NLSUI OPAC header image

Cyber terrorism : issues and challenges

By: Contributor(s): Publication details: BangaloreBangalore NLSIU 2014Description: 106 p. ; 25 cmOnline resources:
Contents:
Table of Contents INTRODUCTION ; I. TERRORISM: MEANING AND CONCEPT ; II. DEFINITION OF CYBER TERRORISM ; II. WHO ARE CYBER TERRORISTS? ; • Hackers ; • Hactivists ; • Computer Criminals ; • Industrial Espionage ; • Insiders ; • Consultants/Contractors ; III. MODES OF CYBER-TERRORISM; • Unauthorized access & Hacking ; • Trojan Attack ; • Virus and Worm attack ; • E-mail related crimes ; • Domain Name Service (ONS) Attacks ; • Distributed Denial of Service (OOoS) Attacks ; • Cyber terrorism is the forerunner of warfare ; IV. IMPACT OF CYBER TERRORISM ; V. REASONS FOR CYBER TERRORISMS ; VI. INFRASTRUCTURE VULNERABLE TO CYBERTERRORISM ; • Potential Targets ; VII. JURISDICTION VIS A VIS INTERNET ; • Traditional Jurisdictional Laws vis a vis Modern Internet Transactions; • Internet Jurisdiction: Complexities Involved ; • Internet Jurisdiction- An insight into Judicial Decisions ; • Analysis of Judicial Precedents ; • International Convention ; • Indian Position ; • Mitigating Risk of Internet Jurisdiction: Possible Solutions ; ~ Legal Solutions ; ~ Business Solutions ; VIII. CERTAIN DISADVANTAGES OF CYBER-TERRORISM ; IX. FUTURE OF CYBER-TERRORISM ; X. LEGISLATIVE MEASURES IN INDIA ; • Constitution of India ; • Indian Penal Code ; • Protection under Information Technology Act, 2000 ; XI. PREVENTIVE MEASURES ; XII. DIFFICULTIES FOR IMPLEMENTING SECURITY MEASURES AGAINST CYBER TERRORISM ; XIII. CONTROL MEASURES FROM INTERNATIONAL AND GLOBAL ORGANISATIONS ; XIV. COUNTER TERRORISM POLICY: CONDITIONS & GUIDELINES ; XV. LAW IN VARIOUS COUNTRIES RELATING TO CYBER TERRORISM; • Singapore ; • United States ; • Malaysia ; • United Kingdom ; • Pakistan ; XVI. INSTANCES OF CYBER TERRORISM ; • Cyber Terrorism Cases in India ; XVII. NEED FOR CYBER TERRORISM LAW IN INDIA ; XVIII. SUGGESTIONS TO CURB CYBER TERRORISM ; CONCLUSION.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Dissertation . Not for loan LLM473

Table of Contents INTRODUCTION ; I. TERRORISM: MEANING AND CONCEPT ; II. DEFINITION OF CYBER TERRORISM ; II. WHO ARE CYBER TERRORISTS? ; • Hackers ; • Hactivists ; • Computer Criminals ; • Industrial Espionage ; • Insiders ; • Consultants/Contractors ; III. MODES OF CYBER-TERRORISM; • Unauthorized access & Hacking ; • Trojan Attack ; • Virus and Worm attack ; • E-mail related crimes ; • Domain Name Service (ONS) Attacks ; • Distributed Denial of Service (OOoS) Attacks ; • Cyber terrorism is the forerunner of warfare ; IV. IMPACT OF CYBER TERRORISM ; V. REASONS FOR CYBER TERRORISMS ; VI. INFRASTRUCTURE VULNERABLE TO CYBERTERRORISM ; • Potential Targets ; VII. JURISDICTION VIS A VIS INTERNET ; • Traditional Jurisdictional Laws vis a vis Modern Internet Transactions; • Internet Jurisdiction: Complexities Involved ; • Internet Jurisdiction- An insight into Judicial Decisions ; • Analysis of Judicial Precedents ; • International Convention ; • Indian Position ; • Mitigating Risk of Internet Jurisdiction: Possible Solutions ; ~ Legal Solutions ; ~ Business Solutions ; VIII. CERTAIN DISADVANTAGES OF CYBER-TERRORISM ; IX. FUTURE OF CYBER-TERRORISM ; X. LEGISLATIVE MEASURES IN INDIA ; • Constitution of India ; • Indian Penal Code ; • Protection under Information Technology Act, 2000 ; XI. PREVENTIVE MEASURES ; XII. DIFFICULTIES FOR IMPLEMENTING SECURITY MEASURES AGAINST CYBER TERRORISM ; XIII. CONTROL MEASURES FROM INTERNATIONAL AND GLOBAL ORGANISATIONS ; XIV. COUNTER TERRORISM POLICY: CONDITIONS & GUIDELINES ; XV. LAW IN VARIOUS COUNTRIES RELATING TO CYBER TERRORISM; • Singapore ; • United States ; • Malaysia ; • United Kingdom ; • Pakistan ; XVI. INSTANCES OF CYBER TERRORISM ; • Cyber Terrorism Cases in India ; XVII. NEED FOR CYBER TERRORISM LAW IN INDIA ; XVIII. SUGGESTIONS TO CURB CYBER TERRORISM ; CONCLUSION.