SlideShare una empresa de Scribd logo
1 de 19
• July 2014
McAfee – Bletchley Park Trust ‘Design a Cyber
Superhero’ competition winners
The McAfee and Bletchley Park Trust partnership
In October 2013, McAfee announced a major five-year partnership with the Bletchley Park Trust, whose
mission is to preserve and develop the home of Britain's pioneering World War Two Codebreakers.
In June 2014, McAfee and Bletchley Park Trust unveiled the International Cyber Security Exhibition and
Computer Learning Zone, located within the new Bletchley Park Visitor Centre in Block C. This
collaboration brings together two organisations highly committed to keeping people of all ages safe
online.
At the new site, children and adults will be able to learn how the breathtaking achievements of the WW2
Codebreakers are relevant in today's war against cyber threats.
The ‘Design a Cyber Superhero’ competition
To coincide with the opening of the new site and cyber security exhibition at Bletchley Park, McAfee and
Bletchley Park Trust invited schools to participate by asking children from aged 8–11 to create a superhero
mascot to represent the Bletchley Park–McAfee partnership.
The competition received over 500 entries – here are the wonderfully imaginative creations of our top 15
finalists, including the winner ‘Super Safe Cyber Sally’ who was heralded the ultimate next-generation
superhero who will protect the online world from cybercrime.
Pope Paul Primary School
Entrant: Sophie
Super hero: Com-Kid
Super powers:
glasses that turn
all written
dangers into
anagrams so you
can’t read them;
buzzer that goes
off every time an
online danger is
senses
Pope Paul Primary School
Entrant: Shayan
Superhero: Cyber Man
Super powers:
blocks dangerous
websites; side
kick Super Pooch
bites viruses
Gayton Junior School
Entrant: Divjot
Superhero:
Cyber Lightning
Strike
Super powers:
can sense danger
on her radio;
flies quicker than
a swirling storm;
a whiz kid that
loves computers
Gayton Junior School
Entrant: Holly
Superhero: Cybershade
Super powers: a web protector
that is strict with cyberbullies; can
suck cyberbullying from
computers with scanner on her
hand
Gayton Junior School
Superhero: Justice
Super powers: zaps computers
that are being hacked; reverses
viruses; deletes rude videos
North Heath Primary School
Entrant: Francesca and Mark
Superhero: Roary
Super powers: a powerful
roar that scares away
viruses; McAfee badge
blocks trolls from getting
your personal
information
North Heath Primary School
Entrants: Beth and Tara
Superhero: Firewall Phill
Super powers: virus-
stopping bike helmet;
fast-typing fingers;
firewall-producing epic
shoes!
North Heath Primary School
Entrant: George
Superhero: The Hacker
Attacker
Super powers: electric
boots to run quickly
through the wires; a
shield to block hackers;
binary cape to decode
dodgy websites
Our second place winner!
St Gregory's Catholic Primary
Entrant: Sophia
Superhero: KYSO
(Keep You Safe
Online)
Super powers:
Red laser beam
to block
viruses; radar
to spot cyber
bullying;
invisibility to
secretly watch
children and
keep them safe
online
Little Paxton Primary
Entrant: Kirstyn
Superhero: Super Safe
Cyber Sally
Super powers: special
glasses to see every
computer in the world;
bow with bubble
machine to float mean
messages away; belt to
detect problems
Our first place winner!
Little Paxton Primary
Entrant: Hannah
Superhero:
Bletchy The
Brilliant
Super
powers: kills
viruses with
his magical
computer;
transforms
cyber bullies
into kind
people
Potters Gate C of E
Entrants: Kiran and Joe
Superhero: Cyber Sam
Super powers: super
sonic ears to hear
aggressive language;
USB to show the police
what’s happened
online; Sam’s pet Rex is
super suspicious on the
web and helps him
track down the bad
guys
St Mary’s C of E School
Entrant: Cameron
Superhero: Captain Enigma Cybersafe
Super powers: Superhero suit; gives children the
power to stay safe online
Our third place winner!
Online blog submission
Could that hero be McCyber!?
Madam’s masterpiece meets E’s theories to
form their character who I’m told started on the
wrong side of the battle. Having been a caught
hacking he knows how to think like the bad
guys. He doesn’t need any weapons as he has
spent so much time online he now has a smart
chip embedded in his brain. His huge hands are
due to all the muscles he’s built up in his fingers
spending so much time speed typing. We think
he’s the bad turned good guy for McAfee’s
mission.
Entrants: Madam and E (children of blogger who writes for Family Four Fun)
Superhero: McCyber
Super powers: micro chip embedded in brain to make him smart; huge hands
from speed typing and tracking down bad guys
Roberts Primary School
Entrants: Ben Williams and Pharrell Edwards
Superhero: Cyber Man
Super powers: if you press the button on
his back, it locks up all of the hackers’ bad
stuff; super strength; super flight; speed
19

Más contenido relacionado

La actualidad más candente

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a HackerDigital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a HackerTennessee Bureau of Investigation
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Mitch Spaulding
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usagealigi
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smartwiggit
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 

La actualidad más candente (20)

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a HackerDigital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smart
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Destacado

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024Frank Maiorca
 
SonicWall VPN Configuration
SonicWall VPN ConfigurationSonicWall VPN Configuration
SonicWall VPN Configurationneweb
 
SonicWall Configuration
SonicWall ConfigurationSonicWall Configuration
SonicWall Configurationneweb
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftSchipul - The Web Marketing Company
 
Treinamento Sonicwall
Treinamento SonicwallTreinamento Sonicwall
Treinamento SonicwallPaulo Batista
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing BasicsBelal Raslan
 

Destacado (7)

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
SonicWall NSA 2400 Getting Started Guide
SonicWall NSA 2400 Getting Started GuideSonicWall NSA 2400 Getting Started Guide
SonicWall NSA 2400 Getting Started Guide
 
SonicWall VPN Configuration
SonicWall VPN ConfigurationSonicWall VPN Configuration
SonicWall VPN Configuration
 
SonicWall Configuration
SonicWall ConfigurationSonicWall Configuration
SonicWall Configuration
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
Treinamento Sonicwall
Treinamento SonicwallTreinamento Sonicwall
Treinamento Sonicwall
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 

Similar a McAfee and Bletchley Park Trust 'Design a Cyber Superhero' Competition

Raising A Cyber Citizen
Raising A Cyber CitizenRaising A Cyber Citizen
Raising A Cyber CitizenJustin Medved
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital PlaygroundKim Cofino
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptxRicaElaineLubasan
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommBarbara Ludwig
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Essay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of MaladiesEssay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of MaladiesBrittany Avila
 
Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...Learning Pool Ltd
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety TalkOllie Bray
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 
Kevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of DeceptionKevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of DeceptionRaGaZoMe
 

Similar a McAfee and Bletchley Park Trust 'Design a Cyber Superhero' Competition (20)

Raising A Cyber Citizen
Raising A Cyber CitizenRaising A Cyber Citizen
Raising A Cyber Citizen
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Essay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of MaladiesEssay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of Maladies
 
Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Kevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of DeceptionKevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of Deception
 
nghe thuat lua dao
nghe thuat lua daonghe thuat lua dao
nghe thuat lua dao
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

McAfee and Bletchley Park Trust 'Design a Cyber Superhero' Competition

  • 1. • July 2014 McAfee – Bletchley Park Trust ‘Design a Cyber Superhero’ competition winners
  • 2. The McAfee and Bletchley Park Trust partnership In October 2013, McAfee announced a major five-year partnership with the Bletchley Park Trust, whose mission is to preserve and develop the home of Britain's pioneering World War Two Codebreakers. In June 2014, McAfee and Bletchley Park Trust unveiled the International Cyber Security Exhibition and Computer Learning Zone, located within the new Bletchley Park Visitor Centre in Block C. This collaboration brings together two organisations highly committed to keeping people of all ages safe online. At the new site, children and adults will be able to learn how the breathtaking achievements of the WW2 Codebreakers are relevant in today's war against cyber threats.
  • 3. The ‘Design a Cyber Superhero’ competition To coincide with the opening of the new site and cyber security exhibition at Bletchley Park, McAfee and Bletchley Park Trust invited schools to participate by asking children from aged 8–11 to create a superhero mascot to represent the Bletchley Park–McAfee partnership. The competition received over 500 entries – here are the wonderfully imaginative creations of our top 15 finalists, including the winner ‘Super Safe Cyber Sally’ who was heralded the ultimate next-generation superhero who will protect the online world from cybercrime.
  • 4. Pope Paul Primary School Entrant: Sophie Super hero: Com-Kid Super powers: glasses that turn all written dangers into anagrams so you can’t read them; buzzer that goes off every time an online danger is senses
  • 5. Pope Paul Primary School Entrant: Shayan Superhero: Cyber Man Super powers: blocks dangerous websites; side kick Super Pooch bites viruses
  • 6. Gayton Junior School Entrant: Divjot Superhero: Cyber Lightning Strike Super powers: can sense danger on her radio; flies quicker than a swirling storm; a whiz kid that loves computers
  • 7. Gayton Junior School Entrant: Holly Superhero: Cybershade Super powers: a web protector that is strict with cyberbullies; can suck cyberbullying from computers with scanner on her hand
  • 8. Gayton Junior School Superhero: Justice Super powers: zaps computers that are being hacked; reverses viruses; deletes rude videos
  • 9. North Heath Primary School Entrant: Francesca and Mark Superhero: Roary Super powers: a powerful roar that scares away viruses; McAfee badge blocks trolls from getting your personal information
  • 10. North Heath Primary School Entrants: Beth and Tara Superhero: Firewall Phill Super powers: virus- stopping bike helmet; fast-typing fingers; firewall-producing epic shoes!
  • 11. North Heath Primary School Entrant: George Superhero: The Hacker Attacker Super powers: electric boots to run quickly through the wires; a shield to block hackers; binary cape to decode dodgy websites Our second place winner!
  • 12. St Gregory's Catholic Primary Entrant: Sophia Superhero: KYSO (Keep You Safe Online) Super powers: Red laser beam to block viruses; radar to spot cyber bullying; invisibility to secretly watch children and keep them safe online
  • 13. Little Paxton Primary Entrant: Kirstyn Superhero: Super Safe Cyber Sally Super powers: special glasses to see every computer in the world; bow with bubble machine to float mean messages away; belt to detect problems Our first place winner!
  • 14. Little Paxton Primary Entrant: Hannah Superhero: Bletchy The Brilliant Super powers: kills viruses with his magical computer; transforms cyber bullies into kind people
  • 15. Potters Gate C of E Entrants: Kiran and Joe Superhero: Cyber Sam Super powers: super sonic ears to hear aggressive language; USB to show the police what’s happened online; Sam’s pet Rex is super suspicious on the web and helps him track down the bad guys
  • 16. St Mary’s C of E School Entrant: Cameron Superhero: Captain Enigma Cybersafe Super powers: Superhero suit; gives children the power to stay safe online Our third place winner!
  • 17. Online blog submission Could that hero be McCyber!? Madam’s masterpiece meets E’s theories to form their character who I’m told started on the wrong side of the battle. Having been a caught hacking he knows how to think like the bad guys. He doesn’t need any weapons as he has spent so much time online he now has a smart chip embedded in his brain. His huge hands are due to all the muscles he’s built up in his fingers spending so much time speed typing. We think he’s the bad turned good guy for McAfee’s mission. Entrants: Madam and E (children of blogger who writes for Family Four Fun) Superhero: McCyber Super powers: micro chip embedded in brain to make him smart; huge hands from speed typing and tracking down bad guys
  • 18. Roberts Primary School Entrants: Ben Williams and Pharrell Edwards Superhero: Cyber Man Super powers: if you press the button on his back, it locks up all of the hackers’ bad stuff; super strength; super flight; speed
  • 19. 19