Blog da Zscaler

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Products & Solutions

Rogue One: A Star Wars Story

image
NICK KAEL
December 21, 2016 - 2 Min. de leitura

As I sat through the premiere of “Rogue One: A Star Wars Story” this past weekend, I couldn’t help but relate it back to a familiar tale that consistently comes up in IT security. The similarities were striking as I watched the story unfold. (Warning: spoiler ahead.)

The story opens, as it always does, in a galaxy far, far away. We learn that the plans for the Death Star reveal hidden vulnerabilities in its design that the Rebel Alliance may be able to exploit. To succeed, however, the Rebels would need to steal the plans and would use tactics like social engineering as a way to locate and exploit the weakest link in the Imperial defense. Turns out this weak link took the form of a security breach from a user. Starting to sound familiar?

Once inside, the Rebels set up diversions for the Imperial forces, so they could try to locate the plans in the Imperial data storage. They were in luck. Because the data wasn’t encrypted, they could easily identify the plain text files in which they’d find not only the plans, but also the crown jewel: the vulnerability that could destroy the Death Star.

As part of their strategy, the Rebels sought the assistance of two malicious insiders, a pilot and K-2SO, an Imperial security droid that had been reprogrammed and was now loyal to the Alliance. Once the Rebels got the data, they faced another major hurdle: exfiltration. In order to get the files out, they needed to take down the Imperial shield. They threw everything they had at it, bringing the shield to its knees like a massive DDoS attack. Success.

There’s been a lot of debate over the moral of “Rogue One: A Star Wars Story.” Redemption, sacrifice, and looking outside oneself for purpose are a few. The film has even sparked some controversy as filmmakers and political extremists argued whether or not the story had political undertones. (Obviously.) But from my standpoint, the moral we can all take away from “Rogue One” is as follows: Don’t become the weakest link in your network by falling victim to social engineering or bypassing security controls, and do invest in sandbox technology that will prevent infected files from being downloaded; do protect your data with robust encryption and the use of data loss prevention; and always be sure to use the Force.

 

Read how Zscaler Cloud Sandbox blocks malware and prevents C&C calls

Read how Zscaler Data Loss Prevention prevents data exfiltration

form submtited
Obrigado por ler

Esta postagem foi útil??

Aviso legal: este post no blog foi criado pela Zscaler apenas para fins informativos e é fornecido "no estado em que se encontra", sem quaisquer garantias de exatidão, integridade ou confiabilidade. A Zscaler não se responsabiliza por quaisquer erros, omissões ou por quaisquer ações tomadas com base nas informações fornecidas. Quaisquer sites ou recursos de terceiros vinculados neste post são fornecidos apenas para sua conveniência, e a Zscaler não se responsabiliza por seu conteúdo ou práticas. Todo o conteúdo está sujeito a alterações sem aviso prévio. Ao acessar este blog, você concorda com estes termos e reconhece que é de sua exclusiva responsabilidade verificar e utilizar as informações conforme apropriado para suas necessidades.

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Ao enviar o formulário, você concorda com nossa política de privacidade.