Information security

From ImperialWiki
Jump to: navigation, search
(Information security in ''Star Wars'')
m (Information security in ''Star Wars'')
Line 38: Line 38:
 
It may be worth noting that R2-D2 has been allowed to operate for decades without a memory erasure.  This may have allowed the droid to accumulate an exceptionally large store of cracking tools and techniques, something that his various owners ([[Padmé Amidala]], [[Anakin Skywalker]], [[Bail Organa]], [[Leia Organa]], and [[Luke Skywalker]]) have probably encouraged.
 
It may be worth noting that R2-D2 has been allowed to operate for decades without a memory erasure.  This may have allowed the droid to accumulate an exceptionally large store of cracking tools and techniques, something that his various owners ([[Padmé Amidala]], [[Anakin Skywalker]], [[Bail Organa]], [[Leia Organa]], and [[Luke Skywalker]]) have probably encouraged.
  
However, some of R2-D2's computer "hacks" may not be indications of poor security measures.  Shutting down dangerous machinery, like garbage compactors and droid assembly lines<ref>''[[Star Wars: Attack of the Clones]]''</ref>, might have minimal authorization requirements by design, allowing any worker to shut down the system in the event of a safety issue.  Also, it is fairly conclusive that [[Darth Vader]] wanted [[Leia]] to be rescued in order to learn the location of the rebel base. As such, much of the information R2 obtained from the Death Star computer may have been deliberately left unprotected for him to discover with relative ease.
+
However, some of R2-D2's computer "hacks" may not be indications of poor security measures.  Shutting down dangerous machinery, like garbage compactors and droid assembly lines<ref>''[[Star Wars: Attack of the Clones]]''</ref>, might have minimal authorization requirements by design, allowing any worker to shut down the system in the event of a safety issue.  Also, it is fairly conclusive that [[Darth Vader]] wanted Leia to be rescued in order to learn the location of the rebel base. As such, much of the information R2 obtained from the Death Star computer may have been deliberately left unprotected for him to discover with relative ease.
  
 
The nature of Star Wars computer networks may also change the nature of computer "hacking".  Central computers, like droids, seem to be [[artificial intelligence|AI's]], so obtaining access or information from them may be more like social engineering than actual "hacking".  The computer system of [[Cloud City]], for example, '''volunteered''' information about the state of the [[Millennium Falcon|Millennium Falcon's]] [[hyperdrive]] to R2-D2<ref>''[[Star Wars: The Empire Strikes Back]]''</ref>.
 
The nature of Star Wars computer networks may also change the nature of computer "hacking".  Central computers, like droids, seem to be [[artificial intelligence|AI's]], so obtaining access or information from them may be more like social engineering than actual "hacking".  The computer system of [[Cloud City]], for example, '''volunteered''' information about the state of the [[Millennium Falcon|Millennium Falcon's]] [[hyperdrive]] to R2-D2<ref>''[[Star Wars: The Empire Strikes Back]]''</ref>.

Revision as of 08:37, 14 June 2008


Personal tools