become a popular pastime on the Internet. Gamers invest large amount of money and time in today's games. The technological and social risks of online games should be understood by anyone who enjoys them.
• risks from social interactions with strangers who may trick you into revealing
personal or financial information
• risks from computer intruders exploiting security vulnerabilities
• risks from online and real-world predators
• risks from viruses, Trojan horses, computer worms, and spy-ware.
Online Gaming Risks
online gaming may involve both social risks and technological risks. Thus, many online gaming risks are similar to those computer users may have already encountered, but they may not have realized that the games pose another opportunity for the compromise of their privacy or computer security.
Technological Risks
Online gaming can involve the following technological risks to your computer system or the systems of gamers with whom you interact.
• risks from social interactions with strangers who may trick you into revealing
personal or financial information
• risks from computer intruders exploiting security vulnerabilities
• risks from online and real-world predators
• risks from viruses, Trojan horses, computer worms, and spy-ware.
Online Gaming Risks
online gaming may involve both social risks and technological risks. Thus, many online gaming risks are similar to those computer users may have already encountered, but they may not have realized that the games pose another opportunity for the compromise of their privacy or computer security.
Technological Risks
Online gaming can involve the following technological risks to your computer system or the systems of gamers with whom you interact.
1. Attacks via gaming and virtual reality sites
2. Browser threats
3. Insecure Website Application
Social Risks
Although computer games were once solitary activities, most now have an online community that talks, chats, or sends instant messages during the games. Some computer intruders may use the social interaction of the online gaming environment in an attempt to exploit software vulnerabilities. Others may try to gain access to unprotected computers connected to the Internet. The intruders may want to do any of these:
• capture your personal information
• steal your identity
• steal credit your card information
• inappropriately contact children by pretending to be another child, setting up meetings, or tricking them into revealing personal information
Social Risks
Although computer games were once solitary activities, most now have an online community that talks, chats, or sends instant messages during the games. Some computer intruders may use the social interaction of the online gaming environment in an attempt to exploit software vulnerabilities. Others may try to gain access to unprotected computers connected to the Internet. The intruders may want to do any of these:
• capture your personal information
• steal your identity
• steal credit your card information
• inappropriately contact children by pretending to be another child, setting up meetings, or tricking them into revealing personal information
No comments:
Post a Comment