Contact us today!

Network Solutions Unlimited Blog

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

A Little Background
For those of you who have spent your lives living on Dagoba and haven’t seen the original Star Wars movie, subsequently titled, A New Hope, the story follows a young pilot named Luke Skywalker, whose guardians are murdered by soldiers of the Imperial Army, who were looking for two droids Luke’s Uncle Owen purchased. With the help of an old hermit, Obi Wan “Old Ben” Kenobi, Luke sets out to join the rebellion led by Luke’s sister Leia (although they don’t know they are related).

The Empire has developed a new type of battlestation called the Death Star, which is a moon-sized behemoth equipped with a Superlaser, which was soon used to obliterate first Jedha City (Rogue One) and eventually, Leia’s (adopted) home planet of Alderaan. Knowing that having a weapon with that kind of destructive power would be the end of the rebellion that was underway by a pro-democratic coalition called the Alliance to Restore the Republic (or Rebel Alliance). The plot of A New Hope centers around the rebellion attempt to neutralize the Imperial’s Death Star.

A team consisting of former smuggler Han Solo, the Wookie Chewbacca, serial-whiner Luke Skywalker, Jedi Obi Wan Kenobi, and two droids C-3PO and R2-D2 set out to save Princess Leia Organa from a cell on the Death Star. Today, we’ll take a look at how the Empire's security procedures made it possible for the rebellion to get Leia out of there, while simultaneously destroying the battlestation and throwing the Empire into chaos.

Unprotected Endpoints
Star Wars - Obi Wan Kenobi was a wanted man by the Empire after he defeated Anakin in a duel on Mustafar (Revenge of the Sith), so even though it was decades later, he would have to be careful. When he’s stopped by Imperial Stormtroopers, he was able to use the Jedi Mind Trick to spoof their thoughts and get past the checkpoint.
Real World - Having a thoroughly controlled authentication protocol is an important part of keeping your data and infrastructure secure. Passwords, biometrics, and other forms of authentication have to both work for the users, while also being complex enough to keep unwanted parties out.

A Complete Lack of Segmentation and Lack of System Encryption
Star Wars - Once the team gets to the Death Star, they gain access to a control room where the droids begin to access the Death Star’s system. As soon as he’s hooked up, R2-D2 has complete access to the whole entire network without any form of authentication or protection.
Real World - Having some segmentation to your network allows you to pick and choose who can access certain information and who can’t. No matter who can access information, your network data needs to be encrypted to ensure that just anyone can’t access all the sensitive information on it.

Ignoring CISO at Great Peril
Star Wars - The Admiralty of the Imperial Army did not want to hear that there was a possibility that the rebels had found, and could execute sabotage, on a vulnerability. So much so that Grand Moff Tarkin scoffed when he was approached about the potential vulnerability to the battle station. Nothing was done with that information and it resulted in the first Imperial Death Star being destroyed, and the death of all Imperial staff onboard.
Real World - It is very, very risky to ignore the vulnerabilities in your network, as the more open your network is to outsiders, the larger you risk being infiltrated. Keeping your network and infrastructure up to date with the latest patches and security protections is a must to keep your organization from being put in precarious positions, or from being destroyed outright.

No matter what you think about your organization’s network security, you can learn a lot from the negligent manner the Empire went about securing their important assets. If you are looking for some help with your organization's security, whether it be physical or virtual, call Network Solutions Unlimited’s professional security technicians today at 217-428-6449. May the fourth be with you!

How to Calculate if That Print Job Was Really Wort...
Tech Term: Chromebook


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

VPN Thank You Budget Information Technology Artificial Intelligence Solid State Drive Employer Employee Relationship Work/Life Balance Microsoft Office Cleaning eWaste Customer Legislation Productivity Automobile Password Emergency Monitors Settings Health CrashOverride Computer Fan Hosted Solutions Computer Accessories Operating System MSP Security Samsung Identity Theft IT Support Loyalty Troubleshooting Hackers Chrome File Sharing Vulnerability Best Practices Devices Microsoft Word Avoiding Downtime Big Data Black Market Gamification Spyware Files Credit Cards Users Virtual Assistant Vendor Management Communications IT Solutions Going Green Root Cause Analysis Spam Blocking Benefits Humor Conferencing Computer Care Consultant Law Enforcement Storage Apps Advertising Backup Updates Commerce Miscellaneous Webinar Twitter BDR How To Co-Managed Services Payroll iOS Passwords Cache Gifts Business Intelligence App Cybersecurity End of Support PowerPoint Electronic Medical Records Company Culture Server Employer-Employee Relationship Managed IT Services Apple Wireless Internet Touchpad Shadow IT Two-factor Authentication Access Control Education Nanotechnology Regulation Virtualization Proactive Bluetooth Money Excel Scalability Business Technology Remote Computing Tech Term IT solutions IT Management Blockchain Data Storage Congratulations Financial Business Computing Evernote Data NFL hacker Television Smart Tech Travel Communication Shortcut Admin Update Hyperlink Firewall Projects Risk Management Audiobook Data Recovery WiFi Dark Web Document Management Social Media Printing Rootkit Innovation Emails Cybercrime Connectivity Charger Robot Streaming Media Mobile Security Experience IT Services Spam Utility Computing Facebook Wi-Fi Hard Drive Recovery Alexa for Business Keyboard Shortcuts Office Internet exploMicrosoft Saving Time Retail Smart Technology Business Owner Screen Mirroring Hacking intranet Scam Browser Automation Computer Forensics Hosted Solution Professional Services Keyboard Value Training Social Engineering Tablets Upgrade SMB IoT Relocation Phishing Device Security Printers Virus Testing Public Computer Business USB Entertainment User Error Colocation Google Maps Data Management OneNote Data storage Google Drive Websites Windows Ink Monitoring Safety Android Software Microsoft File Storage Human Resources Encryption Public Cloud Cortana Private Cloud VoIP WannaCry Managed IT Service Data Breach BYOD Virtual Reality Disaster Recovery Wasting Time Alert Wasting Money Hiring/Firing Phone System Lifestyle Workplace Tips Information Two Factor Authentication Administration IT Service Computing Infrastructure Cloud HBO Students Productivity How to Project Management Collaboration Telephone Systems History Managed IT Services Accessory Unified Threat Management Amazon Wireless Technology Managing Stress Small Business Hard Disk Drive Data Protection Flexibility Licensing Internet Physical Security Mobile Devices Managed Service Provider Transportation Windows 10 Google Comparison Smartphone Office Tips Fraud Google Assistant Upgrades Worker Commute Quick Tips Managed Service WIndows Server 2008 Data Backup Word Monitor Audit Instant Messaging Email Financial Technology Compliance Techology Meetings Ransomware Holiday Tech Support Bring Your Own Device Identity Adobe Peripheral Applications Office 365 Business Management Content Filtering Microsoft Excel Vendor Government Computing Battery Cost Management Content Filter Mobile Device Management Business Continuity Wireless The Internet of Things Mobility Tip of the Week Antivirus Telephone Reputation Sales Touchscreen Edge Augmented Reality Workers Gmail Windows 10s Application Laptop Employee-Employer Relationship Sports Windows 7 Legal Router HaaS Data Loss iPhone Saving Money PDF Mobile Networking Mobile Device Google Docs Data Security Unified Communications Downtime Privacy Malware Unsupported Software Language Wireless Charging Politics Patch Management Chromebook Sync App store IT Support User Tips Analysis Save Time Hardware Bandwidth FAQ Camera Smartphones Personal Information Network Security Best Practice WPA3 Video Games Chromecast Network Maintenance Software as a Service Computer Save Money Data Theft Management HIPAA Content Assessment Cast Specifications Remote Workers Data Privacy IT budget Internet Exlporer SaaS Books Proactive IT Windows 10 Cloud Computing Computers Outlook Search Worker Outsourced IT Ciminal Redundancy Memory Display Technology Efficiency Remote Monitoring Internet of Things Identities Marketing Hard Drives Gadgets Hybrid Cloud Managed IT Windows