Cyber security and implications for national infrastructure

Author(s):  
P. Davis
Author(s):  
Lior Tabansky

Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems. Analysing the national responses to Cybersecurity challenges reveals the power of “Cyber War” metaphor and the resulting militarization of cyberspace. But these are unsuitable against cyber disruption of civilian national infrastructure. Further, the persistent trend towards militarization of cybersecurity has negative outcomes. How then should democratic societies provide Cybersecurity? One way of addressing the challenge is presented in the second part of the chapter. Israeli Cyber Defence stresses three lessons. 1. Despite the global risks, a national response is feasible. 2. Israel did not to task the IDF with cyber defence in civilian realm. 3. Technical prowess is not enough for national Cybersecurity, without political measures to settle conflicts and overcome barriers.


As societies, governments, corporations, and individuals become more dependent on the digital environment, so they also become increasingly vulnerable to misuse of that environment. A considerable industry has developed to provide the means with which to make cyberspace more secure, stable, and predictable. Cybersecurity is concerned with the identification, avoidance, management, and mitigation of risk in, or from, cyberspace—the risk of harm and damage that might occur as the result of everything from individual carelessness to organized criminality, to industrial and national security espionage, and, at the extreme end of the scale, to disabling attacks against a country’s critical national infrastructure. But this represents a rather narrow understanding of security and there is much more to cyberspace than vulnerability, risk, and threat. As well as security from financial loss, physical damage, etc., cybersecurity must also be for the maximization of benefit. The Oxford Handbook of Cybersecurity takes a comprehensive and rounded approach to the still evolving topic of cybersecurity: the security of cyberspace is as much technological as it is commercial and strategic; as much international as regional, national, and personal; and as much a matter of hazard and vulnerability as an opportunity for social, economic, and cultural growth.


2020 ◽  
pp. 613-630
Author(s):  
Barend Pretorius ◽  
Brett van Niekerk

Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.


2018 ◽  
pp. 1125-1145
Author(s):  
Lior Tabansky

Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems. Analysing the national responses to Cybersecurity challenges reveals the power of “Cyber War” metaphor and the resulting militarization of cyberspace. But these are unsuitable against cyber disruption of civilian national infrastructure. Further, the persistent trend towards militarization of cybersecurity has negative outcomes. How then should democratic societies provide Cybersecurity? One way of addressing the challenge is presented in the second part of the chapter. Israeli Cyber Defence stresses three lessons. 1. Despite the global risks, a national response is feasible. 2. Israel did not to task the IDF with cyber defence in civilian realm. 3. Technical prowess is not enough for national Cybersecurity, without political measures to settle conflicts and overcome barriers.


2013 ◽  
Vol 3 (3) ◽  
pp. 80-87 ◽  
Author(s):  
L. Tabansky

Cyber Warfare holds a grave hazard of striking national infrastructure while circumventing traditional defense systems. This article examines the evolution of Critical Infrastructure Protection (CIP) policy in Israel and analyses its performance. Israel has developed a unique legal and regulatory model for critical infrastructure protection, which was implemented in late 2002. Recently, a comprehensive review of cyber security posture has been conducted, and significant policy changes are in progress. The Israeli approach to CIP and beyond, fostering cooperation between public, security, academic and private sectors, appears to be successful. This study of the evolution of Israeli Critical Infrastructure Protection policy may assist policy-making in other countries.


Sign in / Sign up

Export Citation Format

Share Document