{"id":13868,"date":"2025-02-25T08:24:47","date_gmt":"2025-02-25T07:24:47","guid":{"rendered":"https:\/\/www.nlr.org\/newsroom\/%post_template_type%\/cyber-security-for-space-systems\/"},"modified":"2025-04-03T08:41:10","modified_gmt":"2025-04-03T06:41:10","slug":"cyber-security-for-space-systems","status":"publish","type":"post","link":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/","title":{"rendered":"Cyber security for space systems"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>In today&#8217;s interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in aviation, mobile transport, telecommunication, and energy rely on satellite-retrieved data. Ensuring the mitigation of cyber security risks is vital to safeguard the safety of the user community, and confidence in cyber security solutions is essential in the design of space and ground segments. Staying aware of cyber security events and developments, as well as legislative changes, is key to maintaining the integrity of end-to-end space systems. NLR can support you with insights in the rapidly changing developments related to cyber security solutions and legislation and the impact on your system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>NLR can support you with:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list is-style-with-arrow\">\n<li>Unique cyber security risk assessments through a dynamic and hierarchical approach.<\/li>\n\n\n\n<li>Advice on solutions to mitigate cyber security risks.<\/li>\n\n\n\n<li>Cyber security and robustness tests using NLR&#8217;s Space System Simulation Laboratory (EUROSIM, STK, MATLAB\/SIMULINK, MOSAIC) for space and ground system simulation and RF signal generation tools (including GNSS spoofer).<\/li>\n\n\n\n<li>Training for system operators and creation of awareness of cyber security risks through a unique security event modelling tool.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in aviation, mobile transport, telecommunication, and energy rely on satellite-retrieved data. Ensuring the mitigation of cyber security risks is vital to safeguard the safety of the user community, and confidence in cyber security solutions is essential [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":11399,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[62],"expertise":[139],"class_list":["post-13868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-geen-onderdeel-van-een-categorie-2","post_template_type-capability","expertise-ruimtevaarttechnologie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber security for space systems - Nederlands Lucht- en Ruimtevaartcentrum<\/title>\n<meta name=\"description\" content=\"In today&#039;s interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security for space systems - Nederlands Lucht- en Ruimtevaartcentrum\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Nederlands Lucht- en Ruimtevaartcentrum\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T07:24:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T06:41:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nlr.org\/wp-content\/uploads\/2025\/02\/copyright_nlr_2025_big-data-binary-1024x576.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linsey Jepma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linsey Jepma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/\"},\"author\":{\"name\":\"Linsey Jepma\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#\\\/schema\\\/person\\\/036741a874842873a7099155218c9c7c\"},\"headline\":\"Cyber security for space systems\",\"datePublished\":\"2025-02-25T07:24:47+00:00\",\"dateModified\":\"2025-04-03T06:41:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/\"},\"wordCount\":190,\"publisher\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nlr.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/copyright_nlr_2025_big-data-binary.jpg\",\"articleSection\":[\"Geen onderdeel van een categorie\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/\",\"url\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/\",\"name\":\"Cyber security for space systems - Nederlands Lucht- en Ruimtevaartcentrum\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nlr.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/copyright_nlr_2025_big-data-binary.jpg\",\"datePublished\":\"2025-02-25T07:24:47+00:00\",\"dateModified\":\"2025-04-03T06:41:10+00:00\",\"description\":\"In today's interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.nlr.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/copyright_nlr_2025_big-data-binary.jpg\",\"contentUrl\":\"https:\\\/\\\/www.nlr.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/copyright_nlr_2025_big-data-binary.jpg\",\"width\":2048,\"height\":1152,\"caption\":\"Binary data analysis - Big data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/capability\\\/cyber-security-for-space-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber security for space systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#website\",\"url\":\"https:\\\/\\\/www.nlr.org\\\/\",\"name\":\"Nederlands Lucht- en Ruimtevaartcentrum\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nlr.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#organization\",\"name\":\"Nederlands Lucht- en Ruimtevaartcentrum\",\"url\":\"https:\\\/\\\/www.nlr.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.nlr.org\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/logo-nlr.svg\",\"contentUrl\":\"https:\\\/\\\/www.nlr.org\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/logo-nlr.svg\",\"caption\":\"Nederlands Lucht- en Ruimtevaartcentrum\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.nlr.org\\\/#\\\/schema\\\/person\\\/036741a874842873a7099155218c9c7c\",\"name\":\"Linsey Jepma\",\"url\":\"https:\\\/\\\/www.nlr.org\\\/nl\\\/newsroom\\\/author\\\/linsey\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security for space systems - Nederlands Lucht- en Ruimtevaartcentrum","description":"In today's interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/","og_locale":"nl_NL","og_type":"article","og_title":"Cyber security for space systems - Nederlands Lucht- en Ruimtevaartcentrum","og_description":"In today's interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in","og_url":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/","og_site_name":"Nederlands Lucht- en Ruimtevaartcentrum","article_published_time":"2025-02-25T07:24:47+00:00","article_modified_time":"2025-04-03T06:41:10+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.nlr.org\/wp-content\/uploads\/2025\/02\/copyright_nlr_2025_big-data-binary-1024x576.jpg","type":"image\/jpeg"}],"author":"Linsey Jepma","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Linsey Jepma","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/#article","isPartOf":{"@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/"},"author":{"name":"Linsey Jepma","@id":"https:\/\/www.nlr.org\/#\/schema\/person\/036741a874842873a7099155218c9c7c"},"headline":"Cyber security for space systems","datePublished":"2025-02-25T07:24:47+00:00","dateModified":"2025-04-03T06:41:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/"},"wordCount":190,"publisher":{"@id":"https:\/\/www.nlr.org\/#organization"},"image":{"@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nlr.org\/wp-content\/uploads\/2025\/02\/copyright_nlr_2025_big-data-binary.jpg","articleSection":["Geen onderdeel van een categorie"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/","url":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/","name":"Cyber security for space systems - Nederlands Lucht- en Ruimtevaartcentrum","isPartOf":{"@id":"https:\/\/www.nlr.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nlr.org\/wp-content\/uploads\/2025\/02\/copyright_nlr_2025_big-data-binary.jpg","datePublished":"2025-02-25T07:24:47+00:00","dateModified":"2025-04-03T06:41:10+00:00","description":"In today's interconnected world, robust, secure, and safe end-to-end space systems and information are crucial, as many critical applications in","breadcrumb":{"@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/#primaryimage","url":"https:\/\/www.nlr.org\/wp-content\/uploads\/2025\/02\/copyright_nlr_2025_big-data-binary.jpg","contentUrl":"https:\/\/www.nlr.org\/wp-content\/uploads\/2025\/02\/copyright_nlr_2025_big-data-binary.jpg","width":2048,"height":1152,"caption":"Binary data analysis - Big data"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nlr.org\/nl\/newsroom\/capability\/cyber-security-for-space-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nlr.org\/nl\/"},{"@type":"ListItem","position":2,"name":"Cyber security for space systems"}]},{"@type":"WebSite","@id":"https:\/\/www.nlr.org\/#website","url":"https:\/\/www.nlr.org\/","name":"Nederlands Lucht- en Ruimtevaartcentrum","description":"","publisher":{"@id":"https:\/\/www.nlr.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nlr.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.nlr.org\/#organization","name":"Nederlands Lucht- en Ruimtevaartcentrum","url":"https:\/\/www.nlr.org\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.nlr.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.nlr.org\/wp-content\/uploads\/2023\/10\/logo-nlr.svg","contentUrl":"https:\/\/www.nlr.org\/wp-content\/uploads\/2023\/10\/logo-nlr.svg","caption":"Nederlands Lucht- en Ruimtevaartcentrum"},"image":{"@id":"https:\/\/www.nlr.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nlr.org\/#\/schema\/person\/036741a874842873a7099155218c9c7c","name":"Linsey Jepma","url":"https:\/\/www.nlr.org\/nl\/newsroom\/author\/linsey\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/posts\/13868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/comments?post=13868"}],"version-history":[{"count":2,"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/posts\/13868\/revisions"}],"predecessor-version":[{"id":13901,"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/posts\/13868\/revisions\/13901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/media\/11399"}],"wp:attachment":[{"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/media?parent=13868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/categories?post=13868"},{"taxonomy":"expertise","embeddable":true,"href":"https:\/\/www.nlr.org\/nl\/wp-json\/wp\/v2\/expertise?post=13868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}