List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
No edit summary
No edit summary
Line 44:
 
== Real-world examples ==
* Incidents:
* (...)
** [[Estonia (2007)]]
** [[Georgia (2008)]]
** [[Cyber operations in Iraq since 2003]]
** [[Stuxnet (2010)]]
** [[Ababil (2011–13)]]
** [[Shamoon (2012)]]
** [[Heartbleed (2014)]] (what happens when a widespread vulnerability is disclosed)
** [[Sony pictures hack (2014)]]
** [[Sands Casino (2014)]]
** [[Steel mill in Germany (2014)]]
** [[OPM data breach (2015)]]
** [[Bundestag hack (2015)]]
** [[Power grid cyberattack in Ukraine (2015)]]
** [[DNC email leak (2016)]]
** [[Shamoon 2.0 (2016)]]
** [[WannaCry (2017)]]
** [[NotPetya (2017)]]
** [[French elections (2017)]]
** (...)
* [[APT-28]]
* Actors:
* [[APT-29]]
** [[Unit 61398APT-28]]
** [[APT-2829]]
* (...)
** [[Unit 61398]]
** (...)
 
== Keywords ==

Revision as of 14:08, 10 August 2018

About the project

About the project

Scenarios

Scenario 101

Scenario 102

Areas of law

General international law and peacetime cyber operations

Cyber law of armed conflict (JAB, JIB)

Real-world examples

Keywords

List of keywords