0% found this document useful (0 votes)
2 views

harshnew (1)

The document outlines a minor project synopsis for a Bachelor's degree in Computer Applications, focusing on the development of a Python-based Key Logger. The project aims to capture and record keystrokes for security monitoring while addressing ethical considerations in its use. Future enhancements may include machine learning integration and remote monitoring capabilities.

Uploaded by

Vansh Rajpal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

harshnew (1)

The document outlines a minor project synopsis for a Bachelor's degree in Computer Applications, focusing on the development of a Python-based Key Logger. The project aims to capture and record keystrokes for security monitoring while addressing ethical considerations in its use. Future enhancements may include machine learning integration and remote monitoring capabilities.

Uploaded by

Vansh Rajpal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

MINOR PROJECT SYNOPSIS

Submitted for the Partially fulfillment of award of the degree of

BACHELOR OF COMPUTER APPLICATION

in

FIMT- SCHOOL OF IT

By

Harsh Verma
01090102022

UNDER THE GUIDANCE OF

FIMT- SOIT

Fairfield Institute of Management and Technology (FIMT)


Affiliated to GGSIP UNIVERSITY
NEW DELHI

YEAR – 2024
TABLE OF CONTENT

Sl. No. Outlines PAGE NO.

1. INTRODUCTION 1

2. OBJECTIVES 2

3. FUTURE SCOPE OF PROJECT 2

4. METHODOLOGY 3

5. TOOLS AND TECHNOLOGIES 4

6. REFERENCE 5
Introduction

A Key Logger is a software tool designed to capture and record the keystrokes entered on a
computer's keyboard. Often used for security monitoring or troubleshooting, it serves as a
surveillance tool to track user input for various purposes, such as studying user behaviour,
ensuring compliance, or detecting unauthorized access. This project aims to create a Key
Logger using Python, showcasing the powerful capabilities of the language for system level
programming while emphasizing its ethical use in cybersecurity.

Problem Statement: In today’s digital age, monitoring activities on computers has become a
critical task, especially in security-sensitive environments like businesses or educational
institutions. Tracking unauthorized access, ensuring compliance, or simply monitoring
productivity can be complex without the right tools. A Key Logger addresses these
challenges by providing real-time tracking of keystrokes. However, the ethical implications
make it important to focus on responsible usage.

Why this Topic was Chosen: This topic was chosen because Key Loggers play a vital role
in cybersecurity and digital forensics. By developing this project, I aim to understand the
intricacies of system monitoring and the ethical considerations involved in creating such
surveillance

1
Objective & Future Scope
Objective: The primary objective of this project is to develop a Python-based Key Logger
that can efficiently capture and record keystrokes on a computer, while ensuring minimal
system impact. The project aims to achieve the following:

• To understand the process of developing low-level system applications.


• To analyse the potential use cases and security concerns surrounding Key Loggers.
• To provide a foundation for further exploration in digital forensics and security
auditing tools.
• To demonstrate the ethical and secure implementation of such tools for monitoring
purposes.

Future Scope of the Project: The project’s scope extends beyond simple keystroke logging.
With advancements in machine learning, future iterations of this project could analyze typing
patterns to detect suspicious behaviour or create intelligent monitoring systems. Moreover,
integration with cloud services could allow for remote monitoring, expanding its application
to enterprise environments for security purposes. The project could also be extended to
mobile platforms, offering cross-device monitoring solutions.

2
Methodology
This section outlines the entire software system, from development to execution. The Key
Logger is built using Python, a flexible and powerful programming language that offers a
wide range of system interaction libraries.

Summary of the Project:

• Data Capture: The Key Logger captures keyboard inputs in real-time by hooking
into system events using Python libraries like pynput or keyboard.
• Data Storage: Once keystrokes are recorded, they are stored in a local log file, which
can be encrypted for security.
• Data Retrieval: The stored data can be reviewed by an authorized individual for
monitoring purposes.
• Ethical Considerations: The system will ensure that only authorized users can access
the logs, and the tool is used only in legal and ethical contexts.

Flowchart/DFD: [Insert a simple flowchart or Data Flow Diagram (DFD) here to represent
how keystrokes are captured and processed.]

3
Tools and Technologies

Hardware:
• A standard desktop/laptop computer with a working keyboard.
• Sufficient RAM (minimum 4 GB) to support smooth operation.

Software:

• Python 3.x for writing the code.


• Libraries: pynput, keyboard, os, and time for capturing and logging keystrokes.
• Text Editor or IDE (e.g., Visual Studio Code, PyCharm) for development.
• Operating System: Linux, Windows, or macOS for deployment.

Testing Technologies:

• Unit Testing: Each function will be tested independently to ensure it correctly


captures and logs keystrokes.
• System Testing: The application will be tested on various operating systems to verify
compatibility.
• Security Testing: To ensure that the logs remain confidential and cannot be accessed
by unauthorized users, encryption methods will be employed.
• Performance Testing: The Key Logger will be assessed for its impact on system
performance to ensure minimal CPU or memory usage.

4
References
[List your references here, including textbooks, articles, websites, or Python documentation
used during the development of the project.]

You might also like