Main Page: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(preparing the main page for general update on 20 oct)
(testing pics for scn26 - 28)
Line 50: Line 50:
|-
|-
|[[File:Scn25.JPG|center|120px|link=Scenario 25: Cyber disruption of humanitarian assistance]][[Scenario 25: Cyber disruption of humanitarian assistance|S25<br>Humanitarian<br>assistance]]
|[[File:Scn25.JPG|center|120px|link=Scenario 25: Cyber disruption of humanitarian assistance]][[Scenario 25: Cyber disruption of humanitarian assistance|S25<br>Humanitarian<br>assistance]]
|[[File:Cyber-security-g97a081f15 1920.jpg|center|120px|link=Scenario 26: Export licensing of intrusion tools]][[Scenario 26: Export licensing of intrusion tools|S26<br>Export<br>licensing]]
|
|[[File:Scn27.jpg|center|120px|link=Scenario 27: Contesting and redirecting ongoing attacks]][[Scenario 27: Contesting and redirecting ongoing attacks|S27<br>Redirecting<br>attacks]]
|
|[[File:Scn28.jpg|center|120px|link=Scenario 28: Extraterritorial incidental civilian cyber harm]][[Scenario 28: Extraterritorial incidental civilian cyber harm|S28<br>Incidental<br>harm]]
|
|}
|}
</div>
</div>

Revision as of 20:08, 19 October 2022

Welcome to the Cyber Law Toolkit, an interactive online resource on international law and cyber operations.