

| Item type | Current library | Status | Barcode | |
|---|---|---|---|---|
|
|
. | Not for loan | LLM807 |
TABLE OF CONTENT
LIST OF SYMBOLS AND ABBREVIATION ;
LIST OF STATUTES ;
TABLE OF CASES ;
1. INTRODUCTION;
1.1 INTRODUCTION ;
1.2 RESEARCH PROBLEM ;
1.3 AIMS AND OBJECTIVE OF STUDY;
1.4 HYPOTHESIS ;
1.5 RESEARCH QUESTION ;
1.6 METHODOLOGY;
1.7 MODE OF CITATION ;
1.8 LIMITATIONS ;
1.9 SCHEME OF STUDY ;
2. REVIEW OF LITERATURE ;
3. COMPREHENDING THE PROVISIONS OF INDIAN PENAL CODE.1860 IN TERMS OF CYBER· TERRORISM;
3.1 DEFINITION;
3.2 INDIAN PENAL CODE, 1860 DEALING WITH THE PROVISIONS RELATING TO CYBBROFFENCES;
32.1 Cyber-offences: Amendment to the Indian Penal Code, 1860 ;
32.2 Interpretation of the term 'War' under the ambit of Indian Penal Code, 1860;
3.3 CONCLUSION;
4. COMPREHENDING THE PROVISIONS OF INFORMATION TECHNOLOGY ACT. 2000 IN RELATION TO CYBER·TERRORISM;
4.1 PROVISION UNDER INFORMATION TECHNOLOGY ACT, 2000 ;
4.2 SECTION 66F OF THE IT ACT. ;
42.1 Distributed denial of services ;
42.2 Relevance of critical information structure;
4.3 POWER OF GOVERNMENT TO UNDERTAKE ACTION REGARDING
CYBER SECURITY ;
43.1 Section 69: power of Government to issue directions ;
43.2 Section 69A: power of Government to block public access to information on computer resources;
43.3 Section 69B: power of Government to monitor and collect traffic data and Internet;
4.4 ALTERATION OF SOURCE CODE UNDER SECTION 43 ;
4.5 INFORMATION TECHNOLOGY RULES, 20 11: CONCERN ING CYBER art;
4.6 CONCLUSION ;
5. JUDICIAL INTERPRETATION CONCERNING CYBER·TERRORSIM
5.1 POSITION IN USA ;
5.1.1 Analysis of Rajib Mitra case ;
5.1.2 Analysis of Ardit Ferzi case ;
5.2 POSITION IN INDIA ;
52.1 Analysis of Mehdi Masoor Biswas case ;
52.2 Analysis of Ahmedabad Bomb Blast case.
5.3 CONCLUSION ;
6. CONCLUSION AND SUGGESTIONS;
6.1 CONCLUSION ;
6.2 SUGGESTIONS ;
6.3 LOOPHOLES IN THE EXISTING LEGAL FRAMEWORK ;
6.4 SUGGESTIONS TO REGULATE CYBERSPACE TO COMBAT CYBER·TERRORISM ;
BIBLIOGRAPHY .