Verified Document

Risk Management The Video Game Industry Forms Essay

¶ … Risk Management The video game industry forms a significant part of the leading companies worldwide currently. The huge diffusion of the internet and associated information technologies over the recent years has raised the need of increased security. Advancement in technology consequently leads to the advancement of video games as well as associated security risks. Some of the common threats and vulnerabilities involving this industry include: misuse by human, hacking, fraud, virus attacks, among others. Such factors can facilitate adversities such as information loss and alteration, and unauthorized access. This paper identifies and assesses potential threats, malicious attacks, and vulnerabilities expected by the organization. It also gives the control procedures to mitigate the mentioned risks and vulnerabilities.

The Threats and Vulnerabilities

There are a number of dominant security threats involving technology and information that affect the organization. Such threats poise a serious disruption to the business continuity planning (BCP) cycle of the video game organization. These threats include system failure, network failure, virus attack, fraud, hacking, fabrication, and theft.

Enterprise Systems Security Weaknesses

The biggest enterprise weakness presents itself through acquisition processes. Acquisitions are a vital step in expanding a company's size, particularly, the video game company. Progressive involvement in acquisitions by the company can and does pave way for potential security weaknesses (Rahman and Morh 2011). The actual acquisition process involves the integration of many different systems, a process that could create possible, inherent security risks. There is the risk of providing too much access, blocking of valid network traffic or mistrust towards the domains might evolve. This process also could have the organization integrate with systems with unknown risks. The video game industry constitutes of programs with potential security risk s. As leverage to this factor is by use of common programs (e.g. Microsoft Office, Adobe Reader, and Quick Time). These programs act as a vector for infecting computers with internet access; hackers acquire information by using such infection vectors. Another security risk comes with the coding language that the video game organization uses to generate its products. All programming languages contain threats and vulnerabilities; the mode of writing the language influences such threats and...

The networks usually comprise of the Local Area Network and the Wide Area Network used to interconnect the company's facilities. These interconnections create security risks whether properly or poorly done. Connection of the organization's WAN to the internet compromises the information that traverses the network prior to ignoring proper security procedures. The absence of safeguards e.g. firewalls, proper configurations and the intrusion detection system increase cases of unauthorized access. The organization should use proper configurations to prevent unauthorized access. Firewalls and other intrusion detection systems should also be employed.
System Software Risks

The video game company employs a wide variety of software and hardware components in running its operations. The use of common operating systems and server systems by the organization poses a serious security risk. Programming languages used in the video game creation process have security risks that they consequently integrate to some of the generated programs. Utilization of these programs creates risks within the enterprise. The organization throughout uses websites over the internet; web sites provide hackers with a weak access point to the organization's information. The hackers access the website to acquire personal information and credit card information that might be used to alter or destroy the databases. In order to prevent hacking, the organization should ensure the installation of security software called firewall, which blocks unauthorized entries. Storing backup information is also a vital strategy in case the attackers alter or destroy the data. Virus attack is another software threat, which involves the use of malicious software that compromise account information (account name and passwords) in the organization's network. This leads to fraudulent activities putting the electronically controlled businesses process at high risk. The organization can avert virus attacks is by employing the use of trusted antivirus software to block virus software. It is necessary to train the employees (programmers) on how to use the programming languages. This will reduce the creation of risks by the programs developed by the organization.

Enterprise System Hardware Threats

The video game industry also…

Sources used in this document:
References

Syed, R and Morh, S. (2011). IT Security Issues within the Video Game Industry. The International Journal of Computer Science and Information Technology. Vol. 3, No. 5.
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Gambling Consumers Industry and Regulation
Words: 9110 Length: 26 Document Type: Dissertation

Internet Gambling: Consumers, Industry, And Regulation Business Management Final Year Project Online gambling is a large and growing industry. Estimates from an industry consulting group indicate that as many as 2,000 firms worldwide are involved in offering a number of different types of online gambling, resulting in an estimated $25.4 billion in winnings and as much as twenty times that in revenue. Why is online gambling so popular, and what does this imply

Internationalization of Branding in the Retail Industry
Words: 16085 Length: 60 Document Type: Term Paper

The main focus of the 1980s regarding brands focused on a trend in takeovers, enabling successful brands to become extremely valuable on the open market. Even very early on, a value associated with a brand large was viewed in part as more important than the product itself. Early research indicates that many thought the only way to have a successful brand was to buy one. Many felt that the

Corporate Social Responsibility
Words: 3095 Length: 10 Document Type: Term Paper

Product Placement in Console Games A growing body of research confirms that one of the best ways to reach male consumers aged 18 to 34 years is to place products in console games. Originally, game developers paid advertisers to include their products in games to lend them authenticity and realism, but advertisers are now paying game developers to have their products placed in popular console games. The introduction of online gaming

Cracking the Code the Contemporary Issue of
Words: 3543 Length: 12 Document Type: Essay

Cracking the Code The contemporary issue of physical security/IT security Modern day businesses and organizations face the contemporary issue of physical security/IT security. Whether a business needs to maintain network security for a website or server, or an organization needs to restrict access to a server room, there are several aspects facing the problem of dealing with IT security. Any general computer networking instructor teaches the DOD and/or OSI networking models and

Challenge of Managing All Stakeholders in the Context of a Merger...
Words: 23212 Length: 80 Document Type: Term Paper

Managing All Stakeholders in the Context of a Merger Process Review of the Relevant Literature Types of Mergers Identifying All Stakeholders in a Given Business Strategic Market Factors Driving Merger Activity Selection Process for Merger Candidates Summary, Conclusion, and Recommendations The Challenge of Managing All Stakeholders in the Context of a Merger Process Mergers and acquisitions became central features of organizational life in the last part of the 20th century, particularly as organizations seek to establish and

Why Did the Dot Com Industry Crashed After the Boom
Words: 11033 Length: 40 Document Type: Term Paper

Com industry crash after the boom This is a paper examining some of the factors that caused the dot-com crash Many believe the root cause of the dot-com crash was over valuation of stock prices relative to the actual underlying value of the companies themselves. Stocks of Internet companies traded at Price-Earning ratios of higher then 30, buoyed by a speculative bubble. When reality set in for investors many realized that

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now