Cyber for Gaming Environments..

Gaming and Virtual Portal Threats

Gaming since 2001 has remained one of the world's top terrorist communication vehicles. In both September 11, 2001 and EU events such as the Paris-Brussels 2015 attacks, and then the 2017 Cambrills and Barcelona attacks, terrorists used online games for messaging and logistics.

Rule #1:
Farming

Closely monitor or better yet, forbid e-currency or gold farming.

Rule #2:
Authentication

Using software such as AI-based Iovation means that an authentication decision can return in 100 milliseconds.

Rule #3:
Tunneling

Teredo or other tunnels are an absolute "no." For either ISP support or 'better gaming experience.'

Rule #4: Hacking

Prohibit any versions of code hacking: even on home or mobile lans of contractors or personnel.

Experian 2019 Prediction:
Online Gaming our Next Big Target?

Experian® in early 2019 has shared its sixth annual “Data Breach Industry Forecast,” which broaches such topics as cloud attacks and biometric hacking. Their online gaming prediction is nothing new: that hackers will continue to pose as avatars or gamers to infiltrate online communities and steal e-currency, passwords, and sensitive personal information.

This may sound like a non-threat for most adults. But that's not true, unfortunately. Heading into 2020, the majority of male contract, military and FTE personnel age 20 to 29, employed in sensitive government or financial work, participate in online gaming almost daily. Even stepping out on a lunchbreak for a quick game on a personal mobile phone, is a significant clearance and OPSEC violation. But Big 4 companies including Deloitte Touche and large firms including Booz Allen have repeatedly found violations among their entry-level staff.