Difference between revisions of "Main Page"

From International cyber law: interactive toolkit
Jump to navigation Jump to search
(resizing thumbnails)
Line 19: Line 19:
 
{| class="wikitable" style="text-align: center"
 
{| class="wikitable" style="text-align: center"
 
|[[File:Scenario_01.jpg|center|120px|link=Scenario 01: Election interference]][[Scenario 01: Election interference|S01 (Election interference)]]
 
|[[File:Scenario_01.jpg|center|120px|link=Scenario 01: Election interference]][[Scenario 01: Election interference|S01 (Election interference)]]
|[[File:Enigma, 1923, Deutschland.JPG|center|120px|link=Scenario 02: Cyber espionage against government departments]][[Scenario 02: Cyber espionage against government departments|S02 (Political espionage)]]
+
|[[File:Scenario 02.jpg|alt=|center|120x120px]][[Scenario 02: Cyber espionage against government departments|S02 (Political espionage)]]
 
|[[File:Scenario_03.jpg|center|120px|link=Scenario 03: Cyber operation against the power grid]][[Scenario 03: Cyber operation against the power grid|S03 (Power grid)]]
 
|[[File:Scenario_03.jpg|center|120px|link=Scenario 03: Cyber operation against the power grid]][[Scenario 03: Cyber operation against the power grid|S03 (Power grid)]]
 
|[[File:Flags.jpg|center|120px|link=Scenario 04: A State’s failure to assist an international organization]][[Scenario 04: A State’s failure to assist an international organization|S04 (International organization)]]
 
|[[File:Flags.jpg|center|120px|link=Scenario 04: A State’s failure to assist an international organization]][[Scenario 04: A State’s failure to assist an international organization|S04 (International organization)]]
 
|-
 
|-
|[[File:The Bronze Soldier - panoramio.jpg|center|120px|link=Scenario 05: State investigates and responds to cyber operations against private actors in its territory]][[Scenario 05: State investigates and responds to cyber operations against private actors in its territory|S05 (Criminal investigation)]]
+
|[[File:Scenario 05.jpg|alt=|center|120x120px]][[Scenario 05: State investigates and responds to cyber operations against private actors in its territory|S05 (Criminal investigation)]]
 
|[[File:Hacker2.jpg|center|120px|link=Scenario 06: Cyber countermeasures against an enabling State]][[Scenario 06: Cyber countermeasures against an enabling State|S06 (Enabling State)]]
 
|[[File:Hacker2.jpg|center|120px|link=Scenario 06: Cyber countermeasures against an enabling State]][[Scenario 06: Cyber countermeasures against an enabling State|S06 (Enabling State)]]
 
|[[File:Scenario_07.jpg|center|120px|link=Scenario 07: Leak of State-developed hacking tools]][[Scenario 07: Leak of State-developed hacking tools|S07 (Hacking tools)]]
 
|[[File:Scenario_07.jpg|center|120px|link=Scenario 07: Leak of State-developed hacking tools]][[Scenario 07: Leak of State-developed hacking tools|S07 (Hacking tools)]]

Revision as of 07:30, 3 April 2019

MainBanner.jpg
Welcome to the Cyber Law Toolkit, an interactive online resource on international law and cyber operations.

Other resources

  • FAQ – Frequently asked questions about the project and the Toolkit.
  • All articles – Updated list of all substantive articles in the Toolkit. In a printed book, this would be the table of contents.
  • Keywords – Overview of all keywords used across the Toolkit content. Serves the same purpose as an index would in a printed book.
  • Examples – List of real-world incidents that have inspired the analysis in the Toolkit.
  • Glossary – Glossary of the technical terms used in the Toolkit.
  • Short form citation – Abbreviated references for the most commonly used citations in the Toolkit.
  • Bibliography – Bibliography of resources used in the creation and development of the Toolkit.
  • People – List of all people involved in the project (including scenario authors, peer reviewers, research assistants...).