SlideShare une entreprise Scribd logo
1  sur  19
• July 2014
McAfee – Bletchley Park Trust ‘Design a Cyber
Superhero’ competition winners
The McAfee and Bletchley Park Trust partnership
In October 2013, McAfee announced a major five-year partnership with the Bletchley Park Trust, whose
mission is to preserve and develop the home of Britain's pioneering World War Two Codebreakers.
In June 2014, McAfee and Bletchley Park Trust unveiled the International Cyber Security Exhibition and
Computer Learning Zone, located within the new Bletchley Park Visitor Centre in Block C. This
collaboration brings together two organisations highly committed to keeping people of all ages safe
online.
At the new site, children and adults will be able to learn how the breathtaking achievements of the WW2
Codebreakers are relevant in today's war against cyber threats.
The ‘Design a Cyber Superhero’ competition
To coincide with the opening of the new site and cyber security exhibition at Bletchley Park, McAfee and
Bletchley Park Trust invited schools to participate by asking children from aged 8–11 to create a superhero
mascot to represent the Bletchley Park–McAfee partnership.
The competition received over 500 entries – here are the wonderfully imaginative creations of our top 15
finalists, including the winner ‘Super Safe Cyber Sally’ who was heralded the ultimate next-generation
superhero who will protect the online world from cybercrime.
Pope Paul Primary School
Entrant: Sophie
Super hero: Com-Kid
Super powers:
glasses that turn
all written
dangers into
anagrams so you
can’t read them;
buzzer that goes
off every time an
online danger is
senses
Pope Paul Primary School
Entrant: Shayan
Superhero: Cyber Man
Super powers:
blocks dangerous
websites; side
kick Super Pooch
bites viruses
Gayton Junior School
Entrant: Divjot
Superhero:
Cyber Lightning
Strike
Super powers:
can sense danger
on her radio;
flies quicker than
a swirling storm;
a whiz kid that
loves computers
Gayton Junior School
Entrant: Holly
Superhero: Cybershade
Super powers: a web protector
that is strict with cyberbullies; can
suck cyberbullying from
computers with scanner on her
hand
Gayton Junior School
Superhero: Justice
Super powers: zaps computers
that are being hacked; reverses
viruses; deletes rude videos
North Heath Primary School
Entrant: Francesca and Mark
Superhero: Roary
Super powers: a powerful
roar that scares away
viruses; McAfee badge
blocks trolls from getting
your personal
information
North Heath Primary School
Entrants: Beth and Tara
Superhero: Firewall Phill
Super powers: virus-
stopping bike helmet;
fast-typing fingers;
firewall-producing epic
shoes!
North Heath Primary School
Entrant: George
Superhero: The Hacker
Attacker
Super powers: electric
boots to run quickly
through the wires; a
shield to block hackers;
binary cape to decode
dodgy websites
Our second place winner!
St Gregory's Catholic Primary
Entrant: Sophia
Superhero: KYSO
(Keep You Safe
Online)
Super powers:
Red laser beam
to block
viruses; radar
to spot cyber
bullying;
invisibility to
secretly watch
children and
keep them safe
online
Little Paxton Primary
Entrant: Kirstyn
Superhero: Super Safe
Cyber Sally
Super powers: special
glasses to see every
computer in the world;
bow with bubble
machine to float mean
messages away; belt to
detect problems
Our first place winner!
Little Paxton Primary
Entrant: Hannah
Superhero:
Bletchy The
Brilliant
Super
powers: kills
viruses with
his magical
computer;
transforms
cyber bullies
into kind
people
Potters Gate C of E
Entrants: Kiran and Joe
Superhero: Cyber Sam
Super powers: super
sonic ears to hear
aggressive language;
USB to show the police
what’s happened
online; Sam’s pet Rex is
super suspicious on the
web and helps him
track down the bad
guys
St Mary’s C of E School
Entrant: Cameron
Superhero: Captain Enigma Cybersafe
Super powers: Superhero suit; gives children the
power to stay safe online
Our third place winner!
Online blog submission
Could that hero be McCyber!?
Madam’s masterpiece meets E’s theories to
form their character who I’m told started on the
wrong side of the battle. Having been a caught
hacking he knows how to think like the bad
guys. He doesn’t need any weapons as he has
spent so much time online he now has a smart
chip embedded in his brain. His huge hands are
due to all the muscles he’s built up in his fingers
spending so much time speed typing. We think
he’s the bad turned good guy for McAfee’s
mission.
Entrants: Madam and E (children of blogger who writes for Family Four Fun)
Superhero: McCyber
Super powers: micro chip embedded in brain to make him smart; huge hands
from speed typing and tracking down bad guys
Roberts Primary School
Entrants: Ben Williams and Pharrell Edwards
Superhero: Cyber Man
Super powers: if you press the button on
his back, it locks up all of the hackers’ bad
stuff; super strength; super flight; speed
19

Contenu connexe

Tendances

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a HackerDigital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a HackerTennessee Bureau of Investigation
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Mitch Spaulding
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usagealigi
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smartwiggit
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 

Tendances (20)

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a HackerDigital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smart
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

En vedette

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024Frank Maiorca
 
SonicWall VPN Configuration
SonicWall VPN ConfigurationSonicWall VPN Configuration
SonicWall VPN Configurationneweb
 
SonicWall Configuration
SonicWall ConfigurationSonicWall Configuration
SonicWall Configurationneweb
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftSchipul - The Web Marketing Company
 
Treinamento Sonicwall
Treinamento SonicwallTreinamento Sonicwall
Treinamento SonicwallPaulo Batista
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing BasicsBelal Raslan
 

En vedette (7)

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
SonicWall NSA 2400 Getting Started Guide
SonicWall NSA 2400 Getting Started GuideSonicWall NSA 2400 Getting Started Guide
SonicWall NSA 2400 Getting Started Guide
 
SonicWall VPN Configuration
SonicWall VPN ConfigurationSonicWall VPN Configuration
SonicWall VPN Configuration
 
SonicWall Configuration
SonicWall ConfigurationSonicWall Configuration
SonicWall Configuration
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
Treinamento Sonicwall
Treinamento SonicwallTreinamento Sonicwall
Treinamento Sonicwall
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 

Similaire à McAfee and Bletchley Park Trust 'Design a Cyber Superhero' Competition

Raising A Cyber Citizen
Raising A Cyber CitizenRaising A Cyber Citizen
Raising A Cyber CitizenJustin Medved
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital PlaygroundKim Cofino
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptxRicaElaineLubasan
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommBarbara Ludwig
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Essay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of MaladiesEssay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of MaladiesBrittany Avila
 
Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...Learning Pool Ltd
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety TalkOllie Bray
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 
Kevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of DeceptionKevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of DeceptionRaGaZoMe
 

Similaire à McAfee and Bletchley Park Trust 'Design a Cyber Superhero' Competition (20)

Raising A Cyber Citizen
Raising A Cyber CitizenRaising A Cyber Citizen
Raising A Cyber Citizen
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Essay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of MaladiesEssay Topics For Interpreter Of Maladies
Essay Topics For Interpreter Of Maladies
 
Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...Learning Futures: How new & emerging technologies will impact learning and de...
Learning Futures: How new & emerging technologies will impact learning and de...
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Kevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of DeceptionKevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of Deception
 
nghe thuat lua dao
nghe thuat lua daonghe thuat lua dao
nghe thuat lua dao
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

McAfee and Bletchley Park Trust 'Design a Cyber Superhero' Competition

  • 1. • July 2014 McAfee – Bletchley Park Trust ‘Design a Cyber Superhero’ competition winners
  • 2. The McAfee and Bletchley Park Trust partnership In October 2013, McAfee announced a major five-year partnership with the Bletchley Park Trust, whose mission is to preserve and develop the home of Britain's pioneering World War Two Codebreakers. In June 2014, McAfee and Bletchley Park Trust unveiled the International Cyber Security Exhibition and Computer Learning Zone, located within the new Bletchley Park Visitor Centre in Block C. This collaboration brings together two organisations highly committed to keeping people of all ages safe online. At the new site, children and adults will be able to learn how the breathtaking achievements of the WW2 Codebreakers are relevant in today's war against cyber threats.
  • 3. The ‘Design a Cyber Superhero’ competition To coincide with the opening of the new site and cyber security exhibition at Bletchley Park, McAfee and Bletchley Park Trust invited schools to participate by asking children from aged 8–11 to create a superhero mascot to represent the Bletchley Park–McAfee partnership. The competition received over 500 entries – here are the wonderfully imaginative creations of our top 15 finalists, including the winner ‘Super Safe Cyber Sally’ who was heralded the ultimate next-generation superhero who will protect the online world from cybercrime.
  • 4. Pope Paul Primary School Entrant: Sophie Super hero: Com-Kid Super powers: glasses that turn all written dangers into anagrams so you can’t read them; buzzer that goes off every time an online danger is senses
  • 5. Pope Paul Primary School Entrant: Shayan Superhero: Cyber Man Super powers: blocks dangerous websites; side kick Super Pooch bites viruses
  • 6. Gayton Junior School Entrant: Divjot Superhero: Cyber Lightning Strike Super powers: can sense danger on her radio; flies quicker than a swirling storm; a whiz kid that loves computers
  • 7. Gayton Junior School Entrant: Holly Superhero: Cybershade Super powers: a web protector that is strict with cyberbullies; can suck cyberbullying from computers with scanner on her hand
  • 8. Gayton Junior School Superhero: Justice Super powers: zaps computers that are being hacked; reverses viruses; deletes rude videos
  • 9. North Heath Primary School Entrant: Francesca and Mark Superhero: Roary Super powers: a powerful roar that scares away viruses; McAfee badge blocks trolls from getting your personal information
  • 10. North Heath Primary School Entrants: Beth and Tara Superhero: Firewall Phill Super powers: virus- stopping bike helmet; fast-typing fingers; firewall-producing epic shoes!
  • 11. North Heath Primary School Entrant: George Superhero: The Hacker Attacker Super powers: electric boots to run quickly through the wires; a shield to block hackers; binary cape to decode dodgy websites Our second place winner!
  • 12. St Gregory's Catholic Primary Entrant: Sophia Superhero: KYSO (Keep You Safe Online) Super powers: Red laser beam to block viruses; radar to spot cyber bullying; invisibility to secretly watch children and keep them safe online
  • 13. Little Paxton Primary Entrant: Kirstyn Superhero: Super Safe Cyber Sally Super powers: special glasses to see every computer in the world; bow with bubble machine to float mean messages away; belt to detect problems Our first place winner!
  • 14. Little Paxton Primary Entrant: Hannah Superhero: Bletchy The Brilliant Super powers: kills viruses with his magical computer; transforms cyber bullies into kind people
  • 15. Potters Gate C of E Entrants: Kiran and Joe Superhero: Cyber Sam Super powers: super sonic ears to hear aggressive language; USB to show the police what’s happened online; Sam’s pet Rex is super suspicious on the web and helps him track down the bad guys
  • 16. St Mary’s C of E School Entrant: Cameron Superhero: Captain Enigma Cybersafe Super powers: Superhero suit; gives children the power to stay safe online Our third place winner!
  • 17. Online blog submission Could that hero be McCyber!? Madam’s masterpiece meets E’s theories to form their character who I’m told started on the wrong side of the battle. Having been a caught hacking he knows how to think like the bad guys. He doesn’t need any weapons as he has spent so much time online he now has a smart chip embedded in his brain. His huge hands are due to all the muscles he’s built up in his fingers spending so much time speed typing. We think he’s the bad turned good guy for McAfee’s mission. Entrants: Madam and E (children of blogger who writes for Family Four Fun) Superhero: McCyber Super powers: micro chip embedded in brain to make him smart; huge hands from speed typing and tracking down bad guys
  • 18. Roberts Primary School Entrants: Ben Williams and Pharrell Edwards Superhero: Cyber Man Super powers: if you press the button on his back, it locks up all of the hackers’ bad stuff; super strength; super flight; speed
  • 19. 19