Skip to main content

Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency Response

  • 850 Accesses

Part of the Lecture Notes in Computer Science book series (LNCS,volume 13785)

Abstract

Space sector is considered to be one of those which are essential to maintain vital economic and social functions. Critical Infrastructures or Critical Entities that belong to these sectors are exposed to a wide range of natural and man-made threats, including natural hazards, terrorist attacks, insider threats, or sabotage, but also to cyber-attacks, which are emerging especially with the use of information related systems, as in the space domain. More specifically, a physical attack on a space ground segment could make the distribution of satellite data problematic, while a cyber-attack attack on its data storage, access and exchange could affect not only the reliability of space data, but also their FAIR standards. The present work will focus on the enhancement of the preparedness and response phases of crisis management, through the use of technological and operational solutions. Thus, three tools namely CIRP-RAT, ENGAGE CSIM and ERPs are presented, including their functionalities and benefits offered to the end-users. The findings and developments presented, are linked with the EU funded project 7SHIELD, which aims to provide the European Ground Segment of Space Systems, with a holistic framework for their cyber–physical protection, enabling them to confront complex cyber and physical threats, by covering all the stages of crisis management, namely pre-crisis, crisis and post-crises.

Keywords

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Council of the EU: Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. EUR-Lex. https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:32008L0114

  2. Union, Council of the European: Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the resilience of critical entities. EUR-Lex. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52020PC0829

  3. 7SHIELD project. 7SHIELD project (GA No 883284). 7SHIELD project (2022). https://www.7shield.eu/project/. Accessed 10 June 2022

  4. Hromada, M., Rehak, D., Walker, N.: Electricity infrastructure technical security: Practical application and best practices of risk assessment. In: Rehak, D., et al., (eds.) Safety and Security Issues in Technical Infrastructures, pp. 1–30. IGI Global, Hershey (2020). https://doi.org/10.4018/978-1-7998-3059-7.ch001

  5. British Standard Institute (BSI): BS11200: Crisis Management – guidance and good practice. BSI (2014)

    Google Scholar 

  6. Mantzana, V., Georgiou, E., Gazi, A., Gkotsis, I., Chasiotis, I., Eftychidis, G.: Towards a global CIs’ cyber-physical security management and joint coordination approach. In: Abie, H., et al. (eds.) CPS4CIP 2020. LNCS, vol. 12618, pp. 155–170. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69781-5_11

    Chapter  Google Scholar 

  7. Mariš, L., Loveček, T., Zeegers, M.: Security of infrastructure systems: infrastructure security assessment. In: Rehak, D., et al. (eds.) Safety and Security Issues in Technical Infrastructures, pp. 353–382. IGI Global, Hershey (2020). https://doi.org/10.4018/978-1-7998-3059-7.ch013

  8. Mantzana, V., Darra, E., Gkotsis, I.: Cyber-physical security in healthcare. In: Rehak, D., et al. (eds.) Safety and Security Issues in Technical Infrastructures, pp. 63–87. IGI Global, Hershey (2020). https://doi.org/10.4018/978-1-7998-3059-7.ch003

  9. Giannopoulos, G., Filippini, R., Schimmer, M.: Risk assessment methodologies for Critical Infrastructure Protection. Part I: a state of the art. JRC (2012)

    Google Scholar 

  10. ISO: Risk management—Risk assessment techniques. IEC 31010:2019 (2019)

    Google Scholar 

  11. Giannopoulos, G., Dorneanu, B., Jonkeren, O.: Risk assessment methodology for critical infrastructure protection. https://publications.jrc.ec.europa.eu/repository/bitstream/JRC78292/lbna25745enn.pdf. Accessed 05 June 2013

  12. Fausto, A., et al.: Toward the integration of cyber and physical security monitoring systems for critical infrastructures. Sensors (Basel) 21, 6970 (2021)

    Google Scholar 

  13. Kovacich, G.L., Halibozek, E.P.: The Manager’s Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program. Butterworth-Heinemann, Oxford (2003)

    Google Scholar 

  14. ENTELEC: ENTELEC. What is a PSIM software platform?, 14 October 2021. https://www.entelec.eu/what-is-a-psim-software-platform. Accessed 10 June 2022

  15. ASME: All-Hazards Risk and Resilience: Prioritizing Critical Infrastructures Using the RAMCAP PlusSM Approach. ASME Press, New York (2009)

    Google Scholar 

  16. LA MÉTHODE EBIOS RISK MANAGER. https://www.ssi.gouv.fr/administration/management-du-risque/la-methode-ebios-risk-manager/

  17. Quick Risk Estimation Tool. ttps://www.unisdr.org/campaign/resilientcities/toolkit/article/quick-risk-estimation-qre.html

  18. Petit, F.D., et al.: National Technical Reports Library. Protective Measures Index and Vulnerability Index. July 2013 [Online]

    Google Scholar 

  19. Preyssl, C., Atkins, R., Deak, T.: Risk management at ESA. ESA Bull. 97, 64–68 (1999)

    Google Scholar 

  20. Schroeter, J.: Risk management in ESA’s scientific directorate: a case study. ESA Bull. 107, 64–71 (2001)

    MathSciNet  Google Scholar 

  21. Norman, T.L.: Risk Analysis and Security Countermeasure Selection. Second Edition

    Google Scholar 

  22. EU-CIRCLE (2018) [Online]. https://www.eu-circle.eu/

Download references

Acknowledgements

The work presented in this paper has been conducted in the framework of the 7SHIELD project, which has received funding from the European Union’s H2020 research and innovation programme under grant agreement no. 883284 respectively. This output reflects the views only of the author(s), and the European Union cannot be held responsible for any use which may be made of the information contained therein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ilias Gkotsis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gkotsis, I. et al. (2023). Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency Response. In: Katsikas, S., et al. Computer Security. ESORICS 2022 International Workshops. ESORICS 2022. Lecture Notes in Computer Science, vol 13785. Springer, Cham. https://doi.org/10.1007/978-3-031-25460-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25460-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25459-8

  • Online ISBN: 978-3-031-25460-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics