List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
No edit summary |
No edit summary |
||
Line 44: | Line 44: | ||
== Real-world examples == |
== Real-world examples == |
||
* Incidents: |
|||
⚫ | |||
* [[Estonia (2007)]] |
** [[Estonia (2007)]] |
||
* [[Georgia (2008)]] |
** [[Georgia (2008)]] |
||
* [[Cyber operations in Iraq since 2003]] |
** [[Cyber operations in Iraq since 2003]] |
||
* [[Stuxnet (2010)]] |
** [[Stuxnet (2010)]] |
||
* [[Ababil (2011–13)]] |
** [[Ababil (2011–13)]] |
||
* [[Shamoon (2012)]] |
** [[Shamoon (2012)]] |
||
* [[Heartbleed (2014)]] (what happens when a widespread vulnerability is disclosed) |
** [[Heartbleed (2014)]] (what happens when a widespread vulnerability is disclosed) |
||
* [[Sony pictures hack (2014)]] |
** [[Sony pictures hack (2014)]] |
||
* [[Sands Casino (2014)]] |
** [[Sands Casino (2014)]] |
||
* [[Steel mill in Germany (2014)]] |
** [[Steel mill in Germany (2014)]] |
||
* [[OPM data breach (2015)]] |
** [[OPM data breach (2015)]] |
||
* [[Bundestag hack (2015)]] |
** [[Bundestag hack (2015)]] |
||
* [[Power grid cyberattack in Ukraine (2015)]] |
** [[Power grid cyberattack in Ukraine (2015)]] |
||
* [[DNC email leak (2016)]] |
** [[DNC email leak (2016)]] |
||
* [[Shamoon 2.0 (2016)]] |
** [[Shamoon 2.0 (2016)]] |
||
* [[WannaCry (2017)]] |
** [[WannaCry (2017)]] |
||
* [[NotPetya (2017)]] |
** [[NotPetya (2017)]] |
||
* [[French elections (2017)]] |
** [[French elections (2017)]] |
||
⚫ | |||
⚫ | |||
* Actors: |
|||
* [[APT-29]] |
|||
* [[ |
** [[APT-28]] |
||
⚫ | |||
⚫ | |||
** [[Unit 61398]] |
|||
⚫ | |||
== Keywords == |
== Keywords == |
Revision as of 14:08, 10 August 2018
About the project
Scenarios
Areas of law
General international law and peacetime cyber operations
- Sovereignty
- Due diligence
- Jurisdiction
- State responsibility
- Peacetime cyber espionage
- Non-state actors
- Specialised regimes
- Prohibited intervention
Cyber law of armed conflict (JAB, JIB)
- Jus ad bellum:
- Jus in bello:
- International armed conflict
- Non-international armed conflict
- Criminal responsibility
- Conduct of hostilities - the subtopics can be developed
- Certain persons, objects and activities - again
- Occupation
- Neutrality
Real-world examples
- Incidents:
- Estonia (2007)
- Georgia (2008)
- Cyber operations in Iraq since 2003
- Stuxnet (2010)
- Ababil (2011–13)
- Shamoon (2012)
- Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
- Sony pictures hack (2014)
- Sands Casino (2014)
- Steel mill in Germany (2014)
- OPM data breach (2015)
- Bundestag hack (2015)
- Power grid cyberattack in Ukraine (2015)
- DNC email leak (2016)
- Shamoon 2.0 (2016)
- WannaCry (2017)
- NotPetya (2017)
- French elections (2017)
- (...)
- Actors:
- APT-28
- APT-29
- Unit 61398
- (...)