1
LATTHE EDUCATION SOCITY’S POLYTECHNIC,
SANGLI
DEPARTMENT OF COMPUTER ENGINEERING
MICRO PROJECT PROPOSAL
SUBJECT: Emerging Trends in Computer &
Information Technology
TITLE: Study of Network Hacking
SUBMITTED BY:
Roll Number Name Enrollment Number
243205 Raghav Deepak Dattawadkar 2200430300
2
PROBLEM STATEMENT
Study of Network Hacking
LITERATURE REVIEW
Network hacking refers to the act of gaining unauthorized access to a
computer network and its infrastructure resources, such as devices, servers,
software, and other services. Network hacking involves gathering information
about a target network, identifying vulnerabilities, and exploiting them to gain
access. A variety of tools and techniques are used to identify potential security
threats in computer networks.
Network Hacking is gathering an information from network and computers
over the internet.
AIMS AND BENEFITS OF PROJECT:
Network hacking is a serious threat to computer networks and systems. It is
important for individuals and organizations to understand the risks and
implement appropriate security measures to prevent unauthorized access to
their networks and data.
The aim of this microproject is to study and analyze various network hacking
techniques, their methodologies, and countermeasures. This includes
understanding ethical hacking concepts, common attack vectors, penetration
testing, and security measures to prevent unauthorized access. The project will
also explore emerging trends in network security to enhance awareness and
preparedness against cyber threats.
3
COURSE OUTCOMES ACHIEVED
By completing this microproject on Study of Network Hacking under the
subject Emerging Trends in Computer and Information Security, I have
achieved the following course outcomes:
Understanding Network Hacking Concepts – Gained knowledge about
the fundamentals of network hacking, ethical hacking principles, and the
role of cybersecurity in preventing unauthorized access.
Identification of Network Vulnerabilities – Learned to recognize common
network security flaws, including weak authentication, outdated software,
and improper system configurations.
Exploration of Emerging Cybersecurity Trends – Researched modern
advancements in cybersecurity, including AI-driven threat detection, Zero
Trust security models, and blockchain-based security for enhancing network
protection.
Development of a Security-Conscious Mindset – Developed awareness
about ethical hacking responsibilities, legal considerations, and best
practices for securing digital infrastructure.
This microproject has provided valuable insights into ethical hacking practices
and cybersecurity measures, enhancing my ability to analyze, detect, and
prevent network threats effectively.
4
PROPOSED METHODOLOGY
To effectively study network hacking and its countermeasures, I will follow a
structured approach as outlined below:
1. Understanding the Topic
Identify the importance of network security and the risks posed by
hacking.
Define the key objectives of the study, focusing on ethical hacking and
security measures.
2. Research and Data Collection
Gather information from books, research papers, and online sources about
hacking techniques.
Study real-life cyberattacks to understand how hackers exploit network
vulnerabilities.
3. Study of Hacking Techniques
Learn about different hacking methods like phishing, malware attacks,
denial-of-service (DoS), and man-in-the-middle (MITM) attacks.
Understand how hackers gain unauthorized access to networks.
4. Identifying Network Vulnerabilities
Explore common security weaknesses such as weak passwords, outdated
software, and misconfigured settings.
Analyze how these vulnerabilities can be exploited.
5. Learning Security Measures
Study various protection methods like firewalls, encryption, intrusion
detection systems (IDS), and multi-factor authentication.
Research ethical hacking tools like Kali Linux, Wireshark, and Nmap
for security testing.
5
6. Exploring Emerging Trends
Study modern advancements like AI-based security, blockchain security,
and Zero Trust models.
Understand how cybersecurity is evolving to tackle new threats.
7. Documentation and Conclusion
Prepare a detailed report summarizing hacking methods, vulnerabilities,
security solutions, and key findings.
Conclude with recommendations to enhance network security.
RESOURCES REQUIRED
Sr. No Name of Specifications Remark
resource/material
1 Computer Intel Core I5 1
. system with and later
broad RAM 8GB,
specifications Windows 11
and later
versions.
2 Any other Laser printer 1
. resources used HP
LaserJet Pro
P1566 Printer.
6
ACTION PLAN
Sr. Details of Activity Planned Planned Name Of Responsible
No. Start Date Finish Date Team Member
1 finalization of topic Raghav D. Dattawadkar
.
2 Preparation and Raghav D. Dattawadkar
. submission of
project proposal.
3 Creating layout of micro Raghav D. Dattawadkar
. project.
4 Content preparation. Raghav D. Dattawadkar
.
5 Memorize about required Raghav D. Dattawadkar
. resources.
6 Correction and Raghav D. Dattawadkar
. implementation
.
7 Seminar. Raghav D. Dattawadkar
.
8 Final submission of Raghav D. Dattawadkar
. micro project.
REFRENCE LINKS
https://dev.to/s3cloudhub/understanding-network-hacking-26c1
https://training.alef.com/ww/network-security-ethical-hacking.p2315.html
https://iln.ieee.org/public/contentdetails.aspx?
id=D77FAD18901645A39978B0E778E04048