Without Forced Entry / Road to Cyber-Safety / Password Privacy / The Weakest Link / Free Beer / Our Little Secret / The Fire-hole
Phishing through the window/Fasten seatbelt before driving information highways/Password privacy threats made intuitive/How strong the chain
Sketch 1 (1,500 characters)
Better not google "phishing statistics", numbers are crazy. As a matter of fact, although I consider myself far more informed than the average about cybersecurity, phishing attempts are becoming so sophisticated that no later than three days ago I found myself just about to click negligently on a forged Facebook email.
You are protected by your firewall. Or is it a "fire-hole" ? (This is obviously a 5 minutes draft.) The idea behind this sketch is that one should never blindly trust one's security protections, as with any (including real life) security issue, vigilance is the key.
The "fire-hole" idea could be made a series. Here a locked fridge from which hangs a microphone, and a mobile phone displaying a safe but leaking a coin.
This sketch was inspired by Sketch 2 of Barry Stacks' "Digital Fingerprint Mouse" application. The idea behind is that if you don't take appropriate precautions, your little secrets might not be *that* secret. This is a very quick sketch, it would need more thinking about the routes and how to highlight the data leak cause. Maybe it can be made a series with different countries, different data types (e.g. credit card number), different kind of leaks (phishing, virus, server infection…).
This sketch needs more people to make it alive… Anyway, this is a construction on the "if it's free, then you're the product" adage. People baited with free beer are encouraged to throw their data.
See sketch description.
Very quick proof of concept of the mask disambiguation : one of the evil character is seen from the back, so that it appears obvious he's wearing a mask. I would use a different mask though. He could also have a tatoo or another distinctive sign asserting his black hat nature. I would add volume to the characters, and obviously fix the flawed perspective.
Only three characters are depicted here but eventually a whole cybersecurity chain may be represented. Crocodiles/sharks/piranhas could be waiting for the Data to fall. Data as a baby because it cannot be held responsible of itself, and for the sake of asserting its preciousness. To illustrate the numerous dangerous online temptations, the User is facing a Facebook "Like" button — clicking on it would break the chain. This is a draft, forgive the offense to Newton's law of gravitation. ;)
Most people are modest when it comes to nudity, yet an insane amount of passwords are so easy to guess they hide nothing of their privacy. The reason for this is likely ignorance, and a visual metaphor may help educate people about password security and privacy. The concept can be extended to a series of different activities, people or fields of cybersecurity (e.g. encryption as suggested by Ben Banks). Original photo : https://commons.wikimedia.org/wiki/File:Danrocha.jpg
It's easy to lock a physical door, and not everyday will offenders disguised as policemen knock on it. But things are different on the Internet : one may get forged emails several times a day, and our vigilance is more easily overstepped, especially for laymen. The thieves may not come from where they are expected to…
The idea of this sketch is to put the light on phishing, hence the Facebook- and Paypal-masked characters (not sure the latter is recognizable enough, and it has to be clear that these are masked thieves and not the legit service). However it will work for other fields of cybersecurity, and I think it works even without any figures.
The obvious analogy with the name of a famous OS is unintended — though maybe they deserve it…
The two other pictures are unrelated ideas, merged into this application for the sake of single application. See "inspiration" link below for comments about "Password Security".
Sketch 2 (1,500 characters)
The second sketch is to be considered as my lead application. This is my favorite because it tries to take a positive point of view. I was thinking about how most contributions to this challenge (mine included) are conveying anxiety rather than improving the internet users self-confidence about security. People are used to road safety rules, like fasten one's seatbelt or wearing a helmet for bikers. In a way surfing on the Internet can be compared to longboarding a road : the less protections you use, the more severe you risk to be hurt.
Assigning a cybersecurity mean to each body protection on a photograph makes the analogy quite relatable for people (it's easier to use the longboard analogy rather than a car because many visible protections are available) : the road is the Internet, the longboard is the surfing device (be it a computer, a mobile or whatever), the most important security device is your vigilance on what you are actually seeing, the most important protections are a helmet and strong passwords, other important protections include firewall, antivirus, encryption, security updates…
I inverted colors of the picture to give it a "virtual reality" atmosphere. I think a TRON-like visual style may be appropriate for a definitive picture. Words would be shaped into actual protections, not just put over it.
Original photograph credits : Thayne Tuason, CC-BY-SA (https://commons.wikimedia.org/wiki/File:Maryhill_Fall_Freeride_2012-_cowzers_2.jpg
Very quick attempt to show how protections would look like (calligrams). The chin-guard is off (BTW it might be clearer if the chin-guard had another word ? the "vigilance" kind of breaks the legibility) and I took random colors (I'm not very intuitive with colors, I always needs a lot of fiddling) but you get the idea.
What have you learned through this sketching process? (1,000 characters)
Indeed I was sadly impressed by the volume of successful phishing attempts (according to public statistics and estimates).
Tell us more about you. (1,000 characters)
I am a former physicist (still am deep down), an entrepreneur, a children book editor, an art gallerist, a freelance developer, a sysadmin, a (harmless) hacker, and shortly a junior freelance data scientist, with an interest for visual creation and experience in vector graphics and photo manipulation.
Why are you participating in this Challenge? (750 characters)
Having a natural interest in cybersecurity topics and actually being a low level hacker myself (say just above the script kiddies…) I often find myself lamenting both on the boring and anxiety-provoking imagery and on the ignorance and misconceptions of the public.
Unfortunately, I don't think any of my current websites are relevant to this application.
What is your experience with the field of cybersecurity?
I have minimal experience and/or knowledge in the cybersecurity field.
How did you hear about this OpenIDEO Challenge?
Location: State / District