1. K-State home
  2. »Information Technology Services
  3. »IT Security
  4. »Cyber Security Awareness Month at K-State
  5. »Cyber Security Awareness Poster and Video Contest

Information Technology Services

Cyber Security Awareness Poster and Video Contest

Win prizes, gain experience, earn recognition!

Information Technology Services is conducting a contest in search of posters and videos of two minutes or less developed by K-State students, for students that focuses on information security topics and how to best handle them.

Prizes will be awarded for first ($200) and two honorable mentions ($25) in both video and poster for a total of six prizes in the form of Visa gift cards. Winning entries also will be featured on K-State’s websites and social media pages, and may be used in campus security awareness campaigns.

Poster and video entries will be judged on creativity, content, and overall effectiveness of delivery by representatives from the Student Technology Committee, the Faculty Senate Committee on Technology, the Office of Mediated Education, and the Information Technology Assistance Center.

Deadline for submission is October 31, 2017. Winners will be notified on November 14, 2017.

Contestant Guidelines

  • You must be a currently enrolled K-State student.
  • An individual student or a group of students may submit a video and/or poster.
  • Only one video and/or poster submission is permissible.
  • Departmental sponsorship of a video and/or poster submission is not allowed.
  • Submissions must be made online.
  • Contestants must be willing to make minor adjustments if deemed necessary as specified based on feedback from the judges. To be eligible to receive the cash prizes, contestants must acknowledge and make the necessary corrections within 15 to 30 days of notification.

Content Guidelines

  • May be about general security awareness or focus on one specific topic.
  • Must use correct and consistent spelling, punctuation, grammar, and capitalization in all submissions.
  • To coincide with Cyber Security Awareness month, we ask that creators use the STOP. THINK. CONNECT message in some way in the poster and video. For example, creators might include the message at the end of the video, showing the words somewhere in the video, or simply say the phrase within the video.
  • Must be generic (do not reference any specific college or university, applications, or vendors).
  • Must be in good taste and appropriate for multicultural and university populations.
  • Must address topics that will retain relevance for one to two years (avoid narrow technology-specific topics such as a specific threat, virus, and so forth).
  • Must be original and not infringe upon any copyright, trademark, or other proprietary right.

Poster Guidelines

  • Each poster entry must be original artwork by student(s) for a broad student audience. Professional assistance is not allowed and will disqualify any entry.
  • Digital resolution of each entry must be sufficient to be printed at a maximum of 24 inches by 36 inches without print scaling (minimum 300 dpi).
  • Students should leave 1.5 inches of white space at the bottom of the poster to allow for the addition of sponsor and/or institutional logos.
  • Posters must be submitted in PDF format. File size should not exceed 25MB. The artist is responsible for conversion to digital format.

Video Guidelines

  • Professional (paid) assistance may not be used in production of the video and will be grounds for disqualification.
  • Faculty advisors may offer support by directing contestants to other students for assistance but cannot aid in the creative process.
  • Minimal credits (limited to 10 seconds) are allowed (but not required) at the end of the videos.
  • All videos must include a written transcript submitted as a word document (.doc) or text file (.txt) so that closed captions can be added.
  • Videos must be submitted in .mp4 format.

Suggested Topics

Ideas for topics include, but are not limited, to:

  • Antivirus
  • Cybersafety; staying safe online
  • Internet of Things (IoT)
  • Malware and ransomware
  • Passwords
  • Phishing
  • Physical security
  • Privacy
  • Safeguarding data and personal information
  • Security of personally owned devices or mobile devices (BYOD)
  • Security risks of peer-to-peer (P2P) file sharing
  • Sharing data
  • Social engineering
  • Wi-Fi security