We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to our use of cookies.

Enter Site

Videos

Cyberuk2019 highlights

Cyber Accelerator demo day

Cyber Growth animation

TIGHS CyberFirst Adventures

CYBERUK2019 FiveEyes Highlights

CyberFirst Girls Competition 2019

CYBERUK2019 Schools Event

Can you guess the most hacked passwords? Select a category:




1.
2.
3.
4.
5.

Drag the passwords to where they ranked

Source: The list was created in April 2019 after breached usernames and passwords published on Have I Been Pwned website.

Crack the code using an ADFGVX cipher

How it works

In cryptography, the ADFGVX cipher was a field cipher originally used by the German Army during World War I. The cipher is named after the six possible letters used in the ciphertext: A, D, F, G, V and X. These letters were chosen deliberately because they sound very different from each other when transmitted via morse code. The intention was to reduce the possibility of operator error.



If you want some help to crack the code, please use this online decoder. However, if you'd like to work it out yourself please contact enquiries@ncsc.gov.uk for the factsheet.

Find the hidden message in the annual review

Enter the encoded message

Your decoded message:

Re-order using a transposition key:

Hint: It's an acronym...

C C N S
X G A A
A A A D
V D A D
A A G F
D A G F
V D A G
A V G F
D A D G
G X A D
A F D D
A V D A
G X A D
D V G A
F D D F
G A A G
G A A V
F D D G
A G G A
D A F D
A V G D
V G A A
V D D A
G G A D
V X A A
N C S C
A X A G
A A D A
A V D D
G A F A
G D D A
A V G D
G A F V
D D G A
A G D X
D A D F
D A A V
A G D X
G D A V
D F F D
A G G A
A G V A
D F G D
G A A G
F D D A
G A D V
A V A G
D V A D
A G D G
A V A X

Decode using a substitution key:

Hint: It's something that we do.

A D F G V X
A C Y B E R S
D U I T A D F
F G H J K L M
G N O P Q V W
V X Z 1 2 3 4
X 5 6 7 8 9 0

Your decoded message:

Case study:

Cyber Accelerator: Nettoken

Simonetta d’Ottaviano is CEO of Nettoken, an identity management platform designed to encourage awareness of an individual’s expanding digital footprint, helping improve their personal security. The platform keeps track of all of a subscriber’s online accounts, making everything accessible from a single control panel.

“The average internet user is signed up to around 150 active accounts, putting them at high risk of cybercrime,” says Simonetta, who co-founded the firm with Charlotte Slingsby and Ela Neagu while completing her master’s in engineering.

“We realised that most cyber security products are designed for businesses and we wanted to look at it from an individual’s point of view.”

They designed a management platform for a user’s digital identity; a way of organising multiple online accounts, which also acts as a single password manager.

“Nettoken provides an overview of all the services that you may have signed up for, whether it was to book a flight or create a new WIFI access. It acts as a manager which puts them into groups, your shopping accounts in one, utilities and financial accounts in another.”

She explains: “We wanted to create a usable tool that has cyber security embedded, without the user having to worry too much about it.“

The service is already proving popular and the company is aiming to soon reach 5,000 paying customers.

Simonetta believes Nettoken has benefited greatly from being included in the NCSC Cyber Accelerator programme.

“Taking part in the programme was very important to challenge us and build our credibility. The team was very encouraging, and to have access to their technical expertise was invaluable. It’s been a brilliant experience for us to be mentored and assisted by the NCSC.”

Case study:

Cyber Accelerator: LuJam

Five years ago, Tim Moran set up LuJam Cyber to combat a major challenge in cyber security, encouraging SMEs to understand that whatever their size, they are not immune to attacks.

Last year, 31% of all SMEs suffered from hostile incidents and, as Tim states, “The worst thing is that the majority of these attacks were preventable. Many of these companies are relying on a firewall and antivirus alone, often because other forms of protection are too expensive.”

Tim recognised that SMEs require similar levels of security to larger enterprises but delivered in a way that is easy for a business owner to use and understand, without needing to be an IT specialist. After attracting investors to match a £250,000 grant won from Innovate UK – as well as selling his house to raise more capital along the way – Bristol-based LuJam launched a subscription service offering customers full protection against the latest cyber threats for all of their devices.

“Following extensive trials, we were ready to provide companies with cyber security software at a competitive price. Our goal is to help Managed Service Providers (MSPs) take their customers on a steady journey to improved cyber hygiene.

“Our service is powered by cloud analytics and network scanning that discovers IT assets, assesses risks, blocks bad connections and provides continuous monitoring.”

LuJam spent nine months working with the NCSC, an experience Tim views as incredibly rewarding. After five years of development, the future looks bright for the company, which is now in trials with several major partners and investors.

Tim says: “Our solution is applicable anywhere in the world and we are already involved in a number of initiatives in Commonwealth countries. We’ve also started to explore much larger opportunities in cyber insurance, enterprise supply chains and enterprise homeworkers.”

Click and drag to view

“The
progress
we
have
made
on
‘Secure
by
Design’
has
been
the
product
of
a
great
partnership
between
DCMS
and
the
NCSC.
Both
on
the
development
of
standards
that
are
based
in
the
language
of
our
Code
of
Practice,
or
through
productive
challenge
sessions
on
our
future
regulation
proposals,
we
work
together
as
a
united
front
towards
our
ambition
of
protecting
citizens
and
the
wider
economy
from
harm.”

Case studies

Protecting Airports

The NCSC has been tackling the abuse of public sector email domains in the UK. One such incident occurred when criminals tried to send in excess of 200,000 emails purporting to be from a UK airport, using a non-existent gov.uk address in a bid to defraud people. However, the emails never reached the intended recipients’ inboxes because the Active Cyber Defence system automatically detected the suspicious domain name and the recipients’ mail providers never delivered the spoof messages. The email account used by the criminals to communicate with victims was also taken down.

Protecting Emergency Services

Two fire services merged to form a new super service with a new name and associated internet domain. One of the organisations subsequently deregistered their original domain. However in just three months, Synthetic DMARC blocked more than 150,000 emails from this now non-existent domain. There is no way of knowing whether these were as a result of fraudulent purposes or misconfiguration, but shows the necessity to correctly curate domains throughout their lifecycle.

“Digital
technology
continues
to
change
the
way
that
elections
are
run
and
fought;
it
also
changes
the
way
that
voters
are
informed
and
influenced.
Since
its
creation,
the
NCSC
has
provided
valued
support
to
the
Commission
and
wider
electoral
sector,
to
mitigate
the
risks
posed
by
these
innovations.
We
welcome
their
important
role
in
supporting
the
ongoing
integrity
of
elections
in
the
UK.”

“Our
engagement
with
the
NCSC
has
helped
us
to
establish
our
executive
agency,
Social
Security
Scotland,
followed
by
the
launch
of
our
public
facing
cloud
based
digital
platform,
which
underpins
the
delivery
of
the
first
live
devolved
benefit
payments
Scotland.
The
NCSC
has
provided
us
with
expert
advice
and
guidance
through
technical
workshops
and
engaging
its
partners
to
share
experiences.
This
has
given
us
valuable
assurance
in
support
of
our
strategic
security
objectives
and
our
own
‘Secure
by
Design’
principle.”

“We
have
made
significant
investments
in
improving
our
cyber
defences
and
cyber
hygiene.
The
NCSC
has
proven
to
be
an
expert
advisor
in
defining
and
refining
our
requirements,
most
especially
in
our
plans
to
implement
a
Security
Information
and
Events
Management
Service
and
associated
Security
Operating
Centre.
Their
experience
of
forensics,
analytics,
alerts
and
appropriate
approaches
to
monitoring
has
been
invaluable.”

“The
NCSC
continues
to
provide
valuable
advice
and
guidance
for
us
to
share
with
Welsh
stakeholders
which
greatly
contributes
to
increasing
cyber
security
capability
within
Wales.
We
value
the
engagement
and
ongoing
support
in
several
areas,
including
increasing
take
up
of
Active
Cyber
Defence
tools
in
the
Welsh
public
sector
and
encouraging
participation
of
Welsh
students
on
CyberFirst
courses.”

Keeping the lights on

A successful cyber attack against the energy sector could disrupt the fuel and power supplies our country so heavily relies on. That’s why the NCSC’s work with energy firms has been diverse and extensive.

This year the NCSC worked with one of the UK’s largest oil refineries to review and advise on an upgrade to its systems, greatly increasing its resilience. The NCSC’s Cyber Adversary Simulation team also conducted an exercise against a critical supplier of road fuels, which identified vulnerabilities that the company has since protected itself against.

In partnership with the Department for Business, Energy and Industrial Strategy (BEIS), the NCSC held a complex technical exercise with electricity distribution network operators. It was the culmination of a two-year project and involved more than 170 participants at 13 different UK locations to test the sector’s response to a national-level incident.

Digital integration is only adding to the security challenge. The NCSC’s recent review of smart metering infrastructure for BEIS, and the recommendations it produced, is one illustration of how the NCSC works with government departments to ensure the highest cyber security standards across the sector.

Threats to air passenger data

The aviation sector has continued to be an attractive target for cyber attackers. Airlines store vast amounts of personal identifiable information (PII), which criminals can sell or use for spear phishing and identity theft. State actors may also be interested in airline PII for counter-intelligence purposes or tracking dissidents.

The NCSC’s work with the sector has included assisting UK airlines targeted by a group known as Chafer. This group, which security companies have linked to Iran, has a history of targeting global organisations for bulk personal data sets. The NCSC helped the airlines identify potential risks to their networks and offered mitigation advice, minimising the impact.

It has also continued working with NATS, the main air navigation service provider in the UK, to review the cyber security of their air traffic control and management system.

“The
NCSC’s
world-class
capabilities
and
analysis
have
underpinned
UK
government
attributions
of
malign
cyber
attacks.
On
the
international
front,
the
relationships
it
has
built
and
the
cyber
capacity
building
programmes
it
has
supported
continue
to
play
a
vital
role
in
delivering
for
Global
Britain.”

“The
CyberFirst
Bursary
scheme
has
been
the
best
thing
I’ve
ever
done
in
my
life
and
has
opened
so
many
doors
for
me.
I’ve
had
the
opportunity
to
meet
new
people,
make
new
connections
and
gain
new
skills.”

“The
competition
has
helped
me
learn
lots
of
new
things
that
I
had
never
heard
of
before.
It
opened
my
eyes
to
what
cyber
security
is
really
like,
and
what
it
takes
to
become
a
cyber
security
professional.
There
aren’t
many
girls
in
cyber
security,
so
it
is
important
to
encourage
more
to
get
involved.”

Bletchley Park section at 'Top Secret' at the Science Museum
© Jody Kingzett, Science Museum Group

“For
the
first
time
the
public
will
be
given
a
glimpse
into
our
secret
history
of
amazing
intelligence,
world-leading
innovation,
and
most
of
all
brilliant
people.
And
as
the
threats
to
the
UK
become
more
diverse
and
complex
it’s
a
chance
to
encourage
the
next
generation
of
recruits.
Because
at
GCHQ
we
believe
that
with
the
right
mix
of
minds,
anything
is
possible.”

Her Majesty The Queen unveils an historic plaque at Watergate House, the 1919 birthplace of GCHQ