{"id":606,"date":"2015-10-08T13:50:22","date_gmt":"2015-10-08T10:50:22","guid":{"rendered":"http:\/\/www.axiomsec.com\/?page_id=606&#038;lang=he"},"modified":"2023-12-23T18:40:18","modified_gmt":"2023-12-23T16:40:18","slug":"%d7%91%d7%99%d7%aa","status":"publish","type":"page","link":"https:\/\/www.axiomsec.com\/?page_id=606&lang=he","title":{"rendered":"\u05d1\u05d9\u05ea"},"content":{"rendered":"<p style=\"text-align: right;\">\u00a0 \u05d0\u05e7\u05e1\u05d9\u05d5\u05dd \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05e2\u05d5\u05e1\u05e7\u05ea \u05d1\u05d9\u05d9\u05e2\u05d5\u05e5 \u05d5\u05d4\u05d3\u05e8\u05db\u05d4 \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4, \u05d4\u05d7\u05d9\u05e8\u05d5\u05dd \u05d5\u05d4\u05d4\u05de\u05e9\u05db\u05d9\u05d5\u05ea \u05d4\u05e2\u05e1\u05e7\u05d9\u05ea(BCP) \u05d1\u05de\u05d2\u05d6\u05e8 \u05d4\u05e6\u05d9\u05d1\u05d5\u05e8\u05d9, \u05d4\u05e2\u05e1\u05e7\u05d9 \u05d5\u05d4\u05d0\u05d6\u05e8\u05d7\u05d9. \u05d4\u05d7\u05d1\u05e8\u05d4 \u05de\u05d1\u05e6\u05e2\u05ea \u05ea\u05d4\u05dc\u05d9\u05db\u05d9\u05dd \u05e9\u05dc \u05ea\u05db\u05e0\u05d5\u05df \u05d5\u05d4\u05d5\u05d1\u05dc\u05ea \u05de\u05e2\u05e8\u05db\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05de\u05d1\u05d5\u05e1\u05e1\u05d9\u05dd \u05e2\u05dc \u05d4\u05e2\u05e8\u05db\u05d4 \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05d4\u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd. \u05d4\u05ea\u05d4\u05dc\u05d9\u05da \u05de\u05d1\u05d5\u05e6\u05e2 \u05d0\u05dc \u05de\u05d5\u05dc \u05db\u05dc\u05dc \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05dc\u05e8\u05d1\u05d5\u05ea \u05d8\u05e8\u05d5\u05e8, \u05e2\u05d1\u05e8\u05d9\u05d9\u05e0\u05d5\u05ea \u05e8\u05db\u05d5\u05e9, \u05e1\u05d3\u05e8 \u05e6\u05d9\u05d1\u05d5\u05e8\u05d9, \u05de\u05e0\u05d9\u05e2\u05ea \u05d0\u05d5\u05d1\u05d3\u05df \u05e2\u05e1\u05e7\u05d9 (Loss Prevention), \u05de\u05d4\u05d9\u05de\u05e0\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd, \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2.<br \/>\n\u05db\u05de\u05d5 \u05db\u05df \u05d0\u05d7\u05e8\u05d0\u05d9\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e2\u05dc \u05d4\u05e0\u05d9\u05d4\u05d5\u05dc \u05d4\u05de\u05e7\u05e6\u05d5\u05e2\u05d9\u00a0 <a href=\"https:\/\/www.wincol.ac.il\/security\/\" data-auth=\"NotApplicable\" data-linkindex=\"1\">\u05d4\u05de\u05e8\u05db\u05d6 \u05dc\u05e0\u05d9\u05d4\u05d5\u05dc \u05d5\u05d1\u05d9\u05d8\u05d7\u05d5\u05df \u05d1\u05de\u05e8\u05db\u05d6 \u05d4\u05d0\u05e7\u05d3\u05de\u05d9 \u05dc\u05d5\u05d9\u05e0\u05e1\u05e7\u05d9-\u05d5\u05d9\u05e0\u05d2\u05d9\u05d9\u05d8<\/a>\u00a0\u00a0\u05d0\u05e9\u05e8 \u05d4\u05d5\u05e7\u05dd \u05d1\u05e9\u05e0\u05ea 2009 \u05db\u05de\u05d9\u05d6\u05dd \u05de\u05e9\u05d5\u05ea\u05e3 \u05d1\u05d9\u05d7\u05d3 \u05e2\u05dd \u05d4\u05de\u05e8\u05db\u05d6 \u05d4\u05d0\u05e7\u05d3\u05de\u05d9 \u05dc\u05d5\u05d9\u05e0\u05e1\u05e7\u05d9-\u05d5\u05d9\u05e0\u05d2\u05d9\u05d9\u05d8.<\/p>\n<p><a href=\"http:\/\/www.axiomsec.com\/?practiceareas=security&amp;lang=he\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-443 size-full aligncenter\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-security.png\" alt=\"icon-security\" width=\"64\" height=\"63\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-security.png 64w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-security-50x50.png 50w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><b><a href=\"http:\/\/www.axiomsec.com\/?practiceareas=security&amp;lang=he\">\u05d0\u05d1\u05d8\u05d7\u05d4<\/a><\/b><\/h2>\n<p style=\"text-align: center;\"><a title=\"Security\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=security&amp;lang=he\">\u05d9\u05d9\u05e2\u05d5\u05e5 \u05dc\u05d0\u05d1\u05d8\u05d7\u05d4, \u05ea\u05db\u05e0\u05d5\u05df \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05d0\u05d1\u05d8\u05d7\u05d4<\/a><\/p>\n<p><a href=\"http:\/\/www.axiomsec.com\/?practiceareas=secutiry\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-514 size-full\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-new.jpg\" alt=\"security service\" width=\"354\" height=\"296\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-new.jpg 354w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-new-300x251.jpg 300w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><a title=\"Training\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=training-2\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-448 aligncenter\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-training.png\" alt=\"icon-training\" width=\"64\" height=\"63\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-training.png 64w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-training-50x50.png 50w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><strong><a title=\"Training\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=%d7%94%d7%9b%d7%a9%d7%a8%d7%94&amp;lang=he\">\u05d4\u05d3\u05e8\u05db\u05d4 \u05d5\u05d0\u05d9\u05de\u05d5\u05df<\/a><\/strong><\/h2>\n<p style=\"text-align: center;\"><a title=\"Training\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=training-2\">\u05e7\u05d5\u05e8\u05e1\u05d9\u05dd, \u05e1\u05de\u05d9\u05e0\u05e8\u05d9\u05dd, \u05d0\u05d9\u05de\u05d5\u05e0\u05d9\u05dd<\/a><\/p>\n<p><a href=\"http:\/\/www.axiomsec.com\/?practiceareas=training-2\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-444\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security.jpg\" alt=\"home-trainning\" width=\"354\" height=\"296\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security.jpg 354w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-300x250.jpg 300w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><\/p>\n<p><a title=\"DISSASTER MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=dissaster-management\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-451 aligncenter\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-management.png\" alt=\"icon-management\" width=\"64\" height=\"63\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><strong><a title=\"EMERGENCY MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=emergency-management-%d7%a0%d7%99%d7%94%d7%95%d7%9c-%d7%9c%d7%a9%d7%a2%d7%aa-%d7%97%d7%99%d7%a8%d7%95%d7%9d&amp;lang=he\">\u05de\u05e6\u05d1\u05d9 \u05d7\u05d9\u05e8\u05d5\u05dd<\/a><\/strong><\/h2>\n<p style=\"text-align: center;\"><a title=\"EMERGENCY MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=dissaster-management\">\u05d4\u05d9\u05e2\u05e8\u05db\u05d5\u05ea, \u05de\u05d5\u05db\u05e0\u05d5\u05ea \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05d1\u05de\u05e6\u05d1\u05d9 \u05d0\u05e1\u05d5\u05df \u05d5\u05d7\u05d9\u05e8\u05d5\u05dd<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"DISSASTER MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=dissaster-management\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-450\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/home-disaster.jpg\" alt=\"home-disaster\" width=\"354\" height=\"296\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-disaster.jpg 354w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-disaster-300x250.jpg 300w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><\/p>\n<div class=\"info_box\">\n<p><a href=\"http:\/\/security.wincol.ac.il\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-240 size-full\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/banner.jpg\" alt=\"banner\" width=\"230\" height=\"319\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/banner.jpg 230w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/banner-216x300.jpg 216w\" sizes=\"(max-width: 230px) 100vw, 230px\" \/><\/a><\/p>\n<h3><a title=\"Supply chain and Loss prevention\" href=\"http:\/\/www.axiomsec.com\/?security=%D7%A9%D7%A8%D7%A9%D7%A8%D7%AA-%D7%94%D7%A1%D7%A4%D7%A7%D7%94-%D7%95%D7%94%D7%9E%D7%A0%D7%A2%D7%95%D7%AA-%D7%9E%D7%90%D7%91%D7%93%D7%95%D7%AA&amp;lang=he\">\u05de\u05e0\u05d9\u05e2\u05ea \u05d0\u05d5\u05d1\u05d3\u05df \u05e2\u05d9\u05e1\u05e7\u05d9<\/a><\/h3>\n<p>Loss Prevention is a field of action that aims to enable the effectively control of the industrial, marketing and conveying processes together with the movements of funds, raw materials and products, in order to protect the organization's assets and vital interests against hostile elements attempts to damage them or to exploit them for their own benefit.<br \/>\nThese threats of criminal elements, whether they are coming from the inside of the organization, using personnel authorized to utilize its resources, and even if they are operating from the outside, existed since ancient times.<\/p>\n<p style=\"text-align: right;\"><a title=\"Supply chain and Loss prevention\" href=\"http:\/\/www.axiomsec.com\/?security=%d7%a9%d7%a8%d7%a9%d7%a8%d7%aa-%d7%94%d7%a1%d7%a4%d7%a7%d7%94-%d7%95%d7%94%d7%9e%d7%a0%d7%a2%d7%95%d7%aa-%d7%9e%d7%90%d7%91%d7%93%d7%95%d7%aa&amp;lang=he\">\u05e7\u05e8\u05d0 \u05e2\u05d5\u05d3<\/a><\/p>\n[\/span4]\n<div class=\"span4 \"><h3><a href=\"http:\/\/www.axiomsec.com\/?cat=19&amp;lang=he\">\u05de\u05d0\u05de\u05e8\u05d9\u05dd \u05d0\u05d7\u05e8\u05d5\u05e0\u05d9\u05dd<\/a><\/h3>\n<div class=\"wp-cpl-sc-wrap wp-cpl-sc-theme-2\">\n        <div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/www.axiomsec.com\/?p=102\" title=\"Permalink to: Professional ethics and values in the field of security\">Professional ethics and values in the field of security<\/a><\/h2>\n            <div class=\"wp-cpl-sc-entry\">\n        <p>\n            The professional staff of the\u00a0Homeland Security Academic College at Wingate, Israel compiled the\u00a0\"Code of Ethics of Security\". The purpose of this\u2026        <\/p>\n                <p class=\"wp-cpl-sc-readmore\">\n            <a href=\"https:\/\/www.axiomsec.com\/?p=102\">\u05e7\u05e8\u05d0 \u05e2\u05d5\u05d3<\/a>\n        <\/p>\n            <\/div>\n        <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/www.axiomsec.com\/?p=106\" title=\"Permalink to: Security as Reflected in the Adversary's Possible Modes of Operation (PMO) \">Security as Reflected in the Adversary&#8217;s Possible Modes of Operation (PMO)<\/a><\/h2>\n            <div class=\"wp-cpl-sc-entry\">\n        <p>\n            Security plans are evaluated, first and foremost, by how well designed they are, and by their appropriateness to address the threats, taking into\u2026        <\/p>\n                <p class=\"wp-cpl-sc-readmore\">\n            <a href=\"https:\/\/www.axiomsec.com\/?p=106\">\u05e7\u05e8\u05d0 \u05e2\u05d5\u05d3<\/a>\n        <\/p>\n            <\/div>\n        <div class=\"clear\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u05d0\u05e7\u05e1\u05d9\u05d5\u05dd \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05e2\u05d5\u05e1\u05e7\u05ea \u05d1\u05d9\u05d9\u05e2\u05d5\u05e5 \u05d5\u05d4\u05d3\u05e8\u05db\u05d4 \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4, \u05d4\u05d7\u05d9\u05e8\u05d5\u05dd \u05d5\u05d4\u05d4\u05de\u05e9\u05db\u05d9\u05d5\u05ea \u05d4\u05e2\u05e1\u05e7\u05d9\u05ea(BCP) \u05d1\u05de\u05d2\u05d6\u05e8 \u05d4\u05e6\u05d9\u05d1\u05d5\u05e8\u05d9, \u05d4\u05e2\u05e1\u05e7\u05d9 \u05d5\u05d4\u05d0\u05d6\u05e8\u05d7\u05d9. \u05d4\u05d7\u05d1\u05e8\u05d4 \u05de\u05d1\u05e6\u05e2\u05ea \u05ea\u05d4\u05dc\u05d9\u05db\u05d9\u05dd \u05e9\u05dc \u05ea\u05db\u05e0\u05d5\u05df \u05d5\u05d4\u05d5\u05d1\u05dc\u05ea \u05de\u05e2\u05e8\u05db\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05de\u05d1\u05d5\u05e1\u05e1\u05d9\u05dd \u05e2\u05dc \u05d4\u05e2\u05e8\u05db\u05d4 \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05d4\u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd. \u05d4\u05ea\u05d4\u05dc\u05d9\u05da \u05de\u05d1\u05d5\u05e6\u05e2 \u05d0\u05dc \u05de\u05d5\u05dc \u05db\u05dc\u05dc \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05dc\u05e8\u05d1\u05d5\u05ea \u05d8\u05e8\u05d5\u05e8, \u05e2\u05d1\u05e8\u05d9\u05d9\u05e0\u05d5\u05ea \u05e8\u05db\u05d5\u05e9, \u05e1\u05d3\u05e8 \u05e6\u05d9\u05d1\u05d5\u05e8\u05d9, \u05de\u05e0\u05d9\u05e2\u05ea \u05d0\u05d5\u05d1\u05d3\u05df \u05e2\u05e1\u05e7\u05d9 (Loss Prevention), \u05de\u05d4\u05d9\u05de\u05e0\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd, \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2. \u05db\u05de\u05d5 \u05db\u05df \u05d0\u05d7\u05e8\u05d0\u05d9\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e2\u05dc \u05d4\u05e0\u05d9\u05d4\u05d5\u05dc \u05d4\u05de\u05e7\u05e6\u05d5\u05e2\u05d9\u00a0 \u05d4\u05de\u05e8\u05db\u05d6 \u05dc\u05e0\u05d9\u05d4\u05d5\u05dc \u05d5\u05d1\u05d9\u05d8\u05d7\u05d5\u05df&nbsp;<a href=\"https:\/\/www.axiomsec.com\/?page_id=606&#038;lang=he\" class=\"read-more\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/606"}],"collection":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=606"}],"version-history":[{"count":19,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/606\/revisions"}],"predecessor-version":[{"id":983,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/606\/revisions\/983"}],"wp:attachment":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}