Most likely a verson of the above has been written for every heist movie. They’ll take the data and auction it to the highest bidder and leave destroying the Death Star to Luke Skywalker. Save the Galaxy - Unfortunately most hackers are about money, not saving the galaxy. In tech jargon “ exfiltrate it from the data center”.Ĥ. The final step for a hacker is uploading the data. Upload Deathstar Plans - Just like in the movie, where making the upload is the ultimate goal, hackers get value from data only if they can steal it. In the real world, it’s often passwords, emails, or documents.ģ. They need to get data to make their efforts pay off. Find Deathstar Plans - After hackers establish a digital beachhead they search for valuable data. In the real world this is taking control of a first machine within a target network, while in Rogue One it’s full on Special Forces style physical assault.Ģ. More importantly, getting inside a targets computer system is always Step 1 for a hacker. It means, if a hacker can physically access a device (say a hard drive or iPhone) it’s just a mater of time before a hacker can access the emails and documents store on that device (see Exhibit A: San Bernadino iPhone). Physical Invasion - “Physical Access is Access” is an oft quoted security dictum. While fanciful in many respects the core ideas of a hack are all here:ġ. Rogue One is like a cartoon version of how the US Government had it’s personnel data stolen (for details see The Breach by Wired Magazine).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |