1. Introduction
Metaverse is a compound word of the English word meta meaning ‘virtual’ and universe meaning universe[1]. Metaverse, a three-dimensional virtual world that interacts with reality, is capable of social, economic, and cultural activities. Metaverse started service as a game in the early days, but now it has become established in our daily life. In the virtual world, social, economic, and cultural activities are possible just like in reality, and above all, the number of users of Metaverse, which was able to connect daily life through non-face-to-face daily life due to Corona 19, naturally increased rapidly. In line with the growing demand, the field of metaverse is expanding beyond games to entertainment, education, finance, and broadcasting. You can also experience the metaverse. Currently, various wearable devices such as rings and wristbands are being developed and released, so the future metaverse is getting more expectations. As such, the metaverse connecting the virtual world and the real world is attracting attention as a new space that contrasts with reality. It is necessary to pay attention to.
2. Related Works
2.1 The main threat to the metaverse
Metaverse expanded and developed into various industrial fields, and at the same time, the number of users increased. However, when using Metaverse, it is possible to understand the basic behavior of users online, so privacy-related issues may arise. In addition, creations or possessions in the virtual world (Non-Fungible-Token) can be realized as real-world financial profits through user-to-user transactions, which can affect real personal financial assets. As such, the metaverse is closely related to reality, so security threats in the metaverse can cause the same or greater damage than threats in the real world. Therefore, we analyze actual cases of security threats related to metaverse and study countermeasures. Advances in technology within the metaverse make virtual worlds very similar to reality. Therefore, physical attacks that cause fear through media such as AR or VR or realistically implement inappropriate content depending on the user occur. Due to the expansion of metaverse devices, voyeurs and wiretapping are possible through microphones and cameras attached to the equipment, and there are attacks such as stimulating the brain or injecting hallucinations through equipment hacking. This is accepted not only as a problem in the virtual world but also as a problem in the real world.

<Figure 1> Elements of a Metaverse> [2]
Metaverse, which started as a game service, continues to grow as a game platform to this day. As a result, the influx of young people who wanted to use the game increased. According to a Nielsen Korea survey, 50.4% aged 7-12 and 20.6% aged 13-18, children and adolescents accounted for more than 70% of the total users [3]. The problem is that, as there are many youth users, a lot of crimes against juveniles started to occur on Metaverse. In fact, on April 8, 2022, sexual exploitation crimes against 11 children and adolescents occurred on the metaverse platform 'ZEPETO'. As such, adolescents are easily exposed to cybercrime.
When a user account (avatar) is stolen, not only assets in the virtual world but also sensitive information such as biometric information and location information in the real world are easily exposed. In Metaverse, since users use avatars to use services, authentication of users using a vatars is very important. If the user authenticates only once for the initial connection, a problem may arise in which someone other than the owner of the avatar uses the avatar. On April 1, 2012, the administrator account of 'ROBLOX ', an online metaverse game platform, was hacked, and there was an accident that abused ad ministrator privileges to delete user accounts or disrupt the currency system [4].
3. Countermeasures Against Major Threats in Metaverse
3.1 Threats Analysis of Metaverse
Even when personal information of users using Metaverse is entered, the data may not be safe due to attacks related to hacking. Therefore, it is necessary to establish a system that encrypts data in real time through an encryption system for personal information and does not collect information when users input personalinformation[6][7]. In addition, a lot of data is stored in the metaverse, which is created by combining technologies in various fields, and if you do not check the stored information, you can acquire the right to the storage. There will be. In Metaverse, user information, which is sensitive information of user accounts (avatars), is used by advertisers, ad marketers, and developers. When using personal information, it is necessary to manage it so that it is only used for scientific research or public record preservation. Even through de-identification of personal information that can delete some or all of personal information, it makes it difficult to combine with other information so that a specific individual cannot be identified. This allows the use of personal information while minimizing the possibility of personal information infringement.

<Figure 2> Security Models of Metaverse
It is also necessary to pay attention to supply chain attacks on metaverse platform access and devices. In the form of attacks that penetrate the supply chain and tamper with software or hardware delivered to users, the user's perception that the supply from the supplier is safe can be exposed to security threats. Therefore, it is necessary to find a way to detect forgery by maintaining the original state[8][9][10].
In the metaverse connected to the real world, digital finance and virtual currency transactions are realized, causing damage from phishing. Attackers disguise themselves as the administrator of the server or act as a user of the server and steal personal or financial information by inducing clicks on malicious links by forming intimacy with others. In the Metaverse platform, users need to be informed about precaution s related to this. Users should not leak personal information to other users, and should be careful about unverified links.
4. Cybersecurity Stability Analysis in Metaverse
In order to technically derive potential security threats in the metaverse market, it is prepared as shown in Table 1 in relation to the aforementioned technical components of the metaverse. Technical considerations are presented by adopting STRIDE threat modeling in terms of security such as confidentiality, integrity, availability, authentication, rights management, and non-repudiation.
(Table 1) Security threats in the metaverse[5]

(Table 2) Classification of security threats related to metaverse components

As the metaverse moves closer to us, so does the concern about cybersecurity. This is because all transactions, information exchange, and privacy protection that occur in the virtual environment are performed in the same way as in the real world. Therefore, various security systems should be prepared so that my avatar can safely manage assets while working in a virtual environment.
In particular, the virtual environment requires more consideration than the real world. There will be fakes in the virtual environment, and even the ‘fake characters’ may act as if they were the real me. Therefore, how to respond to such virtual infringement will be the biggest issue. In addition, the system may be stopped due to software bugs, and digital assets may be hacked. And the most worrisome part is that the virtual environment created with Metaverse is the domain of a specific conglomerate, not the country. What if the company does not fulfill its social responsibilities and obligations and pursues only profit and profit? Then there is the problem of how to define the rights and responsibilities of avatars living in the virtual environment.
(Table 3) security vulnerabilities of Metaverse

After all, the core foundation of Metaverse is ‘block chain’ and ‘safety of non-fungible tokens’. So far, we have recognized that these technologies are used in cryptocurrencies to disrupt the money market and create a breeding ground for speculation. But soon, the era of the metaverse will open. From now on, we will have to prepare cybersecurity measures suitable for the metaverse.
5. Conclusion
Unlike other web services that have been previously provided, Metaverse approaches our daily life much more closely. Starting with game content-based metaverses such as ROBLOX and Minecraft, which are based on game content among young people, it continues to expand and develop into life, communication, finance, and work platforms. As a result, the metaverse platform engine has been widely applied to all industries and social fields, and there are many opinions that the expansion of the metaverse's influence is just the beginning. Due to the nature of the metaverse platform, leading companies around the world are rapidly expanding their business fields by transplanting their intellectual property (IP) to the metaverse platform. On the other hand, some view the metaverse as a part of the game. If the metaverse is viewed as game content, the rating system under the Game Industry Promotion Act is applied, which can become a major obstacle to the development of the metaverse industry. Such unilateral regulation can hinder the development of the met averse industry, so it is important to find a compromise between development and regulation in consideration of technological development and circumstances. Since the avatar in the metaverse refers to the real 'I', cyber attacks in the metaverse can affect reality, and hacking in the metaverse can also cause financial damage to users in the real world. It can be seen that user-centered security is essential to safely perform threats that may occur while using the metaverse as described above.
References
- Brown, Dalvin. "What is the 'metaverse'? Facebook says it's the future of the Internet". Washington Post. 2021.08.
- Elements of a Metaverse, What is a metaverse?, "https://www.gartner.com/en/articles/what-is-a-metaverse", 2022.01.
- Hankyoreh, "Stalking and similar sexual acts… 'New type' metaverse child sex crime, is it punishable", https://www.hani.co.kr/arti/society/society_general/1012415.html.
- Hyungyeong Kim, and Hyungwon Kwon."A study on the analysis of security vulnerabilities in metaverse." Proceedings of the Korean Telecommunications Society Conference, 1454-1455, 2021.
- Y. Wang, Z. Su, N. Zhang, D. Liu, R. Xing, T. Hao Luan and X. S. Shen, "A Survey on Metaverse: Fundamentals, Security, and Privacy," arXiv preprintarXiv:203.0262, 2022.
- Electronic newspaper, "Metaverse and cyber security strategy to protect personal information must come together", https://www.etnews.com/20220315000153, 2022.
- Seunghwan Lee, "Metaverse begins: 5Major Issues and Forecast" SPRi Analysis Issue Report, IS-116, Apr, 2021.
- Turner, M. J. Matrix methods of Structural Analysis, 1st Ed., Vol. 1, Macmillan, New York, pp.203~206, 1974.
- Park, D., Kim, S., Lee, Y., and Kim, C., Performance Evaluation of Propeller for Electrically Powered HALE UAV; Part II. Computational Analysis, 2021.
- Ahn, S. W., Cho, J. Y., and Kim, S. J., "An Alternative Computing Algorithm of the Penalized Weighted Residual Method for the Structural Dynamics," Journal of the Energy Convergence Society, Vol. 25, No. 6, pp. 83~92, 1999.