List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
No edit summary
No edit summary
Line 44: Line 44:


== Real-world examples ==
== Real-world examples ==
* Incidents:
* (...)
* [[Estonia (2007)]]
** [[Estonia (2007)]]
* [[Georgia (2008)]]
** [[Georgia (2008)]]
* [[Cyber operations in Iraq since 2003]]
** [[Cyber operations in Iraq since 2003]]
* [[Stuxnet (2010)]]
** [[Stuxnet (2010)]]
* [[Ababil (2011–13)]]
** [[Ababil (2011–13)]]
* [[Shamoon (2012)]]
** [[Shamoon (2012)]]
* [[Heartbleed (2014)]] (what happens when a widespread vulnerability is disclosed)
** [[Heartbleed (2014)]] (what happens when a widespread vulnerability is disclosed)
* [[Sony pictures hack (2014)]]
** [[Sony pictures hack (2014)]]
* [[Sands Casino (2014)]]
** [[Sands Casino (2014)]]
* [[Steel mill in Germany (2014)]]
** [[Steel mill in Germany (2014)]]
* [[OPM data breach (2015)]]
** [[OPM data breach (2015)]]
* [[Bundestag hack (2015)]]
** [[Bundestag hack (2015)]]
* [[Power grid cyberattack in Ukraine (2015)]]
** [[Power grid cyberattack in Ukraine (2015)]]
* [[DNC email leak (2016)]]
** [[DNC email leak (2016)]]
* [[Shamoon 2.0 (2016)]]
** [[Shamoon 2.0 (2016)]]
* [[WannaCry (2017)]]
** [[WannaCry (2017)]]
* [[NotPetya (2017)]]
** [[NotPetya (2017)]]
* [[French elections (2017)]]
** [[French elections (2017)]]
** (...)
* [[APT-28]]
* Actors:
* [[APT-29]]
* [[Unit 61398]]
** [[APT-28]]
** [[APT-29]]
* (...)
** [[Unit 61398]]
** (...)


== Keywords ==
== Keywords ==

Revision as of 14:08, 10 August 2018

About the project

About the project

Scenarios

Scenario 101

Scenario 102

Areas of law

General international law and peacetime cyber operations

Cyber law of armed conflict (JAB, JIB)

Real-world examples

Keywords

List of keywords