• Home
  • Current congress
  • Public Website
  • My papers
  • root
  • browse
  • IAC-18
  • E7
  • 5
  • paper
  • The relevance and applicability of cybersecurity laws with regard to data storage on board satellites and on the ground

    Paper number

    IAC-18,E7,5,9,x47812

    Author

    Ms. Dimitra Stefoudi, The Netherlands, Leiden University

    Year

    2018

    Abstract
    Cybersecurity is a growing concern in the space sector, with satellite transmission interference and unauthorised access to data being the most common threats against space systems. This paper will focus on the latter and on the cybersecurity laws that, albeit in their infancy, aim at protecting against such risks. 
    
    In particular, this paper will assess whether the existing cybersecurity regulations are pertinent to the protection of data stored on board satellite in outer space and on the ground. It will specifically refer to the context of the EU Directive on Security of Network and Information Systems (NIS Directive), the US Internet of Things Cybersecurity Improvement Act (IoT Cybersecurity Act), and the Tallinn Manual on the International Law Applicable to Cyber Operations (Tallinn Manual 2.0), so as to assess their connection to the current methods of data storage. Towards this end, the relevance of the said laws and their competence in ensuring an adequate level of protection against cyber threats and security breaches will be argued. On the one hand, cybersecurity regulations are designed to safeguard the integrity of data systems from external tampering. . On the other hand, it has not yet been established whether the scope of these laws extend outside the territorial sovereignty of States or in outer space, while the element of cyber operation in the framework of space activities appears in various shapes. 
    
    The purpose of this paper is to determine whether the regulatory regime in force is able to address the challenges rising from the increasing connectivity of satellites and satellite systems, which make them vulnerable against cybersecurity risks. In doing so, it will mainly focus on the notions of information system, service provider, and cyber threat within the structure of space systems.
    Abstract document

    IAC-18,E7,5,9,x47812.brief.pdf

    Manuscript document

    IAC-18,E7,5,9,x47812.pdf (🔒 authorized access only).

    To get the manuscript, please contact IAF Secretariat.