Aspects of cyber conflicts
Cyber conflicts can break the real world.
Sketch 1 (1,500 characters)
I would like to show with this concept how an important system in the medical field is affected by a conflict. The structure of the system is broken. There are mistakes and the system can not work in the necessary and correct way. Equipment, the staff, medicines, all things can be affected by the conflict. In the next step, I want to create a poster with several images in the manner shown.
Sketch 2 (1,500 characters)
With this sketch I would like to illustrate how a cyber conflict can damage or stop the energy supply of a country by an attack. I want to portray the attack with a kind of lasso. This contains binary code. This way, I want to visualize the malicious code, regardless of a specific programming language. In the next step I will work out the graphics of the sketch with Illustrator and Photoshop.
What have you learned through this sketching process? (1,000 characters)
I realized that you have to try to achieve the best possible balance between imagery and technical language. I do not want to overwhelm or underline the viewer.
Tell us more about you. (1,000 characters)
I am a Freelance Graphic Designer from Bremen in Germany. At the moment I am training for the profession of IT specialist and have sometimes come into contact with cybersecurity. However, I have no in-depth knowledge in cybersecurity.
Why are you participating in this Challenge? (750 characters)
I find the combination of technology and design very exciting.
What is your experience with the field of cybersecurity?
I have minimal experience and/or knowledge in the cybersecurity field.
What best describes you?
I’m a professional visual creator freelancer.
How did you hear about this OpenIDEO Challenge?
Someone in my network (word of mouth)
Location: State / District
What opportunity areas are you covering with this final portfolio? (250 characters)
I think that my graphics cover the opportunity areas "Cyber Conflict" and "Hackers and Hacking".
Final Portfolio (1,500 characters)
Due to the cyber conflict, an operation becomes problematic. Necessary data has been confused or lost.
This illustration is supposed to be an allegory. A nuclear power plant which is attacked in a cyber conflict.
Here I would like to show what happens when the software of an airplane is compromised due to a cyber conflict.
On this picture I would like to show the observer what effect a cyber conflict can have on telecommunications.
This illustration also is supposed to be an allegory for an attacked nuclear powerplant.
Briefly describe your imagined use case for the work in your portfolio. (250 characters)
I think you can use the graphics to inform people about Cyber Conflicts. You could use them in an information brochure. The illustrations with the nuclear power plant could well be used to inform young people.
Commitment to Creative Commons License (CC BY 4.0)
Yes, I ensure that my portfolio is in compliance with CC BY 4.0.