Cybersecurity Threats and Attacks in the Gaming Industry: Secure Game Players' and Developers' Data and Systems

· Springer Nature
Ebook
106
Pages
Ratings and reviews aren’t verified  Learn More
49% price drop on Jun 13

About this ebook

Learn about the most common and known threats and attacks in the gaming industry. Cybersecurity is a critical concern in the gaming industry due to the significant financial investments, personal data, and intellectual property at stake. Game developers, publishers, and players all have a vested interest in maintaining a secure gaming environment.

This pocketbook is about why cybersecurity in the gaming industry is essential to protect player data, maintain a secure gaming environment, and safeguard intellectual property. Both players and game developers need to remain vigilant, educate themselves about potential threats, and employ best practices to ensure a safe and enjoyable gaming experience. We will describe the most common type of targeted games facing cybersecurity attacks as well as some of the most common types of cyber threats faced by the gaming industry such as malware, distributed denial of service (DDoS) attacks, data breaches, etc.

What You Will Learn

  • Describes the importance cybersecurity in the gaming industry
  • Explains key aspects of cybersecurity in the gaming
  • Describes the common types of cyber threats faced by the gaming industry

Who Is This Book For

The book assumes you have strong gaming development and security knowledge. The book will be written mainly for developers who want to learn how to choose the right tools, what are the best practice, the threats, and vulnerabilities

About the author

Massimo Nardone has more than 27 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 27 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.

In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.

His technical skills include Security, OT/IoT/IIoT, Android, Cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University).

He stays current to industry and security trends, attending events, being part of a board such as the ISACA Finland Chapter Board, ISF, Nordic CISO Forum, Android Global Forum, etc.

He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as a Cyber Security Freelancer for IT/OT and IoT. He has reviewed more than 55 IT books for different publishers and has coauthored Pro Spring Security (Apress, 2023) Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.