Cybersecurity Analysis: Riot Games - Data Flow, System, and Security

Verified

Added on  2023/01/04

|2
|312
|84
Report
AI Summary
This report provides a cybersecurity analysis of Riot Games, focusing on its data flow and system design. It includes a diagram illustrating the data flow, encompassing components like private computers, OSPF switches, network access servers, game hosting servers, and firewalls. The report details the flow of data from the client side, through the network access server, and into the game hosting servers, emphasizing the importance of bandwidth maximization and DDoS attack protection. The client accesses the online game through a secure connection and his account via the network access server using his login credentials. The report highlights the use of hardware and software firewalls to secure the system and protect client accounts and game software, which are considered key assets. The entire process is described step-by-step, including all validation measures.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY
Figure 1 Web Data Flow Diagram of Riot Games (Source: created by author)
The diagram shown is the portal data flow diagram. The main systems in this setup is
private computers, multiple OSPF switches, one network access server, multiple game
hosting servers, a traffic monitor server, a maintenance server, a hardware firewall and an ISP
modem. In the client side, the systems are a router access point, a personal computer and a
software firewall. The assets of the company are the client accounts and their private
information. The online game software is a major asset of the company Riot games. The
overall risk mitigating approach is to maximize the bandwidth of the servers and purchase
extra bandwidth in order to protect the system from DDoS attacks.
In this process, first the game is started from the Riot games head office via an ISP
access network which can be accessed by a network access server. The connection is then
travelled through multiple OSPF switches in three different areas in order to increase the
bandwidth of the hosting server. After coming out of the switch network, the game software
is online hosted in the game hosting servers where both the traffic is monitored and is
maintained via the maintenance server. The connection is protected by a hardware firewall
from server end and is secured from the client side via a software firewall. The client
accesses the online game through a secure connection and access his account via the network
access server using his login credentials. This is the entire step by step process including all
validation.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]