“Israel is exposed to cyber-attacks which can paralyze entire life systems on which the\u00a0country runs.”<\/strong><\/span><\/span><\/p>\nPM Netanyahu.<\/strong><\/div>\n<\/blockquote>\n \n<\/span> \nIn Israel, it turns out, great minds are contemplating possible Day Zero possibilities. Not<\/span> \nthe teenage Saudi ‘nightmare’ – as the ambitious hacker called himself – but the real<\/span> \nNIGHTMARE. And at Technion’s world-leading computer science faculty, plans are underway<\/span> \nto bring expert researchers from across the field into one Cyber Security Research and<\/span> \nTeaching Program at the Faculty of Computer Science.<\/span> \n \n<\/span> \nFor experts like Petrank, the kind of “Day Zero” scenario such as sabotage of power plants,<\/span> \nflight control systems, or army control networks are far more disturbing. \u201cAl Qaeda are looking<\/span> \nfor more spectacular ways to wage war. They are looking for something more dramatic than<\/span> \n9\/11, and that can either be the acquisition of weapons of mass destruction or cyber terrorism<\/span> \n\u2014 real cyber terror,\u201d an Israel cyber terror expert told reporters. \u201cEvents like these of the past<\/span> \nfew weeks can pique their interest in true cyber warfare.\u201d<\/span> \n \n<\/span> \nReal cyber terror involves hitting control systems of airports or other infrastructure, power<\/span> \nplants, transportation systems, hospitals, everything that is controlled by computers. The<\/span> \ndamage could be catastrophic – far more than a conventional war. \u201cThis could involve the<\/span> \nkilling of thousands of people. Imagine someone breaking into Logan airport\u2019s systems, and<\/span> \ninstead of hijacking planes, now they are programmed to collide into one another or crash.\u201d<\/span> \n \n<\/span> \nIsrael’s enemies are probing the vulnerability of these sophisticated systems. Israeli PM<\/span> \nBenjamin Netanyahu recently warned that \u201cIsrael is exposed to cyber-attacks which can<\/span> \n \n<\/span> \nparalyze entire life systems on which the country runs.\u201d To face the constant threat of attacks<\/span> \nby terrorists and hostile countries, it is absolutely vital to Israel\u2019s security and economic well-<\/span> \nbeing to develop the best, most robust systems and take all measures possible to protect<\/span> \nthem. Therefore, Prime Minister Netanyahu has recently announced \u201cthe establishment of a<\/span> \nnational cybernetic initiative to encourage and develop the field of cybernetics and turn the<\/span> \nState of Israel into a global center of [cybernetics] knowledge, in cooperation with academia,<\/span> \nindustry, the security establishment and other public bodies.\u201d<\/span> \n \n<\/span> \nTechnion is well known for various contributions in computer security and cryptography, such<\/span> \nas assessing the security of cellular phone networks and exposing their vulnerabilities and<\/span> \nweaknesses.<\/span> \n \n<\/span> \nFor example, a Technion team studied the protocols of the ubiquitous GSM phone system<\/span> \nand identified several weaknesses that allowed for eavesdropping on a conversation, taking<\/span> \nover a call, and even impersonating a different phone owner. The researchers also examined<\/span> \nthe security of other kinds of applications such as car remote controls, analysis of the strength<\/span> \nof cryptographic standards, and the design of new cryptographic systems.<\/span> \n \n<\/span> \nIn addition, Technion researchers working in other areas of computing constantly address<\/span> \nsecurity issues such as cloud computing, where security is a critical enabling technology<\/span> \nwithout which the entire concept is rendered unusable.<\/span> \n \n<\/span> \nResearchers in a variety of Technion faculties study security issues related to operating<\/span> \nsystems (OS), the methodologies by which they defend underlying applications, and<\/span> \nrequirements from supporting hardware and programming languages.<\/span> \n \n<\/span> \nTechnion graduates have become key players in Israel\u2019s thriving computer security industry.<\/span> \nA good example is the startup, Imperva , which recently went public and works in the area<\/span> \nof data protection. One of its founders was also a founder of Checkpoint, a leading Israeli<\/span> \ncompany that revolutionized computer security in the early 1990s, making it possible for<\/span> \nenterprises to defend entire networks. Its magnitude of success has paved the way and<\/span> \ninspired many other Israeli companies and Technion graduates. In today\u2019s Israeli high-tech<\/span> \narena, an entire ecosystem of companies exists to seek out solutions for the next possible<\/span> \ncyber flaw. One would be hard-pressed to find such a company without a dominant presence<\/span> \nof Technion graduates.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n
\n
\n<\/span><\/div>\n<\/div>\n\n
\n\n\n <\/span><\/td>\n<\/tr>\n\nWhen a hacker becomes a WMD terrorist –<\/span> \nTechnion Research blocks the way.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n
<\/object><\/span><\/div>\n \n<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"
December 20th, 2030. The world has made headway into healing some of its oldest diseases – cancer, Alzheimer\u2019s, MS. Driven by global communication through social media, the majority of nations are at peace, as the problem of oil dependency was alleviated by energy pioneers that created unlimited fuel from an infinite resource the sun. But… Continue Reading Ready for Day Zero – Pioneering Cyber Security<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-83610","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"\nReady for Day Zero - Pioneering Cyber Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n