Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

A Little Background
For those of you who have spent your lives living on Dagoba and haven’t seen the original Star Wars movie, subsequently titled, A New Hope, the story follows a young pilot named Luke Skywalker, whose guardians are murdered by soldiers of the Imperial Army, who were looking for two droids Luke’s Uncle Owen purchased. With the help of an old hermit, Obi Wan “Old Ben” Kenobi, Luke sets out to join the rebellion led by Luke’s sister Leia (although they don’t know they are related).

The Empire has developed a new type of battlestation called the Death Star, which is a moon-sized behemoth equipped with a Superlaser, which was soon used to obliterate first Jedha City (Rogue One) and eventually, Leia’s (adopted) home planet of Alderaan. Knowing that having a weapon with that kind of destructive power would be the end of the rebellion that was underway by a pro-democratic coalition called the Alliance to Restore the Republic (or Rebel Alliance). The plot of A New Hope centers around the rebellion attempt to neutralize the Imperial’s Death Star.

Security
A team consisting of former smuggler Han Solo, the Wookie Chewbacca, serial-whiner Luke Skywalker, Jedi Obi Wan Kenobi, and two droids C-3PO and R2-D2 set out to save Princess Leia Organa from a cell on the Death Star. Today, we’ll take a look at how the Empire's security procedures made it possible for the rebellion to get Leia out of there, while simultaneously destroying the battlestation and throwing the Empire into chaos.

Unprotected Endpoints
Star Wars - Obi Wan Kenobi was a wanted man by the Empire after he defeated Anakin in a duel on Mustafar (Revenge of the Sith), so even though it was decades later, he would have to be careful. When he’s stopped by Imperial Stormtroopers, he was able to use the Jedi Mind Trick to spoof their thoughts and get past the checkpoint.
Real World - Having a thoroughly controlled authentication protocol is an important part of keeping your data and infrastructure secure. Passwords, biometrics, and other forms of authentication have to both work for the users, while also being complex enough to keep unwanted parties out.

A Complete Lack of Segmentation and Lack of System Encryption
Star Wars - Once the team gets to the Death Star, they gain access to a control room where the droids begin to access the Death Star’s system. As soon as he’s hooked up, R2-D2 has complete access to the whole entire network without any form of authentication or protection.
Real World - Having some segmentation to your network allows you to pick and choose who can access certain information and who can’t. No matter who can access information, your network data needs to be encrypted to ensure that just anyone can’t access all the sensitive information on it.

Ignoring CISO at Great Peril
Star Wars - The Admiralty of the Imperial Army did not want to hear that there was a possibility that the rebels had found, and could execute sabotage, on a vulnerability. So much so that Grand Moff Tarkin scoffed when he was approached about the potential vulnerability to the battle station. Nothing was done with that information and it resulted in the first Imperial Death Star being destroyed, and the death of all Imperial staff onboard.
Real World - It is very, very risky to ignore the vulnerabilities in your network, as the more open your network is to outsiders, the larger you risk being infiltrated. Keeping your network and infrastructure up to date with the latest patches and security protections is a must to keep your organization from being put in precarious positions, or from being destroyed outright.

No matter what you think about your organization’s network security, you can learn a lot from the negligent manner the Empire went about securing their important assets. If you are looking for some help with your organization's security, whether it be physical or virtual, call FRS Pros’s professional security technicians today at 561-795-2000. May the fourth be with you!

How to Calculate if That Print Job Was Really Wort...
Tech Term: Chromebook
 

Comments 1

Marvin McIntire on Monday, 16 July 2018 11:58

Gregg, I completely agree with you on this. If you don't know what are the odds, then you won't be able to do your essay writing service work properly. Most people will take this as a joke right now, but I firmly believe in this.

Gregg, I completely agree with you on this. If you don't know what are the odds, then you won't be able to do your [url=https://www.huffingtonpost.com/nancy-laws/the-shocking-truth-about-_5_b_7041934.html]essay writing service[/url] work properly. Most people will take this as a joke right now, but I firmly believe in this.
Already Registered? Login Here
Guest
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Business Management Cloud User Tips Google Tech Term Hardware Software Hackers Microsoft Computer Data Backup Malware Mobile Devices Browser Productivity Efficiency Hosted Solutions Smartphone Cybersecurity Windows IT Services Windows 10 Data Recovery Data Security Android Data Office 365 Apps Smartphones Email Internet of Things Outsourced IT Innovation Cybercrime Business Continuity Upgrade VoIP Operating System IT Support Backup Communications Saving Money Business Mobile Device Management Money Vulnerability Alert Law Enforcement Disaster Recovery Ransomware Phishing Spam Microsoft Office Managed IT Services Server Collaboration Passwords Network Best Practice IT Support Employer-Employee Relationship Workplace Tips Applications Small Business Chrome Windows 10 App Cloud Computing Blockchain Computers Two-factor Authentication Virtualization Information Artificial Intelligence Information Technology Holiday Miscellaneous OneNote Networking Telephone Systems Tech Support Gadgets Router Managed Service Provider Managed IT Managed IT Services Google Drive Users Unsupported Software Commerce Gmail WannaCry Save Money Travel Application Managed Service Communication Excel Encryption Access Control Safety Fraud Budget Mobile Security SaaS Government Bring Your Own Device Proactive IT Evernote Wireless Technology Google Assistant Touchscreen Data Storage Robot User Error Risk Management Data Management WiFi Mobile Device The Internet of Things Social Media Cortana Productivity VPN iPhone Wi-Fi Sports Update Word Audit Business Technology Shortcut Data Protection Facebook Politics Patch Management Wireless Charging Automation Google Docs Project Management Password Quick Tips Devices BDR Cost Management Hosted Solution Augmented Reality Avoiding Downtime Mobility Data Breach Hacking Credit Cards App store Chromebook Co-Managed Services Transportation Google Maps Spyware Alexa for Business Laptop Camera Private Cloud Microsoft Word Financial Payroll IT Solutions Specifications Legal Virus DDoS Management Webinar File Sharing Antivirus Files Recovery Printing Telephone Consultant Going Green Social Apple Disaster Touchpad Projects Remote Monitoring Tablets Maintenance Security Cameras Sales Proactive Vendor Sync Hacker PowerPoint Admin IT solutions Storage Social Engineering FAQ Emergency Administrator Hyperlink Edge Humor Retail Websites Streaming Media Identity NFL eWaste Point of Sale Lithium-ion battery Hybrid Cloud Machine Learning iOS WIndows Server 2008 Employee-Employer Relationship Personal Information Wireless Internet Saving Time Windows 10s HBO Identities Charger Access Value Wasting Time Screen Mirroring Data Loss Ciminal Identity Theft Computer Care Nanotechnology Conferencing Data Theft Chromecast Data Privacy Windows 7 Unified Threat Management Reputation Device Security Amazon Meetings History Adobe Workers Telephony Gamification Keyboard Shortcuts Solid State Drive Data storage Legislation Language Internet Exlporer Accessory Emails Cast Remote Computing Health Vendor Management Software as a Service Root Cause Analysis Gifts Computing Hard Drive Display Upgrades Windows Ink Scam Virtual Assistant Computer Fan Testing Wireless Licensing Updates Uninterrupted Power Supply Memory Human Resources Hard Disk Drive IT Management Settings Comparison Outlook Computer Forensics Peripheral Marketing BYOD Search Microsoft Excel IT budget Samsung Bandwidth Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Office tips Cache Benefits Advertising Phone System es Save Time Computer Accessories Training Monitors Music Battery Smart Technology Flexibility Television CrashOverride HaaS Instant Messaging End of Support Relocation Compliance Company Culture Scalability Analytics Printers Keyboard Thank You Entertainment Black Market Cleaning Regulation Big Data Automobile Office Downtime PDF Mobile Computing Managing Stress Congratulations USB Worker Twitter How To Books Text Messaging Education Hiring/Firing Video Games Experience Virtual Reality Work/Life Balance