Advertisement

Cyber Security Challenges: The Israeli Water Sector Example

  • Lior TabanskyEmail author
Chapter
Part of the Protecting Critical Infrastructure book series (PCIN, volume 3)

Abstract

Critical infrastructure protection spans an increasing number of publicly and privately owned nondefense entities. As cyberspace continued to expand, securing society requires a comprehensive approach to include business sector cooperation with all levels of government. More attention must be devoted to activities and facilities not only on the national but also on the municipal level. This will require nontraditional governance approaches to complement the usual top–down national regulation. We discuss recent cyber security policy developments in Israel, and move on to discuss future cyber security challenges using water supply as an example. Hopefully the approaches discussed in this paper will provide useful information for other developed countries.

Keywords

Municipal Level Critical Infrastructure Million Cubic Meter Israeli Defense Force Industrial Control System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Acronyms

BOT

Build–operate–transfer

BYOD

Bring your own device

CIP

Critical infrastructure protection

CoTS

Commercial off-the-shelf

DDR&D

(Maf’at מפא”ת) Ministry of Defense Directorate for Research & Development

DOD

Department of Defense

ICS

Industrial control system

IDF (Tzahal צה”ל)

Israel Defence Forces

ILITA

Information and Technology Authority

INCB

Israel National Cyber Bureau

ISA (Shabak שב”כ)

Israel Security Agency

IT

Information technology

Kinneret

Lake of Galilee

Maf’at

The Ministry Of Defense Directorate For Defense Research And Development

Mekorot

National Water Company

MCM

Million cubic meters

NCI

National Cyber Initiative

NCSA

(Rashut Le’umit le-Haganat ha-Cyber רשות לאומית להגנת הסייבר) National Cyber Security Authority

NISA

(Re’em) National Information Security Authority

NSA

National Security Agency

PLC

Programmable logic controller

SCADA

Supervisory control and data acquisition

Shodan

Web Search Engine for Finding Interconnected Devices

USB

Universal Serial Bus

WWW

World Wide Web

References

  1. Anderson, R., & Moore, T. (2006). The Economics of information security. Science, 314, 610–613.CrossRefGoogle Scholar
  2. Bodenheim, R., Butts, J., Dunlap, S., & Mullins, B. (2014). Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. International Journal of Critical Infrastructure Protection, 7, 114–123.CrossRefGoogle Scholar
  3. Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53, 23–40.CrossRefGoogle Scholar
  4. Gorman, C. (2012). Counterfeit chips on the rise. IEEE Spectrum, 49, 16–17.CrossRefGoogle Scholar
  5. Grauman, B. (2012). Cyber-security: The vexed question of global rules: An independent report on cyber-preparedness around the world. In (SDA), S. D. A. & INC., M. (eds.). Brussels: Security & Defence Agenda (SDA).Google Scholar
  6. Katz, Y., & Hendel, Y. (2012). Israel vs. Iran: The shadow war. Washington, D.C, Potomac.Google Scholar
  7. Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy, 9, 49–51.CrossRefGoogle Scholar
  8. Mazzucato, M. (2013). The entrepreneurial state: Debunking public vs. private sector myths.Google Scholar
  9. OECD. (2015). Water resources allocation: Sharing risks and opportunities. OECD Publishing.Google Scholar
  10. Prime Minister’s Office, I. (2015). Cabinet approves establishment of national cyber authority (Online). Available: http://www.pmo.gov.il/English/MediaCenter/Spokesman/Pages/spokeCyber150215.aspx.
  11. Ravid, B. (2014). Israeli security agencies in turf battle over cyber war. Netanyahu to decide. HaAretz, 14/09.Google Scholar
  12. Reed, M., Miller, J. F., & Popick, P. (2014). Supply chain attack patterns: Framework and Catalog. Office of the Deputy Assistant Secretary of Defense for Systems Engineering.Google Scholar
  13. Sanger, D. E. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. New York: Crown.Google Scholar
  14. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford, New York: Oxford University Press.Google Scholar
  15. Weiss, J. (2014). Industrial control system (ICS) cyber security for water and wastewater systems. Securing Water and Wastewater Systems. Berlin: Springer.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  1. 1.The Blavatnik Interdisciplinary Cyber Research Center (ICRC) and the Department of Political ScienceTel Aviv UniversityTel AvivIsrael

Personalised recommendations