List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
No edit summary |
No edit summary |
||
Line 44:
== Real-world examples ==
* Incidents:
* (...)▼
** [[Estonia (2007)]]
** [[Georgia (2008)]]
** [[Cyber operations in Iraq since 2003]]
** [[Stuxnet (2010)]]
** [[Ababil (2011–13)]]
** [[Shamoon (2012)]]
** [[Heartbleed (2014)]] (what happens when a widespread vulnerability is disclosed)
** [[Sony pictures hack (2014)]]
** [[Sands Casino (2014)]]
** [[Steel mill in Germany (2014)]]
** [[OPM data breach (2015)]]
** [[Bundestag hack (2015)]]
** [[Power grid cyberattack in Ukraine (2015)]]
** [[DNC email leak (2016)]]
** [[Shamoon 2.0 (2016)]]
** [[WannaCry (2017)]]
** [[NotPetya (2017)]]
** [[French elections (2017)]]
▲** (...)
* [[APT-28]]▼
* Actors:
** [[
* (...)▼
** [[Unit 61398]]
▲** (...)
== Keywords ==
|
Revision as of 14:08, 10 August 2018
About the project
Scenarios
Areas of law
General international law and peacetime cyber operations
- Sovereignty
- Due diligence
- Jurisdiction
- State responsibility
- Peacetime cyber espionage
- Non-state actors
- Specialised regimes
- Prohibited intervention
Cyber law of armed conflict (JAB, JIB)
- Jus ad bellum:
- Jus in bello:
- International armed conflict
- Non-international armed conflict
- Criminal responsibility
- Conduct of hostilities - the subtopics can be developed
- Certain persons, objects and activities - again
- Occupation
- Neutrality
Real-world examples
- Incidents:
- Estonia (2007)
- Georgia (2008)
- Cyber operations in Iraq since 2003
- Stuxnet (2010)
- Ababil (2011–13)
- Shamoon (2012)
- Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
- Sony pictures hack (2014)
- Sands Casino (2014)
- Steel mill in Germany (2014)
- OPM data breach (2015)
- Bundestag hack (2015)
- Power grid cyberattack in Ukraine (2015)
- DNC email leak (2016)
- Shamoon 2.0 (2016)
- WannaCry (2017)
- NotPetya (2017)
- French elections (2017)
- (...)
- Actors:
- APT-28
- APT-29
- Unit 61398
- (...)