Danie Sharpe

10%
Flag icon
However, the Experts, taking into account the present state of cyber communications, acknowledged that it is usually unlikely that such ‘transit States’ would know of, and be able to identify, malicious traffic transiting their cyber infrastructure.
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
Rate this book
Clear rating
Open Preview