{"id":2160,"date":"2023-05-20T10:49:48","date_gmt":"2023-05-20T08:49:48","guid":{"rendered":"https:\/\/www.spacesecurity.info\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/"},"modified":"2023-05-20T11:16:32","modified_gmt":"2023-05-20T09:16:32","slug":"treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/","title":{"rendered":"TREKS (Targeting, Reconnaissance, &#038; Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle"},"content":{"rendered":"<p>&#8220;<em>The space sector is in need of new frameworks and methodologies specific to our unique operating environment<\/em>&#8221; said <a href=\"https:\/\/www.linkedin.com\/in\/gregoryfalco\/\">Gregory Falco<\/a> (Aerospace Security &amp; Space Technology Asst. Prof at Johns Hopkins, Cybersecurity PhD from MIT).<\/p>\n<p><strong>The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA)<\/strong><\/p>\n<p>The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA) framework was already in place. SPARTA is an ATT&amp;CK\u00ae like knowledge-base framework but for for Space Missions. SPARTA matrix is intended to provide unclassified information to space professionals about how spacecraft may be compromised due to adversarial actions across the attack lifecycle. You can learn more about SPARTA in our article <a href=\"https:\/\/www.spacesecurity.info\/aerospace-corporation-released-sparta-v1-3-a-new-version-of-the-space-attack-research-and-tactic-analysis-sparta-matrix\/\">here<\/a>.<\/p>\n<figure id=\"attachment_2061\" aria-describedby=\"caption-attachment-2061\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2061 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix-1024x420.jpg\" alt=\"\" width=\"696\" height=\"285\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix-1024x420.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix-300x123.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix-768x315.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix-1536x630.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix-696x285.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix-1068x438.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/SPARTA-Matrix.jpg 1875w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-2061\" class=\"wp-caption-text\">Space Attack Research and Tactic Analysis (SPARTA) matrix<\/figcaption><\/figure>\n<p><strong>The SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield) from ESA<\/strong><\/p>\n<p>There was also the\u00a0SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield) from ESA. SPACE-SHIELD is an ATT&amp;CK\u00ae like knowledge-base framework for Space Systems. It is a collection of adversary tactics and techniques, and a security tool applicable in the Space environment to strengthen the security level. The matrix covers the Space Segment and communication links, and it does not address specific types of mission. You can learn more about SPACE-SHIELD in our article <a href=\"https:\/\/www.spacesecurity.info\/esa-released-the-space-shield-an-attck-like-knowledge-base-framework-for-space-systems\/\">here<\/a>.<\/p>\n<figure id=\"attachment_2021\" aria-describedby=\"caption-attachment-2021\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2021 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917-1024x348.jpeg\" alt=\"\" width=\"696\" height=\"237\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917-1024x348.jpeg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917-300x102.jpeg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917-768x261.jpeg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917-1536x523.jpeg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917-696x237.jpeg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917-1068x363.jpeg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/04\/1682669931917.jpeg 1878w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-2021\" class=\"wp-caption-text\">SPACE-SHIELD or ATT&amp;CK Matric for Space<\/figcaption><\/figure>\n<p><strong>The Targeting, Reconnaissance, &amp; Exploitation Kill-Chain for Space Vehicles (TREKS) Cybersecurity Framework<\/strong><\/p>\n<p>Now, after more than five years spent researching and working on space system cybersecurity, <a href=\"https:\/\/www.linkedin.com\/in\/jacob-oakley-3128a25a\/\">Dr. Jacob Oakley<\/a> released the Targeting, Reconnaissance, &amp; Exploitation Kill-Chain for Space Vehicles (TREKS) Cybersecurity Framework.<\/p>\n<p><strong>About Dr. Jacob Oakley<\/strong><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/jacob-oakley-3128a25a\/\">Dr. Jacob Oakley<\/a> is a cybersecurity professional and author with over 17 years of experience. A foremost expert on offensive cybersecurity, cyber warfare, and space system cybersecurity, he has advised Department of Defense (DoD) and Fortune 500 executives on strategic mitigation of risks and threats to globally distributed, multi-domain network architectures.<\/p>\n<figure id=\"attachment_2151\" aria-describedby=\"caption-attachment-2151\" style=\"width: 300px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Jacob-Oakley.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2151 size-medium\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Jacob-Oakley-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Jacob-Oakley-300x300.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Jacob-Oakley-150x150.jpg 150w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Jacob-Oakley.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-2151\" class=\"wp-caption-text\">Dr. Jacob Oakley<\/figcaption><\/figure>\n<p>The Targeting, Reconnaissance, &amp; Exploitation Kill-Chain for Space Vehicles (TREKS) Cybersecurity framework was developed to provide a taxonomy for understanding, protecting against, and decomposing cybersecurity compromises of space-resident systems, otherwise known as space vehicles (SVs).<\/p>\n<p>TREKS is intended to provide a bridge between the existing frameworks available to address, categorize, taxonomize and analyze cybersecurity compromises of traditional terrestrial based network architectures and the future of cybersecurity for space where those frameworks become more applicable as compromises become more frequent, prolific, and acknowledged. This framework can provide a taxonomy that can be used to characterize foundational aspects of cyber threats to SVs in a way that allows for the identification of trends and enables analysis of this niche target set at the intersection of the space and cyber domains.<\/p>\n<figure id=\"attachment_2149\" aria-describedby=\"caption-attachment-2149\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2149 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2-1024x642.jpg\" alt=\"\" width=\"696\" height=\"436\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2-1024x642.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2-300x188.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2-768x482.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2-696x437.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2-1068x670.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework-2.jpg 1240w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-2149\" class=\"wp-caption-text\">Targeting, Reconnaissance, &amp; Exploitation Kill-Chain for Space Vehicles (TREKS) Cybersecurity Framework<\/figcaption><\/figure>\n<p>&#8220;<em>This framework should be utilized to typify a space vehicle (SV) as a target, based on the function of that SV and an actor\u2019s motivation for targeting it, tying those compromise characteristics to what vectors could be leveraged to exploit subsystems and execute effects related to said motivation. The initial version of this framework could be seen as satellite centric, but the intent is to continuously build out the understandings surrounding this taxonomy to best incorporate all manner of SVs, from satellites to weapons to crewed vessels, labs and beyond<\/em>.&#8221; said Dr. Jacob Oakley.<\/p>\n<p><strong>The TREKS Companion: A Guidebook to the TREKS Cybersecurity Framework<\/strong><\/p>\n<p>A guidebook is available <a href=\"https:\/\/treksframework.org\/guidebook\">on the website for free PDF<\/a> and on Amazon as a <a href=\"https:\/\/amzn.to\/3Iuhrom\">kindle<\/a> or <a href=\"https:\/\/amzn.to\/3Wpl4lw\">paperback<\/a> version.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2157\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-1-200x300.jpg\" alt=\"\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-1-200x300.jpg 200w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-1-683x1024.jpg 683w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-1-768x1152.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-1-696x1044.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-1.jpg 1000w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a> <a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2155\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-2-200x300.jpg\" alt=\"\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-2-200x300.jpg 200w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-2.jpg 600w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><\/p>\n<p>The purpose of this guidebook is to act as a reference to the included TREKS cybersecurity framework and aid in its use by the offensive and defensive cybersecurity communities as well as space system owners and operators.<\/p>\n<p><strong>About future work<\/strong><\/p>\n<p>This guidebook will continue to be a living document, edited, and updated based on feedback from both the space and cyber communities, with new versions released as appropriate.<\/p>\n<p>As was stated at the beginning of this guidebook, this is intended to be a continuously updated living document to make it easier to leverage and utilize the TREKS cybersecurity framework and act as a mechanism to keep the framework itself up to date.<\/p>\n<p>&#8220;<em>Like the <a href=\"https:\/\/www.spacesecurity.info\/aerospace-corporation-released-sparta-v1-3-a-new-version-of-the-space-attack-research-and-tactic-analysis-sparta-matrix\/\">Aerospace Corporation&#8217;s SPARTA framework<\/a> contextualizes unique vulnerabilities and countermeasures for the space vehicle, the TREKS framework highlights the unique kill chain for the space vehicle. I encourage Space ISAC and others deep in the weeds of space cyber ops to consider leveraging this<\/em>&#8221; said <a href=\"https:\/\/www.linkedin.com\/in\/gregoryfalco\/\">Gregory Falco<\/a>.<\/p>\n<p>For usage and licensing information please visit the <a href=\"https:\/\/treksframework.org\/\">treksframework.org<\/a> website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The space sector is in need of new frameworks and methodologies specific to our unique operating environment&#8221; said Gregory Falco (Aerospace Security &amp; Space Technology Asst. Prof at Johns Hopkins, Cybersecurity PhD from MIT). The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA) The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA) framework [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2154,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,22,20],"tags":[],"class_list":{"0":"post-2160","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-hacking-en","9":"category-news"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TREKS (Targeting, Reconnaissance, &amp; Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TREKS (Targeting, Reconnaissance, &amp; Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"&#8220;The space sector is in need of new frameworks and methodologies specific to our unique operating environment&#8221; said Gregory Falco (Aerospace Security &amp; Space Technology Asst. Prof at Johns Hopkins, Cybersecurity PhD from MIT). The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA) The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA) framework [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-20T08:49:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-20T09:16:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"984\" \/>\n\t<meta property=\"og:image:height\" content=\"554\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"TREKS (Targeting, Reconnaissance, &#038; Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle\",\"datePublished\":\"2023-05-20T08:49:48+00:00\",\"dateModified\":\"2023-05-20T09:16:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/\"},\"wordCount\":795,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/TREKS-Cybersecurity-Framework.jpg\",\"articleSection\":[\"Cyber\",\"Hacking\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/\",\"name\":\"TREKS (Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/TREKS-Cybersecurity-Framework.jpg\",\"datePublished\":\"2023-05-20T08:49:48+00:00\",\"dateModified\":\"2023-05-20T09:16:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/TREKS-Cybersecurity-Framework.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/TREKS-Cybersecurity-Framework.jpg\",\"width\":984,\"height\":554},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TREKS (Targeting, Reconnaissance, &#038; Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TREKS (Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/","og_locale":"en_US","og_type":"article","og_title":"TREKS (Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle - Space &amp; Cybersecurity Info","og_description":"&#8220;The space sector is in need of new frameworks and methodologies specific to our unique operating environment&#8221; said Gregory Falco (Aerospace Security &amp; Space Technology Asst. Prof at Johns Hopkins, Cybersecurity PhD from MIT). The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA) The Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis (SPARTA) framework [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2023-05-20T08:49:48+00:00","article_modified_time":"2023-05-20T09:16:32+00:00","og_image":[{"width":984,"height":554,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"TREKS (Targeting, Reconnaissance, &#038; Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle","datePublished":"2023-05-20T08:49:48+00:00","dateModified":"2023-05-20T09:16:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/"},"wordCount":795,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework.jpg","articleSection":["Cyber","Hacking","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/","url":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/","name":"TREKS (Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework.jpg","datePublished":"2023-05-20T08:49:48+00:00","dateModified":"2023-05-20T09:16:32+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/TREKS-Cybersecurity-Framework.jpg","width":984,"height":554},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"TREKS (Targeting, Reconnaissance, &#038; Exploitation Kill-Chain for Space Vehicles), a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2160"}],"version-history":[{"count":3,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2160\/revisions"}],"predecessor-version":[{"id":2167,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2160\/revisions\/2167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2154"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}