Main Page: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(thumbnails and captions)
(scenario captions)
Line 18: Line 18:
<div id="mp-dyk" style="padding:0.1em 0.6em 0.5em;">
<div id="mp-dyk" style="padding:0.1em 0.6em 0.5em;">
{| class="wikitable" style="text-align: center"
{| class="wikitable" style="text-align: center"
|[[File:Scenario_01.jpg|center|120px|link=Scenario 01: Election interference]][[Scenario 01: Election interference|S01<br>Election interference]]
|[[File:Scenario_01.jpg|center|120px|link=Scenario 01: Election interference]][[Scenario 01: Election interference|S01<br>Election<br>interference]]
|[[File:Scenario 02.jpg|center|120px|link=Scenario 02: Cyber espionage against government departments]][[Scenario 02: Cyber espionage against government departments|S02<br>Political espionage]]
|[[File:Scenario 02.jpg|center|120px|link=Scenario 02: Cyber espionage against government departments]][[Scenario 02: Cyber espionage against government departments|S02<br>Political<br>espionage]]
|[[File:Scenario_03.jpg|center|120px|link=Scenario 03: Cyber operation against the power grid]][[Scenario 03: Cyber operation against the power grid|S03<br>Power grid]]
|[[File:Scenario_03.jpg|center|120px|link=Scenario 03: Cyber operation against the power grid]][[Scenario 03: Cyber operation against the power grid|S03<br>Power<br>grid]]
|[[File:Flags.jpg|center|120px|link=Scenario 04: A State’s failure to assist an international organization]][[Scenario 04: A State’s failure to assist an international organization|S04<br>International organization]]
|[[File:Flags.jpg|center|120px|link=Scenario 04: A State’s failure to assist an international organization]][[Scenario 04: A State’s failure to assist an international organization|S04<br>International<br>organization]]
|-
|-
|[[File:Scenario 05.jpg|center|120x120px|link=Scenario 05: State investigates and responds to cyber operations against private actors in its territory]][[Scenario 05: State investigates and responds to cyber operations against private actors in its territory|S05<br>Criminal investigation]]
|[[File:Scenario 05.jpg|center|120x120px|link=Scenario 05: State investigates and responds to cyber operations against private actors in its territory]][[Scenario 05: State investigates and responds to cyber operations against private actors in its territory|S05<br>Criminal<br>investigation]]
|[[File:Hacker2.jpg|center|120px|link=Scenario 06: Cyber countermeasures against an enabling State]][[Scenario 06: Cyber countermeasures against an enabling State|S06<br>Enabling State]]
|[[File:Hacker2.jpg|center|120px|link=Scenario 06: Cyber countermeasures against an enabling State]][[Scenario 06: Cyber countermeasures against an enabling State|S06<br>Enabling<br>State]]
|[[File:Scenario_07.jpg|center|120px|link=Scenario 07: Leak of State-developed hacking tools]][[Scenario 07: Leak of State-developed hacking tools|S07<br>Hacking tools]]
|[[File:Scenario_07.jpg|center|120px|link=Scenario 07: Leak of State-developed hacking tools]][[Scenario 07: Leak of State-developed hacking tools|S07<br>Hacking<br>tools]]
|[[File:Scenario 08.jpg|center|120px|link=Scenario 08: Certificate authority hack]][[Scenario 08: Certificate authority hack|S08<br>Certificate authority]]
|[[File:Scenario 08.jpg|center|120px|link=Scenario 08: Certificate authority hack]][[Scenario 08: Certificate authority hack|S08<br>Certificate<br>authority]]
|-
|-
|[[File:Su25-kompo-vers2.svg|center|120px|link=Scenario 09: Economic cyber espionage]][[Scenario 09: Economic cyber espionage|S09<br>Economic espionage]]
|[[File:Su25-kompo-vers2.svg|center|120px|link=Scenario 09: Economic cyber espionage]][[Scenario 09: Economic cyber espionage|S09<br>Economic<br>espionage]]
|[[File:Cyberweapon.jpg|center|120px|link=Scenario 10: Cyber weapons review]][[Scenario 10: Cyber weapons review|S10<br>Cyber weapons]]
|[[File:Cyberweapon.jpg|center|120px|link=Scenario 10: Cyber weapons review]][[Scenario 10: Cyber weapons review|S10<br>Cyber<br>weapons]]
|[[File:Scenario_11.jpg|center|120px|link=Scenario 11: Sale of surveillance tools in defiance of international sanctions]][[Scenario 11: Sale of surveillance tools in defiance of international sanctions|S11<br>Surveillance tools]]
|[[File:Scenario_11.jpg|center|120px|link=Scenario 11: Sale of surveillance tools in defiance of international sanctions]][[Scenario 11: Sale of surveillance tools in defiance of international sanctions|S11<br>Surveillance<br>tools]]
|[[File:Data2.jpg|center|120px|link=Scenario 12: Cyber operations against computer data]][[Scenario 12: Cyber operations against computer data|S12<br>Computer data]]
|[[File:Data2.jpg|center|120px|link=Scenario 12: Cyber operations against computer data]][[Scenario 12: Cyber operations against computer data|S12<br>Computer<br>data]]
|-
|-
|[[File:Scenario_13.jpg|center|120px|link=Scenario 13: Cyber operations as a trigger of the law of armed conflict]][[Scenario 13: Cyber operations as a trigger of the law of armed conflict|S13<br>Armed conflict]]
|[[File:Scenario_13.jpg|center|120px|link=Scenario 13: Cyber operations as a trigger of the law of armed conflict]][[Scenario 13: Cyber operations as a trigger of the law of armed conflict|S13<br>Armed<br>conflict]]
|
|
|
|

Revision as of 08:10, 3 April 2019

Welcome to the Cyber Law Toolkit, an interactive online resource on international law and cyber operations.

Other resources

  • FAQ – Frequently asked questions about the project and the Toolkit.
  • All articles – Updated list of all substantive articles in the Toolkit. In a printed book, this would be the table of contents.
  • Keywords – Overview of all keywords used across the Toolkit content. Serves the same purpose as an index would in a printed book.
  • Examples – List of real-world incidents that have inspired the analysis in the Toolkit.
  • Glossary – Glossary of the technical terms used in the Toolkit.
  • Short form citation – Abbreviated references for the most commonly used citations in the Toolkit.
  • Bibliography – Bibliography of resources used in the creation and development of the Toolkit.
  • People – List of all people involved in the project (including scenario authors, peer reviewers, research assistants...).