Professional Documents
Culture Documents
:
10 2015 .
1
: -
.
.
( )
.
( )
( ).
" " - .
( )
- 2014
[ .] [] .
.
-
. " "
. 1996 ""
"" .
1
"" ""
.
.
" ".
.
2004
" ".
. .
100 .
.
:
"" 2001 ""
2004
2004
. 100
" " 25 2006
.
2006 13 ""
2007
" " " " . 2008 "
" 300
.
" " " " -
2013 . 2014
. " "
.
" " .2014
" 13
" - -
2
" " .
.
" "
. " " .
2014 ""
. 34 .
.
" "
.
: .
. (
) .
() .
-
.
( )
.
( ).
.
.
.
.
.
.
() .
()
.
. (
- ) .
"".
. :
" 20 .
" . []
1990 . 2007
.
" . .
"" .
.
.
.
.
.
4
.
.
)
(
.
2
:
.
. ()
.
"
" .
.
.
.
. (
) .
" "
.
:
: .
.
.
"" .
" " .
1948
"" .
. [] 1948
.
.
.
.
.1948 :
:
: .
.
. "" .
15 1948
. ""
.
.
1948
.
.
1
Regional
defense
"
"
:
:
.
.
1949
" " .
-1 .
.
.
.
.
.
.
1956
1949
.
. .
.
. ( )Gordian knot
: .
.
.
" "
()
.
.
.
.
\
.
.
.
8
.
.
.
. .
.
.
.
.
( ) :
.
.
" "
( 2006 2009/2008
.)2012
( 4382 )
( 7 ).
( 86 )
.
.
20 60
.
40 32 .
" "
.
).
.
.
" " .
.
.
10
-
-
.
( ) .
.
.
.
) (functional resilience .
. " "
.
.
.
.
.
. " "
.
.
.
.
. 10 31
11
1.3
2014
" " .
2 .
.
.
.
.
.
.
-
753
.
.
.
.
.
12
" "
.
.
( )210
.
( )
.
.
.
.
.
.
.
.
/ : 2014 " "
" " () .
"
.
" .
.
.
.
) .
(
. .
13
4
:
50 : 4258 735
5226 32 74 2200 .
.
( )
.
" " .
.
.
.
.
.
( ) .
.
14
"
"
.
.
.
.
( )
:
.
:
-1
.
.
.
.
.
-2 :
.
-3 : .
.
.
.
.
.
.
.
:
15
-1 (
) .
.
.
-2
( )order of battle
.
.
.
- -
.
-3
.
.
.
-4
.
-5
.
.
-6
.
.
16
. ""
- -
.
.
.
-
.
.
.
.
. .
8 .
.
.
.
.
17
- .
.
" "
.
:
.
.
.
:
. -
.
- .
- -
.
( )
.
18
5
()
) .
(
()
.
().
() .
( )DDoS )DNS(- 1000
) (ISA .
()
( )SEA .
( .)OpIsrael
Cyber Warfare .
19
() ( )ISA
. ()
" "
( )
() : .
()IP
70 .
()
()
() ( )ISA
.
.
( IP
.
()
.
)addresses
3
.
.
20
()
.
( )Hacktivist
()
) .
(
.
.
( )IT security
-------------
* : .
21