Cyber Security Issues in Online Games

被引:4
作者
Zhao, Chen [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430079, Hubei, Peoples R China
来源
ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II | 2018年 / 1955卷
关键词
Online games; cyber security; data encryption system; identification technology;
D O I
10.1063/1.5033679
中图分类号
O59 [应用物理学];
学科分类号
摘要
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to garners. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
引用
收藏
页数:5
相关论文
共 50 条
[31]   Determination of Cyber Security Issues and Awareness Training for University Students [J].
Khamzina, Botagoz ;
Roza, Nabuova ;
Zhussupbekova, Gulsara ;
Shaizhanova, Karlygash ;
Aten, Aiganym ;
Meirkhanovna, Baikulova Aigerim .
INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2022, 17 (18) :177-190
[32]   LEARNING CYBER SECURITY: TEACHING TECHNICALLY CHALLENGING TOPICS WITH GAMES AND VIRTUAL LABORATORIES [J].
Kasurinen, Jussi ;
Kettunen, Martti .
INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (03) :103-114
[33]   Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure [J].
Djenna, Amir ;
Harous, Saad ;
Saidouni, Djamel Eddine .
APPLIED SCIENCES-BASEL, 2021, 11 (10)
[34]   CSCD: A Cyber Security Community Detection Scheme on Online Social Networks [J].
Zeng, Yutong ;
Yu, Honghao ;
Wu, Tiejun ;
Chen, Yong ;
Lan, Xing ;
Huang, Cheng .
DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2022, 2023, 508 :135-150
[35]   Serious games as a tool to model attack and defense scenarios for cyber-security exercises [J].
Yamin, Muhammad Mudassar ;
Katt, Basel ;
Nowostawski, Mariusz .
COMPUTERS & SECURITY, 2021, 110
[36]   Cyber security [J].
Sandström, E ;
Weiss, J .
2005 CIGRE/IEEE PES International Symposium, 2005, :282-289
[37]   CYBER SECURITY [J].
Sonntag, Michael .
IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 :313-323
[38]   Cyber(in)security [J].
Szczypiorski, Krzysztof .
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (01) :243-248
[39]   Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment [J].
Zhao, Yuhan ;
Ge, Yunfei ;
Zhu, Quanyan .
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2021, 2021, 13061 :208-228
[40]   Taxonomy of cyber security metrics to measure strength of cyber security [J].
Gupta Bhol S. ;
Mohanty J.R. ;
Kumar Pattnaik P. .
Materials Today: Proceedings, 2023, 80 :2274-2279