Risk Management The Video Game Industry Forms Essay

PAGES
4
WORDS
1408
Cite

¶ … Risk Management The video game industry forms a significant part of the leading companies worldwide currently. The huge diffusion of the internet and associated information technologies over the recent years has raised the need of increased security. Advancement in technology consequently leads to the advancement of video games as well as associated security risks. Some of the common threats and vulnerabilities involving this industry include: misuse by human, hacking, fraud, virus attacks, among others. Such factors can facilitate adversities such as information loss and alteration, and unauthorized access. This paper identifies and assesses potential threats, malicious attacks, and vulnerabilities expected by the organization. It also gives the control procedures to mitigate the mentioned risks and vulnerabilities.

The Threats and Vulnerabilities

There are a number of dominant security threats involving technology and information that affect the organization. Such threats poise a serious disruption to the business continuity planning (BCP) cycle of the video game organization. These threats include system failure, network failure, virus attack, fraud, hacking, fabrication, and theft.

Enterprise Systems Security Weaknesses

The biggest enterprise weakness presents itself through acquisition processes. Acquisitions are a vital step in expanding a company's size, particularly, the video game company. Progressive involvement in acquisitions by the company can and does pave way for potential security weaknesses (Rahman and Morh 2011). The actual acquisition process involves the integration of many different systems, a process that could create possible, inherent security risks. There is the risk of providing too much access, blocking of valid network traffic or mistrust towards the domains might evolve. This process also could have the organization integrate with systems with unknown risks. The video game industry constitutes of programs with potential security risk s. As leverage to this factor is by use of common programs (e.g. Microsoft Office, Adobe Reader, and Quick Time). These programs act as a vector for infecting computers with internet access; hackers acquire information by using such infection vectors. Another security risk comes with the coding language that the video game organization uses to generate its products. All programming languages contain threats and vulnerabilities; the mode of writing the language influences such threats and...

...

The networks usually comprise of the Local Area Network and the Wide Area Network used to interconnect the company's facilities. These interconnections create security risks whether properly or poorly done. Connection of the organization's WAN to the internet compromises the information that traverses the network prior to ignoring proper security procedures. The absence of safeguards e.g. firewalls, proper configurations and the intrusion detection system increase cases of unauthorized access. The organization should use proper configurations to prevent unauthorized access. Firewalls and other intrusion detection systems should also be employed.
System Software Risks

The video game company employs a wide variety of software and hardware components in running its operations. The use of common operating systems and server systems by the organization poses a serious security risk. Programming languages used in the video game creation process have security risks that they consequently integrate to some of the generated programs. Utilization of these programs creates risks within the enterprise. The organization throughout uses websites over the internet; web sites provide hackers with a weak access point to the organization's information. The hackers access the website to acquire personal information and credit card information that might be used to alter or destroy the databases. In order to prevent hacking, the organization should ensure the installation of security software called firewall, which blocks unauthorized entries. Storing backup information is also a vital strategy in case the attackers alter or destroy the data. Virus attack is another software threat, which involves the use of malicious software that compromise account information (account name and passwords) in the organization's network. This leads to fraudulent activities putting the electronically controlled businesses process at high risk. The organization can avert virus attacks is by employing the use of trusted antivirus software to block virus software. It is necessary to train the employees (programmers) on how to use the programming languages. This will reduce the creation of risks by the programs developed by the organization.

Enterprise System Hardware Threats

The video game industry also…

Sources Used in Documents:

References

Syed, R and Morh, S. (2011). IT Security Issues within the Video Game Industry. The International Journal of Computer Science and Information Technology. Vol. 3, No. 5.


Cite this Document:

"Risk Management The Video Game Industry Forms" (2012, May 26) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/risk-management-the-video-game-industry-80250

"Risk Management The Video Game Industry Forms" 26 May 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/risk-management-the-video-game-industry-80250>

"Risk Management The Video Game Industry Forms", 26 May 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/risk-management-the-video-game-industry-80250

Related Documents
Video Games Have for a
PAGES 33 WORDS 9936

Dopamine is a pleasure inducing chemical that is secreted whenever an individual engages his/her mind in the playing f video games. The New brain research that was conducted years back (Bartholow, Bushman & Sestir, 2006) was the first to show that the playing of violent video games results in bad health of the players. The emphatic responses of the brain to the simulation of certain real-life violence such as shooting

Computer Games Research When considering the short history of computers, video and PC gaming are very recent on the timeline of technology. This is one of the reasons why there have not been many conclusive studies on the negative and/or positive effects of electronic games on children and young adults -- the most formative years. With the ever-increasing interest and involvement of children in this activity, much concern has been expressed

The main focus of the 1980s regarding brands focused on a trend in takeovers, enabling successful brands to become extremely valuable on the open market. Even very early on, a value associated with a brand large was viewed in part as more important than the product itself. Early research indicates that many thought the only way to have a successful brand was to buy one. Many felt that the

Internet Gambling: Consumers, Industry, And Regulation Business Management Final Year Project Online gambling is a large and growing industry. Estimates from an industry consulting group indicate that as many as 2,000 firms worldwide are involved in offering a number of different types of online gambling, resulting in an estimated $25.4 billion in winnings and as much as twenty times that in revenue. Why is online gambling so popular, and what does this imply

Management of Amazon
PAGES 9 WORDS 3055

Amazon is the largest internet-based company in America with headquarters located in Washington and Seattle in the United States. The company was founded in 1995 by Jeffrey Bezos and it started as online bookstores then diversified to selling videos, CDs, MP3 and DVDs. Today, Amazon offers about 4.7 million books, computer games, DVD and a wide variety of items of all kids. Ever since Bezos opened the doors of Amazon,

Management Information Systems Internet business-to-business sales will attain approximately $1.3 trillion in 2003 and, in 2004, business-to-consumer sales will attain approximately $100 billion. E-businesses at the moment have attained a point where they are trying to move away from a superficial analysis of their customers to engaging in rich customer relations. Strategic customer relationship management and its relationship to e-business is the focus of this paper. Internet business-to-business sales will attain approximately