Cyber Security Issues in Online Games

被引:4
作者
Zhao, Chen [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430079, Hubei, Peoples R China
来源
ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II | 2018年 / 1955卷
关键词
Online games; cyber security; data encryption system; identification technology;
D O I
10.1063/1.5033679
中图分类号
O59 [应用物理学];
学科分类号
摘要
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to garners. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
引用
收藏
页数:5
相关论文
共 50 条
[41]   An Analysis of the Security and Privacy Issues of the Neovote Online Voting System [J].
Blanchard, Enka ;
Gallais, Antoine ;
Leblond, Emmanuel ;
Sidhoum-Rahal, Djohar ;
Walter, Juliette .
ELECTRONIC VOTING (E-VOTE-ID 2022), 2022, 13553 :1-18
[42]   Cyber Protection of Grid-Connected Devices Through Embedded Online Security [J].
Farnell, Chris ;
Soria, Estefano ;
Jackson, Justin ;
Mantooth, H. Alan .
2021 IEEE DESIGN METHODOLOGIES CONFERENCE (DMC), 2021,
[43]   National Cyber Security in South Africa: A Letter to the Minister of Cyber Security [J].
von Solms, Rossouw ;
von Solms, Basie .
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, :369-374
[44]   Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control [J].
Verma, Aastha ;
Shri, Charu .
VISION-THE JOURNAL OF BUSINESS PERSPECTIVE, 2025, 29 (04) :478-492
[45]   What kind of cyber security? Theorising cyber security and mapping approaches [J].
Fichtner, Laura .
INTERNET POLICY REVIEW, 2018, 7 (02)
[46]   Cybercrime and cyber-security issues associated with China: some economic and institutional considerations [J].
Nir Kshetri .
Electronic Commerce Research, 2013, 13 :41-69
[47]   Cybercrime and cyber-security issues associated with China: some economic and institutional considerations [J].
Kshetri, Nir .
ELECTRONIC COMMERCE RESEARCH, 2013, 13 (01) :41-69
[48]   What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan [J].
Jones, Simon L. ;
Collins, Emily I. M. ;
Levordashka, Ana ;
Muir, Kate ;
Joinson, Adam .
CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
[49]   From information security to cyber security [J].
von Solms, Rossouw ;
van Niekerk, Johan .
COMPUTERS & SECURITY, 2013, 38 :97-102
[50]   NATO AND CYBER SECURITY [J].
Kazakovtsev, A. V. .
VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02) :109-114