Star Wars Cyber Security Parallels
DISCLAIMER: This blog post is not endorsed by Disney, George Lucas, or LucasFilms. Star Wars, the characters, and scenarios are Star Wars: TM & © Lucasfilm Ltd. All Rights Reserved.
Star Wars and Cybersecurity
(Almost) Parallel Universes
In the spirit of #ForceFriday and the upcoming Star Wars: #TheForceAwakens, we decided to have a little fun and compare the two. This list and discussion is not absolute and it is based on our observations.
-The Dark Side is the universal symbol of all things malicious: Malware, Bot Nets, Cyber Attacks, Advanced Persistent Threat, and the such. It is always trying to take over, sometimes using the force (hacking ala Black Hat) for evil. Others see Darth Vader as an aggressive Chief Security Officer (CSO).
-Jedis are White Hat Hackers (the good guys; hackers that use their knowledge, skills, and abilities to make the world a better place) trying to use the force for good. They occasionally err towards “Grey Hat” status to get into the Death Star, etc. to ensure the Dark Side doesn’t take over; think of Chewbacca, Luke, and Hans Solo getting themselves into the Death Star as a Trojan.
-R2D2 is the ultimate hacker. Look at all the data he good just by plugging into the Death Star. C3PO is a brilliant social engineer (one who hacks humans). His act of being stupid and clumsy made guards drop and allowed access.
-Despite the fact that it was known that the Death Star was under attack, nothing was done when the droids left in the pod. Perhaps they have a “monitor only policy.”
We should look at Star Wars as a lesson in Cyber Security. Per eSecurity Planet, “as a security professional speaking to an audience of security professionals, terms like CSO (Chief Security Officer), APT (Advanced Persistent Threat) and BYOD (Bring Your Own Device) are well known. Those terms are not, however, typically part of the Star Wars lexicon. Meghu’s talk was officially titled, ‘How Not to Do Security: Lessons Learned from the Galactic Empire,’ and it was riddled with modern IT security acronyms, terms and analysis.”
Here is a fun survey for you to complete (if you choose) to find out which Star Wars characters should be on YOUR IT Security Team:
Thanks for stopping by and reading our blog. We would appreciate if you could subscribe (assuming you like what you read; we think you will). This is meant to be informative and to provide value to anyone who reads this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.