Star Wars Cyber Security Parallels


Star Wars Cyber Security Parallels

DISCLAIMER: This blog post is not endorsed by Disney, George Lucas, or LucasFilms. Star Wars, the characters, and scenarios are Star Wars: TM & © Lucasfilm Ltd. All Rights Reserved.

Star Wars and Cybersecurity

(Almost) Parallel Universes

In the spirit of #ForceFriday and the upcoming Star Wars: #TheForceAwakens, we decided to have a little fun and compare the two. This list and discussion is not absolute and it is based on our observations.

-The Dark Side is the universal symbol of all things malicious: Malware, Bot Nets, Cyber Attacks, Advanced Persistent Threat, and the such. It is always trying to take over, sometimes using the force (hacking ala Black Hat) for evil. Others see Darth Vader as an aggressive Chief Security Officer (CSO).
-Jedis are White Hat Hackers (the good guys; hackers that use their knowledge, skills, and abilities to make the world a better place) trying to use the force for good. They occasionally err towards “Grey Hat” status to get into the Death Star, etc. to ensure the Dark Side doesn’t take over; think of Chewbacca, Luke, and Hans Solo getting themselves into the Death Star as a Trojan.
-R2D2 is the ultimate hacker. Look at all the data he good just by plugging into the Death Star. C3PO is a brilliant social engineer (one who hacks humans). His act of being stupid and clumsy made guards drop and allowed access.
-Despite the fact that it was known that the Death Star was under attack, nothing was done when the droids left in the pod. Perhaps they have a “monitor only policy.”

We should look at Star Wars as a lesson in Cyber Security. Per eSecurity Planet, “as a security professional speaking to an audience of security professionals, terms like CSO (Chief Security Officer), APT (Advanced Persistent Threat) and BYOD (Bring Your Own Device) are well known. Those terms are not, however, typically part of the Star Wars lexicon. Meghu’s talk was officially titled, ‘How Not to Do Security: Lessons Learned from the Galactic Empire,’ and it was riddled with modern IT security acronyms, terms and analysis.”

Here is a fun survey for you to complete (if you choose) to find out which Star Wars characters should be on YOUR IT Security Team:

Thanks for stopping by and reading our blog. We would appreciate if you could subscribe (assuming you like what you read; we think you will). This is meant to be informative and to provide value to anyone who reads this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.

eSecurity Planet

Enter your email address:

Delivered by FeedBurner

Contact Us

Subscribe to our mailing list

* indicates required

About Joe Gray

Joe Gray is a native of East Tennessee. He joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Since leaving the Navy, Joe has lived and worked in St. Louis, MO, Richmond, VA, and Atlanta, GA. His primary experience is in the Information Assurance (IA) and Cyber Security compliance field. He has worked as a Systems Engineer, Information Systems Auditor, Senior UNIX Administrator, Information Systems Security Officer, and Director of IT Security. Joe is in pursuit of his PhD in Information Technology (with focus in Information Assurance and Security). His undergraduate and graduate degrees are also in Information Technology (with focus in Information Assurance and Security) from Capella University, where he graduated Summa Cum Laude for both degrees and completed a Graduate Certificate in Business Intelligence. He also is a part-time (Adjunct) Faculty at Georgia Gwinnett College. Joe holds the (ISC)² CISSP-ISSMP, GIAC GSNA, CompTIA Security+, CompTIA Network+, and CompTIA A+ certifications. In his spare time, Joe enjoys reading news relevant to information security, blogging, bass fishing, and flying his drone in addition to tinkering with and testing scripts in R and Python.