Abstract
National cybersecurity strategy and policy in Israel commenced in the early 2000s, with a centralised Critical Infrastructure Protection, one of the first policies of its kind in the world. The regulation instated in the 2002 ‘Resolution B/84’ mandated cybersecurity directives for selected commercial and public organisations and utilities by the National Information Security Authority. The organisations supervised by the National Information Security Authority were required to finance and implement the mandatory security instructions.
We discuss the stakeholders’ encounter with the inevitable cybersecurity dilemmas and describe the policy-making process for achieving acceptable trade-offs between competing values. The Tel Aviv Stock Exchange (TASE) reluctance to accept this cybersecurity regulation illustrates the recurring challenges facing cybersecurity policy. The CIP arrangement proved viable, and is still operational in 2014, but is far from being the ultimate step in cybersecurity policy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In fact, the existing chief security officers at government ministries already had professionally authority for physical security of the designated supervised entities. For example, the Ministry of Communications has certain authority over some aspects of the telephone company, Bezeq, the Ministry of National Infrastructures over the water supply company, Mekorot, and so forth.
- 2.
The counter-terrorism advisor in the NSC generally chaired the steering committee.
Reference
Tabansky L (2011) Critical infrastructure protection from cyber threats. Mil Strateg Aff 3(2):61–78
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Tabansky, L., Ben Israel, I. (2015). The Israeli National Cybersecurity Policy Focuses on Critical Infrastructure Protection (CIP). In: Cybersecurity in Israel. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-18986-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-18986-4_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18985-7
Online ISBN: 978-3-319-18986-4
eBook Packages: Computer ScienceComputer Science (R0)