OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

Aspects of cyber conflicts

Cyber conflicts can break the real world.

Photo of Linda Graf
5 1

Written by

Sketch 1 (1,500 characters)

I would like to show with this concept how an important system in the medical field is affected by a conflict. The structure of the system is broken. There are mistakes and the system can not work in the necessary and correct way. Equipment, the staff, medicines, all things can be affected by the conflict. In the next step, I want to create a poster with several images in the manner shown.

Sketch 2 (1,500 characters)

With this sketch I would like to illustrate how a cyber conflict can damage or stop the energy supply of a country by an attack. I want to portray the attack with a kind of lasso. This contains binary code. This way, I want to visualize the malicious code, regardless of a specific programming language. In the next step I will work out the graphics of the sketch with Illustrator and Photoshop.

What have you learned through this sketching process? (1,000 characters)

I realized that you have to try to achieve the best possible balance between imagery and technical language. I do not want to overwhelm or underline the viewer.

Tell us more about you. (1,000 characters)

I am a Freelance Graphic Designer from Bremen in Germany. At the moment I am training for the profession of IT specialist and have sometimes come into contact with cybersecurity. However, I have no in-depth knowledge in cybersecurity.

Why are you participating in this Challenge? (750 characters)

I find the combination of technology and design very exciting.

What is your experience with the field of cybersecurity?

  • I have minimal experience and/or knowledge in the cybersecurity field.

What best describes you?

  • I’m a professional visual creator freelancer.

How did you hear about this OpenIDEO Challenge?

  • Someone in my network (word of mouth)

Location: City


Location: State / District


Location: Country

  • Germany

What opportunity areas are you covering with this final portfolio? (250 characters)

I think that my graphics cover the opportunity areas "Cyber Conflict" and "Hackers and Hacking".

Final Portfolio (1,500 characters)

Briefly describe your imagined use case for the work in your portfolio. (250 characters)

I think you can use the graphics to inform people about Cyber Conflicts. You could use them in an information brochure. The illustrations with the nuclear power plant could well be used to inform young people.

Commitment to Creative Commons License (CC BY 4.0)

  • Yes, I ensure that my portfolio is in compliance with CC BY 4.0.


Join the conversation:

Photo of Dima Boulad

I'm so glad to see the progress of this idea and the sketches into your final portfolio Linda Graf  .As the review team is going through all submissions, I would like to take this chance to thank you for your participation in this Challenge and your dedication to this important and complex topic. Watch this space as we announce the top picks!

Photo of Mai Arollado

Hi Linda,

Great job! i love the deconstructivism look of it that turn out to be like a corrupt file. it almost looks like a painting. I would just want to see if how can you incorporate visual language to the drawing that can connect with cyber security so that the viewer can easily catch it in one glance.

Great job Linda! looking forward to your finish drawing.

Best regards,Mai

Photo of mariah jochai

Hey Linda!
Awesome job on round 1. I like how, in your first sketch, you took what I'm assuming was a stock image and put it through a sort of filter to create something entirely different. I could see creating a whole library of images that are "corrupted" in this way to communicate the disruption caused by cyber conflict. I could see even using photos representing many other industries, banking, farming, factory production, etc. Nice job!

Photo of Dima Boulad

Welcome to the challenge Linda Graf , and thank you for your contribution! I really like the detailing of the second sketch. How would you consider pushing your sketch further? Which technique would you use? We've had a large number of very interesting submissions so far and we will be going through them one by one in the Review phase. In the meantime, we invite you to browse other submissions and join the conversation around cybersecurity on the platform!

Photo of Linda Graf

Thank you for your welcome and the questions about my second sketch.

I would like to create the second sketch as a realistic illustration in the form of a digital painting. I want the viewer to see the nuclear power plant in the scene in a classic or analogue look. As a contrast and eye-catcher, I would like to integrate the lasso with the binary code into the scene. My intention is to visualize a contrast of realistic illustration of the analog world and an attack with modern means of the digital world.