So Long And Thanks For All The Phishing
The false sense of security in the argument that one would never be a target is just the result of a lack of security awareness education.
Sketch 1 (1,500 characters)


What have you learned through this sketching process? (1,000 characters)
The ease with which references can be made to such abstract concepts as cybersecurity by representing it through scenes of everyday life where your physical or emotional security could be threatened.Tell us more about you. (1,000 characters)
I am a web designer and brand strategist with more than 8 years of experience in the sector. I am dedicated to creating conceptual worlds for my clients through the use of metaphors and visual allegories, thus creating strong, recognizable brands that connect with their audience.Why are you participating in this Challenge? (750 characters)
To help lay new foundations of visual representation of asbestos concepts such as the digital world, making it simple and easy to consume for users.Website(s)
I helped with the design and ideation of the cybersecurity visuals at www.essendis.comWhat is your experience with the field of cybersecurity?
- I have considerable experience and/or knowledge in the cybersecurity field.
What best describes you?
- I’m a professional visual creator freelancer.
How did you hear about this OpenIDEO Challenge?
- In the news
Location: City
DoralLocation: State / District
FloridaLocation: Country
- United States of America
What opportunity areas are you covering with this final portfolio? (250 characters)
Hackers and Hacking, and a wildcard* Security awareness: How to apply logical security in your personal and work environment.Final Portfolio (1,500 characters)





How would you summarize your final portfolio in 100 words or less? (650 characters)
Studying the concepts of hacking and the reasons behind it. I realized that there are obvious similarities in the behaviors, abilities and characteristics of the predators and prey of the animal kingdom, with respect to their human counterparts, hackers and victims. However, as in nature, we can evolve the handling of tools and the adoption of tools and behaviors to present better defenses against possible digital attacks.Briefly describe your imagined use case for the work in your portfolio. (250 characters)
A high profile journalist is writing a series about security awareness. For each case her illustrator artist made a cover illustration for both print and web, using as reference animal scenes analogous to the technical features of the attack.What was the most useful feedback that you received? (1,000 characters)
It was at the mentorship call, where the mentor introduced me to the concept of attack vectors. About how hackers don't target specific targets, but try to attack or access a broad base of people, waiting for some to fall. This helped me adjust the technical aspect of my illustrations and even inspired the natural approach to which the illustrations were derived.How have your concepts evolved since the Ideas Phase? (1,000 characters)
At the beginning of the challenge, my concept was the lack of Security awareness as a problem when it comes to navigating the digital world. After an arduous work of refinement together with my mentor and the community, my concept evolved towards basic concepts of Security awareness seen from a natural analog approach, where predator and prey have evolved to develop or defend themselves from attack vectors. The idea is to empower the audience by exposing them to useful and concrete security concepts, while showing them ways to minimize the risks of exposing themselves to a security breach.How have you been able to incorporate technical accuracy into your concepts? (1000 characters)
By including concepts such as multiple attackers, multiple vectors and multiple targets, it was easy to relate this to herds and groups interacting with each other through vectors of attack and defense.How do your concepts expand the conversation on cybersecurity? (1000 characters)
By showing empowered users through a cross-cultural reference, we can begin to educate audiences on the practice of cybersecurity as something positive and normal in a society. Like customs or memes that can be transmitted from generation to generation as part of the cultural baggage. There are also issues about how the digital environment is a living environment, and just as the arms race of the natural world has evolved its attack vectors and defenses, it is natural in the digital world that methods of attack and defense evolve organically, analogous to the natural evolution of species.If you were provided with additional time and resources, are there additional ways that you’d wish to reimagine the visual language of cybersecurity? (1,000 characters)
I would like to create a series of signage symbols representing the cybersecurity issues and safety measures through print or digital media, embedding them into the collective imaginary, transcending us as individuals and society in time. (e.g. icons of nuclear or biological risk).What resources did you find most helpful? (optional, 1,000 characters)
The call with the cybersecurity mentor, the link to O'Reilly's animal covers and definitely the declassified NSA Cold War information security posters.Commitment to Creative Commons License (CC BY 4.0)
- Yes, I ensure that my portfolio is in compliance with CC BY 4.0.
31 comments
Join the conversation:
Commenthetoni7270 hetoni7270