
Library Catalogue

| 000 -LEADER | |
|---|---|
| fixed length control field | 02358nam a2200145Ia 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20260209120132.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 260209s9999||||xx |||||||||||||| ||und|| |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Anuj Kumar Singh |
| 245 #0 - TITLE STATEMENT | |
| Title | Cyber terrorism : issues and challenges |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | BangaloreBangalore |
| Name of publisher, distributor, etc. | NLSIU |
| Date of publication, distribution, etc. | 2014 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 106 p. ; 25 cm. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Table of Contents INTRODUCTION ; I. TERRORISM: MEANING AND CONCEPT ; II. DEFINITION OF CYBER TERRORISM ; II. WHO ARE CYBER TERRORISTS? ; • Hackers ; • Hactivists ; • Computer Criminals ; • Industrial Espionage ; • Insiders ; • Consultants/Contractors ; III. MODES OF CYBER-TERRORISM; • Unauthorized access & Hacking ; • Trojan Attack ; • Virus and Worm attack ; • E-mail related crimes ; • Domain Name Service (ONS) Attacks ; • Distributed Denial of Service (OOoS) Attacks ; • Cyber terrorism is the forerunner of warfare ; IV. IMPACT OF CYBER TERRORISM ; V. REASONS FOR CYBER TERRORISMS ; VI. INFRASTRUCTURE VULNERABLE TO CYBERTERRORISM ; • Potential Targets ; VII. JURISDICTION VIS A VIS INTERNET ; • Traditional Jurisdictional Laws vis a vis Modern Internet Transactions; • Internet Jurisdiction: Complexities Involved ; • Internet Jurisdiction- An insight into Judicial Decisions ; • Analysis of Judicial Precedents ; • International Convention ; • Indian Position ; • Mitigating Risk of Internet Jurisdiction: Possible Solutions ; ~ Legal Solutions ; ~ Business Solutions ; VIII. CERTAIN DISADVANTAGES OF CYBER-TERRORISM ; IX. FUTURE OF CYBER-TERRORISM ; X. LEGISLATIVE MEASURES IN INDIA ; • Constitution of India ; • Indian Penal Code ; • Protection under Information Technology Act, 2000 ; XI. PREVENTIVE MEASURES ; XII. DIFFICULTIES FOR IMPLEMENTING SECURITY MEASURES AGAINST CYBER TERRORISM ; XIII. CONTROL MEASURES FROM INTERNATIONAL AND GLOBAL ORGANISATIONS ; XIV. COUNTER TERRORISM POLICY: CONDITIONS & GUIDELINES ; XV. LAW IN VARIOUS COUNTRIES RELATING TO CYBER TERRORISM; • Singapore ; • United States ; • Malaysia ; • United Kingdom ; • Pakistan ; XVI. INSTANCES OF CYBER TERRORISM ; • Cyber Terrorism Cases in India ; XVII. NEED FOR CYBER TERRORISM LAW IN INDIA ; XVIII. SUGGESTIONS TO CURB CYBER TERRORISM ; CONCLUSION. |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Dr. S B N Prakash - GuideDr. S B N Prakash - Guide |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://dans.nls.ac.in/handle/123456789/1788">https://dans.nls.ac.in/handle/123456789/1788</a> |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|
| . | . | 09.02.2026 | LLM473 | 09.02.2026 | 09.02.2026 | Dissertation |