the space system life cycle, enabling affordability across the entire system life cycle. Now is the time to leverage their capabilities, to ensure that the space infrastructure so vital to our security and American way of life has the protection it requires.<\/p>\n<p style=\"text-align: left;\" align=\"justify\"><strong>Fuente: <\/strong><a href=\"https:\/\/www.c4isrnet.com\/opinion\/2020\/11\/02\/securing-the-final-frontier-digital-twins-satellites-and-cybersecurity\/?utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=C4ISRNET%2011.3&amp;utm_content=Final&amp;utm_term=Editorial%20-%20Daily%20Brief\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.c4isrnet.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Estados Unidos y sus aliados dependen cada vez m\u00e1s del acceso sin restricciones al espacio. Sin embargo, no esta completamente resuelto el problema de la&hellip; <\/p>\n","protected":false},"author":1,"featured_media":6820,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,35,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6819"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6819"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6819\/revisions"}],"predecessor-version":[{"id":6821,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6819\/revisions\/6821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/6820"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}