TABLE OF CONTENTS
Introduction .......................................................................................................................................... 3
I. The protection of sovereignty in cyberspace and violations of the principle of non-intervention .. 4
II. The application of the Law of States Responsibility to activities in the cyberspace ...................... 5
a) Attribution .................................................................................................................................. 5
b) Due diligence .............................................................................................................................. 6
c) Countermeasures ........................................................................................................................ 7
III. Cyber operations and the Use of Force .......................................................................................... 8
a) Cyber operations and Article 2(4) of the UN Charter ................................................................ 8
b) Cyber operations and the exercise of self-defence by States...................................................... 9
c) Cyber operations and the application of International Humanitarian Law ................................ 9
d) Cyber operations and the law of neutrality............................................................................... 10
IV. Human rights in cyberspace ......................................................................................................... 10
V. The role of private stakeholders in cyberspace ............................................................................. 11
VI. International cooperation in the cybersecurity domain ............................................................... 11