Control your personal data stream (cybersecurity awareness)
Protect yourself, rise walls, close doors and keep control over your personal data stream. Always keep cybersecurity in mind.
Sketch 1 (1,500 characters)
As a dam takes control of a river it is a good metaphor for taking control of your personal data stream. Dams stop rivers from flooding valleys with dangerous amounts of water. They only let through as much as is useful for the associated human-built ecosystem. The same applies to the digital dam in this illustration. It ensures that your device will not be flooded with malware, spyware and other malicious codes from connected networks and let only the requested harmless code get to your device. The idea is to create an visually appealing illustration that is not directly related to cybersecurity at the first sight but in fact has a cybersecurity background. People should identify with this illustration and in best case use it as background image to always keep in mind ‘be like this dam, do not just let everything go through. Make yourself save from massive amounts of malicious code in the world wide web. Do not simply just download or accept anything and make sure you let only get to your device what is really useful.' The image is square, making it the best wallpaper for mobile devices as well as desktops.
Sketch 2 (1,500 characters)
This visual design concept works as an awareness game for cybersecurity. The goal is to build a strong computer system to mine money to build an even more strong computer system to mine even more money. But the stronger the computer becomes, the more attacks will occur. Therefore, players must invest money in security components such as upgrading the antivirus system or setting up firewalls (as seen in games like The Settlers or Clash of Clans where players build up a middle age village and make it safe from invaders). With the antivirus system players can send out security guards that fight invaders or find hidden viruses. With the max level antivirus system you can eliminate them with a laser. During the game the player resives emails into the ingame inbox. For example, a message telling you can get a free system boost making you mine twice as fast for the next hour. In this situation, the player has to decide whether it is a real email or a phishing mail. Players can detect fake mails in several ways. For example a generated sender adress 'email@example.com'. If the player accepts a fake boost, viruses invade the system, forcing the player to send out security guards to fight them. The game is over when invaders destroy the processoring unit or all mining hardware if no money is left to buy new ones. The value of this game is not to explain cybersecurity in a technical correct way, it's turning players into cybersecurity fans to make them more aware in their daily life.
Low level player has a weak defense and gets attacked. Email in inbox. Mined money is ready to collect.
High level player got firewalls, an max level antivirus system and a strong CPU.
What have you learned through this sketching process? (1,000 characters)
I've trained myself in finding creative and abstract metaphors for technical concepts.
Tell us more about you. (1,000 characters)
When i finished my apprenticeship in graphic design 2015, I started studying media publishing and design in digital media, which is a combination of design, informatics and marketing/economics. I will hold my bachelor degree in less than 2 Months. Since 3 years I'm also part of the Fraunhofer Institute for Secure Information Technologie (https://www.sit.fraunhofer.de/en/) as a working design student.
Teaching the design thinking process
Why are you participating in this Challenge? (750 characters)
Since visualizing cybersecurity topics is my daily business at the Fraunhofer Institute for secure Information Technologie (SIT) I know very well about the struggle of all this generic symbols like shields, locks and binary code. We designers at Fraunhofer SIT always work on finding new individual and specific visualizations for our cybersecurity projects.
I share the idea of how important it is to spread awareness for cybersecurity and really like how this award focuses on the designers role in this process.
Website: Under construction so please just ignore the blog section and incomplete parts. Also currently only in german but the 'Portfolio' sections gives some good insight into my work.
http://elioreichert.de | Linkedin (english): https://www.linkedin.com/in/elioreichert/
What is your experience with the field of cybersecurity?
I have minimal experience and/or knowledge in the cybersecurity field.
What best describes you?
I’m a professional visual creator affiliated with an organization.
How did you hear about this OpenIDEO Challenge?
Someone in my network (word of mouth)
Location: State / District
What opportunity areas are you covering with this final portfolio? (250 characters)
Trustworthiness – (Phishing) | Hackers and Hacking – (Unsafe Password Managers) |Digital Privacy + Encription – (Unsafe Password Managers) | Wildcard – (Cybersecurity Awareness: Game) | Wildcard – (Hardware/Software Security: Digital Dam)
Final Portfolio (1,500 characters)
For general informations about the dam and the awareness game look at the sketch 1 and sketch 2 section. New on the dam: Now filtering not only in a quantitatively way anymore but also in a qualitatively way, so now the dam is really taking control of a users data stream. New on the awareness game: Attackers are now red for better recognition. Also I took a photograph and made a digital composition of a girl playing the game to keep humans in focus as the user is often called the most important part in cybersecurity. One composition looks like a regular photograph to set the focus on the game. The other one makes use of graphical elements to show the gamers focus and concentrations and visualize the learning effect. An other composition was made to visualize the danger of phishing since is one of the most common cyberattacks. A fisherman is coming out of the mail program to phish some login informations, but as you can see in the reflection of the glasses the girl can't see the fisherman, she gets tricked because she only sees a regular trustworthy looking email.
1. The danger of phishing mails.
2.1 Digital dam to take control of your personal data stream (high resolution)
2.2 Digital dam (animated)
3. Visualizing the issue of unsafe password managers.
4.1 Cybersecurity awareness game: Low level player has a weak defense and gets attacked.
4.2 High level player got firewalls, a max level antivirus system and a strong CPU.
4.3 Cybersecurity awareness game is played by a girl to keep humans in focus. Focus within this image is on the game an the gamer.
4.4 This image is visualizing the girls focus, concentration and learning effect while playing the cybersecurity awareness game.
How would you summarize your final portfolio in 100 words or less? (650 characters)
The final portfolio visualizes the danger of phishing and shows a cybersecurity awareness game in action. It clears up that not every password manager is safe and should be blindly trusted. Also the illustration of a dam gives a feeling what it is about to take control of your personal data stream to make your own cyber world a safe environment.
Briefly describe your imagined use case for the work in your portfolio. (250 characters)
Digital Dam: Corporate security training | Password Manager: Made for team-sik.org for a related study (they agreed to use here and license under CC by 4.0) | Game: Awareness for people in general, companies & schools | Phishing: Journalistic article
What was the most useful feedback that you received? (1,000 characters)
It helped me a lot that I've been told the the dam in my first submission is only filtering in a quantitatively but not in a qualitatively way. So I worked on that. I also figured out that people don't recognize the attackers in the awareness game because they are green which is actually a color to visualize "the good guys" so I changed their color to red wich helped a lot.
How have your concepts evolved since the Ideas Phase? (1,000 characters)
The portfolio now is much stronger. It is not only more visually appealing, also the metaphors and symbolics work better. Also with the new photos I set a whole new focus on the human as the most important part in cybersecurity. For the game I changed the attackers color to red to make 'em more recognizable. The dam is now not only filtering also in quantitatively way anymore but also in a qualitatively way, wich makes it a lot more technical accurate.
How have you been able to incorporate technical accuracy into your concepts? (1000 characters)
I've got lots of good advise from my mentor and the other shortlisters in the video call. Also as I'm working at a cybersecurity research institute (as designer) I had lots of nice and helpful conversations with coworkers.
How do your concepts expand the conversation on cybersecurity? (1000 characters)
For me, the most important thing within designing for cybersecurity is to raise a general awareness of cybersecurity. So if I had the time an knowhow I'd love to see my game on mobile App Stores.
Commitment to Creative Commons License (CC BY 4.0)
Yes, I ensure that my portfolio is in compliance with CC BY 4.0.