Editing Scenario 06: Cyber countermeasures against an enabling State
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 109: | Line 109: | ||
* Reviewed by: [[People#Peer_reviewers|Václav Borovička]]; [[People#Peer_reviewers|Dan Efrony]]; [[People#Peer_reviewers|Anna-Maria Osula]]; [[People#Peer_reviewers|Barrie Sander]]; [[People#Peer_reviewers|Peter Stockburger]] |
* Reviewed by: [[People#Peer_reviewers|Václav Borovička]]; [[People#Peer_reviewers|Dan Efrony]]; [[People#Peer_reviewers|Anna-Maria Osula]]; [[People#Peer_reviewers|Barrie Sander]]; [[People#Peer_reviewers|Peter Stockburger]] |
||
− | {| class="wikitable" |
||
− | |+ |
||
− | |Previous: [[Scenario 05: State investigates and responds to cyber operations against private actors in its territory|Scenario 05: Criminal investigation]] |
||
− | |Next: [[Scenario 07: Leak of State-developed hacking tools|Scenario 07: Hacking tools]] |
||
− | |} |
||
[[Category:Countermeasures]] |
[[Category:Countermeasures]] |
||
[[Category:Critical infrastructure]] |
[[Category:Critical infrastructure]] |