Information security

From ImperialWiki
Jump to: navigation, search
(Information security in Star Wars)
(Information security in Star Wars)
Line 31: Line 31:
  
 
==Information security in ''[[Star Wars]]''==
 
==Information security in ''[[Star Wars]]''==
The access protocols for Republic and Imperial computers are not clear, but their primary weakness seems to be inadequate authorization controls for low priority systems.
+
Officers in the Imperial armed forces all carry on their person one to four code cylinders that they seem to use in order to be able access systems from what ever work station that they are operating from, indicating that Imperial information security is token-based.  In many of the Star Wars computer games these cylinders take on the function of keys opening locked doors once they are acquired.  They also have electronic combination locks that are used to secure high level systems, vaults and areas.
 +
 
 +
The access protocols for Republic and Imperial computers are not clear, but their primary weakness seems to be inadequate authorization controls for low priority systems.  
 
*The astromech droid [[R2-D2]] was granted access to the [[Death Star|Death Star's]] computer network without legitimate credentials, but he was denied access to some information.  For instance, he could remotely deactivate the station's garbage compactors, but he could not remotely cut the power to the station's [[tractor beam]]s (although he could determine where to disable them manually).
 
*The astromech droid [[R2-D2]] was granted access to the [[Death Star|Death Star's]] computer network without legitimate credentials, but he was denied access to some information.  For instance, he could remotely deactivate the station's garbage compactors, but he could not remotely cut the power to the station's [[tractor beam]]s (although he could determine where to disable them manually).
 
*Similarly, R2-D2 was able to determine that [[Leia Organa]] was a prisoner on the station and where she was being held, but he could not locate an exit from her cell block other than the main entrance, and he admitted that much of the information he sought was restricted.<ref>''[[Star Wars: A New Hope]]''</ref>
 
*Similarly, R2-D2 was able to determine that [[Leia Organa]] was a prisoner on the station and where she was being held, but he could not locate an exit from her cell block other than the main entrance, and he admitted that much of the information he sought was restricted.<ref>''[[Star Wars: A New Hope]]''</ref>
  
Taken together, these incidents indicate that Imperial networks have "guest" accounts that provide unnecessary access to some systems, and a proficient hacker can exploit these accounts.
+
Taken together, these incidents indicate that Imperial networks have "guest" accounts that provide unnecessary access to some systems, and a proficient hacker can exploit these accounts. It also suggests that some confidential information is handled carelessly, indicating poor enforcement of security procedures.
  
 
It may be worth noting that R2-D2 has been allowed to operate for decades without a memory erasure.  This may have allowed the droid to accumulate an exceptionally large store of cracking tools and techniques, something that his various owners ([[Padmé Amidala]], [[Anakin Skywalker]], [[Bail Organa]], [[Leia Organa]], and [[Luke Skywalker]]) have probably encouraged.
 
It may be worth noting that R2-D2 has been allowed to operate for decades without a memory erasure.  This may have allowed the droid to accumulate an exceptionally large store of cracking tools and techniques, something that his various owners ([[Padmé Amidala]], [[Anakin Skywalker]], [[Bail Organa]], [[Leia Organa]], and [[Luke Skywalker]]) have probably encouraged.
  
 
Furthermore, some of R2-D2's computer "hacks" may not be indications of poor security measures.  Shutting down dangerous machinery, like garbage compactors and droid assembly lines<ref>''[[Star Wars: Attack of the Clones]]''</ref>, might have minimal authorization requirements by design, allowing any worker to shut down the system in the event of a safety issue.  Also, it is fairly conclusive that [[Darth Vader]] wanted Leia to be rescued in order to learn the location of the rebel base. As such, some of the information R2 obtained from the Death Star computer may have been deliberately left unprotected for him to discover with relative ease.
 
Furthermore, some of R2-D2's computer "hacks" may not be indications of poor security measures.  Shutting down dangerous machinery, like garbage compactors and droid assembly lines<ref>''[[Star Wars: Attack of the Clones]]''</ref>, might have minimal authorization requirements by design, allowing any worker to shut down the system in the event of a safety issue.  Also, it is fairly conclusive that [[Darth Vader]] wanted Leia to be rescued in order to learn the location of the rebel base. As such, some of the information R2 obtained from the Death Star computer may have been deliberately left unprotected for him to discover with relative ease.
 
Officers in the Imperial armed forces all carry on their person one to four code cylinders that they seem to use in order to be able access systems from what ever work station that they are operating from.  In many of the Star Wars computer games these cylinders take on the function of keys opening locked doors once they are acquired.  They also have electronic combination locks that are used to secure high level systems, vaults and areas. 
 
  
 
The nature of Star Wars computer networks may also change the nature of computer "hacking".  Like droids, central computers seem to be [[artificial intelligence|AI's]], so obtaining access or information from them may be more like social engineering than actual "hacking".  For example, the computer system of [[Cloud City]], knowing that the city administrator [[Lando Calrissian]] was attempting to escape on the ''[[Millennium Falcon]]'', '''volunteered''' information about the state of the ship's [[hyperdrive]] to R2-D2<ref>''[[Star Wars: The Empire Strikes Back]]''</ref>.
 
The nature of Star Wars computer networks may also change the nature of computer "hacking".  Like droids, central computers seem to be [[artificial intelligence|AI's]], so obtaining access or information from them may be more like social engineering than actual "hacking".  For example, the computer system of [[Cloud City]], knowing that the city administrator [[Lando Calrissian]] was attempting to escape on the ''[[Millennium Falcon]]'', '''volunteered''' information about the state of the ship's [[hyperdrive]] to R2-D2<ref>''[[Star Wars: The Empire Strikes Back]]''</ref>.

Revision as of 04:40, 21 February 2013

Personal tools