OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

Road to privacy

Road to privacy has two ways reality and belief

Photo of Atul Narula
3 4

Written by

Sketch 1 (1,500 characters)

The illustration explains how a normal person (we) using his/her phone has two roads to take in this technology world. One way is the belief that is all sweet where we share our location, photos, moods, personal information, and relationship status with our followers, family & friends. The second way is reality where we are under surveillance all the time and we loose our privacy in our day-to-day activities. Government agencies and social media companies want to control us though our information and map out profile of each person. They want to know our sex life, relationships, health information, and finances to do facial recognition and listen to our conversations with family, close friends. Thus control our lives.

What have you learned through this sketching process? (1,000 characters)

I have been working in cyber security since some time now. I liked this challenge a lot as it was related to the field I am working in. When I started sketching the big task was where to focus, as the cyber security field is very big. Later I decided that I would focus on hacker and surveillance. I started with the definition hacker and seeing the existing images that are use to represent a hacker. Using all my knowledge of deep web, government surveillance programs, tools used, state sponsored attacks and other cyber security topics, I came up with an idea of sketching a hacker. The most exciting part was to put in a sketch all the ideas that were in my head and to create a story around the vision of hacking and surveillance. I learned how challenging is to represent this big picture I have in mind in an image. I also learned how to use basic concepts to make people understand about cyber security with the help of story telling. I hope I get a chance to work with mentors.

Tell us more about you. (1,000 characters)

I am 34-year-old cyber security kid. I would call my self a kid in a cyber security world, as there is lot to learn in this world. Presently based out of Mexico City. I like to learn every day and this love for learning made me learn cyber security and designing skills. I various languages and I’ve been at this cyber security startup space for since last 10 years and I have learned a lot working in this space. I want to represent on an illustration that cyber security isn’t only about technology that a normal person couldn’t understand but it is related to all of us and is a important part of us.

Why are you participating in this Challenge? (750 characters)

I have worked in cyber security field for some years now and what I have felt is that there is a great need of presenting cyber security information to people so that they can understand it easily. Only by this way they will be able to secure their information and data. Normally visiting clients I am being often asked about cyber security topics and current cyber security news. And I always felt the need of some basic images that would make my work easy. I am participating in this challenge not only to share my visuals with others to use but also to showcase the real side of cyber security than what is portrayed. Thus this challenge helped me portray a hacker and the cyber security world. I hope my work can resolve this

Website(s)

https://www.securitynewspaper.com/

What is your experience with the field of cybersecurity?

  • I have considerable experience and/or knowledge in the cybersecurity field.

What best describes you?

  • I’m a cybersecurity professional with an interest in visuals.

How did you hear about this OpenIDEO Challenge?

  • In the news

Location: City

Mexico City, Mexico

Location: State / District

Mexico City, Mexico

Location: Country

  • Mexico

3 comments

Join the conversation:

Comment
Photo of Dima Boulad

Hello Atul Narula  Happy to see your contribution to the Cybersecurity challenge. How would you consider pushing this idea further? We've had a large number of very interesting creations, have you had a chance to browse other submissions? There's a very interesting conversation around cybersecurity going on!

View all comments