Attitude Data Messages - CCSDS
Attitude Data Messages - CCSDS
Attitude Data Messages - CCSDS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>CCSDS</strong> RECOMMENDED STANDARD FOR ATTITUDE DATA MESSAGES<br />
6.2.7 AUDITING OF RESOURCE USAGE<br />
This Recommended Standard assumes that auditing of resource usage will be handled by the<br />
management of systems and networks on which this Recommended Standard is<br />
implemented.<br />
6.3 POTENTIAL THREATS AND ATTACK SCENARIOS<br />
There are no known potential threats or attack scenarios that apply specifically to the<br />
technologies specified in this Recommended Standard. Potential threats or attack scenarios<br />
applicable to the systems and networks on which this Recommended Standard is<br />
implemented should be addressed by the management of those systems and networks.<br />
Protection from unauthorized access is especially important if the mission utilizes open<br />
ground networks such as the Internet to provide ground station connectivity for the exchange<br />
of data formatted in compliance with this Recommended Standard.<br />
6.4 CONSEQUENCES OF NOT APPLYING STATED SECURITY TO THE<br />
TECHNOLOGY<br />
There are no known consequences of not applying the security to the technologies specified<br />
in this Recommended Standard. The consequences of not applying security to the systems<br />
and networks on which this Recommended Standard is implemented could include potential<br />
loss, corruption, and theft of data.<br />
6.5 DATA SECURITY IMPLEMENTATION SPECIFICS<br />
Specific information-security interoperability provisions that may apply between agencies<br />
involved in an exchange of data formatted in compliance with this Recommended Standard<br />
should be specified in an ICD.<br />
<strong>CCSDS</strong> 504.0-B-1 Page 6-2 May 2008