A Narrative Resource for Fundamental Ideas

Explaining aspects of cyber security to younger kids can be daunting, but there are some tools that can help, including a popular cartoon about a family of anthropomorphic dogs living in Australia. The majority of kids (and adults) learn best through narrative storytelling, so using a resource like a short television show to link an entertaining story to an idea can improve information retention. We will take a look at two episodes of the show, Bluey*, and how they can be used to explain cybersecurity ideas in a way that will stick with kiddos, or anyone.

First, A Little Data on Kids and the Internet

Without fear mongering, we can safely say that unmonitored time on the internet is risky for kids. A Global Cybersecurity Forum report that surveyed 25,000 kids puts some hard data behind that statement:

  • Over 90% of kids between the ages of 8-17 are on the internet
  • 40% of kids are online by age 8
  • 72% of kids have been the victim of cyber threats
  • 17% have been the victim of various hacking or phishing* attempts

According to a 2022 Javelin study “One in 43 children experienced the exposure of personal information in the past year.”

Kids and Tech: Balance Between Safe and Practical

It’s common knowledge that we live in a digital world, and the expectation that kids will be able fully engage with that world without being online, at the very least leaves them at a disadvantage in many ways. Limiting screen time and other methods can reduce the occurrence of adverse online interactions, but total mitigation of the danger is virtually impossible. 

All of that said, the outlook is not totally bleak. Teaching kids to responsibly handle technology and making sure they are informed of possible dangers before they arise not only helps them navigate online, but also the “real world” as well. 

So, without further preamble, let’s take a look at what Bluey has to say about Cybersecurity!

Teaching Kids About Scareware – Episode 3.16 “Phones”

Despite security measures, if your child browses the internet long enough it is almost certain that they will eventually come across a pop-up that claims they have “been infected with a virus” or “downloaded malware.” This can be a frightening experience for a child who has not encountered social engineering threats like Scareware which is an effective tactic for getting kids to click on malicious links that claim to offer a solution to a problem.

Our Bluey Example:

While playing a game of Food Delivery, Mort (the grandfather) attempts to “scare” Bluey and Bingo into downloading and clicking on his “Croc Catcher” app by hiding a stuffed crocodile in their delivery basket. Upon discovery of the unexpected reptile, Bluey quickly “loads-down” the app and Mort swoops in to save the day. 

In this example there is no malicious intent, but, with a little imagination, kids can see how someone is able to create a scary situation and trick them into taking an action online without thinking. The rest of the episode has an added bonus of a little social commentary on the isolating effects of excessive screen time and diminished social interaction through technology, but you can address that one on your own 🙂 

These days, when kids have the opportunity to browse the internet at an early age, it is important that they are equipped with knowledge to handle situations that might “pop up.”

Teaching Kids about Ethical Hacking – Episode 3.9 “Magic”

Kids are adapting to technology earlier and at a rapid rate of progression. In that timeframe, they may discover ways to circumvent systems or manipulate networks. There are a whole spectrum of reactions that parents can have to this behavior, but they generally fall into two broad categories – discourage or guide.

Our Bluey Example:

When Bingo wants Mum, who is taking some relaxing time, to play with her, Bluey teaches Bingo “magic” (it’s pretend) that allows her to control people in order to play with them. When things inevitably get out of hand, Mum reminds Bluey of the most important rule of magic – “Magic should only be used to help people.” Bluey becomes a tyrant, using her magic to control others and satisfy her own ends, but Bingo decides to use her magic for good and restores balance in the home.

A quote that is sometimes misattributed to Peter Parker/Spider Man (of course Uncle Ben is the source) states that “With great power comes great responsibility.” If you have a curious youngster who shows aptitude regarding technology, it would be wise to instill the wisdom of Uncle Ben. Instead of trying to suppress their superpower, show them that it can be used for good.

There are several resources that can help guide kids in harnessing their love of finding vulnerabilities in systems such as educational games, courses, or even ethical hacking summer camps. Another narrative that could be shared with older kids is Darknet Diaries: Episode 61 “Samy” which tells the true story of Samy Kamkar who developed a childhood interest in learning how systems could be manipulated, got into a little trouble, and eventually used his skills for good.

In Parting…

Parenting in any era has its challenges and one of ours happens to be the explosion of technology and nearly unfettered interconnectivity. Keeping our kids informed about cyber-safety can seem like a full time task in some seasons of life, but there is a constant that parents can rely on to aid in imparting wisdom – simple narrative stories. 

I have found Bluey to be a great segway into conversations with my kids about important subjects, such as online safety. Have you come across a clever way of teaching kids lessons about cyber security? Please share!

* You can stream Bluey on Disney+. Each episode has a runtime of about 8 minutes and is acceptable for all ages.

* Phishing refers to a tactic where someone pretends to be a person or company you would normally trust in order to obtain private information from you.

About the Author: Josh Daniels

Josh is an avid storyteller and writer who loves learning about the behind-the-scenes of the digital world we live in. While his professional experience is in content marketing, Josh began pursuing a career in cybersecurity in 2022, gaining a Sec+ certificate along with other training from industry professionals and a life long learner attitude.

When he is not writing, Josh enjoys outdoor adventures with his family, watching movies, reading, and an unofficial (unpaid) side gig as a Game Master Consultant for several friends who play table top RPGs. At TCM, Josh has found a home where his passion for storytelling and cybersecurity meet.

“Once men turned their thinking over to machines in the hope that this would set them free. But that only permitted other men with machines to enslave them.”
– Frank Herbert

About TCM Security

TCM Security is a veteran-owned, cybersecurity services and education company founded in Charlotte, NC. Our services division has the mission of protecting people, sensitive data, and systems. With decades of combined experience, thousands of hours of practice, and core values from our time in service, we use our skill set to secure your environment. The TCM Security Academy is an educational platform dedicated to providing affordable, top-notch cybersecurity training to our individual students and corporate clients including both self-paced and instructor-led online courses as well as custom training solutions. We also provide several vendor-agnostic, practical hands-on certification exams to ensure proven job-ready skills to prospective employers.

Pentest Services: https://tcmdev.tcmsecurity.com/our-services/
Follow Us: Blog | LinkedIn | YouTube | Twitter | Facebook | Instagram
Contact Us: sales@tcm-sec.com

See How We Can Secure Your Assets

Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.

 

tel: (877) 771-8911 | email: info@tcm-sec.com