aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • Data

Protect Your Data With These 4 Tips From ‘Star Wars’

  • root
  • December 18, 2019
  • 2 minute read

According to a cybersecurity expert, there are real-life lessons to learn from Empire’s downfall.

Hsinchun Chen, professor of management information systems at the University of Arizona, has spent 27 years researching cyber security and leads a project called “Hacker Web” to explore international hacker communities, including those in Russia, China, and the United States.


Partner with aster.cloud
for your next big idea.
Let us know here.


cyberpogo

Chen says the theft of architectural plans isn’t just the stuff of fiction and, in fact, “probably the most obvious case for why countries hack each other is intellectual property, or IP. Deliberately stealing information about your drawings or your engineering designs or your scientific instruments, that’s all intellectual property.”

In government, he adds, this kind of theft is virtually inevitable.

“There are only two types of organizations: Those who have lost their data and know it, and those who have lost their data but don’t know it,” Chen says.

While we don’t yet know how the Rebel Alliance managed to succeed, Chen knows exactly what he would have told the Empire to avoid theft of its IP.

1. You’re only as strong as your weakest link.

Within companies, governments, and universities, all it takes is one person to allow a breach. “In a big organization with thousands of employees or more, like a government, you will be breached, and you’re only as strong as your weakest link,” Chen says.

How could the Empire rid itself of weak links? “Education and rigorous information assurance practices help,” Chen says.

2. Know their strengths—and your weaknesses.

“Unfortunately, the adversaries are getting more sophisticated and more interconnected—they’re always exchanging information,” Chen says. “You have to be very diligent in collecting information about your vulnerabilities and your adversaries.”

Read More  Identity & Access Management: Authentication With Cloud Identity

The Empire should have invested a significant amount of time, money, and effort to understand its enemy’s strengths and its own weaknesses.

3. Protect what matters most.

The Empire may have had masses of data, but not all data is created equal. Chen believes that dedicating your best security resources to your most valuable data—such as the plans for the Death Star—is paramount. “Protect your most important, critical assets,” he says.

4. Don’t just defend, prevent.

“Cybersecurity has changed from a very defensive mentality to a more holistic and more preventative mentality,” Chen says.

While the Empire ends up fighting to protect the Death Star (and losing), Chen recommends taking stronger preventative security measures from the start.

 

Source: University of Arizona 

Emily Litvack

This post originally appeared in Futurity.


Our humans need coffee too! Your support is highly appreciated, thank you!

root

Related Topics
  • Hacking
  • Internet
  • Security
You May Also Like
View Post
  • Architecture
  • Data
  • Engineering
  • People
  • Programming
  • Software Engineering
  • Technology

Predictions: Top 25 Careers Likely In High Demand In The Future

  • June 6, 2023
View Post
  • Automation
  • Computing
  • Data

IBM To Help Automate Cloud Data Protection With Acquisition Of Polar Security

  • May 25, 2023
View Post
  • Data
  • Public Cloud

Cloud Data Loss Prevention’s Sensitive Data Intelligence Service Is Now Available In Security Command Center

  • May 18, 2023
View Post
  • Data
  • Platforms
  • Technology

Cloudflare’s R2 Is The Infrastructure Powering Leading AI Companies

  • May 16, 2023
View Post
  • Computing
  • Data
  • Programming
  • Software
  • Software Engineering

The Top 10 Data Interchange Or Data Exchange Format Used Today

  • May 11, 2023
View Post
  • Data
  • Public Cloud

Using Cloud Spanner To Handle High Throughput Writes

  • May 8, 2023
View Post
  • Computing
  • Data
  • Design

How To Get Started With Event-Driven Microservices

  • May 3, 2023
View Post
  • Data
  • Solutions
  • Technology
  • Tools

Announcing Project Health Insights Preview: Advancing AI For Health Data

  • April 28, 2023

Stay Connected!
LATEST
  • 1
    Predictions: Top 25 Careers Likely In High Demand In The Future
    • June 6, 2023
  • 2
    A S.W.O.T. Analysis Of Current A.I. Systems
    • June 6, 2023
  • Apple-WWCD23-Vision-Pro-glass-230605 3
    Introducing Apple Vision Pro: Apple’s first spatial compute
    • June 5, 2023
  • 4
    Apple Unveils New Mac Studio And Brings Apple Silicon To Mac Pro
    • June 5, 2023
  • 5
    Apple Introduces M2 Ultra
    • June 5, 2023
  • 6
    tvOS 17 Brings FaceTime And Video Conferencing To The Biggest Screen In The Home
    • June 5, 2023
  • 7
    Apple Introduces The 15‑Inch MacBook Air
    • June 5, 2023
  • 8
    Building A Kubernetes Platform: How And Why To Apply Governance And Policy
    • June 4, 2023
  • 9
    Leave, This “United” “Kingdom”, This “Great” “Britain”
    • June 4, 2023
  • 10
    Amazing Federated Multicloud Apps
    • June 2, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Huawei ICT Competition 2022-2023 Global Final Held In Shenzhen — 146 Teams From 36 Countries And Regions Win Awards
    • May 27, 2023
  • 2
    Huawei OceanStor Pacific Scale-Out Storage Tops IO500 Rankings
    • May 26, 2023
  • 3
    What’s The Future Of DevOps? You Tell Us. Take The 2023 Accelerate State Of DevOps Survey
    • June 2, 2023
  • 4
    Resolving Deployment Issues With Ts-node And Azure Development Pipelines
    • June 1, 2023
  • 5
    MongoDB And Alibaba Cloud Extend Global Partnership
    • May 25, 2023
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.