NLSUI OPAC header image

Cyber Terrorism: Analysis and Enforcement of Cyber Laws in India

By: Contributor(s): Publication details: Bangalore NLSIU 2020Description: 73pOnline resources:
Contents:
TABLE OF CONTENT LIST OF SYMBOLS AND ABBREVIATION ; LIST OF STATUTES ; TABLE OF CASES ; 1. INTRODUCTION; 1.1 INTRODUCTION ; 1.2 RESEARCH PROBLEM ; 1.3 AIMS AND OBJECTIVE OF STUDY; 1.4 HYPOTHESIS ; 1.5 RESEARCH QUESTION ; 1.6 METHODOLOGY; 1.7 MODE OF CITATION ; 1.8 LIMITATIONS ; 1.9 SCHEME OF STUDY ; 2. REVIEW OF LITERATURE ; 3. COMPREHENDING THE PROVISIONS OF INDIAN PENAL CODE.1860 IN TERMS OF CYBER· TERRORISM; 3.1 DEFINITION; 3.2 INDIAN PENAL CODE, 1860 DEALING WITH THE PROVISIONS RELATING TO CYBBROFFENCES; 32.1 Cyber-offences: Amendment to the Indian Penal Code, 1860 ; 32.2 Interpretation of the term 'War' under the ambit of Indian Penal Code, 1860; 3.3 CONCLUSION; 4. COMPREHENDING THE PROVISIONS OF INFORMATION TECHNOLOGY ACT. 2000 IN RELATION TO CYBER·TERRORISM; 4.1 PROVISION UNDER INFORMATION TECHNOLOGY ACT, 2000 ; 4.2 SECTION 66F OF THE IT ACT. ; 42.1 Distributed denial of services ; 42.2 Relevance of critical information structure; 4.3 POWER OF GOVERNMENT TO UNDERTAKE ACTION REGARDING CYBER SECURITY ; 43.1 Section 69: power of Government to issue directions ; 43.2 Section 69A: power of Government to block public access to information on computer resources; 43.3 Section 69B: power of Government to monitor and collect traffic data and Internet; 4.4 ALTERATION OF SOURCE CODE UNDER SECTION 43 ; 4.5 INFORMATION TECHNOLOGY RULES, 20 11: CONCERN ING CYBER art; 4.6 CONCLUSION ; 5. JUDICIAL INTERPRETATION CONCERNING CYBER·TERRORSIM 5.1 POSITION IN USA ; 5.1.1 Analysis of Rajib Mitra case ; 5.1.2 Analysis of Ardit Ferzi case ; 5.2 POSITION IN INDIA ; 52.1 Analysis of Mehdi Masoor Biswas case ; 52.2 Analysis of Ahmedabad Bomb Blast case. 5.3 CONCLUSION ; 6. CONCLUSION AND SUGGESTIONS; 6.1 CONCLUSION ; 6.2 SUGGESTIONS ; 6.3 LOOPHOLES IN THE EXISTING LEGAL FRAMEWORK ; 6.4 SUGGESTIONS TO REGULATE CYBERSPACE TO COMBAT CYBER·TERRORISM ; BIBLIOGRAPHY .
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Dissertation . Not for loan LLM807

TABLE OF CONTENT
LIST OF SYMBOLS AND ABBREVIATION ;
LIST OF STATUTES ;
TABLE OF CASES ;
1. INTRODUCTION;
1.1 INTRODUCTION ;
1.2 RESEARCH PROBLEM ;
1.3 AIMS AND OBJECTIVE OF STUDY;
1.4 HYPOTHESIS ;
1.5 RESEARCH QUESTION ;
1.6 METHODOLOGY;
1.7 MODE OF CITATION ;
1.8 LIMITATIONS ;
1.9 SCHEME OF STUDY ;
2. REVIEW OF LITERATURE ;
3. COMPREHENDING THE PROVISIONS OF INDIAN PENAL CODE.1860 IN TERMS OF CYBER· TERRORISM;
3.1 DEFINITION;
3.2 INDIAN PENAL CODE, 1860 DEALING WITH THE PROVISIONS RELATING TO CYBBROFFENCES;
32.1 Cyber-offences: Amendment to the Indian Penal Code, 1860 ;
32.2 Interpretation of the term 'War' under the ambit of Indian Penal Code, 1860;
3.3 CONCLUSION;
4. COMPREHENDING THE PROVISIONS OF INFORMATION TECHNOLOGY ACT. 2000 IN RELATION TO CYBER·TERRORISM;
4.1 PROVISION UNDER INFORMATION TECHNOLOGY ACT, 2000 ;
4.2 SECTION 66F OF THE IT ACT. ;
42.1 Distributed denial of services ;
42.2 Relevance of critical information structure;
4.3 POWER OF GOVERNMENT TO UNDERTAKE ACTION REGARDING
CYBER SECURITY ;
43.1 Section 69: power of Government to issue directions ;
43.2 Section 69A: power of Government to block public access to information on computer resources;
43.3 Section 69B: power of Government to monitor and collect traffic data and Internet;
4.4 ALTERATION OF SOURCE CODE UNDER SECTION 43 ;
4.5 INFORMATION TECHNOLOGY RULES, 20 11: CONCERN ING CYBER art;
4.6 CONCLUSION ;
5. JUDICIAL INTERPRETATION CONCERNING CYBER·TERRORSIM
5.1 POSITION IN USA ;
5.1.1 Analysis of Rajib Mitra case ;
5.1.2 Analysis of Ardit Ferzi case ;
5.2 POSITION IN INDIA ;
52.1 Analysis of Mehdi Masoor Biswas case ;
52.2 Analysis of Ahmedabad Bomb Blast case.
5.3 CONCLUSION ;
6. CONCLUSION AND SUGGESTIONS;
6.1 CONCLUSION ;
6.2 SUGGESTIONS ;
6.3 LOOPHOLES IN THE EXISTING LEGAL FRAMEWORK ;
6.4 SUGGESTIONS TO REGULATE CYBERSPACE TO COMBAT CYBER·TERRORISM ;
BIBLIOGRAPHY .