Security of information systems plays fundamental role in providing high quality system to its users. Being video game's development company, there is a serious need of integrating and ensuring security within the network infrastructure of the organization. The industry of video games is amongst the largest industries all across the world. With the advancement in technology, companies are developing several different kinds of video games (Mohr & Rahman, 2011). The development of advanced and hi-tech video games is contributing to the increment in security risks. Before the occurrence of recent security breaches, security issues in video games were not considered to be a big issue. Recent security violations ascertain that these security breaches can plague the industry of video games industry. Several companies of video games have experienced security issues in their organization. Thus, the security of information systems in any organization is necessary (Mohr & Rahman, 2011). In order to prevent these security breaches from the organization, business owners are making every possible effort for ensuring security through the integration of firewalls, encryption techniques, intrusion detection systems and other security techniques and tools. The security solutions of information system will help in fulfilling all the risk management principles as it will ensure confidentiality, integrity and availability of data (Mohr & Rahman, 2011).
This paper will help in assessing all potential security threats and attacks within the company which is a developer of video games. Moreover, paper will discuss the impact of these malicious attacks on the performance and operations of company.
Discussion
Potential Malicious Threats and Attacks
There are several types of attacks that disrupt the security of information systems. These attacks include session hijacking, IP spoofing, Phishing, identity and information theft, worms, Trojans, viruses, sniffing, encryption and spyware and web trackers.
Session Hacking and IP Spoofing
The most common security issue regarding information systems is session hacking and IP spoofing. In this type of security attack, one host claims an IP address of another host. This type of attack is most common attack and it is known as spoofing. The spoofing attacker develops such techniques which help in spoofing IP address. The attacker sends data packets to host after spoofing in order to attack the system. Furthermore, there is also IP session hacking which is a serious attack as compared to spoofing. In this attack, attacker takes control over the entire session of the user so as to ...