Telling Cyber Security Stories … and Coffee Cups

In Cyber Security we like to talk about stories, and to relate them to real-life. So Bruce Schneier — the person who got me hooked on…

Telling Cyber Security Stories … and Coffee Cups

In Cyber Security we like to talk about stories, and to relate them to real-life. So Bruce Schneier — the person who got me hooked on cryptography — came up with a whole lot of roles. The most important were: Bob, Alice and Eve. But there were a whole lot of other characters… can you find them from this picture:

I will put the answers way down the page …

Here are the characters we use for Bob, Eve, Alice and Trent (in a clockwise direction starting from the large graphic):

I even has a T-shirt with Eve on it and some ciphers:

And some props:

And I even have them on the wall of my office:

So when I go into the Starbucks at Bruntsfield (just down the road from our Merchiston Campus):

I like to give my Cyber Security name on the coffee cup, so I give them my Cyber name. So here they are … first I asked for Carol, but they give me “Karol”:

And I really felt like a trusted person the day I used “Trent”:

And then I was the evil one (Mallory), but you can tell they didn’t quite believe my name:

Then “Bobalice” — pronounced “Bob -a-leese” … sounds kinda Italian:

And then “Bob — eve”, which definitely sounds Italian:

And for Walter — the warden — I had to try twice:

And when I finally called myself “Eve”, I got this:

Conclusions

Forget those people who scare you about cyber security. It’s also fun and is helping build a new world!

Answers

How many did you get? Here’s the answers: