You are on page 1of 10

SYNOPSIS

ON
Keystroke Inspector

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE


AWARD OF THE DEGREE OF

BACHELOR OF TECHNOLOGY

IN

COMPUTER SCIENCE AND ENGINEERING

SUBMITTED BY:-
Parvaiz Ahmad Raina
20-B-CSE-14006
Under the guidance of
Mr. Jasdeep Singh
Mr. Sahilpreet Singh
Professor Department Of Computer Science

RIMT UNIVERSITY, MANDIGOBINDGARH PUNJAB


July-December 2023
CONTENTS

1. Introduction------------------------------------------------------------------------------------------------------2

2. Literature---------------------------------------------------------------------------------------------------------3

3. Problem Statement ---------------------------------------------------------------------------------------------4

4. Objectives--------------------------------------------------------------------------------------------------------5

5. Hardware Requirements---------------------------------------------------------------------------------------6

6. Software Requirements----------------------------------------------------------------------------------------7

7. Data Flow Diagram--------------------------------------------------------------------------------------------8

8. Reference----------------------------------------------------------------------------------------------9
INTRODUCTION
Keystroke logging, also known as keylogging, is simply tracking the keys that are struck on
a keyboard. This can be done in multiple ways using a wide variety of hardware devices or
software. The reason for its large threat to networks and their security is due to its covertness
4 Chandigarh Polytechnic College nature. Most keyloggers show no signs of any intrusion
within the system allowing for them to gain typed information without anyone having
knowledge of its actions except for the user who installed it. With the proper keylogger
installed on the correct machine a person could easily gain access to a company9s entire
network infrastructure. In terms of system critical data or extremely privileged information
this could cause problems for a vast amount of people very quickly.

Some of the advantages are:

I) Monitoring employees-Keyloggers are very much used in offices to monitor the activities
of the employees. This is basically done to ensure the employees are using the company’s
resources as intended.

II) Monitoring Kids--Keyloggers are very much used in offices to monitor the activities of
the Kids or teenagers, it can keep a record of their activity .

III) Ethical Hacking-We can use a keylogger on our personal computer to understand how it
actually works and what mistakes we need to avoid in order to prevent our self from getting
into trap.
Literature
A keylogger is a software or hardware tool that records keystrokes on a computer, often
covertly. While they can have legitimate uses, such as monitoring computer activity or
enhancing security, they also pose serious privacy and security risks when used maliciously.
Detecting and preventing keyloggers is crucial to safeguarding personal and sensitive
information.

 Keyloggers can be employed for various purposes, including parental control,


employee monitoring, and cybersecurity investigations.
 In the context of parental control, keyloggers may assist parents in ensuring the safety
of their children online, allowing them to monitor their activities and interactions.
Problem Statement
Keyloggers pose a significant threat to digital privacy and security by surreptitiously
capturing keystrokes, potentially leading to the theft of sensitive information, passwords, and
personal data. Detecting and mitigating keyloggers while allowing legitimate uses is a
complex challenge in the realm of cybersecurity.
 Keyloggers pose a significant threat to digital privacy and security by surreptitiously
capturing keystrokes, potentially leading to the theft of sensitive information,
passwords, and personal data.
 Their use in malicious activities, such as identity theft and data breaches, continues to
be a major concern in the digital age.
Objectives of a Keylogger
 Enhance Digital Security: Detect and prevent malicious keyloggers to safeguard
sensitive information and prevent data breaches.
 Ethical Use: Utilize keyloggers for legitimate purposes, such as cybersecurity
investigations and parental control, while respecting privacy and obtaining consent.
 Protect Against Insider Threats: Employ keyloggers in corporate environments to
monitor employee activities, reducing the risk of data leakage and insider threats.
 Enhance Investigative Capabilities: Utilize keyloggers to aid digital forensic
investigations by identifying security vulnerabilities and tracing the source of
cyberattacks.
HARDWARE REQUIREMENTS

We need computer resources with sufficient hardware and the tools installed in.

I. Processor - 1.80 GHz.


II. RAM - 2 GB .
III. Hard Disk - 500 GB.
IV. Network card -10-100 MBPS of Network card.
SOFTWARE REQUIREMENTS

This key logger will be software based program where people can use this for their study
purpose or monitoring there system use. Since it is a software application an IDE will be used
in order to write code and to run them. Among these tools, we need to install latest version of
python in our computers. With the help of these tools, it is possible to implement a keylogger
to a system and maintain a log of pressed keys. In addition to these tools, the language we
will use is Python . Some other required software are :-

Operating System: Windows v10

Virtual Box: Oracle VM Virtual Box

Python Version: Python v3.7.2

Python IDE: VsCode.


Data Flow Diagram Of Keylogger.
References

1. Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant


Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11):
2566–2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
2. Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-
24). "Early prediction of writing quality using keystroke logging". International
Journal of Artificial Intelligence in Education. 32 (4): 835–
866. doi:10.1007/s40593-021-00268-w. ISSN 1560-4292. S2CID 238703970.
3. Use of legal software products for computer monitoring, keylogger.org
4. "Keylogger". Oxford dictionaries. Archived from the original on 2013-09-11.
Retrieved 2013-08-03.

You might also like