Danie Sharpe

29%
Flag icon
It must be cautioned that it can be challenging for a target State to distinguish cyber espionage activities from other cyber operations, including offensive cyber operations. For example, both cyber espionage and offensive cyber operations usually require penetration of a system, often by the introduction of malware or a successful phishing operation.
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
Rate this book
Clear rating
Open Preview