
Comic-BEE is a National Cybersecurity Awareness Month (NCSAM) Champion! To help emphasize the role each individual plays in online safety and the need for everyone to take action, we are providing free access to branching, interactive web comics about cybersecurity.
Here are some ideas on how you can use the comics during NCSAM activities:
A ‘conversation starter’ for your NCSAM activity: start off by reading a comic about a related topic, explore different scenarios and see what happens with different choices, individually or as a group.
Continue your NCSAM activity engagement: send a link to a comic after your event and see if your audience can apply what they learned.
A game or challenge! Comic-BEE will provide up to 25 free challenges on a first come, first served basis. We keep track of each player’s choices and time, and then automatically score each player. Each free challenge has a limit of 50 participants; if you are interested in a larger group, please contact us directly.
- We provide you with 50 anonymous access codes to distribute to your users.
- Challenge participants will see their individual score immediately after playing the comic.
- Complete scores and rankings will be emailed to you at the end of your challenge period.
- You can manually create a leaderboard – players give you their scores as they get them.
Registration is required to access these comics – see the simple form below. Please allow 1-2 business days to receive your link to the comics.
Access to NCSAM comics will expire November 1, 2019 at 11:59 PM EST.
Cyber Hygiene: PROTECT IT
Robin, a middle school student, tackles topics such as passwords setting up home wireless routers, securely configuring a browser, cell phones and apps, anti-virus, and connecting to public WiFi networks. Can she help keep her family secure online?
Target: Middle school students and older, parents and grandparents
Time: 5 – 8 minutes
Supplemental materials:
Keep a clean machine – https://stopthinkconnect.org/campaigns/keep-a-clean-machine-campaign
Learn about malware, botnets & ransomware – https://staysafeonline.org/stay-safe-online/online-safety-basics/malware-and-botnets/
Securing Your Wireless Network – https://www.consumer.ftc.gov/articles/0013-securing-your-wireless-network
Cyber Ethics in School
Seventh-grader Emma learns all about the challenges of ethics in the digital era as she campaigns for Vice President of her Student Council – will her campaign be a success or failure? You decide!
Target: Middle school students and older, parents and adults, educators
Time: 5 – 8 minutes
Supplemental materials:
Know the Rules of Cyber Ethics – https://www.cisecurity.org/daily-tip/know-the-rules-of-cyber-ethics/
Parents: raising privacy savvy kids – https://stopthinkconnect.org/resources/preview/tips-for-parents-on-raising-privacy-savvy-kids
Kids and Socializing Online – https://www.consumer.ftc.gov/articles/0012-kids-and-socializing-online
A Day In the Life: OWN IT
An average day for a busy, modern family in today’s connected world reveals the cybersecurity challenges encountered by a middle school student. Online gaming platforms, cell phone apps, virtual home assistants and other internet connected home devices (the Internet of Things) means protecting data and privacy from threats such as phishing and ransomware – even kids can be affected by weak cybersecurity!
Target: 6-10 minutes
Time: Middle school students and older, parents and adults
Supplemental materials:
Security & privacy in the connected home – https://www.cisecurity.org/newsletter/security-and-privacy-in-the-connected-home/
Parents: rethink safety rules with your teens – https://stopthinkconnect.org/resources/preview/rethink-cyber-safety-rules-and-the-tech-talk-whith-your-teens
Gaming tips for kids, tweens and teens – https://stopthinkconnect.org/resources/preview/tip-sheet-gaming-tips-for-kids-tweens-and-teens
Cyber Crime Investigation
Join the cyber crime investigation team at the National Bureau of Investigations as they investigate the theft of millions of dollars from multiple banks. See how criminals’ “digital footprints” leave clues while you learn about some of the different cybersecurity work roles. See if you can catch the all the hackers and other criminals involved in this cyber crime! Based on the real world Lurk malware investigation.
Target: 7-12 minutes
Time: Middle school, high school and college students, adults
Supplemental materials:
Technology checklist for businesses – https://stopthinkconnect.org/resources/preview/technology-checklist-for-businesses
Cybersecurity misconceptions for mall & medium businesses – https://staysafeonline.org/cybersecure-business/cybersecurity-misconceptions-smb/
Consider a career in cybersecurity – https://www.cisecurity.org/blog/why-consider-a-career-in-cybersecurity/