Contact us today!

FRS Pros Blog

FRS Pros has been serving the United States area since over a Decade, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

A Little Background
For those of you who have spent your lives living on Dagoba and haven’t seen the original Star Wars movie, subsequently titled, A New Hope, the story follows a young pilot named Luke Skywalker, whose guardians are murdered by soldiers of the Imperial Army, who were looking for two droids Luke’s Uncle Owen purchased. With the help of an old hermit, Obi Wan “Old Ben” Kenobi, Luke sets out to join the rebellion led by Luke’s sister Leia (although they don’t know they are related).

The Empire has developed a new type of battlestation called the Death Star, which is a moon-sized behemoth equipped with a Superlaser, which was soon used to obliterate first Jedha City (Rogue One) and eventually, Leia’s (adopted) home planet of Alderaan. Knowing that having a weapon with that kind of destructive power would be the end of the rebellion that was underway by a pro-democratic coalition called the Alliance to Restore the Republic (or Rebel Alliance). The plot of A New Hope centers around the rebellion attempt to neutralize the Imperial’s Death Star.

A team consisting of former smuggler Han Solo, the Wookie Chewbacca, serial-whiner Luke Skywalker, Jedi Obi Wan Kenobi, and two droids C-3PO and R2-D2 set out to save Princess Leia Organa from a cell on the Death Star. Today, we’ll take a look at how the Empire's security procedures made it possible for the rebellion to get Leia out of there, while simultaneously destroying the battlestation and throwing the Empire into chaos.

Unprotected Endpoints
Star Wars - Obi Wan Kenobi was a wanted man by the Empire after he defeated Anakin in a duel on Mustafar (Revenge of the Sith), so even though it was decades later, he would have to be careful. When he’s stopped by Imperial Stormtroopers, he was able to use the Jedi Mind Trick to spoof their thoughts and get past the checkpoint.
Real World - Having a thoroughly controlled authentication protocol is an important part of keeping your data and infrastructure secure. Passwords, biometrics, and other forms of authentication have to both work for the users, while also being complex enough to keep unwanted parties out.

A Complete Lack of Segmentation and Lack of System Encryption
Star Wars - Once the team gets to the Death Star, they gain access to a control room where the droids begin to access the Death Star’s system. As soon as he’s hooked up, R2-D2 has complete access to the whole entire network without any form of authentication or protection.
Real World - Having some segmentation to your network allows you to pick and choose who can access certain information and who can’t. No matter who can access information, your network data needs to be encrypted to ensure that just anyone can’t access all the sensitive information on it.

Ignoring CISO at Great Peril
Star Wars - The Admiralty of the Imperial Army did not want to hear that there was a possibility that the rebels had found, and could execute sabotage, on a vulnerability. So much so that Grand Moff Tarkin scoffed when he was approached about the potential vulnerability to the battle station. Nothing was done with that information and it resulted in the first Imperial Death Star being destroyed, and the death of all Imperial staff onboard.
Real World - It is very, very risky to ignore the vulnerabilities in your network, as the more open your network is to outsiders, the larger you risk being infiltrated. Keeping your network and infrastructure up to date with the latest patches and security protections is a must to keep your organization from being put in precarious positions, or from being destroyed outright.

No matter what you think about your organization’s network security, you can learn a lot from the negligent manner the Empire went about securing their important assets. If you are looking for some help with your organization's security, whether it be physical or virtual, call FRS Pros’s professional security technicians today at 561-795-2000. May the fourth be with you!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Business Management Cloud Business Computing Network Security Google Software Cybersecurity Microsoft Malware Hosted Solutions Tech Term Hackers User Tips Windows Hardware Data Backup Computer Cybercrime Browser Data Recovery Operating System Android Mobile Devices Apps Data Security Smartphone Productivity Innovation Business Continuity Vulnerability Internet of Things Alert Phishing Ransomware Outsourced IT Office 365 Email Law Enforcement Backup Saving Money Business Efficiency Smartphones Disaster Recovery Mobile Device Management Server Money Best Practice IT Support Chrome Windows 10 Two-factor Authentication Unsupported Software Computers Communications Windows 10 Spam Cloud Computing Microsoft Office Information Technology Tech Support Employer-Employee Relationship Google Drive Data Virtualization App VoIP IT Services Telephone Systems Collaboration Network Gadgets IT Support Small Business Managed Service Provider Managed IT Blockchain Facebook Router Mobile Security Commerce Quick Tips Upgrade Avoiding Downtime Wireless Technology Proactive IT Cortana Risk Management The Internet of Things Productivity Data Storage Wireless Charging OneNote Wi-Fi Update Devices Audit Automation Patch Management Data Breach Shortcut iPhone Hacking Gmail Managed IT Services Excel Cost Management Fraud Save Money WannaCry Application Hosted Solution Google Assistant Safety User Error Robot Miscellaneous Data Management Holiday VPN Artificial Intelligence Managed IT Services Sports Government WiFi Google Docs Politics Applications Password Data Protection Social Media BDR IT Management File Sharing Hard Disk Drive Augmented Reality PowerPoint Touchpad Legal Maintenance Files Tablets Encryption Social Engineering IT Solutions Settings Storage Recovery Mobility FAQ Identity Wireless Internet Humor eWaste NFL Consultant Identities Administrator Charger Lithium-ion battery Data Privacy Gamification Device Security Social Word Touchscreen iOS Language Access WIndows Server 2008 Legislation Hard Drive Data storage Memory Screen Mirroring Windows Ink Identity Theft Comparison Internet Exlporer Meetings Chromebook Financial Spyware Cast Google Maps Emails Computer Fan Vendor Management Virus Transportation Outlook Specifications History Printing BYOD Health Apple Marketing Samsung Proactive Going Green Sales DDoS Wireless Evernote Disaster Sync Antivirus Edge Budget Search Webinar Websites Retail Value Networking Remote Monitoring Private Cloud SaaS Emergency Ciminal Streaming Media Data Loss IT solutions Conferencing Point of Sale Data Theft Workers Adobe Project Management Chromecast HBO Windows 10s Passwords Gifts Telephony Nanotechnology Computer Care Computing Remote Computing Computer Forensics Updates Licensing Unified Threat Management IT budget Microsoft Excel Solid State Drive Credit Cards Uninterrupted Power Supply Root Cause Analysis App store Management Laptop Microsoft Word Reputation Travel Upgrades Scam Virtual Reality Crowdsourcing Phone System Users Employer Employee Relationship Music Flexibility Save Time Computer Accessories Instant Messaging Advertising Communication CrashOverride Television Analytics Scalability Hacker HaaS Mobile Device Keyboard Big Data Relocation Managing Stress Personal Information Workplace Tips Books How To Education PDF Mobile Computing es Work/Life Balance Hiring/Firing Electronic Medical Records Current Events Text Messaging Cache Benefits Monitors Training Battery Office tips Smart Technology Thank You Company Culture Entertainment Twitter Black Market End of Support Congratulations Automobile Cleaning Office USB Experience Video Games Worker