Cyber Threats To Israel’s Air Traffic Control

Israel is under a constant Cyber-attack, and the government has ordered the General Security Service to take every needed step to counter these attacks. A Cyber-attack on Israeli infrastructure may include air traffic control installations.

The new National Cyber Defence Authority (NCDA) unit, which is responsible for protecting Israel’s national infrastructures against Cyber-attacks, assumes the coordination of protecting certain infrastructure, banks and mobile carriers. Sources said that the air traffic control is also included in the list and in a very high place.

Israeli officials consider the Cyber-attacks as an act of war and some were quoted saying that “This threat is real like rockets that hit our cities”. This means that the proper Israeli organisations will try and locate the source of the attacks and make an effort to neutralize it.

As it looks now, this is an all-out war, and the concerns are high as signs prove that vital national installations are targeted almost daily. The Israeli air traffic control (ATC) system works very closely with this of the Israeli air force (IAF). Therefore, any attempt to disrupt one of them will affect the other and may cause chaos with “very extreme scenarios”.

So the decision that was made in recent days is to mobilise all the assets that Israel disposes, to defend the Israeli vital systems including its ATC system from organised or sporadic Cyber-attack. What is very clear is that many of the budgets that were traditionally channeled to the deployment of advanced systems that are aimed at defending Israel from attacks either by missiles, rockets or enemy aircraft, will be rerouted now to the new Cyber war.

Photo: Recently completed new control Tower at Ben Gurion Airport, Tel Aviv

I-HLS
 

« Global Cyber Security Awareness Month
US And Russia Face Off Over Syria & Cyber Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Sourcepass

Sourcepass

Sourcepass is an IT consulting company that focuses on providing expert IT services, cloud computing solutions, cybersecurity services, website, and application development.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.