Perfil de Kaitlyn Baker

Government's Cyberthreats: GovLoop guide + photo series


It's clear that government is fighting a constant war
in cyberspace, and it's occasionally losing. 
But is that the whole story?

This guide explores 8 of the critical cyberthreats that government agencies are facing everyday. My challenge as a designer was to figure out a way to visually represent each type of attack without resorting to the usual cheesy stock photos of men in hoodies or binary code on a screen. 

I decided to create my own photo series that would represent each threat in a simple and easy to understand way. I started with some sketches exploring what those may look like, put in a (very strange) order on amazon, and set up a makeshift studio in one of our office conference rooms for an afternoon. It was a really fun challenge to take these abstract concepts and try to show them in a physical and tactile way. 

I kept the rest of the guide black and white with red as a highlight color to portray the danger and seriousness of these threats. In addition to the photo series, each attack is also illustrated by a few recent stats and a step-by-step breakdown of how exactly they happen. 






top row: insider threat, phishing, defacement, password attack
bottom row: distributed denial of service, zero-day attack, malware, advanced persistent threat






At GovLoop, our mission is to serve as a knowledge network by connecting government to improve government. By interviewing agency experts and sharing their knowledge in an interesting and easy-to-read way, we can help other government employees effectively recognize and combat cyberthreats. If this protects even one attack from happening, we've done our job.





Designed for GovLoop. Written by Hannah Moss.

Download full guide here.

Thank you!!


Government's Cyberthreats: GovLoop guide + photo series
Publicado:

Proyecto para

Government's Cyberthreats: GovLoop guide + photo series

Guide + accompanying photo series about government's critical cyberthreats.

Publicado: