0% found this document useful (0 votes)
1 views6 pages

Praposal ETI

Uploaded by

pranavnandre941
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views6 pages

Praposal ETI

Uploaded by

pranavnandre941
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1

LATTHE EDUCATION SOCITY’S POLYTECHNIC,


SANGLI

DEPARTMENT OF COMPUTER ENGINEERING

MICRO PROJECT PROPOSAL

SUBJECT: Emerging Trends in Computer &


Information Technology

TITLE: Study of Network Hacking

SUBMITTED BY:

Roll Number Name Enrollment Number


243205 Raghav Deepak Dattawadkar 2200430300
2

PROBLEM STATEMENT

Study of Network Hacking

LITERATURE REVIEW

Network hacking refers to the act of gaining unauthorized access to a


computer network and its infrastructure resources, such as devices, servers,
software, and other services. Network hacking involves gathering information
about a target network, identifying vulnerabilities, and exploiting them to gain
access. A variety of tools and techniques are used to identify potential security
threats in computer networks.
Network Hacking is gathering an information from network and computers
over the internet.

AIMS AND BENEFITS OF PROJECT:

Network hacking is a serious threat to computer networks and systems. It is


important for individuals and organizations to understand the risks and
implement appropriate security measures to prevent unauthorized access to
their networks and data.
The aim of this microproject is to study and analyze various network hacking
techniques, their methodologies, and countermeasures. This includes
understanding ethical hacking concepts, common attack vectors, penetration
testing, and security measures to prevent unauthorized access. The project will
also explore emerging trends in network security to enhance awareness and
preparedness against cyber threats.
3

COURSE OUTCOMES ACHIEVED

By completing this microproject on Study of Network Hacking under the


subject Emerging Trends in Computer and Information Security, I have
achieved the following course outcomes:

 Understanding Network Hacking Concepts – Gained knowledge about


the fundamentals of network hacking, ethical hacking principles, and the
role of cybersecurity in preventing unauthorized access.
 Identification of Network Vulnerabilities – Learned to recognize common
network security flaws, including weak authentication, outdated software,
and improper system configurations.
 Exploration of Emerging Cybersecurity Trends – Researched modern
advancements in cybersecurity, including AI-driven threat detection, Zero
Trust security models, and blockchain-based security for enhancing network
protection.
 Development of a Security-Conscious Mindset – Developed awareness
about ethical hacking responsibilities, legal considerations, and best
practices for securing digital infrastructure.

This microproject has provided valuable insights into ethical hacking practices
and cybersecurity measures, enhancing my ability to analyze, detect, and
prevent network threats effectively.
4

PROPOSED METHODOLOGY

To effectively study network hacking and its countermeasures, I will follow a


structured approach as outlined below:

1. Understanding the Topic

 Identify the importance of network security and the risks posed by


hacking.
 Define the key objectives of the study, focusing on ethical hacking and
security measures.

2. Research and Data Collection

 Gather information from books, research papers, and online sources about
hacking techniques.
 Study real-life cyberattacks to understand how hackers exploit network
vulnerabilities.

3. Study of Hacking Techniques

 Learn about different hacking methods like phishing, malware attacks,


denial-of-service (DoS), and man-in-the-middle (MITM) attacks.
 Understand how hackers gain unauthorized access to networks.

4. Identifying Network Vulnerabilities

 Explore common security weaknesses such as weak passwords, outdated


software, and misconfigured settings.
 Analyze how these vulnerabilities can be exploited.

5. Learning Security Measures

 Study various protection methods like firewalls, encryption, intrusion


detection systems (IDS), and multi-factor authentication.
 Research ethical hacking tools like Kali Linux, Wireshark, and Nmap
for security testing.
5

6. Exploring Emerging Trends

 Study modern advancements like AI-based security, blockchain security,


and Zero Trust models.
 Understand how cybersecurity is evolving to tackle new threats.

7. Documentation and Conclusion

 Prepare a detailed report summarizing hacking methods, vulnerabilities,


security solutions, and key findings.
 Conclude with recommendations to enhance network security.

RESOURCES REQUIRED

Sr. No Name of Specifications Remark


resource/material
1 Computer Intel Core I5 1
. system with and later
broad RAM 8GB,
specifications Windows 11
and later
versions.
2 Any other Laser printer 1
. resources used HP
LaserJet Pro
P1566 Printer.
6

ACTION PLAN
Sr. Details of Activity Planned Planned Name Of Responsible
No. Start Date Finish Date Team Member

1 finalization of topic Raghav D. Dattawadkar


.
2 Preparation and Raghav D. Dattawadkar
. submission of
project proposal.
3 Creating layout of micro Raghav D. Dattawadkar
. project.
4 Content preparation. Raghav D. Dattawadkar
.
5 Memorize about required Raghav D. Dattawadkar
. resources.
6 Correction and Raghav D. Dattawadkar
. implementation
.
7 Seminar. Raghav D. Dattawadkar
.
8 Final submission of Raghav D. Dattawadkar
. micro project.

REFRENCE LINKS

 https://dev.to/s3cloudhub/understanding-network-hacking-26c1
 https://training.alef.com/ww/network-security-ethical-hacking.p2315.html
 https://iln.ieee.org/public/contentdetails.aspx?
id=D77FAD18901645A39978B0E778E04048

You might also like