Document Type

Article

Publication Date

2-2008

Abstract

We are surrounded by the use of space assets, but for the most part are unaware of their impact on our lives. On a daily basis, space assets contribute to our well-being and others around the world. Space activities have enhanced security, monitored the environment, improved and increased information growth and flow, created economic growth, and changed the way people around the world live and work.[1] Since the 1991 Gulf War, we have also come to understand how much the US military depends on space. Military forces use satellite information for communications, intelligence, surveillance, reconnaissance, warning, weather, navigation, and timing. Space has become the ultimate high ground upon which we depend on militarily and as a nation. Because of this dependence, we must ensure our space assets are adequately protected. It is clear that a systematic approach to analyzing the security of our space assets is needed.

In this article, we draw upon the insights gained from the information security domain when developing strategies to secure organizational information assets; consider the application of Pipkin’s five-phase information security process in the space operations domain;[2] and focus our discussion on the first phase of Pipkin’s process, which is responsible for the identification, valuation, and assignment of safeguards to protect resources.

Comments

Article published on behalf of the U.S. Air Force in High Frontier.

Source Publication

High Frontier

Share

COinS