Cybersecurity risk has traditionally been driven by the engineering and physical sciences where risk is seen as knowable and measurable.
‘Specimens of IT Fauna’ is one example of this human-centred approach and is the result of a collaboration between social scientists, designers, and technologists. The aim of this project was to use critical design to encourage cybersecurity practitioners and policymakers to re-conceptualise cybersecurity risk and think about technology in new and different ways.
These artefacts demonstrate the way critical design can be used to reflect on our understanding of cybersecurity and to envision future risks in a creative way.
Specimens of IT fauna
The internet is ubiquitous, yet its detailed inner workings remain wrapped in mystery. We rely on a wide range of myths, metaphors and mental-models to describe and communicate the network’s abstract concepts and processes. Packets, viruses, worms, trojan horses, crawlers, and cookies are all part of this imaginary bestiary of software.
This new mythology is one of technological wonders, such as live streams and cloud storage, but also of traps, monsters and malware agents. Folk tales of technology, however abstract and metaphorical, serve as our references and guidelines when it comes to making decisions and protecting ourselves from attacks or dangers.
Between educational props and memorabilia, this series of objects visualises and celebrates the abstract bestiary of the internet and acts as a tangible starting point to discuss our relationship to IT technology.
The web-crawler (also known as web-spider or web-robot) methodically patrols the network to index its contents.
- STP Wire Cat 6E
- Content =”follow”
Low Orbit Ion Cannon
The Low Orbit Ion Cannon is a powerful weapon in the video game Command and Conquer. It is also the name of a piece of software used to carry out denial of service attacks.
- Botnet Zombies
- Botnet Handler
- Attack Leader
- DDoS Target
Blaster worm in SD card
Computer worms are standalone malware programs have the ability to replicate and spread their malicious ‘payload’ to other computers on a network.
- Data Damage
The artefacts were produced as part of the Visualisation and Other Methods of Expression (VOME) project, which was funded by the UK’s Engineering and Physical Sciences Research Council (Grant number: EP/G002347/1).
As part of CREST’s commitment to open access research, this text is available under a Creative Commons BY-NC-SA 4.0 licence. Please refer to our Copyright page for full details.