Abstract
This SpringerBrief introduces and analyses over two decades of Israeli cybersecurity policy. We discuss cybersecurity’s complementary aspects and present the major risk that drives cybersecurity policies. We outline the issues and topics covered, sources used, and the research challenges. The analysis requires a broad strategic perspective as factors less tangible than technology such as culture and grand strategy influence the national cybersecurity. Finally, we present the book’s scope and structure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Given the understandable delicateness of the subject, we purposely refrain from attributing opinions and positions to persons, offices or companies throughout the book.
- 2.
Ben-Israel is the co-author of this SpringerBrief.
References
Axelrod R, Iliev R (2014) Timing of cyber conflict. Proc Natl Acad Sci 111(4):1298–1303
Betz D (2012) Cyberpower in strategic affairs: neither unthinkable nor blessed. J Strateg Stud 35(5):689–711. doi:10.1080/01402390.2012.706970
Betz DJ, Stevens T (2013) Analogical reasoning and cyber security. Secur Dialogue 44(2):147–164. doi:10.1177/0967010613478323
Brenner J (2011) America the vulnerable: inside the new threat matrix of digital espionage, crime, and warfare. Penguin, New York
Clarke RA, Knake RK (2010) Cyber war: the next threat to national security and what to do about it. Ecco, New York
Conway M (2014) Reality check: assessing the (un)likelihood of cyberterrorism. In: Chen TM, Jarvis L, Macdonald S (eds) Cyberterrorism. Springer, New York, pp 103–121
Council NR (2014) At the nexus of cybersecurity and public policy: some basic concepts and issues (Clark D, Berson T, Lin HS, eds). p 150. Retrieved from catalog/18749/at-the-nexus-ofcybersecurity-and-public-policy-some-basic
Deibert RJ (2013) Black code: inside the battle for cyberspace. McClelland & Stewart, Toronto
Demchak CC (2011) Wars of disruption and resilience cybered conflict, power, and national security. The University of Georgia Press, Athens/London
Eriksson J, Giacomello G (2014) International relations, cybersecurity, and content analysis: a constructivist approach. In: The global politics of science and technology, vol 2. Springer, New York, pp 205–219
Farrell T (2010) Security studies: critical concepts in international relations. Routledge, Milton Park/Abingdon/New York
Freedman L (2013) Strategy: a history. Oxford University Press, Oxford
Gat A (2006) War in human civilization. Oxford University Press, Oxford/New York
Gilpin RG (1984) The richness of the tradition of political realism. Int Org 38(02):287–304. doi:10.1017/S0020818300026710
Junio TJ (2013) How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. J Strateg Stud 36(1):125–133. doi:10.1080/01402390.2012.739561
Kello L (2013) The meaning of the cyber revolution: perils to theory and statecraft. Int Secur 38(2):7–40. doi:10.1162/ISEC_a_00138
Kuehl DT (2009) Cyberspace and cyberpower. In: Kramer FD, Starr SH, Wentz LK (eds) Cyberpower and national security. National Defense University Press/Potomac Books, Washington, DC
Lewis JA, Neuneck G, United Nations Institute for Disarmament Research, Center for Strategic and International Studies, Universität, H, Institut für Friedensforschung und, S (2013) The cyber index: international security trends and realities
Libicki MC (2007) Conquest in cyberspace: national security and information warfare. Cambridge University Press, New York
Liff AP (2012) Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. J Strateg Stud 1–28
Lindsay JR (2013) Stuxnet and the limits of cyber warfare. Secur Stud 22(3):365–404. doi:10.1080/09636412.2013.816122
Lynn WJ III (2010) Defending a new domain the Pentagon’s cyberstrategy. [Article]. Foreign Aff 89(5):97
Nye JS (2010) Cyber power: Belfer Center for Science and International Affairs. Harvard Kennedy School, Cambridge
Peterson D (2013) Offensive cyber weapons: construction, development, and employment. J Strateg Stud 36(1):120–124
Rid T (2013) Cyber war will not take place. Hurst, London
Rid T, Buchanan B (2014) Attributing cyber attacks. J Strateg Stud 1–34. doi:10.1080/01402390.2014.977382
Tabansky L (2011) Basic concepts in cyber warfare. Mil Strateg Aff 3(1):75–92
Tabansky L (2012) Cybercrime: a national security issue? Mil Strateg Aff 4(3):117–136
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Tabansky, L., Ben Israel, I. (2015). Introduction. In: Cybersecurity in Israel. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-18986-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-18986-4_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18985-7
Online ISBN: 978-3-319-18986-4
eBook Packages: Computer ScienceComputer Science (R0)