Star Wars Cyber Security Parallels


Star Wars Cyber Security Parallels

DISCLAIMER: This blog post is not endorsed by Disney, George Lucas, or LucasFilms. Star Wars, the characters, and scenarios are Star Wars: TM & © Lucasfilm Ltd. All Rights Reserved.

Star Wars and Cybersecurity

(Almost) Parallel Universes

In the spirit of #ForceFriday and the upcoming Star Wars: #TheForceAwakens, we decided to have a little fun and compare the two. This list and discussion is not absolute and it is based on our observations.

-The Dark Side is the universal symbol of all things malicious: Malware, Bot Nets, Cyber Attacks, Advanced Persistent Threat, and the such. It is always trying to take over, sometimes using the force (hacking ala Black Hat) for evil. Others see Darth Vader as an aggressive Chief Security Officer (CSO).
-Jedis are White Hat Hackers (the good guys; hackers that use their knowledge, skills, and abilities to make the world a better place) trying to use the force for good. They occasionally err towards “Grey Hat” status to get into the Death Star, etc. to ensure the Dark Side doesn’t take over; think of Chewbacca, Luke, and Hans Solo getting themselves into the Death Star as a Trojan.
-R2D2 is the ultimate hacker. Look at all the data he good just by plugging into the Death Star. C3PO is a brilliant social engineer (one who hacks humans). His act of being stupid and clumsy made guards drop and allowed access.
-Despite the fact that it was known that the Death Star was under attack, nothing was done when the droids left in the pod. Perhaps they have a “monitor only policy.”

We should look at Star Wars as a lesson in Cyber Security. Per eSecurity Planet, “as a security professional speaking to an audience of security professionals, terms like CSO (Chief Security Officer), APT (Advanced Persistent Threat) and BYOD (Bring Your Own Device) are well known. Those terms are not, however, typically part of the Star Wars lexicon. Meghu’s talk was officially titled, ‘How Not to Do Security: Lessons Learned from the Galactic Empire,’ and it was riddled with modern IT security acronyms, terms and analysis.”

Here is a fun survey for you to complete (if you choose) to find out which Star Wars characters should be on YOUR IT Security Team:

Thanks for stopping by and reading our blog. We would appreciate if you could subscribe (assuming you like what you read; we think you will). This is meant to be informative and to provide value to anyone who reads this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.

eSecurity Planet

Enter your email address:

Delivered by FeedBurner

Contact Us

Subscribe to our mailing list

* indicates required

About Joe Gray

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is currently a Senior Security Architect and maintains his own blog and podcast called Advanced Persistent Security. In his spare time, Joe enjoys attending information security conferences, contributing blogs to various outlets, training in Brazilian Jiu Jitsu (spoken taps out A LOT!), and flying his drone. Joe is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe has contributed material for the likes of AlienVault, ITSP Magazine, CSO Online, and Dark Reading.