Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
The video game industry forms a significant part of the leading companies worldwide currently. The huge diffusion of the internet and associated information technologies over the recent years has raised the need of increased security. Advancement in technology consequently leads to the advancement of video games as well as associated security risks. Some of the common threats and vulnerabilities involving this industry include: misuse by human, hacking, fraud, virus attacks, among others. Such factors can facilitate adversities such as information loss and alteration, and unauthorized access. This paper identifies and assesses potential threats, malicious attacks, and vulnerabilities expected by the organization. It also gives the control procedures to mitigate the mentioned risks and vulnerabilities.
The Threats and Vulnerabilities
There are a number of dominant security threats involving technology and information that affect the organization. Such threats poise a serious disruption to the business continuity planning (BCP) cycle of the video game organization. These threats include system failure, network failure, virus attack, fraud, hacking, fabrication, and theft.
Enterprise Systems Security Weaknesses
The biggest enterprise weakness presents itself through acquisition processes. Acquisitions are a vital step in expanding a company's size, particularly, the video game company. Progressive involvement in acquisitions by the company can and does pave way for potential security weaknesses (Rahman and Morh 2011). The actual acquisition process involves the integration of many different systems, a process that could create possible, inherent security risks. There is the risk of providing too much access, blocking of valid network traffic or mistrust towards the domains might evolve. This process also could have the organization integrate with systems with unknown risks. The video game industry constitutes of programs with potential security risk s. As leverage to this factor is by use of common programs (e.g. Microsoft Office, Adobe Reader, and Quick Time). These programs act as a vector for infecting computers with internet access; hackers acquire information by using such infection vectors. Another security risk comes with the coding language that the video game organization uses to generate its products. All programming languages contain threats and vulnerabilities; the mode of writing the language influences such threats and vulnerabilities.
Potential Risks and Vulnerabilities on the Network
The video game organization runs a wide variety of networking devices manufactured from different sources. The networks usually comprise of the Local Area Network and the Wide Area Network used to interconnect the company's facilities. These interconnections create security risks whether properly or poorly done. Connection of the organization's WAN to the internet compromises the information that traverses the network prior to ignoring proper security procedures. The absence of safeguards e.g. firewalls, proper configurations and the intrusion detection system increase cases of unauthorized access. The organization should use proper configurations to prevent unauthorized access. Firewalls and other intrusion detection systems should also be employed.
System Software Risks
The video game company employs a wide variety of software and hardware components in running its operations. The use of common operating systems and server systems by the organization poses a serious security risk. Programming languages used in the video game creation process have security risks that they consequently integrate to some of the generated programs. Utilization of these programs creates risks within the enterprise. The organization throughout uses websites over the internet; web sites provide hackers with a weak access point to the organization's information. The hackers access the website to acquire personal information and credit card information that might be used to alter or destroy the databases. In order to prevent hacking, the organization should ensure the installation of security software called firewall, which blocks unauthorized entries. Storing backup information is also a vital strategy in case the attackers alter or destroy the data. Virus attack is another software threat, which involves the use of malicious software that compromise account information (account name and passwords) in the organization's network. This leads to fraudulent activities putting the electronically controlled businesses process at high risk. The organization can avert virus attacks is by employing the use of trusted antivirus software to block virus software. It is necessary to train the employees (programmers) on how to use the programming languages. This will reduce the creation of risks by the programs developed by…[continue]
"Risk Management The Video Game Industry Forms" (2012, May 26) Retrieved December 4, 2016, from http://www.paperdue.com/essay/risk-management-the-video-game-industry-80250
"Risk Management The Video Game Industry Forms" 26 May 2012. Web.4 December. 2016. <http://www.paperdue.com/essay/risk-management-the-video-game-industry-80250>
"Risk Management The Video Game Industry Forms", 26 May 2012, Accessed.4 December. 2016, http://www.paperdue.com/essay/risk-management-the-video-game-industry-80250
Dopamine is a pleasure inducing chemical that is secreted whenever an individual engages his/her mind in the playing f video games. The New brain research that was conducted years back (Bartholow, Bushman & Sestir, 2006) was the first to show that the playing of violent video games results in bad health of the players. The emphatic responses of the brain to the simulation of certain real-life violence such as shooting
The second way is that individuals, specifically children can become desensitized to violence. This is because, daily exposure to violence may make one lose their emotional impact on them. Apparently, when one becomes emotionally numb, it becomes easier for them to engage in violence (Harding). The General Aggression Model This is a model that attempts to explain both the development of aggression an individual differences in susceptibility to the influence of
E. those that are contrary to the intent of the marketing material) are taken (Wesley & Barczak 2010). Psychological knowledge has allowed this balancing act in video game marketing to be much more finely tuned than it would be otherwise. Ethical Principles The first three principles discussed herein relate to the efficacy of various marketing efforts, and the considerations that must be taken into account in order for marketing to reach the
To the extent that it is important for the general public to appreciate the serious consequences of military conflict, exposure to thee games, especially among young people who are so impressionable, may be contrary to the interests of society in principle. Community Response to Military-Sponsored Video Game Centers The connection between computer-based video games and real-world knowledge about military weapons systems and tactical combat operations has not been overlooked by the
Internet Gambling: Consumers, Industry, And Regulation Business Management Final Year Project Online gambling is a large and growing industry. Estimates from an industry consulting group indicate that as many as 2,000 firms worldwide are involved in offering a number of different types of online gambling, resulting in an estimated $25.4 billion in winnings and as much as twenty times that in revenue. Why is online gambling so popular, and what does this imply
Amazon is the largest internet-based company in America with headquarters located in Washington and Seattle in the United States. The company was founded in 1995 by Jeffrey Bezos and it started as online bookstores then diversified to selling videos, CDs, MP3 and DVDs. Today, Amazon offers about 4.7 million books, computer games, DVD and a wide variety of items of all kids. Ever since Bezos opened the doors of Amazon,
Management Information Systems Internet business-to-business sales will attain approximately $1.3 trillion in 2003 and, in 2004, business-to-consumer sales will attain approximately $100 billion. E-businesses at the moment have attained a point where they are trying to move away from a superficial analysis of their customers to engaging in rich customer relations. Strategic customer relationship management and its relationship to e-business is the focus of this paper. Internet business-to-business sales will attain approximately