Normal view MARC view ISBD view

Cybersecurity in Israel [electronic resource] / by Lior Tabansky, Isaac Ben Israel.

By: Tabansky, Lior [author.].
Contributor(s): Ben Israel, Isaac [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Cybersecurity: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XIII, 73 p. 5 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319189864.Subject(s): Computer science | Political science | Computer security | Computers | Law and legislation | Economic policy | Computer Science | Legal Aspects of Computing | Political Science | R & D/Technology Policy | Systems and Data SecurityAdditional physical formats: Printed edition:: No titleDDC classification: 343.0999 Online resources: Click here to access online
Contents:
Foreword -- List of Abbreviations -- Introduction -- Geopolitics and Israeli Strategy -- The National Innovation Ecosystem of Israel -- Mid 1990's: The Prequel for National Cybersecurity Policy -- The Israeli National Cybersecurity Policy Focuses on Critical Infrastructure Protection (CIP) -- Seeking Cyberpower: The National Cyber Initiative, 2010 -- The National Cyber-Strategy of Israel and the INCB -- Towards Comprehensive National Cybersecurity -- Striking with Bits? The IDF and Cyber-Warfare -- Conclusion.
In: Springer eBooksSummary: This SpringerBrief gives the reader a detailed account of how cybersecurity in Israel has evolved over the past two decades. The formation of the regions cybersecurity strategy is explored and an in-depth analysis of key developments in cybersecurity policy is provided. The authors examine cybersecurity from an integrative national perspective and see it as a set of policies and actions with two interconnected goals: to mitigate security risks and increase resilience and leverage opportunities enabled by cyber-space. Chapters include an insight into the planning and implementation of the National Security Concept strategy which facilitated the Critical Infrastructure Protection (CIP) agreement in 2002, (one of the first of its kind), the foundation of the Israeli Cyber-strategy in 2011, and details of the current steps being taken to establish a National Cyber Security Authority (NCSA). Cybersecurity in Israel will be essential reading for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers alike.
    average rating: 0.0 (0 votes)
No physical items for this record

Foreword -- List of Abbreviations -- Introduction -- Geopolitics and Israeli Strategy -- The National Innovation Ecosystem of Israel -- Mid 1990's: The Prequel for National Cybersecurity Policy -- The Israeli National Cybersecurity Policy Focuses on Critical Infrastructure Protection (CIP) -- Seeking Cyberpower: The National Cyber Initiative, 2010 -- The National Cyber-Strategy of Israel and the INCB -- Towards Comprehensive National Cybersecurity -- Striking with Bits? The IDF and Cyber-Warfare -- Conclusion.

This SpringerBrief gives the reader a detailed account of how cybersecurity in Israel has evolved over the past two decades. The formation of the regions cybersecurity strategy is explored and an in-depth analysis of key developments in cybersecurity policy is provided. The authors examine cybersecurity from an integrative national perspective and see it as a set of policies and actions with two interconnected goals: to mitigate security risks and increase resilience and leverage opportunities enabled by cyber-space. Chapters include an insight into the planning and implementation of the National Security Concept strategy which facilitated the Critical Infrastructure Protection (CIP) agreement in 2002, (one of the first of its kind), the foundation of the Israeli Cyber-strategy in 2011, and details of the current steps being taken to establish a National Cyber Security Authority (NCSA). Cybersecurity in Israel will be essential reading for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers alike.

There are no comments for this item.

Log in to your account to post a comment.