List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
mNo edit summary
Line 74: Line 74:


== Real-world examples ==
== Real-world examples ==
* [[Cyber attacks against Estonia (2007)]]
* Incidents:
* [[Georgia-Russia conflict (2008)]]
** [[Cyber attacks against Estonia (2007)]]
* [[Cyber operations in Iraq since 2003]]
** [[Georgia-Russia conflict (2008)]]
* [[Stuxnet (2010)]]
** [[Cyber operations in Iraq since 2003]]
** [[Stuxnet (2010)]]
* [[DigiNotar (2011)]]
** [[DigiNotar (2011)]]
* [[Operation Ababil (2012-2013)]]
** [[Operation Ababil (2012-2013)]]
* [[Shamoon (2012)]]
* [[Chinese PLA Unit 61398 indictments (2014)]]
** [[Shamoon (2012)]]
** [[Chinese PLA Unit 61398 indictments (2014)]]
* [[Heartbleed (2014)]]
** [[Heartbleed (2014)]]
* [[Sony Pictures Entertainment attack (2014)]]
** [[Sony Pictures Entertainment attack (2014)]]
* [[Sands Casino hack (2014)]]
** [[Sands Casino hack (2014)]]
* [[Steel mill in Germany (2014)]]
** [[Steel mill in Germany (2014)]]
* [[Ukraine-Russia conflict (2014-)]]
* [[Office of Personnel Management data breach (2015)]]
** [[Ukraine-Russia conflict (2014-)]]
** [[Office of Personnel Management data breach (2015)]]
* [[Bundestag hack (2015)]]
** [[Bundestag hack (2015)]]
* [[The Hacking Team Hack (2015)]]
** [[The Hacking Team Hack (2015)]]
* [[Power grid cyberattack in Ukraine (2015)]]
** [[Power grid cyberattack in Ukraine (2015)]]
* [[1718 sanctions committee hack (2016)]]
** [[1718 sanctions committee hack (2016)]]
* [[DNC email leak (2016)]]
** [[DNC email leak (2016)]]
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
* [[Shamoon 2.0 (2016)]]
** [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
** [[Shamoon 2.0 (2016)]]
* [[APT-29 attacks on ministries (2016-2017)]]
** [[APT-29 attacks on ministries (2016-2017)]]
* [[Ethiopian surveillance of journalists abroad (2017)]]
** [[Ethiopian surveillance of journalists abroad (2017)]]
* [[French presidential election leak (2017)]]
** [[French presidential election leak (2017)]]
* [[NotPetya (mock ransomware)|NotPetya (mock ransomware) (2017)]]
** [[NotPetya (mock ransomware)|NotPetya (mock ransomware) (2017)]]
* [[Operation Cloudhopper (2017)]]
** [[Operation Cloudhopper (2017)]]
* [[WannaCry (2017)]]
** [[WannaCry (2017)]]
* [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]
* [[African Union headquarters hack (2018)]]
** [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]
** [[African Union headquarters hack (2018)]]
* [[SamSam ransomware attack (2018)]]
* (...)
** [[Attempted hack of the OPCW (2018)]]
<!--
** [[SamSam ransomware attack (2018)]]
* [[Attempted hack of the OPCW (2018)]]
** (...)
-->


== Keywords ==
== Keywords ==

Revision as of 11:43, 27 February 2019

This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.

About the project

Scenarios

Legal concepts

General international law

Specialised regimes of peacetime international law

Use of force, conflict and international law

Real-world examples

Keywords

List of keywords