croom new

Eclipse Integrated Systems Blog

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

A Little Background
For those of you who have spent your lives living on Dagoba and haven’t seen the original Star Wars movie, subsequently titled, A New Hope, the story follows a young pilot named Luke Skywalker, whose guardians are murdered by soldiers of the Imperial Army, who were looking for two droids Luke’s Uncle Owen purchased. With the help of an old hermit, Obi Wan “Old Ben” Kenobi, Luke sets out to join the rebellion led by Luke’s sister Leia (although they don’t know they are related).

The Empire has developed a new type of battlestation called the Death Star, which is a moon-sized behemoth equipped with a Superlaser, which was soon used to obliterate first Jedha City (Rogue One) and eventually, Leia’s (adopted) home planet of Alderaan. Knowing that having a weapon with that kind of destructive power would be the end of the rebellion that was underway by a pro-democratic coalition called the Alliance to Restore the Republic (or Rebel Alliance). The plot of A New Hope centers around the rebellion attempt to neutralize the Imperial’s Death Star.

Security
A team consisting of former smuggler Han Solo, the Wookie Chewbacca, serial-whiner Luke Skywalker, Jedi Obi Wan Kenobi, and two droids C-3PO and R2-D2 set out to save Princess Leia Organa from a cell on the Death Star. Today, we’ll take a look at how the Empire's security procedures made it possible for the rebellion to get Leia out of there, while simultaneously destroying the battlestation and throwing the Empire into chaos.

Unprotected Endpoints
Star Wars - Obi Wan Kenobi was a wanted man by the Empire after he defeated Anakin in a duel on Mustafar (Revenge of the Sith), so even though it was decades later, he would have to be careful. When he’s stopped by Imperial Stormtroopers, he was able to use the Jedi Mind Trick to spoof their thoughts and get past the checkpoint.
Real World - Having a thoroughly controlled authentication protocol is an important part of keeping your data and infrastructure secure. Passwords, biometrics, and other forms of authentication have to both work for the users, while also being complex enough to keep unwanted parties out.

A Complete Lack of Segmentation and Lack of System Encryption
Star Wars - Once the team gets to the Death Star, they gain access to a control room where the droids begin to access the Death Star’s system. As soon as he’s hooked up, R2-D2 has complete access to the whole entire network without any form of authentication or protection.
Real World - Having some segmentation to your network allows you to pick and choose who can access certain information and who can’t. No matter who can access information, your network data needs to be encrypted to ensure that just anyone can’t access all the sensitive information on it.

Ignoring CISO at Great Peril
Star Wars - The Admiralty of the Imperial Army did not want to hear that there was a possibility that the rebels had found, and could execute sabotage, on a vulnerability. So much so that Grand Moff Tarkin scoffed when he was approached about the potential vulnerability to the battle station. Nothing was done with that information and it resulted in the first Imperial Death Star being destroyed, and the death of all Imperial staff onboard.
Real World - It is very, very risky to ignore the vulnerabilities in your network, as the more open your network is to outsiders, the larger you risk being infiltrated. Keeping your network and infrastructure up to date with the latest patches and security protections is a must to keep your organization from being put in precarious positions, or from being destroyed outright.

No matter what you think about your organization’s network security, you can learn a lot from the negligent manner the Empire went about securing their important assets. If you are looking for some help with your organization's security, whether it be physical or virtual, call Eclipse Integrated Systems’s professional security technicians today at 800-340-0505. May the fourth be with you!

How to Calculate if That Print Job Was Really Wort...
Tech Term: Chromebook
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google Hackers User Tips Malware Business Management Software Productivity Microsoft Tech Term Innovation Efficiency Hosted Solutions Computer Backup Windows 10 Browser Email Business Apps Cybersecurity Mobile Devices Productivity Managed IT Services Smartphones Small Business Smartphone Internet of Things Saving Money Data Recovery Windows Data Backup Hardware Communication Holiday Android Cybercrime Virtualization VoIP Collaboration Disaster Recovery Network Ransomware Passwords Mobile Device IT Support Business Continuity Workplace Tips Mobility communications Operating System Law Enforcement Microsoft Office Data Security Wireless Miscellaneous IT Services Data IT Support Users Cloud Computing Password Money Gadgets Outsourced IT Chrome Phishing Wi-Fi Social Media Server Office 365 Mobile Device Management Telephone Systems Windows 10 Update BDR Quick Tips Vulnerability Upgrade Unsupported Software Best Practice Risk Management Google Drive Social Facebook Cost Management Employer-Employee Relationship Application App Health Government Information Technology Shortcut Identity Theft Hacking Patch Management Streaming Media Bandwidth Politics Data Management User Error Save Money Marketing Managed IT Services Two-factor Authentication Sports Work/Life Balance Managed IT Networking Current Events Automation Office tips Proactive IT USB Spam Artificial Intelligence Antivirus Alert Managed Service Provider Computers Blockchain Information Managed Service Business Intelligence Data Storage Flexibility Cleaning Connectivity Samsung OneNote Data Protection Encryption VPN Word Router Compliance Social Engineering Applications Maintenance Telephony Humor History Outlook End of Support Battery Training Television Remote Computing Touchscreen Private Cloud Audit Save Time Excel Company Culture Recovery Storage iPhone Managing Stress HaaS Devices SaaS Commerce BYOD Remote Monitoring and Management Gmail Automobile Computer Care Tech Support Cortana Meetings Access Control Personal Information Going Green Apple Medical IT Transportation Mobile Security Internet Exlporer Legal Wireless Technology Wireless Charging Search The Internet of Things Google Docs Analytics eWaste WiFi Office Hosted Solution Fraud Mobile Computing DDoS Identity Adobe Microsoft Word Running Cable Wireless Internet Touchpad Healthcare Comparison IT solutions Trending Data Breach Education Authorization Data storage Microsoft Excel Identities Big Data SharePoint Websites Amazon Credit Cards Value Dark Web Scam Nanotechnology Lithium-ion battery Edge Bluetooth Distributed Denial of Service Hybrid Cloud Consultant Scalability Data Privacy Hiring/Firing iOS Administrator PDF Worker Commute Unified Communications Help Desk Screen Mirroring Specifications Virtual Assistant Windows 10s Evernote Downloads File Sharing Language Books Data Theft IT Management Instant Messaging Error Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Experience Fax Server Managed IT Service How To Hard Drive Benefits Access Licensing Device Security Text Messaging RAM Certification Uninterrupted Power Supply Operating Sysytem Cast Sales Computing Plug-In Solid State Drive Budget Point of Sale Trends Troubleshooting Settings Teamwork IT Solutions FAQ Internet Explorer Microsoft Office 365 Computer Accessories Augmented Reality Google Maps Project Management Phone System Cables Electronic Medical Records Retail Chromebook Reporting Smart Technology Computer Fan Travel Microsoft Teams Security Cameras Avoiding Downtime App store Hacker Hard Disk Drive Chromecast Sync Workers Advertising Wearable Technology A.I. Profitability Video Games Files Charger Threat Data Loss IT budget Music Virus Voice over Internet Protocol Safety Emails Conferencing Reputation Printing WannaCry Tablets Spyware G Suite Wearables Unified Threat Management Analysis Keyboard Updates Movies Eliminating Downtime Laptop Legislation Webinar WIndows Server 2008 Virtual Reality PowerPoint Authentication Vendor Management Proactive HBO Gifts Black Market Google Assistant GDPR Robot NFL Entertainment Bring Your Own Device Upgrades Worker Printers Relocation Twitter Regulation Cache Remote Monitoring CrashOverride Emergency Monitors Disaster

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login