Skip to main content

Cyber Security Challenges: The Israeli Water Sector Example

  • Chapter
  • First Online:
Cyber-Physical Security

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 3))

Abstract

Critical infrastructure protection spans an increasing number of publicly and privately owned nondefense entities. As cyberspace continued to expand, securing society requires a comprehensive approach to include business sector cooperation with all levels of government. More attention must be devoted to activities and facilities not only on the national but also on the municipal level. This will require nontraditional governance approaches to complement the usual top–down national regulation. We discuss recent cyber security policy developments in Israel, and move on to discuss future cyber security challenges using water supply as an example. Hopefully the approaches discussed in this paper will provide useful information for other developed countries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Israelis were targeted by terrorists on the streets, cafes, and buses in a cycle of violence that claimed the lives of 319 Israeli soldiers and 745 civilians, and left 2430 soldiers and 5032 civilians wounded.

  2. 2.

    The Stephen and Nancy Grand Water Research Institute at the Technion and its founder Prof. Uri Shamir are the focal point of water related research and policy in Israel.

  3. 3.

    ILITA consists of three regulators: the database register, responsible for oversight and enforcement of data protection guidelines; the electronic signature register, and credit score service providers register.

  4. 4.

    https://cert.gov.il/.

Abbreviations

BOT:

Build–operate–transfer

BYOD:

Bring your own device

CIP:

Critical infrastructure protection

CoTS:

Commercial off-the-shelf

DDR&D:

(Maf’at מפא”ת) Ministry of Defense Directorate for Research & Development

DOD:

Department of Defense

ICS:

Industrial control system

IDF (Tzahal צה”ל):

Israel Defence Forces

ILITA:

Information and Technology Authority

INCB:

Israel National Cyber Bureau

ISA (Shabak שב”כ):

Israel Security Agency

IT:

Information technology

Kinneret :

Lake of Galilee

Maf’at:

The Ministry Of Defense Directorate For Defense Research And Development

Mekorot:

National Water Company

MCM:

Million cubic meters

NCI:

National Cyber Initiative

NCSA:

(Rashut Le’umit le-Haganat ha-Cyber רשות לאומית להגנת הסייבר) National Cyber Security Authority

NISA:

(Re’em) National Information Security Authority

NSA:

National Security Agency

PLC:

Programmable logic controller

SCADA:

Supervisory control and data acquisition

Shodan:

Web Search Engine for Finding Interconnected Devices

USB:

Universal Serial Bus

WWW:

World Wide Web

References

  • Anderson, R., & Moore, T. (2006). The Economics of information security. Science, 314, 610–613.

    Article  Google Scholar 

  • Bodenheim, R., Butts, J., Dunlap, S., & Mullins, B. (2014). Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. International Journal of Critical Infrastructure Protection, 7, 114–123.

    Article  Google Scholar 

  • Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53, 23–40.

    Article  Google Scholar 

  • Gorman, C. (2012). Counterfeit chips on the rise. IEEE Spectrum, 49, 16–17.

    Article  Google Scholar 

  • Grauman, B. (2012). Cyber-security: The vexed question of global rules: An independent report on cyber-preparedness around the world. In (SDA), S. D. A. & INC., M. (eds.). Brussels: Security & Defence Agenda (SDA).

    Google Scholar 

  • Katz, Y., & Hendel, Y. (2012). Israel vs. Iran: The shadow war. Washington, D.C, Potomac.

    Google Scholar 

  • Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy, 9, 49–51.

    Article  Google Scholar 

  • Mazzucato, M. (2013). The entrepreneurial state: Debunking public vs. private sector myths.

    Google Scholar 

  • OECD. (2015). Water resources allocation: Sharing risks and opportunities. OECD Publishing.

    Google Scholar 

  • Prime Minister’s Office, I. (2015). Cabinet approves establishment of national cyber authority (Online). Available: http://www.pmo.gov.il/English/MediaCenter/Spokesman/Pages/spokeCyber150215.aspx.

  • Ravid, B. (2014). Israeli security agencies in turf battle over cyber war. Netanyahu to decide. HaAretz, 14/09.

    Google Scholar 

  • Reed, M., Miller, J. F., & Popick, P. (2014). Supply chain attack patterns: Framework and Catalog. Office of the Deputy Assistant Secretary of Defense for Systems Engineering.

    Google Scholar 

  • Sanger, D. E. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. New York: Crown.

    Google Scholar 

  • Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford, New York: Oxford University Press.

    Google Scholar 

  • Israel National Water System Map, The Water Authority (2014).http://www.water.gov.il/Hebrew/ProfessionalInfoAndData/2012/israel_national_water_system-map.pdf

  • Weiss, J. (2014). Industrial control system (ICS) cyber security for water and wastewater systems. Securing Water and Wastewater Systems. Berlin: Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lior Tabansky .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Tabansky, L. (2017). Cyber Security Challenges: The Israeli Water Sector Example. In: Clark, R., Hakim, S. (eds) Cyber-Physical Security. Protecting Critical Infrastructure, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-32824-9_10

Download citation

Publish with us

Policies and ethics