StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Analyzing Security Issues in Online Games - Thesis Example

Cite this document
Summary
This thesis "Analyzing Security Issues in Online Games" deals with the security issues in online gaming. The thesis gives background information about online gaming. The history of online gaming is discussed along with the major security issues which are being faced by online games…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Analyzing Security Issues in Online Games
Read Text Preview

Extract of sample "Analyzing Security Issues in Online Games"

Download file to see previous pages

These works try to analyze the different kinds of threats to cybersecurity, the people who pose a threat and how to identify them and the most important topic which will be discussed in this thesis is how to solve the security issues that exist in online games. The different legal and technical methods to fight cybercriminals have been discussed in the article. Methods such as providing education to the consumer and the benefits of it have been highlighted. Hacking issues and loss of accounts by online game players to hackers have been a major issue and this has been discussed in the thesis.

Different methods of authentication which might be used in order to increase the effectiveness and prevent false log on have also been outlined here and a discussion of the benefits of provision of automatic patches of improving the security as and when required. Furthermore, an attempt to discuss scenarios in three specific games and the issues in security involved in these games. Synopsis and examples of compromising situations within the games and their solutions provided by others have also been made.

Some important methods used by companies such as blizzard to monitor the player and the ethical issues associated with such monitoring are also discussed in the thesis. The thesis ends by discussing the areas of improvement and what can still be done to improve the security of online games. In conclusion, this work has covered an in-depth analysis of online gaming and related security issues. The work has also dwelt on reasons which make cybercriminals to target online games and the significance of security in these online games.

Recommendations on new ways to solve the respective specific issues insecurity of the games have also been outlined. Finally, the work concludes with a discussion topic with views on what can be implemented in the long run to make Massive Multiplayer Online games more secure.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Analyzing Security Issues in Online Games Thesis Example | Topics and Well Written Essays - 14500 words, n.d.)
Analyzing Security Issues in Online Games Thesis Example | Topics and Well Written Essays - 14500 words. https://studentshare.org/information-technology/1763644-analysing-security-issues-in-online-games
(Analyzing Security Issues in Online Games Thesis Example | Topics and Well Written Essays - 14500 Words)
Analyzing Security Issues in Online Games Thesis Example | Topics and Well Written Essays - 14500 Words. https://studentshare.org/information-technology/1763644-analysing-security-issues-in-online-games.
“Analyzing Security Issues in Online Games Thesis Example | Topics and Well Written Essays - 14500 Words”. https://studentshare.org/information-technology/1763644-analysing-security-issues-in-online-games.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analyzing Security Issues in Online Games

Statistics on Internet Use among Young People

The questionnaire was administered to ten individuals who had different answers to the questions and the analysis of the answers was done to inform the prevalence of the usage of the internet and other issues.... hellip; The respondents had faced a problem in internet security while in the process of using the internet at different times, most of the people in the 40% had experienced some form of insecurity frequently, 40% had received some form of internet insecurity while only 20% of the total respondents had received any form of insecurity....
8 Pages (2000 words) Essay

Attitude Measuring

The researcher focuses on the analyzing people's attitude to British army's involvement in Afghanistan.... he Likert scale for analyzing people's attitude to British army's involvement in AfghanistanLet us apply the Likert scale to analyze people's attitude to the British army's involvement in Afghanistan....
6 Pages (1500 words) Research Proposal

The Contribution of Security, Trust, and Ease of Use to Customers Satisfaction

Effective marketing of products generally depends on many aspects ranging from security, trust, usability of the product, its appearance and its ability to satisfy customer requirements.... Customer trust is built through; Products need to be test-retested to ensure security of the consumers.... H (1998), analyzing a market involves understanding the various groups of customers who exist, their needs, your… eferred customers, the products/services which you have and which are aimed at meeting their needs, their preferences, what competitors have and how they market their products and services, pricing criteria and how the products and services will be distributed to the targeted According to McNamara, C (2008), marketing analysis is carried out by an organization or business venture in order to gauge the market niche....
11 Pages (2750 words) Essay

The supply chain management failure of Boeing787

As competition in the aviation markets continues to intensify, most of the companies present are trying to ensure that the development of most of their products changes considerably.... Companies are now outsourcing some of the basic operations of their companies to focus on other… Supply chain management has increased the functions of suppliers as aircraft manufacturers require them to join in the development of most of these products, thus; increasing their The Boeing 787, a revolutionary aircraft, is a product of such operations as the Boeing Company decided to increase their value by creating the Dreamliner to counter some of the cost-reducing airline companies (Crown, 2008)....
5 Pages (1250 words) Research Paper

Achieving Business Success Through the Internet

he most salient characteristics of the Internet include e-mail ,discussion groups [like news groups , forums ,bulletin boards where a net user can post messages and look for replies ] , chats and instant messaging , wikis [ website on the internet that can be edited by any net user] adventurous online games , information retrieval , e-commerce , Internet-based telephone services [VoIP] , and web mashups [ where any net user combine their web-based data and services with those of other companies] and so on....
7 Pages (1750 words) Coursework

Practical Windows Security

The essay reveals the definition of security vulnerability and tells that it can be regarded as the preliminary filter that is applicable to various issues.... definition of security vulnerability can be regarded as the preliminary filter that is applicable to various issues.... In order to protect the system from security threats, there are certain recommended practices in the Practical Windows security that need to be followed....
9 Pages (2250 words) Essay

Opportunities and Challenges in Mobile Services

In supplement to retail, there are submissions for mobile advocating and mobile games.... In the paper “Opportunities and Challenges in Mobile Services,” the author discusses the characteristics of mobile systems.... The propagation of mobile telephone boasts an opening to address their need for reliability when the node is a package, it is probable that not less than one close by node obtains....
6 Pages (1500 words) Research Paper

Present Use of Technology in Intelligence Activities

Contextually, the use of technology can be seen in the domain or the work of intelligence agencies that operate all over the world to mitigate rising issues of crimes and eliminating national security threats in future.... Contextually, the use of technology can be witnessed in the work process of intelligence agencies in solving cases relevant to national security and other issues.... Correspondingly, the work of the intelligence sector involves a considerable amount of confidentiality along with the challenging task of accessing information from others' computers or security networks....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us