Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

A Little Background
For those of you who have spent your lives living on Dagoba and haven’t seen the original Star Wars movie, subsequently titled, A New Hope, the story follows a young pilot named Luke Skywalker, whose guardians are murdered by soldiers of the Imperial Army, who were looking for two droids Luke’s Uncle Owen purchased. With the help of an old hermit, Obi Wan “Old Ben” Kenobi, Luke sets out to join the rebellion led by Luke’s sister Leia (although they don’t know they are related).

The Empire has developed a new type of battlestation called the Death Star, which is a moon-sized behemoth equipped with a Superlaser, which was soon used to obliterate first Jedha City (Rogue One) and eventually, Leia’s (adopted) home planet of Alderaan. Knowing that having a weapon with that kind of destructive power would be the end of the rebellion that was underway by a pro-democratic coalition called the Alliance to Restore the Republic (or Rebel Alliance). The plot of A New Hope centers around the rebellion attempt to neutralize the Imperial’s Death Star.

Security
A team consisting of former smuggler Han Solo, the Wookie Chewbacca, serial-whiner Luke Skywalker, Jedi Obi Wan Kenobi, and two droids C-3PO and R2-D2 set out to save Princess Leia Organa from a cell on the Death Star. Today, we’ll take a look at how the Empire's security procedures made it possible for the rebellion to get Leia out of there, while simultaneously destroying the battlestation and throwing the Empire into chaos.

Unprotected Endpoints
Star Wars - Obi Wan Kenobi was a wanted man by the Empire after he defeated Anakin in a duel on Mustafar (Revenge of the Sith), so even though it was decades later, he would have to be careful. When he’s stopped by Imperial Stormtroopers, he was able to use the Jedi Mind Trick to spoof their thoughts and get past the checkpoint.
Real World - Having a thoroughly controlled authentication protocol is an important part of keeping your data and infrastructure secure. Passwords, biometrics, and other forms of authentication have to both work for the users, while also being complex enough to keep unwanted parties out.

A Complete Lack of Segmentation and Lack of System Encryption
Star Wars - Once the team gets to the Death Star, they gain access to a control room where the droids begin to access the Death Star’s system. As soon as he’s hooked up, R2-D2 has complete access to the whole entire network without any form of authentication or protection.
Real World - Having some segmentation to your network allows you to pick and choose who can access certain information and who can’t. No matter who can access information, your network data needs to be encrypted to ensure that just anyone can’t access all the sensitive information on it.

Ignoring CISO at Great Peril
Star Wars - The Admiralty of the Imperial Army did not want to hear that there was a possibility that the rebels had found, and could execute sabotage, on a vulnerability. So much so that Grand Moff Tarkin scoffed when he was approached about the potential vulnerability to the battle station. Nothing was done with that information and it resulted in the first Imperial Death Star being destroyed, and the death of all Imperial staff onboard.
Real World - It is very, very risky to ignore the vulnerabilities in your network, as the more open your network is to outsiders, the larger you risk being infiltrated. Keeping your network and infrastructure up to date with the latest patches and security protections is a must to keep your organization from being put in precarious positions, or from being destroyed outright.

No matter what you think about your organization’s network security, you can learn a lot from the negligent manner the Empire went about securing their important assets. If you are looking for some help with your organization's security, whether it be physical or virtual, call Network Solutions Unlimited’s professional security technicians today at 217-428-6449. May the fourth be with you!

How to Calculate if That Print Job Was Really Wort...
Tech Term: Chromebook
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Avoiding Downtime Business Continuity Computer Fan iOS Business Intelligence Passwords Hackers Windows Data Privacy Health Dark Web Hardware Outsourced IT Emails IT solutions Router Gmail Gamification Compliance Sales HBO Hard Disk Drive File Storage Data Spyware Business Owner Employee-Employer Relationship Relocation Charger Small Business Windows 10s Cleaning Microsoft Office Updates FAQ Data Backup Loyalty Internet Content Filtering Social Engineering Identity Theft HaaS Smart Tech Camera Rootkit Gifts Hacking Unified Communications Managed Service Provider Techology Audiobook Collaboration Data Protection Entertainment Spam Blocking Google Cortana Wireless Efficiency Windows 10 Proactive IT Microsoft Hosted Solution PDF Financial Technology Tech Term Application Files Excel Network Security Cost Management Vendor Management Lifestyle Mobile Devices Google Maps Maintenance Content Filter Marketing Managed IT CrashOverride OneNote Managed IT Service Audit Video Games Data Theft Chrome Financial Worker Identities Data Breach Gadgets Computer Two-factor Authentication Fraud Twitter Data storage Data Storage Business Computing Managed IT Services Virus Smartphone Google Assistant Business Technology Device Security Law Enforcement Monitors Virtual Assistant BDR End of Support Data Security Monitoring Root Cause Analysis Bandwidth Tech Support Software as a Service Facebook Scam Shortcut Sync Licensing Android Wireless Internet Computer Forensics Testing Mobile Security Remote Monitoring Tip of the Week Public Cloud Money Save Time Antivirus Company Culture Students Browser Wasting Money Managed IT Services NFL VoIP Upgrade Malware Content Microsoft Excel Productivity Cloud Business Management Benefits IoT Cybercrime USB History Printing Professional Services Risk Management Printers Travel Government Computing Infrastructure Office 365 Backup Google Drive Hard Drive The Internet of Things App Phone System Cast Operating System Flexibility How to Training IT Solutions Miscellaneous Emergency Search Education Telephone Systems WIndows Server 2008 Scalability VPN Hosted Solutions Public Computer Keyboard Upgrades Mobility Bluetooth Tablets Edge MSP Two Factor Authentication Virtual Reality Proactive Innovation intranet Samsung Data Loss Workers Amazon Smart Technology Apple Mobile Device Management Productivity Storage Chromebook WiFi Chromecast Regulation PowerPoint Comparison Robot Solid State Drive Data Recovery Devices Shadow IT Windows 10 IT Services Internet of Things IT Management Analysis Blockchain File Sharing App store Advertising Apps Mobile IT Support Managed Service Personal Information Security Going Green Alexa for Business Experience Sports Spam Specifications Data Management Employer-Employee Relationship User Tips Encryption Patch Management Books Best Practices Consultant User Error Value Virtualization Office Tips Word Wireless Technology Remote Computing Alert Employer Employee Relationship Touchpad Wi-Fi Nanotechnology Physical Security Best Practice Office Network Customer Saving Money Troubleshooting Adobe Projects Microsoft Word Legislation Instant Messaging hacker Congratulations Update IT budget Retail Television Evernote Project Management Recovery Smartphones Information Applications Monitor Mobile Device Reputation Transportation Ciminal Ransomware Software Managing Stress Computer Accessories Wireless Charging Internet exploMicrosoft Electronic Medical Records Artificial Intelligence HIPAA Assessment Communication Workplace Tips Conferencing WannaCry BYOD Humor Colocation Communications Privacy Holiday Users eWaste Cybersecurity Safety Memory Computers Connectivity Screen Mirroring Windows Ink Hiring/Firing Server Webinar Black Market Cache Automobile Phishing Credit Cards Social Media Unified Threat Management Email Battery Websites Touchscreen Disaster Recovery Unsupported Software Quick Tips How To Bring Your Own Device Document Management Budget Commerce SaaS Administration Internet Exlporer Technology Streaming Media Computer Care Outlook Redundancy Automation Business Computing Worker Commute Laptop Firewall Management Language iPhone Hard Drives Politics Augmented Reality Identity WPA3 Cloud Computing Google Docs IT Support Work/Life Balance Save Money Meetings Big Data Settings Vendor Private Cloud Networking Thank You Vulnerability Legal Password Hybrid Cloud Information Technology Downtime