Skip to main content

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

This SpringerBrief introduces and analyses over two decades of Israeli cybersecurity policy. We discuss cybersecurity’s complementary aspects and present the major risk that drives cybersecurity policies. We outline the issues and topics covered, sources used, and the research challenges. The analysis requires a broad strategic perspective as factors less tangible than technology such as culture and grand strategy influence the national cybersecurity. Finally, we present the book’s scope and structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Given the understandable delicateness of the subject, we purposely refrain from attributing opinions and positions to persons, offices or companies throughout the book.

  2. 2.

    Ben-Israel is the co-author of this SpringerBrief.

References

  • Axelrod R, Iliev R (2014) Timing of cyber conflict. Proc Natl Acad Sci 111(4):1298–1303

    Article  Google Scholar 

  • Betz D (2012) Cyberpower in strategic affairs: neither unthinkable nor blessed. J Strateg Stud 35(5):689–711. doi:10.1080/01402390.2012.706970

    Article  Google Scholar 

  • Betz DJ, Stevens T (2013) Analogical reasoning and cyber security. Secur Dialogue 44(2):147–164. doi:10.1177/0967010613478323

    Article  Google Scholar 

  • Brenner J (2011) America the vulnerable: inside the new threat matrix of digital espionage, crime, and warfare. Penguin, New York

    Google Scholar 

  • Clarke RA, Knake RK (2010) Cyber war: the next threat to national security and what to do about it. Ecco, New York

    Google Scholar 

  • Conway M (2014) Reality check: assessing the (un)likelihood of cyberterrorism. In: Chen TM, Jarvis L, Macdonald S (eds) Cyberterrorism. Springer, New York, pp 103–121

    Google Scholar 

  • Council NR (2014) At the nexus of cybersecurity and public policy: some basic concepts and issues (Clark D, Berson T, Lin HS, eds). p 150. Retrieved from catalog/18749/at-the-nexus-ofcybersecurity-and-public-policy-some-basic

    Google Scholar 

  • Deibert RJ (2013) Black code: inside the battle for cyberspace. McClelland & Stewart, Toronto

    Google Scholar 

  • Demchak CC (2011) Wars of disruption and resilience cybered conflict, power, and national security. The University of Georgia Press, Athens/London

    Google Scholar 

  • Eriksson J, Giacomello G (2014) International relations, cybersecurity, and content analysis: a constructivist approach. In: The global politics of science and technology, vol 2. Springer, New York, pp 205–219

    Google Scholar 

  • Farrell T (2010) Security studies: critical concepts in international relations. Routledge, Milton Park/Abingdon/New York

    Google Scholar 

  • Freedman L (2013) Strategy: a history. Oxford University Press, Oxford

    Google Scholar 

  • Gat A (2006) War in human civilization. Oxford University Press, Oxford/New York

    Google Scholar 

  • Gilpin RG (1984) The richness of the tradition of political realism. Int Org 38(02):287–304. doi:10.1017/S0020818300026710

    Article  Google Scholar 

  • Junio TJ (2013) How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. J Strateg Stud 36(1):125–133. doi:10.1080/01402390.2012.739561

    Article  Google Scholar 

  • Kello L (2013) The meaning of the cyber revolution: perils to theory and statecraft. Int Secur 38(2):7–40. doi:10.1162/ISEC_a_00138

    Article  Google Scholar 

  • Kuehl DT (2009) Cyberspace and cyberpower. In: Kramer FD, Starr SH, Wentz LK (eds) Cyberpower and national security. National Defense University Press/Potomac Books, Washington, DC

    Google Scholar 

  • Lewis JA, Neuneck G, United Nations Institute for Disarmament Research, Center for Strategic and International Studies, Universität, H, Institut für Friedensforschung und, S (2013) The cyber index: international security trends and realities

    Google Scholar 

  • Libicki MC (2007) Conquest in cyberspace: national security and information warfare. Cambridge University Press, New York

    Book  Google Scholar 

  • Liff AP (2012) Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. J Strateg Stud 1–28

    Google Scholar 

  • Lindsay JR (2013) Stuxnet and the limits of cyber warfare. Secur Stud 22(3):365–404. doi:10.1080/09636412.2013.816122

    Article  Google Scholar 

  • Lynn WJ III (2010) Defending a new domain the Pentagon’s cyberstrategy. [Article]. Foreign Aff 89(5):97

    Google Scholar 

  • Nye JS (2010) Cyber power: Belfer Center for Science and International Affairs. Harvard Kennedy School, Cambridge

    Google Scholar 

  • Peterson D (2013) Offensive cyber weapons: construction, development, and employment. J Strateg Stud 36(1):120–124

    Article  Google Scholar 

  • Rid T (2013) Cyber war will not take place. Hurst, London

    Google Scholar 

  • Rid T, Buchanan B (2014) Attributing cyber attacks. J Strateg Stud 1–34. doi:10.1080/01402390.2014.977382

  • Tabansky L (2011) Basic concepts in cyber warfare. Mil Strateg Aff 3(1):75–92

    Google Scholar 

  • Tabansky L (2012) Cybercrime: a national security issue? Mil Strateg Aff 4(3):117–136

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Tabansky, L., Ben Israel, I. (2015). Introduction. In: Cybersecurity in Israel. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-18986-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18986-4_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18985-7

  • Online ISBN: 978-3-319-18986-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics