{"id":28044,"date":"2021-12-29T00:07:00","date_gmt":"2021-12-29T00:07:00","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=28044"},"modified":"2022-01-02T05:36:35","modified_gmt":"2022-01-02T05:36:35","slug":"comic-book-introduces-kids-to-key-concepts-and-careers-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/comic-book-introduces-kids-to-key-concepts-and-careers-in-cybersecurity\/","title":{"rendered":"Comic book introduces kids to key concepts and careers in cybersecurity"},"content":{"rendered":"\n<p><a href=\"https:\/\/theconversation.com\/profiles\/kara-dawson-1282287\">Kara Dawson<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-florida-1392\">University of Florida<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/pavlo-antonenko-1285490\">Pavlo Antonenko<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-florida-1392\">University of Florida<\/a><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/images.theconversation.com\/files\/435435\/original\/file-20211202-17-1wdszbu.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/435435\/original\/file-20211202-17-1wdszbu.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" alt=\"A paper wheel with different symbols sits on a desk. \"\/><\/a><figcaption>Students crack a secret message using this Caesar wheel as part of a challenge. CryptoComics, <a href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/figcaption><\/figure>\n\n\n\n<p>Three 9-year-old girls are huddled around a Caesar wheel, an ancient tool for sharing secret messages.<\/p>\n\n\n\n<p>Cracking a code is one of many challenges the girls complete to help characters in <a href=\"https:\/\/www.youtube.com\/watch?v=lmQzIhL9vzk&amp;t=5s\">CryptoComics<\/a> escape a mysterious cyberworld into which they\u2019ve been drawn.<\/p>\n\n\n\n<p>CryptoComics is a curriculum designed to teach elementary school children \u2013 particularly girls of color \u2013 about <a href=\"https:\/\/www.cisa.gov\/about-cisa\">cybersecurity<\/a> \u2013 the practice of keeping digital information safe \u2013 and related careers. It also <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cryptology\">teaches about cryptology<\/a> \u2013 the science of making and breaking codes. The girls partake in this program as part of their after-school activities in Atlanta.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/images.theconversation.com\/files\/430385\/original\/file-20211104-27-1cqoq0p.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/430385\/original\/file-20211104-27-1cqoq0p.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" alt=\"A computer screen shows a teacher going over a lesson plan.\"\/><\/a><figcaption>Teachers can go over important lesson plans with students. CryptoComics, <a href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/figcaption><\/figure>\n\n\n\n<p>Led by a team of <a href=\"http:\/\/cryptocomics.org\/team\/\">educators and researchers<\/a>, <a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1849768&amp;HistoricalAwards=false\">CryptoComics<\/a> strategically integrates a digital comic book, apps and unplugged activities, such as painting rocks with ancient symbols and making invisible ink. It also features stories about cybersecurity professionals who are women. CryptoComics is freely available on <a href=\"http:\/\/cryptocomics.org\/\">cryptocomics.org<\/a>.<\/p>\n\n\n\n<p>We are both researchers in <a href=\"https:\/\/scholar.google.com\/citations?user=S078Z_EAAAAJ&amp;hl=en\">educational technology<\/a> and <a href=\"https:\/\/scholar.google.com\/citations?user=J1XAg5IAAAAJ&amp;hl=en\">STEM education<\/a>. We are examining how the program \u2013 which we both helped develop \u2013 increases awareness about careers in cybsecurity.<\/p>\n\n\n\n<p>The overall objective of the program is to spark girls\u2019 interest in careers in cybersecurity. While it will take years to determine whether the program has the desired effect, <a href=\"http:\/\/cryptocomics.org\/research\/\">early research<\/a> shows that participants come out knowing about more potential jobs in cybersecurity than they did before.<\/p>\n\n\n\n<p>Kids who\u2019ve participated in the program have told researchers they \u201cliked those jobs introduced in CryptoComics because they keep us safe from hackers.\u201d They also liked that \u201cyou get to work on a team to figure out codes and break them.\u201d<\/p>\n\n\n\n<h2>Vast reach of cyberattacks<\/h2>\n\n\n\n<p>Cybersecurity touches just about everyone in some way or another \u2013 from adults in the workplace and banking to schoolchildren. For instance, cybercriminals have been launching cyberattacks against U.S. schools at a record pace \u2013 as many as <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2021-08-09\/schools-brace-for-more-cyberattacks-after-record-2020\">two per school day<\/a> in 2020. Hackers also target individuals who use <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-safely-use-public-wi-fi-networks\">public Wi-Fi<\/a>.<\/p>\n\n\n\n<p>Cybersecurity professionals will likely be <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">in demand for the foreseeable future<\/a>. The federal government <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">projects 33% growth in jobs<\/a> in cybersecurity and related fields over the next decade or so. Yet women are <a href=\"https:\/\/theconversation.com\/the-lack-of-women-in-cybersecurity-leaves-the-online-world-at-greater-risk-136654\">highly underrepresented<\/a> in the profession, making up <a href=\"https:\/\/www.bls.gov\/cps\/cpsaat11.htm\">only 11%<\/a> of information security analysts.<\/p>\n\n\n\n<p>Part of the reason is that young girls <a href=\"https:\/\/theconversation.com\/stereotypes-about-girls-dissuade-many-from-careers-in-computer-science-172279\">often don\u2019t see themselves<\/a> going into a field like computer science. But research shows that the attitudes elementary school children have toward STEM careers like cybersecurity <a href=\"https:\/\/doi.org\/10.1007\/s10758-018-9358-z\">can be changed<\/a>. CryptoComics was designed to bring cybersecurity learning and career awareness to third to fifth grade girls through an engaging after-school curriculum.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/images.theconversation.com\/files\/430386\/original\/file-20211104-17-muwfci.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/430386\/original\/file-20211104-17-muwfci.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" alt=\"A cartoon depiction of the four main characters standing together.\"\/><\/a><figcaption>Akila, Bai, Carly and Jabari must solve a series of puzzles from the cyberworld. CryptoComics, <a href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/figcaption><\/figure>\n\n\n\n<p>The comic book, designed by media artist <a href=\"https:\/\/www.linkedin.com\/in\/d-a-jackson-a5933ba\/\">D.A. Jackson<\/a>, begins when three friends \u2013 Akila, Carly and Bai \u2013 find a West African souvenir box belonging to Akila\u2019s grandma. Akila takes a picture of the box with her tablet. Suddenly, she and her friends are sucked into a mysterious cyberworld.<\/p>\n\n\n\n<p>As Akila narrates the story, students follow the girls and her little brother, Jabari, who communicates with the girls through the tablet. They crack codes and ciphers and solve puzzles. They also learn the history of cryptology and basics of cybersecurity to help the girls escape the cyberworld.<\/p>\n\n\n\n<p>The six chapters of the comic book progress from basic information about codes and symbols to current cybersecurity practices such as creating safe passwords. Children explore important historical developments in cryptology approaches and technologies like the <a href=\"https:\/\/www.intelligence.gov\/index.php\/people\/barrier-breakers-in-history\/453-navajo-code-talkers\">Navajo Code Talkers<\/a> and the <a href=\"https:\/\/www.britannica.com\/topic\/WAVES-United-States-naval-organization\">WAVES program<\/a>. The Navajo Code Talkers were U.S. Marines of Navajo descent who used their native language to send secret messages over radio waves during WWII. WAVES \u2013 Women Accepted for Voluntarily Emergency Service \u2013 was a division of the U.S. Navy in which female cryptologists worked during WWII.<\/p>\n\n\n\n<p>Children also use a variety of ciphers and codes to encrypt and decrypt information. This helps the comic book characters during their cyberadventure. Activities are grounded in symbols from different cultures such as a scytale from Greece, pictograms from West African and Native American culture and <a href=\"https:\/\/cyber.org\/news\/home-activity-encryption-pigpen-cipher\">Freemason Pigpen ciphers<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/images.theconversation.com\/files\/430387\/original\/file-20211104-19383-1a62kra.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/430387\/original\/file-20211104-19383-1a62kra.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"In one panel a pink and blue colored heart is painted on a rock. Another panel shows missing letters in a text, and a final panel shows a soldier holding a spear in his hand.\"\/><\/a><figcaption>Symbols and codes from different cultures hold important information for the main characters to use. CryptoComics, <a href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/figcaption><\/figure>\n\n\n\n<p>The curriculum culminates with games and simulations in which the children learn about cybersecurity. They learn to defend their device against the person who hacked Akila\u2019s tablet. They learn about safe password practices and how to protect themselves from <a href=\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/\">brute force<\/a> password cracking \u2013 that is, using a program or guesswork to try every possible password combination; <a href=\"https:\/\/www.scamwatch.gov.au\/types-of-scams\/attempts-to-gain-your-personal-information\/phishing\">phishing scams<\/a> that use fake emails to get people to click on malicious links; and <a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-social-engineering\">social engineering<\/a> attacks.<\/p>\n\n\n\n<p>[<em>Too busy to read another daily email?<\/em> <a href=\"https:\/\/memberservices.theconversation.com\/newsletters\/?source=inline-toobusy\">Get one of The Conversation\u2019s curated weekly newsletters<\/a>.]<\/p>\n\n\n\n<p>For example, the comic book characters learn about social engineering when they go back in time to the British Government Code and Cypher School \u2013 now known as <a href=\"https:\/\/www.gchq.gov.uk\/\">GCHQ<\/a>. This is where they meet a <a href=\"https:\/\/www.britannica.com\/topic\/WAVES-United-States-naval-organization\">WAVES<\/a> servicewoman named Dorothy who turns out to be Akila\u2019s grandma. They also meet <a href=\"https:\/\/www.nytimes.com\/2019\/06\/05\/obituaries\/alan-turing-overlooked.html\">Alan Turing<\/a>, a real-life WWII cryptoanalyst.<\/p>\n\n\n\n<p>Dorothy, Alan and the comic book characters work to crack a briefcase password using a letter found on a spy. Meanwhile, students participating in the curriculum work to crack the code via a simulation. Students learn that social engineering is a process hackers use to figure out passwords based on personal information such as a birth dates or names of family members.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/images.theconversation.com\/files\/430389\/original\/file-20211104-27-8zsukc.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/430389\/original\/file-20211104-27-8zsukc.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"A comic book panel shows a letter written from a young girl asking her grandfather to attend a birthday party.\"\/><\/a><figcaption>Social engineering tactics are a gateway for hackers to get private information. CryptoComics, <a href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/figcaption><\/figure>\n\n\n\n<h2>Preparing for cybersecurity careers<\/h2>\n\n\n\n<p>Over 200 elementary school-age students \u2013 73% girls \u2013 from diverse backgrounds in 16 after-school programs across the Southeastern U.S. have participated in <a href=\"https:\/\/stemforall2021.videohall.com\/presentations\/1925\">CryptoComics<\/a>. <a href=\"http:\/\/cryptocomics.org\/research\/\">Preliminary research<\/a>, which we oversaw, has found that children enjoy the curriculum, learn how to encrypt and decrypt information in different ways and demonstrate awareness of cybersecurity professions. They also transfer knowledge and skills gained in CryptoComics to real-life experiences.<\/p>\n\n\n\n<p>Teachers we have spoken with also say the curriculum \u201ccan be a game changer\u201d for participating girls. The teachers report that students \u201cquickly retained\u201d concepts such as enciphering and deciphering \u2013 making and breaking different kinds of messages and codes.<\/p>\n\n\n\n<p>Some students struggled with reading the comic book. They said they wanted audio support but they didn\u2019t want a monotone computer voice. Instead, they wanted the audio \u201cto act like the characters.\u201d As a result, we recruited <a href=\"http:\/\/cryptocomics.org\/team\/\">local voice actors<\/a> to narrate the comic book.<\/p>\n\n\n\n<p>The narration can be used by students who struggle with reading or who simply prefer listening to stories. Teachers confirmed that \u201cthe narrated version of the actual comic book itself has helped tremendously.\u201d It has made the curriculum more accessible for struggling readers.<\/p>\n\n\n\n<p>Tremendous <a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2020\/Workforce-Study\/ISC2ResearchDrivenWhitepaperFINAL.ashx?la=en&amp;hash=2879EE167ACBA7100C330429C7EBC623BAF4E07B\">career opportunities<\/a> exist in cybersecurity. CryptoComics represents just one way to better position young children \u2013 and especially young girls \u2013 to take advantage of these opportunities.<\/p>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/profiles\/kara-dawson-1282287\">Kara Dawson<\/a>, Professor of Educational Technology, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-florida-1392\">University of Florida<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/pavlo-antonenko-1285490\">Pavlo Antonenko<\/a>, Associate Professor of Educational Technology, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-florida-1392\">University of Florida<\/a><\/em><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/comic-book-introduces-kids-to-key-concepts-and-careers-in-cybersecurity-171163\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kara Dawson, University of Florida and Pavlo Antonenko, University of Florida Three 9-year-old girls are huddled around a Caesar wheel, an ancient tool for sharing secret messages. Cracking a code is one of many challenges the girls complete to help characters in CryptoComics escape a mysterious cyberworld into which they\u2019ve been drawn. CryptoComics is a [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":28045,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[292],"tags":[612,6826,1737,4563,1738],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/28044"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=28044"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/28044\/revisions"}],"predecessor-version":[{"id":28124,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/28044\/revisions\/28124"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/28045"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=28044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=28044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=28044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}