What to expect

The topic of network security, from the first internet “worm” to sophisticated state-sponsored cyberattacks and everything in between.

When Mary Queen of Scots plotted with Babington to assassinate her sister Queen Elizabeth I she replaced letters and common words with symbols in her messages to him (see Figure 10.2). Sadly for her the Queen’s cryptanalyst (code-breaker) Walsingham knew about frequency analysis and was able to decipher the messages. Despite a distraught Mary proclaiming, “I would never make shipwreck of my soul by conspiring the destruction of my dearest sister”, the decrypted messages and Babington’s confession ensured a guilty verdict and Mary paid the ultimate price in 1587.


Resources mentioned in the chapter:

NCCE resources for this topic including concept map and full teaching materials are here:
Security (

DEFCON social engineering demonstration

Klez, Mydoom viruses etc.

Cloudflare lava lamps – the story

Hacking a car through the stereo:–music-can-take-control-of-your-car.html

Password resources:

SWGFL password advice.

Open University Password Checker

Password Strength Checker (

Coding a Password Checker | 101 Computing

SQL Injection resources

SQL Injection Tutorial (

SQL Injection Demo (

Phishing tests

Jigsaw/Google Phishing Quiz

What is Phishing? Take the OpenDNS Phishing Quiz

Encryption resources

My Python Caesar Cipher code – Replit

Symmetric vs. Asymmetric Encryption | 101 Computing

Unplugged resources

100 Ideas for Secondary Teachers: Outstanding Computing Lessons – Simon Johnson: Bloomsbury Education

Physical Computing ideas

If you have a networked Raspberry Pi you can create a web server with a page that is vulnerable to SQL Injection using these tutorials:

Project work – competitions

CyberFirst Girls Competition – NCSC.GOV.UK

CyberCenturion – Cyber Security Challenge UK

Cyber Discovery: HM Government’s Cyber Schools Programme (