Cyber (In)Security in Metaverse: New Threats Old Measures?

Authors

  • Nezir AKYEŞİLMEN

Keywords:

Metaverse, cybersecurity, augmented reality, blockchain technology, capacity building

Abstract

As can be seen from Google searches, metaverse , which became one of the most popular concepts – even number one - in cyberspace in late 2021, has gained increasing popularity in literature. Metaverse, for some a more advanced stage of the Internet, is based on blockchain technology, virtual reality and a real-life like virtual space consisting of avatars, three-dimensional glasses, headsets and related instruments. This domain will increase the connection between users, diversify online business and transactions, extend the time spent on the Internet, and accelerate online cooperation and collaboration. While this virtual space increases digitalization, it will add new comfort areas to our lives and provide convenience. However, it is a fact that it will bring new risks and threats.

 

Therefore, security in the metaverse will become an important issue of the future. Ensuring cybersecurity in metaverse will primarily require the development of new measures against new threats in metaverse, in addition to traditional cybersecurity measures. Although it is safer against technical attacks and malicious software for now due to blockchain infrastructure, it is quite week against social-based attacks such as social engineering, phishing, spam messages, fraud, as in today's cyber space. In this respect, the user is the weakest link in cybersecurity – as it is the case in today’s cyber space- comes to the fore here as well. In this context, it would not be wrong to say that an effective and rights-based digital citizenship education, which will improve the cybersecurity capacity of users, will be an important measure in addition to traditional measures to ensure cybersecurity in the metaverse.

References

Academy, “ What is Metaverse”, 2021. https://academy.binance.com/en/articles/what-is-the-metaverse?utm_campaign=googleadsxacademy&utm_source=googleads&utm_medium=cpc&gclid=EAIaIQobChMIqZTX2YXV9QIVXo9oCR07kgLEfEwEASAv9QIVXo9oCR07kgLEF9EA _ [Accessed on 28.01.2022].

Akyesilmen , N. , Cyber Policy and Cyber Security with an Interdisciplinary Approach , Ankara: Orion Kitapevi.2018.

Boltonshield , “ Cybersecurity in the era of the Metaverse ”, 2021. https://boltonshield.com/en/cybersecurity-in-the-era-of-the-metaverse/[Accessed on 06.02.2022].

Borwn , R. , “South Carolina Offers Details of Data Theft and warns it could Happen Elsewhere ”, 2012. https://www.nytimes.com/2012/11/21/us/more-details-of-south-carolina-hacking-episode.html [Accessed 28.01.2022].

Checkpoint , “Live Cyber Threat Map ”, 2022. https://threatmap.checkpoint.com/ [Accessed on 06.02.2022].

CNBCTV, “ Explained : The history of metaverse ”, 2022. https://www.cnbctv18.com/technology/explained-the-history-of-metaverse-12015212 .htm . [Accessed on 28.01.2022].

Davies , N. , “ Cybersecurity and the Metaverse : Pioneering safely into a New Digital World”, 2021. https://www.globalsign.com/en/blog/cybersecurity-and-metaverse-pioneering-safely-new-digital-world[Accessed on 06.02.2022].

Denis , M. , “ What Is This Metaverse Mark Zuckerberg Speaks of?”, 2021. https://www.themanual.com/culture/the-metaverse-explained/ [Accessed on 06.02.2022].

Hunter , T. , “ Surveillance will follow us into ' the metaverse ,' and our bodies could be its new data source ”, 2022. https://www.washingtonpost.com/technology/2022/01/13/privacy-vr-metaverse/ [Accessed on 06.02.2022].

Internetlivestats , “Internet Live stats ”, 2022. https://www.internetlivestats.com/[Accessed on 06.02.2022].

Team, A. , “ Cyber Security and Metaverse ”, 2021. https://allabouttesting.org/cyber-security-and-metaverse/[Accessed on 06.02.2022].

Vellente , D. , “ Cybersecurity , blockchain and NFTs meet the metaverse ”, 2022. https://siliconangle.com/2022/01/17/cybersecurity-blockchain-nfts-meet-metaverse/[Accessed on 28.01.2022].

Downloads

Published

2022-08-21

How to Cite

AKYEŞİLMEN, N. (2022). Cyber (In)Security in Metaverse: New Threats Old Measures? . Cyberpolitik Journal, 7(13), 98-107. Retrieved from http://cyberpolitikjournal.org/index.php/main/article/view/159