Cyber Security Protection for Online Gaming Applications

Author(s):  
Wenbing Zhao

In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.

Author(s):  
Wenbing Zhao

In this chapter, the authors point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, the authors outline some open research issues in this field.


2017 ◽  
Vol 19 (3) ◽  
pp. 1457-1477 ◽  
Author(s):  
Shikhar Verma ◽  
Yuichi Kawamoto ◽  
Zubair Md. Fadlullah ◽  
Hiroki Nishiyama ◽  
Nei Kato

2014 ◽  
Vol 15 (9) ◽  
pp. 776-793 ◽  
Author(s):  
Han Qi ◽  
Muhammad Shiraz ◽  
Jie-yao Liu ◽  
Abdullah Gani ◽  
Zulkanain Abdul Rahman ◽  
...  

Author(s):  
Ramgopal Kashyap

A large vault of terabytes of information created every day from present-day data frameworks and digital innovations, for example, the internet of things and distributed computing. Investigation of this enormous information requires a ton of endeavors at different dimensions to separate learning for central leadership. An examination is an ebb-and-flow territory of innovative work. The fundamental goal of this paper is to investigate the potential effect of enormous information challenges, open research issues, and different instruments related to it. Subsequently, this article gives a stage to study big data at various stages. It opens another skyline for analysts to build up the arrangement in light of the difficulties, and open research issues. The article comprehended that each large information stage has its core interest. Some of this is intended for bunch handling while some are great at constant scientific. Each large information stage likewise has explicit usefulness. Unique procedures were utilized for the investigation.


Author(s):  
Stephen M. Mutula

This author discusses issues and threats to children’s cyber security vis-à-vis access to useful children online literature and the implications for sub-saharan Africa. The author points out that whereas the benefits of online children literature are immense especially in Africa where there is paucity of print literature, increasing cyber security and crime targeting children is of growing concern to governments, school teachers, parents, and Internet service providers. The chapter observes that whereas the developed world has made attempts to put in place mechanisms and systems such as acceptable user policies and protection software to mitigate undesirable consequences of online insecurity to which children are the most vulnerable, Africa is lagging behind despite the pervading Internet on the continent. The author notes that censorship of online literature is not the panacea to cyber insecurity, but parents should work closely with teachers and service providers to find pragmatic ways of protecting children online. Africa could learn a lot from developed countries on how to balance between access to useful online information resources against the growing cyber crime targeting children. The author cautions that the future of online security with regard to children’s safety in cyberspace is bound to become more complex as technologies become more advanced and online predators evolve sophisticated ways to circumvent online security measures, calling for the development of a proactive security strategy to protect children online.


2022 ◽  
pp. 1249-1274
Author(s):  
Ramgopal Kashyap

A large vault of terabytes of information created every day from present-day data frameworks and digital innovations, for example, the internet of things and distributed computing. Investigation of this enormous information requires a ton of endeavors at different dimensions to separate learning for central leadership. An examination is an ebb-and-flow territory of innovative work. The fundamental goal of this paper is to investigate the potential effect of enormous information challenges, open research issues, and different instruments related to it. Subsequently, this article gives a stage to study big data at various stages. It opens another skyline for analysts to build up the arrangement in light of the difficulties, and open research issues. The article comprehended that each large information stage has its core interest. Some of this is intended for bunch handling while some are great at constant scientific. Each large information stage likewise has explicit usefulness. Unique procedures were utilized for the investigation.


2022 ◽  
pp. 168-196
Author(s):  
Heru Susanto ◽  
Fahmi Ibrahim ◽  
Rodiah ◽  
Didi Rosiyadi ◽  
Desi Setiana ◽  
...  

Financial technology (FinTech) as part of financial inlcussion changes conventional business models to be information technology minded. The presence of FinTech in the wider community makes it easy for access to financial service products and transactions and payment systems more practically, efficiently, and economically. Unfortunately, as the security risk in transacting increases, cyber security in the financial services industry and FinTech service providers is considered a major target by cybercriminals. This study proposed a security management approach through hybrid blockchain method implemented through flask framework and encryption to protect transaction data. The results are promising. Referring to accuracy, this study successfully reduces data leakage and misuse of personal data and financial data in FinTechs.


Sign in / Sign up

Export Citation Format

Share Document