GCHQ to test UK citizens' ability to prevent cyber attacks

Surveillance service teams up with Cyber Security Challenge to help uncover new infosecurity experts

Cyber security

UK surveillance service GCHQ has teamed up with the Cyber Security Challenge (CSC) to launch a virtual game, dubbed Astute Explorer, to encourage more people to consider a career in information security.

In the game, which is named after GCHQ's automated code scanning tool, players are tasked with deciphering a code to locate vulnerabilities, and explain how hackers could exploit these to carry out a cyber attack against fictitious aerospace and engineering company Ebell Technologies.

Stephanie Daman, CEO of the Cyber Security Challenge, said: "Astute Explorer is an ingenious game from GCHQ which will not only provide an enjoyable challenge but will test skills that are in high demand by employers in this sector."

The game is part of a series of initiatives that Cyber Security Challenge has rolled out over the past year, and follows on from a task set by security vendor Sophos over the weekend, which asked the public to analyse a hard drive obtained from faux hacking group the Flag Day Associates.

As a result of that task, participants were made aware of a cyber threat by the Flag Day Associates against Ebell, and the shape that potential attack could take is what Astute Explorer is designed to ascertain.

This is the fourth year CSC has run a national competition like this, designed to draw talented people into the cyber security profession. GCHQ is one of CSC's platinum sponsors and one of the three UK-based intelligence agencies.

 Participants who show the most promise will be invited to report for duty at secret locations scattered around the UK, investigating face-to-face in teams.

Successful candidates will take on the Flag Day Associates hacker group at the Masterclass final next year. Anyone living in the UK is invited to participate.

Those interested in taking part can register to play here

Featured Resources

Virtual desktops and apps for dummies

An easy guide to virtual desktop infrastructure, end-user computing, and more

Download now

The total economic impact of optimising and managing your hybrid multi-cloud

Cost savings and business benefits of accelerating the cloud journey

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

What’s next for the education sector?

A new learning experience

Download now

Recommended

Russian spy chief rebuffs “pathetic” SolarWinds hack accusations
cyber attacks

Russian spy chief rebuffs “pathetic” SolarWinds hack accusations

18 May 2021
Data breaches increase by a third as staff continue to work from home
cyber security

Data breaches increase by a third as staff continue to work from home

17 May 2021
What is phishing?
phishing

What is phishing?

17 May 2021
Cisco to acquire threat intelligence provider Kenna Security
Acquisition

Cisco to acquire threat intelligence provider Kenna Security

14 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021