NLSUI OPAC header image

Cyber terrorism : analysis and enforcement of cyber laws in India (Record no. 217442)

MARC details
000 -LEADER
fixed length control field 02351nam a2200145Ia 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260209120143.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 260209s9999||||xx |||||||||||||| ||und||
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Aastha Agarwal
245 #0 - TITLE STATEMENT
Title Cyber terrorism : analysis and enforcement of cyber laws in India
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. BangaloreBangalore
Name of publisher, distributor, etc. NLSIU
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent 73 p. ; 25 cm.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note TABLE OF CONTENT LIST OF SYMBOLS AND ABBREVIATION ; LIST OF STATUTES ; TABLE OF CASES ; 1. INTRODUCTION; 1.1 INTRODUCTION ; 1.2 RESEARCH PROBLEM ; 1.3 AIMS AND OBJECTIVE OF STUDY; 1.4 HYPOTHESIS ; 1.5 RESEARCH QUESTION ; 1.6 METHODOLOGY; 1.7 MODE OF CITATION ; 1.8 LIMITATIONS ; 1.9 SCHEME OF STUDY ; 2. REVIEW OF LITERATURE ; 3. COMPREHENDING THE PROVISIONS OF INDIAN PENAL CODE.1860 IN TERMS OF CYBER· TERRORISM; 3.1 DEFINITION; 3.2 INDIAN PENAL CODE, 1860 DEALING WITH THE PROVISIONS RELATING TO CYBBROFFENCES; 32.1 Cyber-offences: Amendment to the Indian Penal Code, 1860 ; 32.2 Interpretation of the term 'War' under the ambit of Indian Penal Code, 1860; 3.3 CONCLUSION; 4. COMPREHENDING THE PROVISIONS OF INFORMATION TECHNOLOGY ACT. 2000 IN RELATION TO CYBER·TERRORISM; 4.1 PROVISION UNDER INFORMATION TECHNOLOGY ACT, 2000 ; 4.2 SECTION 66F OF THE IT ACT. ; 42.1 Distributed denial of services ; 42.2 Relevance of critical information structure; 4.3 POWER OF GOVERNMENT TO UNDERTAKE ACTION REGARDING CYBER SECURITY ; 43.1 Section 69: power of Government to issue directions ; 43.2 Section 69A: power of Government to block public access to information on computer resources; 43.3 Section 69B: power of Government to monitor and collect traffic data and Internet; 4.4 ALTERATION OF SOURCE CODE UNDER SECTION 43 ; 4.5 INFORMATION TECHNOLOGY RULES, 20 11: CONCERN ING CYBER art; 4.6 CONCLUSION ; 5. JUDICIAL INTERPRETATION CONCERNING CYBER·TERRORSIM 5.1 POSITION IN USA ; 5.1.1 Analysis of Rajib Mitra case ; 5.1.2 Analysis of Ardit Ferzi case ; 5.2 POSITION IN INDIA ; 52.1 Analysis of Mehdi Masoor Biswas case ; 52.2 Analysis of Ahmedabad Bomb Blast case. 5.3 CONCLUSION ; 6. CONCLUSION AND SUGGESTIONS; 6.1 CONCLUSION ; 6.2 SUGGESTIONS ; 6.3 LOOPHOLES IN THE EXISTING LEGAL FRAMEWORK ; 6.4 SUGGESTIONS TO REGULATE CYBERSPACE TO COMBAT CYBER·TERRORISM ; BIBLIOGRAPHY .
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Dr. Nagarathna A - GuideDr. Nagarathna A - Guide
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://dans.nls.ac.in/handle/123456789/391">https://dans.nls.ac.in/handle/123456789/391</a>
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
        . . 09.02.2026   LLM807 09.02.2026 09.02.2026 Dissertation