TY - BOOK AU - Tabansky,Lior AU - Ben Israel,Isaac ED - SpringerLink (Online service) TI - Cybersecurity in Israel T2 - SpringerBriefs in Cybersecurity, SN - 9783319189864 AV - QA75.5-76.95 U1 - 343.0999 23 PY - 2015/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Computer science KW - Political science KW - Computer security KW - Computers KW - Law and legislation KW - Economic policy KW - Computer Science KW - Legal Aspects of Computing KW - Political Science KW - R & D/Technology Policy KW - Systems and Data Security KW - Electronic books KW - local N1 - Foreword -- List of Abbreviations -- Introduction -- Geopolitics and Israeli Strategy -- The National Innovation Ecosystem of Israel -- Mid 1990’s: The Prequel for National Cybersecurity Policy -- The Israeli National Cybersecurity Policy Focuses on Critical Infrastructure Protection (CIP) -- Seeking Cyberpower: The National Cyber Initiative, 2010 -- The National Cyber-Strategy of Israel and the INCB -- Towards Comprehensive National Cybersecurity -- Striking with Bits? The IDF and Cyber-Warfare -- Conclusion N2 - This SpringerBrief gives the reader a detailed account of how cybersecurity in Israel has evolved over the past two decades. The formation of the regions cybersecurity strategy is explored and an in-depth analysis of key developments in cybersecurity policy is provided. The authors examine cybersecurity from an integrative national perspective and see it as a set of policies and actions with two interconnected goals: to mitigate security risks and increase resilience and leverage opportunities enabled by cyber-space. Chapters include an insight into the planning and implementation of the National Security Concept strategy which facilitated the Critical Infrastructure Protection (CIP) agreement in 2002, (one of the first of its kind), the foundation of the Israeli Cyber-strategy in 2011, and details of the current steps being taken to establish a National Cyber Security Authority (NCSA). Cybersecurity in Israel will be essential reading for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers alike UR - http://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-319-18986-4 ER -