EMERGING DIMENSIONS OF CYBER LAW AND IPR Issues and Challenges in 21st Century

556.00₹ 695.00₹

Buy EMERGING DIMENSIONS OF CYBER LAW AND IPR Issues and Challenges in 21st Century | Law Reports , our publication, New Arrivals, CYBER CRIME

Contents


Foreword.............................................................................................................................................. v

Preface............................................................................................................................................... ix

Chapter-1    Protection of Children from Online Sexual Abuse in India & Pakistan De LegeLata - De LegeFerenda...............1

                                                                      Introduction.......................................................................................................... 2

1.  Cyber Crime and Online Child Sexual Abuse.......................................................... 3

2.  Jurisdictional Problems in Online Child Sexual Abuse............................................ 5

3.  Online Child Sexual Abuse in India........................................................................ 7

           Current Legislation to Protect Children from

Online Sexual Abuse in India........................................................................... 7

           Judicial Trends in India................................................................................... 8

4.  Online Child Sexual Abuse in Pakistan................................................................. 10

           Current Legislation to Protect Children from Online Sexual Abuse in Pakistan 10

           Judicial Trends in Pakistan............................................................................ 11

5.  Legislative Challenges to Combat Online Child Sexual Abuse in India & Pakistan. 12

6.  Jurisdictional Chellenges to Combat Online Child Sexual

Abuse in India & Pakistan.................................................................................... 14

7.  Conclusion........................................................................................................... 17

8.  Suggestions.......................................................................................................... 18

    Chapter-2        Contemporary Concerns in Limitation of Liability

    Clauses in Cloud Computing Contracts................................................................... 19.

     1.The Ubiquity of Standard Form Contracts............................................................ 20

    2.  Limitation of Liability Clauses in Standard Form Contracts.................................. 22

    3.  Operability Issues in Cloud Computing................................................................ 24

    4.  Limitation of Liability Clauses in Cloud Contracts............................................... 26

    5. The Indian Position on Cloud Computing............................................................. 28

    6. The way Ahead for Negotiating Cloud Computing Contracts................................. 30

    7.  Conclusion........................................................................................................... 31

    Chapter-3        Intrusion Detection and Prevention System

                                                                 Using Cryptographic Algorithms............................................................................. 33

                                  1.  Introduction......................................................................................................... 34

    11 Cyber Security ............................................................................................... 34

               Risk Management.......................................................................................... 35

             Detection Systems (IDS)............................................................................... 35

    2.  Literature Review................................................................................................. 36

               Characteristic of Invader............................................................................... 37

               Type of Intrusion.......................................................................................... 37

               Jamming the Network.................................................................................... 37

               Junk Transmission........................................................................................ 37

               Teardrop....................................................................................................... 37

               Ping of Death (PoD)...................................................................................... 37

               Denial of Service (DoS)................................................................................. 37

               Man-In-The-Middle...................................................................................... 38

    3.  Intrusion Detection Technique.............................................................................. 38

              Anomaly-Based Detection............................................................................. 38

               Misuse Detection........................................................................................... 39

               Stateful Protocol Analysis.............................................................................. 39

    4.  Components of an Intrusion Detection System /Intrusion Prevention System...... 39

               Data Pre-processor........................................................................................ 40

               Detection Algorithm....................................................................................... 40

              Alert Filter..................................................................................................... 40

               Host Based Intrusion Detection and Prevention System (HIDPS)

    ...........................................................................................................40

               Network Based Intrusion Detection and Prevention System (NIDPS)............ 42

               Network Behavior Analysis (NBA)................................................................ 42

               Wireless Intrusion Detection and Prevention System (WIDPS) .43

    5. Working Flow of Intrusion Detection System....................................................... 43

    6.  Intrusion Detection System/Intrusion Prevention System Functions 44 6.1 Information Collection         44

               Feature Selection........................................................................................... 44

               Analysis........................................................................................................ 45

               Action........................................................................................................... 45

    7.

    Write a review

    Please login or register to review