Abstract
Critical infrastructure protection spans an increasing number of publicly and privately owned nondefense entities. As cyberspace continued to expand, securing society requires a comprehensive approach to include business sector cooperation with all levels of government. More attention must be devoted to activities and facilities not only on the national but also on the municipal level. This will require nontraditional governance approaches to complement the usual top–down national regulation. We discuss recent cyber security policy developments in Israel, and move on to discuss future cyber security challenges using water supply as an example. Hopefully the approaches discussed in this paper will provide useful information for other developed countries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Israelis were targeted by terrorists on the streets, cafes, and buses in a cycle of violence that claimed the lives of 319 Israeli soldiers and 745 civilians, and left 2430 soldiers and 5032 civilians wounded.
- 2.
The Stephen and Nancy Grand Water Research Institute at the Technion and its founder Prof. Uri Shamir are the focal point of water related research and policy in Israel.
- 3.
ILITA consists of three regulators: the database register, responsible for oversight and enforcement of data protection guidelines; the electronic signature register, and credit score service providers register.
- 4.
Abbreviations
- BOT:
-
Build–operate–transfer
- BYOD:
-
Bring your own device
- CIP:
-
Critical infrastructure protection
- CoTS:
-
Commercial off-the-shelf
- DDR&D:
-
(Maf’at מפא”ת) Ministry of Defense Directorate for Research & Development
- DOD:
-
Department of Defense
- ICS:
-
Industrial control system
- IDF (Tzahal צה”ל):
-
Israel Defence Forces
- ILITA:
-
Information and Technology Authority
- INCB:
-
Israel National Cyber Bureau
- ISA (Shabak שב”כ):
-
Israel Security Agency
- IT:
-
Information technology
- Kinneret :
-
Lake of Galilee
- Maf’at:
-
The Ministry Of Defense Directorate For Defense Research And Development
- Mekorot:
-
National Water Company
- MCM:
-
Million cubic meters
- NCI:
-
National Cyber Initiative
- NCSA:
-
(Rashut Le’umit le-Haganat ha-Cyber רשות לאומית להגנת הסייבר) National Cyber Security Authority
- NISA:
-
(Re’em) National Information Security Authority
- NSA:
-
National Security Agency
- PLC:
-
Programmable logic controller
- SCADA:
-
Supervisory control and data acquisition
- Shodan:
-
Web Search Engine for Finding Interconnected Devices
- USB:
-
Universal Serial Bus
- WWW:
-
World Wide Web
References
Anderson, R., & Moore, T. (2006). The Economics of information security. Science, 314, 610–613.
Bodenheim, R., Butts, J., Dunlap, S., & Mullins, B. (2014). Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. International Journal of Critical Infrastructure Protection, 7, 114–123.
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53, 23–40.
Gorman, C. (2012). Counterfeit chips on the rise. IEEE Spectrum, 49, 16–17.
Grauman, B. (2012). Cyber-security: The vexed question of global rules: An independent report on cyber-preparedness around the world. In (SDA), S. D. A. & INC., M. (eds.). Brussels: Security & Defence Agenda (SDA).
Katz, Y., & Hendel, Y. (2012). Israel vs. Iran: The shadow war. Washington, D.C, Potomac.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy, 9, 49–51.
Mazzucato, M. (2013). The entrepreneurial state: Debunking public vs. private sector myths.
OECD. (2015). Water resources allocation: Sharing risks and opportunities. OECD Publishing.
Prime Minister’s Office, I. (2015). Cabinet approves establishment of national cyber authority (Online). Available: http://www.pmo.gov.il/English/MediaCenter/Spokesman/Pages/spokeCyber150215.aspx.
Ravid, B. (2014). Israeli security agencies in turf battle over cyber war. Netanyahu to decide. HaAretz, 14/09.
Reed, M., Miller, J. F., & Popick, P. (2014). Supply chain attack patterns: Framework and Catalog. Office of the Deputy Assistant Secretary of Defense for Systems Engineering.
Sanger, D. E. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. New York: Crown.
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford, New York: Oxford University Press.
Israel National Water System Map, The Water Authority (2014).http://www.water.gov.il/Hebrew/ProfessionalInfoAndData/2012/israel_national_water_system-map.pdf
Weiss, J. (2014). Industrial control system (ICS) cyber security for water and wastewater systems. Securing Water and Wastewater Systems. Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Tabansky, L. (2017). Cyber Security Challenges: The Israeli Water Sector Example. In: Clark, R., Hakim, S. (eds) Cyber-Physical Security. Protecting Critical Infrastructure, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-32824-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-32824-9_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32822-5
Online ISBN: 978-3-319-32824-9
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)