Main Page: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(colonial pipeline incident added)
(adding Ireland's HSE attack)
Line 88: Line 88:


In the Toolkit, [[Scenario 14: Ransomware campaign|Scenario 14]] explores the legal questions regarding ransomware extortion campaigns. Given the indirect involvement of a State, [[Scenario 06: Cyber countermeasures against an enabling State|Scenario 06]] deals with the possible countermeasures deployed against an enabling State.
In the Toolkit, [[Scenario 14: Ransomware campaign|Scenario 14]] explores the legal questions regarding ransomware extortion campaigns. Given the indirect involvement of a State, [[Scenario 06: Cyber countermeasures against an enabling State|Scenario 06]] deals with the possible countermeasures deployed against an enabling State.
</div>
</option>
<option weight="2">
<!-- INCIDENT 15-->
<div id="mp-itn" style="padding:0.1em 0.6em;">[[File:HSE-logo-updated.jpg|left|150px]]
On 14 May 2021, a [[Ireland’s Health Service Executive ransomware attack (2021)|ransomware attack targeted the Irish national healthcare service]] on both national and local levels, including several hospitals that had to cancel planned procedures. The day before, National Cyber Security Centre informed about a potential threat inside the Department of Health network, which spoiled the efforts of ransomware infiltration. The Department’s IT systems were preemptively shut down. The criminal investigation is focusing on the Wizard Spider gang that is operating from Saint Petersburg in Russia according to intelligence agencies. The Minister for Foreign Affairs of Ireland Simon Coveney said he has spoken to his Russian counterpart, Sergey Lavrov, about the cyber attack. Although most of the systems were operable a month later, its complete recovery may take up to 6 months.

In the Toolkit, [[Scenario 14: Ransomware campaign|Scenario 14]] explores the legal questions regarding ransomware extortion campaigns. Given the indirect involvement of a State, [[Scenario 06: Cyber countermeasures against an enabling State|Scenario 06]] deals with the possible countermeasures deployed against an enabling State. [[Scenario 20: Cyber operations against medical facilities|Scenario 20]] focuses on cyber operations against medical facilities.

</div>
</div>
</option>
</option>

Revision as of 10:49, 27 October 2021

__NONUMBEREDHEADINGS__

Welcome to the Cyber Law Toolkit, an interactive online resource on international law and cyber operations.

Call for submissions

Cyber Law Toolkit is now inviting submissions for its next general update in 2022. Successful authors will be awarded an honorarium. This call for submissions is open until 1 November 2021. Full text of the call with submission dates and contacts is available for download here: Call for submissions (PDF)