![Carol small](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Carol-small.png?resize=200%2C209) | Carol Cyber: Bank manager. Married to Bob |
![Bob small](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Bob-small.png?resize=200%2C162) | Bob Cyber: Bob works for a very large software company |
![Oscar small](https://i0.wp.com/security-literacy.org/wp-content/uploads/2015/08/Oscar-small.png?resize=132%2C300) | Oscar Cyber: Oscar is in the 5th grade |
![Alice small 3](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Alice-small-3.png?resize=200%2C200) | Alice Cyber; 18 year old high school student |
![David](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/David.png?resize=132%2C195) | David Cyber: 21 year old college student |
![Sam](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Sam.png?resize=213%2C212) | Security Sam: |
![Dawn](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Dawn.png?resize=203%2C253) | Detective Dawn: Dawns is a cyber security expert and works in the cyber crime division of the local police and is on lone from the FBI |
![Flo](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Flo.png?resize=194%2C185) | Fix-it Flo: Flo runs the local computer shop. |
![Phil small](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Phil-small.png?resize=200%2C200) | Phishing Phil |
![Trudy small](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Trudy-small.png?resize=200%2C261) | Intruder Trudy |
![Eve small](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Eve-small.png?resize=200%2C201) | Eavesdropping Eve |
![Paula small](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Paula-small.png?resize=200%2C261) | Posting Paula |
![Ivan](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Ivan.png?resize=200%2C176) | ID Ivan |
![Malory small](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Malory-small.png?resize=200%2C200) | Malicious Malory |
![Brian](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Brian.png?resize=200%2C200) | Bully Brian |
| Malware Morrie |
![Red Virus](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/Red-Virus.png?resize=200%2C200) | Virus Vicky |
![worm](https://i0.wp.com/www.security-literacy.ece.iastate.edu/wp-content/uploads/2015/06/worm.png?resize=200%2C169) | Wormy Wally |