aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Data

Protect Your Data With These 4 Tips From ‘Star Wars’

  • root
  • December 18, 2019
  • 2 minute read

According to a cybersecurity expert, there are real-life lessons to learn from Empire’s downfall.

Hsinchun Chen, professor of management information systems at the University of Arizona, has spent 27 years researching cyber security and leads a project called “Hacker Web” to explore international hacker communities, including those in Russia, China, and the United States.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Chen says the theft of architectural plans isn’t just the stuff of fiction and, in fact, “probably the most obvious case for why countries hack each other is intellectual property, or IP. Deliberately stealing information about your drawings or your engineering designs or your scientific instruments, that’s all intellectual property.”

In government, he adds, this kind of theft is virtually inevitable.

“There are only two types of organizations: Those who have lost their data and know it, and those who have lost their data but don’t know it,” Chen says.

While we don’t yet know how the Rebel Alliance managed to succeed, Chen knows exactly what he would have told the Empire to avoid theft of its IP.

1. You’re only as strong as your weakest link.

Within companies, governments, and universities, all it takes is one person to allow a breach. “In a big organization with thousands of employees or more, like a government, you will be breached, and you’re only as strong as your weakest link,” Chen says.

How could the Empire rid itself of weak links? “Education and rigorous information assurance practices help,” Chen says.

2. Know their strengths—and your weaknesses.

“Unfortunately, the adversaries are getting more sophisticated and more interconnected—they’re always exchanging information,” Chen says. “You have to be very diligent in collecting information about your vulnerabilities and your adversaries.”

Read More  Building Out Your Support Insights Pipeline

The Empire should have invested a significant amount of time, money, and effort to understand its enemy’s strengths and its own weaknesses.

3. Protect what matters most.

The Empire may have had masses of data, but not all data is created equal. Chen believes that dedicating your best security resources to your most valuable data—such as the plans for the Death Star—is paramount. “Protect your most important, critical assets,” he says.

4. Don’t just defend, prevent.

“Cybersecurity has changed from a very defensive mentality to a more holistic and more preventative mentality,” Chen says.

While the Empire ends up fighting to protect the Death Star (and losing), Chen recommends taking stronger preventative security measures from the start.

 

Source: University of Arizona 

Emily Litvack

This post originally appeared in Futurity.


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

root

Related Topics
  • Hacking
  • Internet
  • Security
You May Also Like
View Post
  • Data
  • Multi-Cloud
  • Platforms

Microsoft And Oracle Expand Partnership To Deliver Oracle Database Services On Oracle Cloud Infrastructure In Microsoft Azure

  • September 14, 2023
View Post
  • Data
  • Learning

Resources to Take Your Charts From Bland to Beautiful

  • September 6, 2023
View Post
  • Data
  • Platforms
  • Technology

Reimagine Data Analytics For The Era Of AI

  • August 30, 2023
View Post
  • Data
  • Platforms

IBM Introduces ‘Watsonx Your Business’

  • August 28, 2023
View Post
  • Data
  • Research
  • Technology

Using Machine Learning To Help ZSL & Network Rail Monitor And Improve Biodiversity Near British Railways

  • August 20, 2023
Redis logo
View Post
  • Data
  • Platforms
  • Software Engineering

Redis 7.2 Sets New Standard For Developers To Harness The Power Of Real-Time Data

  • August 15, 2023
View Post
  • Data
  • Technology

IBM And The USTA Add Generative AI Commentary And AI Draw Analysis To The 2023 US Open Digital Platforms

  • August 15, 2023
View Post
  • Computing
  • Data
  • Platforms

Microsoft Azure Meets Growing Needs Of Healthcare Organizations, Such As Mount Sinai Health System, With A Highly Scalable Public Cloud For Epic

  • August 10, 2023

Stay Connected!
LATEST
  • 1
    Combining AI With A Trusted Data Approach On IBM Power To Fuel Business Outcomes
    • September 21, 2023
  • 2
    Start Your Ubuntu Confidential VM With Intel® TDX On Google Cloud
    • September 20, 2023
  • Microsoft and Adobe 3
    Microsoft And Adobe Partner To Deliver Cost Savings And Business Benefits
    • September 20, 2023
  • 4
    Huawei Connect 2023: Accelerating Intelligence For Shared Success
    • September 20, 2023
  • 5
    Huawei Releases Data Center 2030, Leading Innovation and Development of New Data Centers
    • September 20, 2023
  • Penguin 6
    How To Find And Fix Broken Packages On Linux
    • September 19, 2023
  • Volkswagen 7
    Volkswagen Races Toward Next-Gen Automotive Manufacturing Leadership With Google Cloud And T-Systems
    • September 19, 2023
  • 8
    VMware Scales Multi-Cloud Security With Workforce Identity Federation
    • September 18, 2023
  • Intel Innovation 9
    Intel Innovation 2023
    • September 15, 2023
  • Private 10
    A Comeback For Private Clouds
    • September 14, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Microsoft And Oracle Expand Partnership To Deliver Oracle Database Services On Oracle Cloud Infrastructure In Microsoft Azure
    • September 14, 2023
  • 2
    Real-Time Ubuntu Is Now Available In AWS Marketplace
    • September 12, 2023
  • 3
    IBM Brings Watsonx To ESPN Fantasy Football With New Waiver Grades And Trade Grades
    • September 13, 2023
  • 4
    NASA Shares Unidentified Anomalous Phenomena Independent Study Report
    • September 14, 2023
  • 5
    Introducing OpenAI Dublin
    • September 14, 2023
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.