The Times Australia
The Times World News

.

Comic book introduces kids to key concepts and careers in cybersecurity

  • Written by Kara Dawson, Professor of Educational Technology, University of Florida
Comic book introduces kids to key concepts and careers in cybersecurity
A paper wheel with different symbols sits on a desk.
Students crack a secret message using this Caesar wheel as part of a challenge. CryptoComics, Author provided

Three 9-year-old girls are huddled around a Caesar wheel, an ancient tool for sharing secret messages.

Cracking a code is one of many challenges the girls complete to help characters in CryptoComics[1] escape a mysterious cyberworld into which they’ve been drawn.

CryptoComics is a curriculum designed to teach elementary school children – particularly girls of color – about cybersecurity[2] – the practice of keeping digital information safe – and related careers. It also teaches about cryptology[3] – the science of making and breaking codes. The girls partake in this program as part of their after-school activities in Atlanta.

A computer screen shows a teacher going over a lesson plan.
Teachers can go over important lesson plans with students. CryptoComics

Led by a team of educators and researchers[4], CryptoComics[5] strategically integrates a digital comic book, apps and unplugged activities, such as painting rocks with ancient symbols and making invisible ink. It also features stories about cybersecurity professionals who are women. CryptoComics is freely available on cryptocomics.org[6].

We are both researchers in educational technology[7] and STEM education[8]. We are examining how the program – which we both helped develop – increases awareness about careers in cybsecurity.

The overall objective of the program is to spark girls’ interest in careers in cybersecurity. While it will take years to determine whether the program has the desired effect, early research[9] shows that participants come out knowing about more potential jobs in cybersecurity than they did before.

Kids who’ve participated in the program have told researchers they “liked those jobs introduced in CryptoComics because they keep us safe from hackers.” They also liked that “you get to work on a team to figure out codes and break them.”

Vast reach of cyberattacks

Cybersecurity touches just about everyone in some way or another – from adults in the workplace and banking to schoolchildren. For instance, cybercriminals have been launching cyberattacks against U.S. schools at a record pace – as many as two per school day[10] in 2020. Hackers also target individuals who use public Wi-Fi[11].

Cybersecurity professionals will likely be in demand for the foreseeable future[12]. The federal government projects 33% growth in jobs[13] in cybersecurity and related fields over the next decade or so. Yet women are highly underrepresented[14] in the profession, making up only 11%[15] of information security analysts.

Part of the reason is that young girls often don’t see themselves[16] going into a field like computer science. But research shows that the attitudes elementary school children have toward STEM careers like cybersecurity can be changed[17]. CryptoComics was designed to bring cybersecurity learning and career awareness to third to fifth grade girls through an engaging after-school curriculum.

A cartoon depiction of the four main characters standing together.
Akila, Bai, Carly and Jabari must solve a series of puzzles from the cyberworld.

The comic book, designed by media artist D.A. Jackson[18], begins when three friends – Akila, Carly and Bai – find a West African souvenir box belonging to Akila’s grandma. Akila takes a picture of the box with her tablet. Suddenly, she and her friends are sucked into a mysterious cyberworld.

As Akila narrates the story, students follow the girls and her little brother, Jabari, who communicates with the girls through the tablet. They crack codes and ciphers and solve puzzles. They also learn the history of cryptology and basics of cybersecurity to help the girls escape the cyberworld.

The six chapters of the comic book progress from basic information about codes and symbols to current cybersecurity practices such as creating safe passwords. Children explore important historical developments in cryptology approaches and technologies like the Navajo Code Talkers[19] and the WAVES program[20]. The Navajo Code Talkers were U.S. Marines of Navajo descent who used their native language to send secret messages over radio waves during WWII. WAVES – Women Accepted for Voluntarily Emergency Service – was a division of the U.S. Navy in which female cryptologists worked during WWII.

Children also use a variety of ciphers and codes to encrypt and decrypt information. This helps the comic book characters during their cyberadventure. Activities are grounded in symbols from different cultures such as a scytale from Greece, pictograms from West African and Native American culture and Freemason Pigpen ciphers[21].

In one panel a pink and blue colored heart is painted on a rock. Another panel shows missing letters in a text, and a final panel shows a soldier holding a spear in his hand.
Symbols and codes from different cultures hold important information for the main characters to use.

The curriculum culminates with games and simulations in which the children learn about cybersecurity. They learn to defend their device against the person who hacked Akila’s tablet. They learn about safe password practices and how to protect themselves from brute force[22] password cracking – that is, using a program or guesswork to try every possible password combination; phishing scams[23] that use fake emails to get people to click on malicious links; and social engineering[24] attacks.

[Too busy to read another daily email? Get one of The Conversation’s curated weekly newsletters[25].]

For example, the comic book characters learn about social engineering when they go back in time to the British Government Code and Cypher School – now known as GCHQ[26]. This is where they meet a WAVES[27] servicewoman named Dorothy who turns out to be Akila’s grandma. They also meet Alan Turing[28], a real-life WWII cryptoanalyst.

Dorothy, Alan and the comic book characters work to crack a briefcase password using a letter found on a spy. Meanwhile, students participating in the curriculum work to crack the code via a simulation. Students learn that social engineering is a process hackers use to figure out passwords based on personal information such as a birth dates or names of family members.

A comic book panel shows a letter written from a young girl asking her grandfather to attend a birthday party.
Social engineering tactics are a gateway for hackers to get private information.

Preparing for cybersecurity careers

Over 200 elementary school-age students – 73% girls – from diverse backgrounds in 16 after-school programs across the Southeastern U.S. have participated in CryptoComics[29]. Preliminary research[30], which we oversaw, has found that children enjoy the curriculum, learn how to encrypt and decrypt information in different ways and demonstrate awareness of cybersecurity professions. They also transfer knowledge and skills gained in CryptoComics to real-life experiences.

Teachers we have spoken with also say the curriculum “can be a game changer” for participating girls. The teachers report that students “quickly retained” concepts such as enciphering and deciphering – making and breaking different kinds of messages and codes.

Some students struggled with reading the comic book. They said they wanted audio support but they didn’t want a monotone computer voice. Instead, they wanted the audio “to act like the characters.” As a result, we recruited local voice actors[31] to narrate the comic book.

The narration can be used by students who struggle with reading or who simply prefer listening to stories. Teachers confirmed that “the narrated version of the actual comic book itself has helped tremendously.” It has made the curriculum more accessible for struggling readers.

Tremendous career opportunities[32] exist in cybersecurity. CryptoComics represents just one way to better position young children – and especially young girls – to take advantage of these opportunities.

References

  1. ^ CryptoComics (www.youtube.com)
  2. ^ cybersecurity (www.cisa.gov)
  3. ^ teaches about cryptology (www.techtarget.com)
  4. ^ educators and researchers (cryptocomics.org)
  5. ^ CryptoComics (www.nsf.gov)
  6. ^ cryptocomics.org (cryptocomics.org)
  7. ^ educational technology (scholar.google.com)
  8. ^ STEM education (scholar.google.com)
  9. ^ early research (cryptocomics.org)
  10. ^ two per school day (www.bloomberg.com)
  11. ^ public Wi-Fi (www.consumer.ftc.gov)
  12. ^ in demand for the foreseeable future (www.bls.gov)
  13. ^ projects 33% growth in jobs (www.bls.gov)
  14. ^ highly underrepresented (theconversation.com)
  15. ^ only 11% (www.bls.gov)
  16. ^ often don’t see themselves (theconversation.com)
  17. ^ can be changed (doi.org)
  18. ^ D.A. Jackson (www.linkedin.com)
  19. ^ Navajo Code Talkers (www.intelligence.gov)
  20. ^ WAVES program (www.britannica.com)
  21. ^ Freemason Pigpen ciphers (cyber.org)
  22. ^ brute force (www.imperva.com)
  23. ^ phishing scams (www.scamwatch.gov.au)
  24. ^ social engineering (www.webroot.com)
  25. ^ Get one of The Conversation’s curated weekly newsletters (memberservices.theconversation.com)
  26. ^ GCHQ (www.gchq.gov.uk)
  27. ^ WAVES (www.britannica.com)
  28. ^ Alan Turing (www.nytimes.com)
  29. ^ CryptoComics (stemforall2021.videohall.com)
  30. ^ Preliminary research (cryptocomics.org)
  31. ^ local voice actors (cryptocomics.org)
  32. ^ career opportunities (www.isc2.org)

Read more https://theconversation.com/comic-book-introduces-kids-to-key-concepts-and-careers-in-cybersecurity-171163

Times Magazine

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

From Beach Bops to Alpine Anthems: Your Sonos Survival Guide for a Long Weekend Escape

Alright, fellow adventurers and relaxation enthusiasts! So, you've packed your bags, charged your devices, and mentally prepared for that glorious King's Birthday long weekend. But hold on, are you really ready? Because a true long weekend warrior kn...

Effective Commercial Pest Control Solutions for a Safer Workplace

Keeping a workplace clean, safe, and free from pests is essential for maintaining productivity, protecting employee health, and upholding a company's reputation. Pests pose health risks, can cause structural damage, and can lead to serious legal an...

The Times Features

Tricia Paoluccio designer to the stars

The Case for Nuturing Creativity in the Classroom, and in our Lives I am an actress and an artist who has had the privilege of sharing my work across many countries, touring my ...

Duke of Dural to Get Rooftop Bar as New Owners Invest in Venue Upgrade

The Duke of Dural, in Sydney’s north-west, is set for a major uplift under new ownership, following its acquisition by hospitality group Good Beer Company this week. Led by resp...

Prefab’s Second Life: Why Australia’s Backyard Boom Needs a Circular Makeover

The humble granny flat is being reimagined not just as a fix for housing shortages, but as a cornerstone of circular, factory-built architecture. But are our systems ready to s...

Melbourne’s Burglary Boom: Break-Ins Surge Nearly 25%

Victorian homeowners are being warned to act now, as rising break-ins and falling arrest rates paint a worrying picture for suburban safety. Melbourne residents are facing an ...

Exploring the Curriculum at a Modern Junior School in Melbourne

Key Highlights The curriculum at junior schools emphasises whole-person development, catering to children’s physical, emotional, and intellectual needs. It ensures early year...

Distressed by all the bad news? Here’s how to stay informed but still look after yourself

If you’re feeling like the news is particularly bad at the moment, you’re not alone. But many of us can’t look away – and don’t want to. Engaging with news can help us make ...