Information security

From ImperialWiki
Jump to: navigation, search
(Information security in Star Wars)
m (Information security in Star Wars)
Line 37: Line 37:
 
*Similarly, R2-D2 was able to determine that [[Leia Organa]] was a prisoner on the station and where she was being held, but he could not locate an exit from her cell block other than the main entrance, and he admitted that much of the information he sought was restricted.<ref>''[[Star Wars: A New Hope]]''</ref>
 
*Similarly, R2-D2 was able to determine that [[Leia Organa]] was a prisoner on the station and where she was being held, but he could not locate an exit from her cell block other than the main entrance, and he admitted that much of the information he sought was restricted.<ref>''[[Star Wars: A New Hope]]''</ref>
  
Taken together, these incidents indicate that Imperial networks have "guest" accounts that provide unnecessary access to some systems, and a proficient hacker can exploit these accounts. It also suggests that some confidential information is handled carelessly, indicating poor enforcement of security procedures.  Some of that information, such as a prisoner register showing Leia arriving on board the Death Star, could have been logged by that control room resulting in R2 doing further searches in order to locate her cell.
+
Taken together, these incidents indicate that Imperial networks have "guest" accounts that provide unnecessary access to some systems, and a proficient hacker can exploit these accounts. It also suggests that some confidential information is handled carelessly, indicating poor enforcement of security procedures.  Some of that information, such as a prisoner register showing Leia arriving on board the Death Star, could have been logged by that control room, resulting in R2 doing further searches in order to locate her cell.
  
 
R2-D2's interface equipment resembles the end of the Imperial Code cylinders, hinting that his hacking process may involve mimicking the information on one of those devices, which he could have obtained by reading a cylinder from one of the dead officers in the hangar control room.  It may not be his only way of gaining access, but it does help explain how he could get into some systems but not others. If access was tightened after the station was alerted, the level he'd already gained might be insufficient for further hacking.  This would also explain why moving to a different access point didn't hamper his efforts.
 
R2-D2's interface equipment resembles the end of the Imperial Code cylinders, hinting that his hacking process may involve mimicking the information on one of those devices, which he could have obtained by reading a cylinder from one of the dead officers in the hangar control room.  It may not be his only way of gaining access, but it does help explain how he could get into some systems but not others. If access was tightened after the station was alerted, the level he'd already gained might be insufficient for further hacking.  This would also explain why moving to a different access point didn't hamper his efforts.

Revision as of 15:30, 28 February 2013

Personal tools