Cyber Security Challenges: The Israeli Water Sector Example

Part of the Protecting Critical Infrastructure book series (PCIN, volume 3)


Critical infrastructure protection spans an increasing number of publicly and privately owned nondefense entities. As cyberspace continued to expand, securing society requires a comprehensive approach to include business sector cooperation with all levels of government. More attention must be devoted to activities and facilities not only on the national but also on the municipal level. This will require nontraditional governance approaches to complement the usual top–down national regulation. We discuss recent cyber security policy developments in Israel, and move on to discuss future cyber security challenges using water supply as an example. Hopefully the approaches discussed in this paper will provide useful information for other developed countries.


Municipal Level Critical Infrastructure Million Cubic Meter Israeli Defense Force Industrial Control System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.





Bring your own device


Critical infrastructure protection


Commercial off-the-shelf


(Maf’at מפא”ת) Ministry of Defense Directorate for Research & Development


Department of Defense


Industrial control system

IDF (Tzahal צה”ל)

Israel Defence Forces


Information and Technology Authority


Israel National Cyber Bureau

ISA (Shabak שב”כ)

Israel Security Agency


Information technology


Lake of Galilee


The Ministry Of Defense Directorate For Defense Research And Development


National Water Company


Million cubic meters


National Cyber Initiative


(Rashut Le’umit le-Haganat ha-Cyber רשות לאומית להגנת הסייבר) National Cyber Security Authority


(Re’em) National Information Security Authority


National Security Agency


Programmable logic controller


Supervisory control and data acquisition


Web Search Engine for Finding Interconnected Devices


Universal Serial Bus


World Wide Web


  1. Anderson, R., & Moore, T. (2006). The Economics of information security. Science, 314, 610–613.CrossRefGoogle Scholar
  2. Bodenheim, R., Butts, J., Dunlap, S., & Mullins, B. (2014). Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. International Journal of Critical Infrastructure Protection, 7, 114–123.CrossRefGoogle Scholar
  3. Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53, 23–40.CrossRefGoogle Scholar
  4. Gorman, C. (2012). Counterfeit chips on the rise. IEEE Spectrum, 49, 16–17.CrossRefGoogle Scholar
  5. Grauman, B. (2012). Cyber-security: The vexed question of global rules: An independent report on cyber-preparedness around the world. In (SDA), S. D. A. & INC., M. (eds.). Brussels: Security & Defence Agenda (SDA).Google Scholar
  6. Katz, Y., & Hendel, Y. (2012). Israel vs. Iran: The shadow war. Washington, D.C, Potomac.Google Scholar
  7. Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy, 9, 49–51.CrossRefGoogle Scholar
  8. Mazzucato, M. (2013). The entrepreneurial state: Debunking public vs. private sector myths.Google Scholar
  9. OECD. (2015). Water resources allocation: Sharing risks and opportunities. OECD Publishing.Google Scholar
  10. Prime Minister’s Office, I. (2015). Cabinet approves establishment of national cyber authority (Online). Available:
  11. Ravid, B. (2014). Israeli security agencies in turf battle over cyber war. Netanyahu to decide. HaAretz, 14/09.Google Scholar
  12. Reed, M., Miller, J. F., & Popick, P. (2014). Supply chain attack patterns: Framework and Catalog. Office of the Deputy Assistant Secretary of Defense for Systems Engineering.Google Scholar
  13. Sanger, D. E. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. New York: Crown.Google Scholar
  14. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford, New York: Oxford University Press.Google Scholar
  15. Weiss, J. (2014). Industrial control system (ICS) cyber security for water and wastewater systems. Securing Water and Wastewater Systems. Berlin: Springer.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  1. 1.The Blavatnik Interdisciplinary Cyber Research Center (ICRC) and the Department of Political ScienceTel Aviv UniversityTel AvivIsrael

Personalised recommendations