preview

An Information Security Engineer For A Video Game Development Company

Decent Essays

An Information Security Engineer for a video game development company has many things to be concerned about. A few items of concern are compromised game servers, DDoS, and Threat Group-3279 (TG-3279). For each of these malicious attacks and threats there is a strategy for addressing the risk. In addition there are also potential controls that the company could use to mitigate each risk. Risk management, control identification, and selection processes are important. The best strategy for malicious attacks and threats is determined by the risk. For a compromised game server, risk mitigation is the best strategy. This is because there are things that can be done to reduce the risk impact severity and/or probability of …show more content…

Attacks from a threat group like TG-3279 can be devastating for a company, small companies would not be able to recover. Due to the negative potential outcome of this threat, risk avoidance would be the best strategy. Keeping everything updated will only get you so far. It would be wise to have an inside hacker who can help find any weaknesses in your security so you can make patches or reinforce the weakness. This can help the company stay one step ahead of any threat groups. Along with understanding the best strategy for a risk, it is also good to understand the potential controls needed to mitigate each risk. Preventative controls are needed for a compromised game server. This is mitigation control would work for this threat because it is a preventable problem. To reduce the risk of a DDoS attack, administrative controls would be a good approach. The chances of this attack happening would be lessened if permissions to data and servers were controlled (State University of New York, 2015). It is best to ensure no one person has access to everything. For a threat such as TG-3279, it is best to use a detective control. A company would want to detect a potential problem in the early stages before any damage can be done. Risk management, control identification, and selection processes are important, specifically in this organization. It is naïve of a

Get Access