| 000 | 02426nam a2200181Ia 4500 | ||
|---|---|---|---|
| 999 |
_c207662 _d207662 |
||
| 003 | OSt | ||
| 005 | 20210719105533.0 | ||
| 008 | 210206s2020 xx 000 0 und | ||
| 040 | _cnls | ||
| 100 | _aAastha Agarwal | ||
| 245 | 0 | _aCyber Terrorism: Analysis and Enforcement of Cyber Laws in India | |
| 260 |
_aBangalore _bNLSIU _c2020 |
||
| 300 | _a73p. | ||
| 505 | _aTABLE OF CONTENT LIST OF SYMBOLS AND ABBREVIATION ; LIST OF STATUTES ; TABLE OF CASES ; 1. INTRODUCTION; 1.1 INTRODUCTION ; 1.2 RESEARCH PROBLEM ; 1.3 AIMS AND OBJECTIVE OF STUDY; 1.4 HYPOTHESIS ; 1.5 RESEARCH QUESTION ; 1.6 METHODOLOGY; 1.7 MODE OF CITATION ; 1.8 LIMITATIONS ; 1.9 SCHEME OF STUDY ; 2. REVIEW OF LITERATURE ; 3. COMPREHENDING THE PROVISIONS OF INDIAN PENAL CODE.1860 IN TERMS OF CYBER· TERRORISM; 3.1 DEFINITION; 3.2 INDIAN PENAL CODE, 1860 DEALING WITH THE PROVISIONS RELATING TO CYBBROFFENCES; 32.1 Cyber-offences: Amendment to the Indian Penal Code, 1860 ; 32.2 Interpretation of the term 'War' under the ambit of Indian Penal Code, 1860; 3.3 CONCLUSION; 4. COMPREHENDING THE PROVISIONS OF INFORMATION TECHNOLOGY ACT. 2000 IN RELATION TO CYBER·TERRORISM; 4.1 PROVISION UNDER INFORMATION TECHNOLOGY ACT, 2000 ; 4.2 SECTION 66F OF THE IT ACT. ; 42.1 Distributed denial of services ; 42.2 Relevance of critical information structure; 4.3 POWER OF GOVERNMENT TO UNDERTAKE ACTION REGARDING CYBER SECURITY ; 43.1 Section 69: power of Government to issue directions ; 43.2 Section 69A: power of Government to block public access to information on computer resources; 43.3 Section 69B: power of Government to monitor and collect traffic data and Internet; 4.4 ALTERATION OF SOURCE CODE UNDER SECTION 43 ; 4.5 INFORMATION TECHNOLOGY RULES, 20 11: CONCERN ING CYBER art; 4.6 CONCLUSION ; 5. JUDICIAL INTERPRETATION CONCERNING CYBER·TERRORSIM 5.1 POSITION IN USA ; 5.1.1 Analysis of Rajib Mitra case ; 5.1.2 Analysis of Ardit Ferzi case ; 5.2 POSITION IN INDIA ; 52.1 Analysis of Mehdi Masoor Biswas case ; 52.2 Analysis of Ahmedabad Bomb Blast case. 5.3 CONCLUSION ; 6. CONCLUSION AND SUGGESTIONS; 6.1 CONCLUSION ; 6.2 SUGGESTIONS ; 6.3 LOOPHOLES IN THE EXISTING LEGAL FRAMEWORK ; 6.4 SUGGESTIONS TO REGULATE CYBERSPACE TO COMBAT CYBER·TERRORISM ; BIBLIOGRAPHY . | ||
| 700 | _aDr. Nagarathna A - Guide | ||
| 856 | _uhttp://opac.nls.ac.in:8081/xmlui/handle/123456789/391 | ||
| 942 |
_cDIS _2ddc |
||