Spreading terrorist propaganda through the use of “indulging video games” is another strategy that was deployed by terrorist groups during the pandemic? Discuss Major threats for Internal security and Suggest measures to be taken ?

 'Spreading terrorist propaganda through the use of “indulging video games” is another strategy that was deployed by terrorist groups during the pandemic? Discuss Major  threats for Internal security and Suggest measures to be taken ?15M.

New technologies and high-speed internet connections have helped online gaming become a popular pastime on the internet. Because gamers invest large amounts of time and money in today’s sophisticated games, others see an opportunity for mischief or illicit profit. The technological and social risks of online games should be understood by anyone who enjoys them. 

These include the following:

 • risks from social interactions with strangers who may trick you into revealing personal or financial information

 • risks from computer intruders exploiting security vulnerabilities 

• risks from online and real-world predators 

• risks from viruses, Trojan horses, computer worms, and spyware

In general, online gaming may involve both social risks ,technological risks and National Security risk

Technological Risks Online gaming can involve the following technological risks to your computer system or the systems of gamers with whom you interact.

  1. Viruses may arrive as attachments in email messages or via instant messaging programs, and corrupt or malicious programs may be hidden in game files you download or software you install
  2. Malicious Software:Malicious individuals may also take advantage of the social networks associated with online games that rely on chat, email, or even voice communication to entice you to visit bogus web sites or open email attachments containing malicious software and install this software on your computer.
  3. Insecure or Compromised Gamer Servers
  4. Some game protocols – the methods for communicating game information between machines – are not implemented as securely as other protocols. Game code may not be as well scrutinized as more popular commercial software. Consequently, game software may sometimes cause “buggy” behavior on your computer or introduce unknown vulnerabilities. 

Social Risks:

. The intruders may want to do any of these:

 • capture your personal information 

• steal your identity • steal credit your card information 

• inappropriately contact children by pretending to be another child, setting up meetings, or tricking them into revealing personal information


 National Security risk

  • Today, misuse of information and communication technology such as internet and social media for terrorist propaganda, 
  • radicalisation and recruitment of cadre; 
  • misuse of new payment methods and crowdfunding platforms for financing of terrorism; 
  • and misuse of emerging technologies for terrorist purposes have emerged as the most serious threats of terrorism.
  • Hacking Institutional servers for Information . 
  • Computer viruses and trojan malware – The likelihood of someone with an internet connection suffering a computer virus is high. Whether it’s through downloading a rogue attachment or playing a game from an unprotected website, computer viruses are common. Trojan viruses resemble real software and are some of the most common tactics used by cybercriminal networks.

  • Ransomware – Usually associated with enterprises, ransomware is also found to infect systems and consoles used by online gamers. Typically, the gamer has information stolen and can only be retrieved once a ransom is paid from the victim to the attacker.

    Phishing and stolen identities – Phishing, the go-to method of attack for cybercriminals, is also a frequent tactic within the gaming community. Typically, a message will be sent from a malicious individual mimicking a trusted user that they may have encountered online, asking for personal information. Once obtained, this information is then used to extort the victim or conduct fraudulent activity using their identity.

    Spyware – Without realising it, gamers could be targeted through spyware schemes, especially if they are dealing with an untrustworthy online gaming operation. Spyware monitors a user’s every movement and actions on the internet without their knowledge. If this information is recorded, it can then be sold to third parties, which is a breach in privacy.

Tackling these cyber threats as an online gamers with respective to National Security 


Comments

Popular posts from this blog

Justice is not blind, just a tad tongue-tied"

The crisis of ethical values in modern times is traced to a narrow perception of the good life. Discuss. ?

Essence of Ethics ?