Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

A Little Background
For those of you who have spent your lives living on Dagoba and haven’t seen the original Star Wars movie, subsequently titled, A New Hope, the story follows a young pilot named Luke Skywalker, whose guardians are murdered by soldiers of the Imperial Army, who were looking for two droids Luke’s Uncle Owen purchased. With the help of an old hermit, Obi Wan “Old Ben” Kenobi, Luke sets out to join the rebellion led by Luke’s sister Leia (although they don’t know they are related).

The Empire has developed a new type of battlestation called the Death Star, which is a moon-sized behemoth equipped with a Superlaser, which was soon used to obliterate first Jedha City (Rogue One) and eventually, Leia’s (adopted) home planet of Alderaan. Knowing that having a weapon with that kind of destructive power would be the end of the rebellion that was underway by a pro-democratic coalition called the Alliance to Restore the Republic (or Rebel Alliance). The plot of A New Hope centers around the rebellion attempt to neutralize the Imperial’s Death Star.

Security
A team consisting of former smuggler Han Solo, the Wookie Chewbacca, serial-whiner Luke Skywalker, Jedi Obi Wan Kenobi, and two droids C-3PO and R2-D2 set out to save Princess Leia Organa from a cell on the Death Star. Today, we’ll take a look at how the Empire's security procedures made it possible for the rebellion to get Leia out of there, while simultaneously destroying the battlestation and throwing the Empire into chaos.

Unprotected Endpoints
Star Wars - Obi Wan Kenobi was a wanted man by the Empire after he defeated Anakin in a duel on Mustafar (Revenge of the Sith), so even though it was decades later, he would have to be careful. When he’s stopped by Imperial Stormtroopers, he was able to use the Jedi Mind Trick to spoof their thoughts and get past the checkpoint.
Real World - Having a thoroughly controlled authentication protocol is an important part of keeping your data and infrastructure secure. Passwords, biometrics, and other forms of authentication have to both work for the users, while also being complex enough to keep unwanted parties out.

A Complete Lack of Segmentation and Lack of System Encryption
Star Wars - Once the team gets to the Death Star, they gain access to a control room where the droids begin to access the Death Star’s system. As soon as he’s hooked up, R2-D2 has complete access to the whole entire network without any form of authentication or protection.
Real World - Having some segmentation to your network allows you to pick and choose who can access certain information and who can’t. No matter who can access information, your network data needs to be encrypted to ensure that just anyone can’t access all the sensitive information on it.

Ignoring CISO at Great Peril
Star Wars - The Admiralty of the Imperial Army did not want to hear that there was a possibility that the rebels had found, and could execute sabotage, on a vulnerability. So much so that Grand Moff Tarkin scoffed when he was approached about the potential vulnerability to the battle station. Nothing was done with that information and it resulted in the first Imperial Death Star being destroyed, and the death of all Imperial staff onboard.
Real World - It is very, very risky to ignore the vulnerabilities in your network, as the more open your network is to outsiders, the larger you risk being infiltrated. Keeping your network and infrastructure up to date with the latest patches and security protections is a must to keep your organization from being put in precarious positions, or from being destroyed outright.

No matter what you think about your organization’s network security, you can learn a lot from the negligent manner the Empire went about securing their important assets. If you are looking for some help with your organization's security, whether it be physical or virtual, call Network Solutions Unlimited’s professional security technicians today at 217-428-6449. May the fourth be with you!

How to Calculate if That Print Job Was Really Wort...
Tech Term: Chromebook
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Malware Paperless Office Identity Theft Troubleshooting Mobile Devices Relocation Google Drive Safety File Storage Virtual Reality Blockchain File Sharing Marketing Best Practice Internet of Things iPhone Recovery hacker Scalability IT Support Bandwidth Hard Drives Bring Your Own Device Mobile Security Public Computer Remote Monitoring Managed IT Services Fraud Proactive IT Efficiency Analytics Managing Stress Emergency Google Assistant Data Theft Remote Workers Touchpad Thank You BDR Flexibility Phishing Printers Files Cloud Computing Physical Security Memory Wireless Internet User Tips CrashOverride Email Data Breach Congratulations Utility Computing BYOD Internet exploMicrosoft History intranet Wireless Technology Edge Apple Backup Server Payroll Sync Browser Virtual Private Network OneNote Chrome Saving Money Managed Service Facebook Rootkit Advertising Hosted Solutions Computing HaaS Windows 7 Unified Threat Management Screen Mirroring Save Time Keyboard Business Nanotechnology Business Intelligence SaaS Bluetooth Alexa for Business eWaste Microsoft Office Smartphones Search Remote Computing Upgrades Money Hybrid Cloud VoIP Managed Service Provider Cleaning Instant Messaging Experience Risk Management Conferencing Data Backup Operating System Disaster Recovery Office 365 Mobility Security Cameras Cache Unsupported Software Managed IT Services Maintenance Government The Internet of Things Chromebook Small Business Entertainment Antivirus Identity Financial Technology Company Culture Best Practices Data Storage Content Applications Computer Care Law Enforcement Password Television Security Customer Windows Ink Wasting Money Samsung Webinar Personal Information Business Continuity Mobile Device Reputation PDF Managed IT Service Microsoft Employee Students Cloud Employer Employee Relationship Vendor Management Avoiding Downtime Tech Term Tip of the Week Device Security Communication Data Office Tips Settings Benefits Virtual Assistant Solid State Drive Commerce Machine Learning App Specifications Smart Tech Big Data Shadow IT IoT Information Technology Twitter Payment Cards Phone System Update iOS Apps Productivity Telephone Legislation Passwords Windows 10s Outsourced IT Humor Consultant Monitoring Spyware Computer Fan Assessment Tech Support Amazon Meetings Medical IT Upgrade Human Resources Windows 10 Hosted Solution Software Electronic Medical Records Data Loss Audit Users Tablets Wasting Time Google Word Workers Virus Financial FAQ Camera Content Filtering Shortcut Data Security Analysis Microsoft Excel Google Docs Hardware Software as a Service Artificial Intelligence Data Management Patch Management Co-Managed Services Sales Printing WPA3 Spam Gamification Networking Spam Blocking Robot Proactive Admin Business Owner Credit Cards Gmail USB Computer Accessories Workplace Tips Mobile Device Management Computer Administration Application Content Filter Virtualization Dark Web Social Engineering Gifts Windows Backup and Disaster Recovery Business Management Licensing App store Devices Hiring/Firing Compliance Testing Business Computing Microsoft Word Save Money Training Wireless Books WiFi NFL Excel Router Video Games Cast Data Protection Techology Two Factor Authentication Data Privacy Management Vendor Monitor IT Service Innovation Encryption Cybersecurity WIndows Server 2008 Gadgets Hackers SMB Projects Professional Services Chromecast Google Maps Charger Touchscreen HBO Black Market Updates HIPAA Internet Retail Work/Life Balance Audiobook Windows 10 Break/Fix Miscellaneous PowerPoint Document Management Unified Communications Automobile Smartphone Display Travel Business Technology Keyboard Shortcuts Information Ransomware Hard Drive IT budget Augmented Reality Laptop Emails Social Media Evernote Value Computers Managed IT Productivity Technology Two-factor Authentication Transportation E-Commerce Telephone Systems Downtime How to Alert Network Security Employer-Employee Relationship Project Management Loyalty Identities Monitors Wi-Fi VPN Colocation Root Cause Analysis Public Cloud Android Language Education Firewall How To Sports Privacy Hard Disk Drive Worker Comparison Vulnerability Data Recovery Outlook IT Management Quick Tips End of Support Computer Forensics Automation Hyperlink Communications Worker Commute Cybercrime IT Services Budget Mobile Access Control Private Cloud Going Green Collaboration Peripheral Office Holiday Smart Technology Data storage IT Solutions Storage WannaCry Ciminal Adobe Employee-Employer Relationship Connectivity Saving Time Cortana IT Support Computing Infrastructure MSP Politics User Error Wireless Charging Network Streaming Media Health Hacking Regulation Redundancy Internet Exlporer Lifestyle Accessory Scam Legal Websites Cost Management IT solutions Battery