Cyberuk2019 highlights
Cyber Accelerator demo day
Cyber Growth animation
TIGHS CyberFirst Adventures
CYBERUK2019 FiveEyes Highlights
CyberFirst Girls Competition 2019
CYBERUK2019 Schools Event
Source: The list was created in April 2019 after breached usernames and passwords published on Have I Been Pwned website.
In cryptography, the ADFGVX cipher was a field cipher originally used by the German Army during World War I. The cipher is named after the six possible letters used in the ciphertext: A, D, F, G, V and X. These letters were chosen deliberately because they sound very different from each other when transmitted via morse code. The intention was to reduce the possibility of operator error.
If you want some help to crack the code, please use this online decoder. However, if you'd like to work it out yourself please contact enquiries@ncsc.gov.uk for the factsheet.
Hint: It's an acronym...
C | C | N | S |
---|---|---|---|
X | G | A | A |
A | A | A | D |
V | D | A | D |
A | A | G | F |
D | A | G | F |
V | D | A | G |
A | V | G | F |
D | A | D | G |
G | X | A | D |
A | F | D | D |
A | V | D | A |
G | X | A | D |
D | V | G | A |
F | D | D | F |
G | A | A | G |
G | A | A | V |
F | D | D | G |
A | G | G | A |
D | A | F | D |
A | V | G | D |
V | G | A | A |
V | D | D | A |
G | G | A | D |
V | X | A | A |
N | C | S | C |
---|---|---|---|
A | X | A | G |
A | A | D | A |
A | V | D | D |
G | A | F | A |
G | D | D | A |
A | V | G | D |
G | A | F | V |
D | D | G | A |
A | G | D | X |
D | A | D | F |
D | A | A | V |
A | G | D | X |
G | D | A | V |
D | F | F | D |
A | G | G | A |
A | G | V | A |
D | F | G | D |
G | A | A | G |
F | D | D | A |
G | A | D | V |
A | V | A | G |
D | V | A | D |
A | G | D | G |
A | V | A | X |
Hint: It's something that we do.
A | D | F | G | V | X | |
---|---|---|---|---|---|---|
A | C | Y | B | E | R | S |
D | U | I | T | A | D | F |
F | G | H | J | K | L | M |
G | N | O | P | Q | V | W |
V | X | Z | 1 | 2 | 3 | 4 |
X | 5 | 6 | 7 | 8 | 9 | 0 |
Simonetta d’Ottaviano is CEO of Nettoken, an identity management platform designed to encourage awareness of an individual’s expanding digital footprint, helping improve their personal security. The platform keeps track of all of a subscriber’s online accounts, making everything accessible from a single control panel.
“The average internet user is signed up to around 150 active accounts, putting them at high risk of cybercrime,” says Simonetta, who co-founded the firm with Charlotte Slingsby and Ela Neagu while completing her master’s in engineering.
“We realised that most cyber security products are designed for businesses and we wanted to look at it from an individual’s point of view.”
They designed a management platform for a user’s digital identity; a way of organising multiple online accounts, which also acts as a single password manager.
“Nettoken provides an overview of all the services that you may have signed up for, whether it was to book a flight or create a new WIFI access. It acts as a manager which puts them into groups, your shopping accounts in one, utilities and financial accounts in another.”
She explains: “We wanted to create a usable tool that has cyber security embedded, without the user having to worry too much about it.“
The service is already proving popular and the company is aiming to soon reach 5,000 paying customers.
Simonetta believes Nettoken has benefited greatly from being included in the NCSC Cyber Accelerator programme.
“Taking part in the programme was very important to challenge us and build our credibility. The team was very encouraging, and to have access to their technical expertise was invaluable. It’s been a brilliant experience for us to be mentored and assisted by the NCSC.”
Five years ago, Tim Moran set up LuJam Cyber to combat a major challenge in cyber security, encouraging SMEs to understand that whatever their size, they are not immune to attacks.
Last year, 31% of all SMEs suffered from hostile incidents and, as Tim states, “The worst thing is that the majority of these attacks were preventable. Many of these companies are relying on a firewall and antivirus alone, often because other forms of protection are too expensive.”
Tim recognised that SMEs require similar levels of security to larger enterprises but delivered in a way that is easy for a business owner to use and understand, without needing to be an IT specialist. After attracting investors to match a £250,000 grant won from Innovate UK – as well as selling his house to raise more capital along the way – Bristol-based LuJam launched a subscription service offering customers full protection against the latest cyber threats for all of their devices.
“Following extensive trials, we were ready to provide companies with cyber security software at a competitive price. Our goal is to help Managed Service Providers (MSPs) take their customers on a steady journey to improved cyber hygiene.
“Our service is powered by cloud analytics and network scanning that discovers IT assets, assesses risks, blocks bad connections and provides continuous monitoring.”
LuJam spent nine months working with the NCSC, an experience Tim views as incredibly rewarding. After five years of development, the future looks bright for the company, which is now in trials with several major partners and investors.
Tim says: “Our solution is applicable anywhere in the world and we are already involved in a number of initiatives in Commonwealth countries. We’ve also started to explore much larger opportunities in cyber insurance, enterprise supply chains and enterprise homeworkers.”
Click and drag to view
The NCSC has been tackling the abuse of public sector email domains in the UK. One such incident occurred when criminals tried to send in excess of 200,000 emails purporting to be from a UK airport, using a non-existent gov.uk address in a bid to defraud people. However, the emails never reached the intended recipients’ inboxes because the Active Cyber Defence system automatically detected the suspicious domain name and the recipients’ mail providers never delivered the spoof messages. The email account used by the criminals to communicate with victims was also taken down.
Two fire services merged to form a new super service with a new name and associated internet domain. One of the organisations subsequently deregistered their original domain. However in just three months, Synthetic DMARC blocked more than 150,000 emails from this now non-existent domain. There is no way of knowing whether these were as a result of fraudulent purposes or misconfiguration, but shows the necessity to correctly curate domains throughout their lifecycle.
A successful cyber attack against the energy sector could disrupt the fuel and power supplies our country so heavily relies on. That’s why the NCSC’s work with energy firms has been diverse and extensive.
This year the NCSC worked with one of the UK’s largest oil refineries to review and advise on an upgrade to its systems, greatly increasing its resilience. The NCSC’s Cyber Adversary Simulation team also conducted an exercise against a critical supplier of road fuels, which identified vulnerabilities that the company has since protected itself against.
In partnership with the Department for Business, Energy and Industrial Strategy (BEIS), the NCSC held a complex technical exercise with electricity distribution network operators. It was the culmination of a two-year project and involved more than 170 participants at 13 different UK locations to test the sector’s response to a national-level incident.
Digital integration is only adding to the security challenge. The NCSC’s recent review of smart metering infrastructure for BEIS, and the recommendations it produced, is one illustration of how the NCSC works with government departments to ensure the highest cyber security standards across the sector.
The aviation sector has continued to be an attractive target for cyber attackers. Airlines store vast amounts of personal identifiable information (PII), which criminals can sell or use for spear phishing and identity theft. State actors may also be interested in airline PII for counter-intelligence purposes or tracking dissidents.
The NCSC’s work with the sector has included assisting UK airlines targeted by a group known as Chafer. This group, which security companies have linked to Iran, has a history of targeting global organisations for bulk personal data sets. The NCSC helped the airlines identify potential risks to their networks and offered mitigation advice, minimising the impact.
It has also continued working with NATS, the main air navigation service provider in the UK, to review the cyber security of their air traffic control and management system.
Bletchley Park section at 'Top Secret' at the Science Museum
© Jody Kingzett, Science Museum Group
Her Majesty The Queen unveils an historic plaque at Watergate House, the 1919 birthplace of GCHQ