List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
m (removed Actors from Examples)
Line 75: Line 75:
== Real-world examples ==
== Real-world examples ==
* Incidents:
* Incidents:
**[[Cyber attacks against Estonia (2007)]]
** [[Cyber attacks against Estonia (2007)]]
** [[Georgia-Russia conflict (2008)]]
** [[Georgia-Russia conflict (2008)]]
** [[Cyber operations in Iraq since 2003]]
** [[Cyber operations in Iraq since 2003]]
Line 104: Line 104:
** [[African Union headquarters hack (2018)]]
** [[African Union headquarters hack (2018)]]
** [[Attempted hack of the OPCW (2018)]]
** [[Attempted hack of the OPCW (2018)]]
**[[SamSam ransomware attack (2018)]]
** [[SamSam ransomware attack (2018)]]
** (...)
* Actors:
** [[APT-28]]
** [[APT-29]]
** [[Unit 61398]]
** (...)
** (...)



== Keywords ==
== Keywords ==

Revision as of 12:03, 22 February 2019

This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.

About the project

Scenarios

Legal concepts

General international law

Specialised regimes of peacetime international law

Use of force, conflict and international law

Real-world examples


Keywords

List of keywords